1. Abrams, M.D., Amoroso, E.G., LaPadula, L.J., Lunt, T.F. and Williams, J.G. (1993) Report of an Integrity Research Study Group. Computers 6 Security, 12, 679–89.
2. Bertino, E., Bettini, C., Ferrari, E. and Samarati, P. (1996) A Decentralized Temporal Authorization Model, in Information Systems Security—Facing the Information Society of the 21st Century (eds. S.K. Katsikas and D Gritzalis) Chapman & Hall, London, 271–80.
3. Ceri, S. and Widom, J. (1993) Managing Semantic Heterogeneity with Production Rules and Persistent Queues. Proceedings of the 19th VLDB Conference, Dublin, Ireland, 108–19.
4. Chawathe, S.S., Garcia-Molina, H. and Widom, J. (1993) Constraint Management in Loosely Coupled Distributed Databases. Technical report, Computer Science Department, Stanford University.
5. Chawathe, S.S., Garcia-Molina, H. and Widom, J. (1996) A Toolkit for Constraint Management in Heterogeneous Information Systems, in Proceedings of the Twelfth International Conference on Data Engineering (ed. S.Y.W. Su) IEEE Computer Society, Los Alamitos, CA, 56–65.