From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trigger Inheritance and Overriding in an Active Object Database System., , и . IEEE Trans. Knowl. Data Eng., 12 (4): 588-608 (2000)An Access Control System for Digital Libraries and the Web: The Ma$X$ Prototype Demonstration, , и . Research and Advanced Technology for Digital Libraries, 6th European Conference, ECDL 2002, Rome, Italy, September 16-18, 2002, Proceedings, том 2458 из Lecture Notes in Computer Science, стр. 656-657. Springer, (2002)Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases., , и . Symposium on Reliability in Distributed Software and Database Systems, стр. 57-69. IEEE Computer Society, (1983)Object-Oriented Databases., и . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems., , и . ACM Workshop on Role-Based Access Control, стр. 1-12. ACM, (1997)An Approach to Integrate Multimedi Data in a Knowledge Representation System., , и . Advanced Visual Interfaces, том 36 из World Scientific Series in Computer Science, стр. 109-123. World Scientific, (1992)Learning information release policies for preventing intersection attacks., , и . MILCOM, стр. 794-799. IEEE, (2017)Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation., и . DEXA, стр. 500-507. Springer, (1990)Systematic clustering method for l-diversity model., , , и . ADC, том 104 из CRPIT, стр. 93-102. Australian Computer Society, (2010)Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application., , , , и . Communications and Multimedia Security, том 175 из IFIP, стр. 159-171. Springer, (2004)