“…The process of evaluating this changed state against the integrity rules is then described in section 4 while finally our conclusions are presented in section 5. This work is an extension to the programme of research, by the authors, into the generation, evaluation and application of rules in databases [6,7,8,11].…”