{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T19:07:06Z","timestamp":1760296026181},"reference-count":23,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1016\/s0169-023x(99)00042-7","type":"journal-article","created":{"date-parts":[[2003,4,23]],"date-time":"2003-04-23T16:16:34Z","timestamp":1051114594000},"page":"291-313","source":"Crossref","is-referenced-by-count":4,"title":["Towards generating a data integrity standard"],"prefix":"10.1016","volume":"32","author":[{"given":"Moshe","family":"Zviran","sequence":"first","affiliation":[]},{"given":"Chanan","family":"Glezer","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-023X(99)00042-7_BIB1","unstructured":"E.M. Awad, M.H. Gotterer, Database Management, Boyd and Fraser Publishing Company, 1992"},{"issue":"7","key":"10.1016\/S0169-023X(99)00042-7_BIB2","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1016\/0167-4048(93)90085-J","article-title":"Report on an integrity research study group","volume":"12","author":"Abrams","year":"1993","journal-title":"Computers and Security"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB3","doi-asserted-by":"crossref","unstructured":"L.K. Barker, L.D. Nelson, Security standards \u2013 government and commercial, AT&T Technical Journal, 1988, pp. 9\u201318","DOI":"10.1002\/j.1538-7305.1988.tb00626.x"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB4","doi-asserted-by":"crossref","unstructured":"L. Badger, A model for specifying multi-granularity integrity policies, in: Proceedings of the 1989 IEEE Symposium on Security and Privacy, April 1989, pp. 84\u201391","DOI":"10.1109\/SECPRI.1989.36301"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB5","unstructured":"D.E. Bell, L.J. LaPadula, Secure Computer Systems: Mathematical Foundations and Model, The Mitre Corporation, Bedford, MA, November 1973"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB6","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0169-023X(97)00049-9","article-title":"Data security","volume":"25","author":"Bertino","year":"1998","journal-title":"Data & Knowledge Engineering"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB7","unstructured":"K.J. Biba, Integrity Considerations for Secure Computer Systems, The Mitre Corporation, Bedford, MA, April 1977"},{"issue":"3","key":"10.1016\/S0169-023X(99)00042-7_BIB8","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1145\/185827.185828","article-title":"Automatic generation of production rules for integrity constraints","volume":"19","author":"Ceri","year":"1994","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB9","unstructured":"S. Ceri, F. Garziotti, Specification and management of database integrity constraints through logic programming, Polytechnic di Milano, Technical Report 88-025, 1988"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB10","doi-asserted-by":"crossref","unstructured":"D.D. Clark, D.R. Wilson, A comparison of commercial and military security policies, in: Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987, pp. 184\u2013194","DOI":"10.1109\/SP.1987.10001"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB11","unstructured":"C.J. Date, An introduction to Database Systems, sixth ed., Addison-Wesley, New York, 1995"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB12","unstructured":"DoD, Trusted Computer System Evaluation Criteria, US Department of Defense, National Computer Security Center, August 1983"},{"year":"1981","series-title":"Database Security and Integrity","author":"Fernandez","key":"10.1016\/S0169-023X(99)00042-7_BIB13"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB14","unstructured":"R.R. Henning, S.A. Walker, Data integrity vs data security: a workable compromise, in: Proceedings of the 10th National Computer Security Conference, October 1987"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB15","doi-asserted-by":"crossref","unstructured":"G. Moerkotte, P.C. Lockemann, Reactive consistency control in deductive databases, ACM Transactions on Database Systems, 1991, pp. 52\u201364","DOI":"10.1145\/115302.115298"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB16","doi-asserted-by":"crossref","unstructured":"A., Motro, Integrity=validity+completeness, ACM Transactions on Database Systems, 1989, pp. 480\u2013502","DOI":"10.1145\/76902.76904"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB17","unstructured":"C. Pfleeger, Security in Computing, second ed., Prentice-Hall, Englewood Cliffs, NJ, 1997"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB18","unstructured":"J.E. Roskos, S.R. Welke, J.M. Boone, T. Mayfield, Integrity in the Department of Defense Computer Systems, IDA Paper P-2316, Institute of Defense Analysis, 1990"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB19","doi-asserted-by":"crossref","unstructured":"Z.G. Ruthberg, W.T. Polk, Report of the Invitational Workshop on Data Integrity, Government Printing Office, 1989","DOI":"10.6028\/NIST.SP.500-168"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB20","doi-asserted-by":"crossref","unstructured":"P. Terry, S. Wiseman, A new security policy model, in: Proceedings of the IEEE Computer Society Symposium on Security and Privacy, May 1989","DOI":"10.1109\/SECPRI.1989.36296"},{"key":"10.1016\/S0169-023X(99)00042-7_BIB21","unstructured":"S. Walke, J. Roskos, J. Boone, T., Mayfield, Taxonomy of integrity models, implementations and mechanisms, in: Proceedings of the 13th National Computer Security Conference, October 1990"},{"issue":"1","key":"10.1016\/S0169-023X(99)00042-7_BIB22","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1093\/comjnl\/17.1.17","article-title":"Methodology of computer systems design","volume":"17","author":"Waters","year":"1974","journal-title":"The Computer Journal"},{"issue":"3","key":"10.1016\/S0169-023X(99)00042-7_BIB23","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1093\/comjnl\/36.3.227","article-title":"Evaluating password techniques for multilevel authentication mechanisms","volume":"36","author":"Zviran","year":"1993","journal-title":"The Computer Journal"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X99000427?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X99000427?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T04:59:47Z","timestamp":1578459587000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X99000427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["S0169023X99000427"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(99)00042-7","relation":{},"ISSN":["0169-023X"],"issn-type":[{"type":"print","value":"0169-023X"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}