{"id":"https://openalex.org/W1966264882","doi":"https://doi.org/10.1016/0167-4048(91)90068-o","title":"Integrity principles and mechanisms in database management systems","display_name":"Integrity principles and mechanisms in database management systems","publication_year":1991,"publication_date":"1991-08-01","ids":{"openalex":"https://openalex.org/W1966264882","doi":"https://doi.org/10.1016/0167-4048(91)90068-o","mag":"1966264882"},"language":"en","primary_location":{"id":"doi:10.1016/0167-4048(91)90068-o","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(91)90068-o","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038692973","display_name":"Ravi Sandhu","orcid":"https://orcid.org/0000-0002-3165-1813"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ravi Sandhu","raw_affiliation_strings":["Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A","Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A","institution_ids":[]},{"raw_affiliation_string":"Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A.#TAB#","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A","Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A","institution_ids":[]},{"raw_affiliation_string":"Center for Secure Information Systems and Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, U.S.A.#TAB#","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038692973"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.14063599,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"10","issue":"5","first_page":"413","last_page":"427"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8364709615707397},{"id":"https://openalex.org/keywords/terminology","display_name":"Terminology","score":0.6953208446502686},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.567287802696228},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.547228991985321},{"id":"https://openalex.org/keywords/database-security","display_name":"Database security","score":0.5453235507011414},{"id":"https://openalex.org/keywords/relational-database-management-system","display_name":"Relational database management system","score":0.5233399271965027},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5056664943695068},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4884249269962311},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.47926923632621765},{"id":"https://openalex.org/keywords/database-design","display_name":"Database design","score":0.448127418756485},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3227711319923401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23341459035873413}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8364709615707397},{"id":"https://openalex.org/C547195049","wikidata":"https://www.wikidata.org/wiki/Q1725664","display_name":"Terminology","level":2,"score":0.6953208446502686},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.567287802696228},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.547228991985321},{"id":"https://openalex.org/C2778553114","wikidata":"https://www.wikidata.org/wiki/Q1035293","display_name":"Database security","level":2,"score":0.5453235507011414},{"id":"https://openalex.org/C24394798","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database management system","level":3,"score":0.5233399271965027},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5056664943695068},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4884249269962311},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.47926923632621765},{"id":"https://openalex.org/C148840519","wikidata":"https://www.wikidata.org/wiki/Q1049878","display_name":"Database design","level":2,"score":0.448127418756485},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3227711319923401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23341459035873413},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/0167-4048(91)90068-o","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(91)90068-o","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.86.9439","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.9439","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.list.gmu.edu/journals/csec/c91int.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320312726","display_name":"University of Oregon","ror":"https://ror.org/0293rh119"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W72966216","https://openalex.org/W151842453","https://openalex.org/W178848230","https://openalex.org/W590536527","https://openalex.org/W1528150469","https://openalex.org/W1549617594","https://openalex.org/W1987377478","https://openalex.org/W2009285751","https://openalex.org/W2062373477","https://openalex.org/W2065076704","https://openalex.org/W2095881341","https://openalex.org/W2096014157","https://openalex.org/W2105332409","https://openalex.org/W2105508709","https://openalex.org/W2106887953","https://openalex.org/W2122789628","https://openalex.org/W2143509186","https://openalex.org/W2144984544","https://openalex.org/W2152505375","https://openalex.org/W2168098409","https://openalex.org/W2293634425","https://openalex.org/W2621165795","https://openalex.org/W4210930851","https://openalex.org/W6602917166","https://openalex.org/W6606128883","https://openalex.org/W6675768837","https://openalex.org/W6675913266","https://openalex.org/W6681326468","https://openalex.org/W6681525158","https://openalex.org/W6682897138"],"related_works":["https://openalex.org/W3085968255","https://openalex.org/W2505630977","https://openalex.org/W2383709723","https://openalex.org/W325713583","https://openalex.org/W1567213510","https://openalex.org/W2512945146","https://openalex.org/W2392855649","https://openalex.org/W2626533837","https://openalex.org/W2375584934","https://openalex.org/W41925032"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
