[1]
M. Badawy and K. Richta, “Deriving Triggers from Integrity Constraint Specifications in the Database Management Systems”, Acta Polytech, vol. 41, no. 6, Jan. 2001.