Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems., , and . ACM Workshop on Role-Based Access Control, page 1-12. ACM, (1997)Object-Oriented Databases., and . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases., , and . Symposium on Reliability in Distributed Software and Database Systems, page 57-69. IEEE Computer Society, (1983)Trigger Inheritance and Overriding in an Active Object Database System., , and . IEEE Trans. Knowl. Data Eng., 12 (4): 588-608 (2000)Manipulating Spatial Data in Constraint Databases., , and . SSD, volume 1262 of Lecture Notes in Computer Science, page 115-141. Springer, (1997)Self-Generating Policies for Machine Learning in Coalition Environments., , , , , , , , , and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 42-65. Springer, (2018)Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems., , and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 359-373. Springer, (1994)Matching an XML Document against a Set of DTDs., , and . ISMIS, volume 2366 of Lecture Notes in Computer Science, page 412-422. Springer, (2002)Privacy-Preserving Trust Negotiations., , and . Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, page 283-301. Springer, (2004)High-Assurance Integrity Techniques for Databases., , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)