“…Some previous work (Andrews et al, 1995;Creech, 1996;Kappe, 1995), while enforcing referential integrity to the web, impose custom-made (or customized) authoring, visualization or administration schemes. However, for transparency reasons and ease of deployment, it would be preferable to have a system that would enforce referential integrity on the web, to content providers and subscribers, in a mostly transparent manner, i.e., based solely on proxying with minor server and/or client extensions.…”