共 50 条
- [34] Algorithms for Efficient Biometric Systems to Mitigate the Integrity of a Distributed Database [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2018), 2018, : 238 - 242
- [35] An integrity lock architecture for supporting distributed authorizations in database federations [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 189 - +
- [37] Survivability and applicability in database constraints: Temporal boundary to data integrity scenarios [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 518 - 522
- [38] FUNCTIONAL-DEPENDENCIES TO ENFORCE INTEGRITY CONSTRAINTS IN DATABASE MACHINE ENVIRONMENTS [J]. COMPUTING SYSTEMS, 1991, 6 (02): : 91 - 101