Author of the publication

Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.

, and . ESORICS, volume 2502 of Lecture Notes in Computer Science, page 39-54. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inference-Proof View Update Transactions with Minimal Refusals., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 104-121. Springer, (2011)A Foundation of Codd's Relational Maybe-Operations.. ACM Trans. Database Syst., 8 (4): 608-636 (1983)Controlled Query Evaluation for Known Policies by Combining Lying and Refusal., and . FoIKS, volume 2284 of Lecture Notes in Computer Science, page 49-66. Springer, (2002)Optimistic Anonymous Participation in Inter-organizational Workflow Instances., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 86-100. Springer, (2006)On Inference-Proof View Processing of XML Documents., and . IEEE Trans. Dependable Secur. Comput., 10 (2): 99-113 (2013)Preserving confidentiality while reacting on iterated queries and belief revisions., and . Ann. Math. Artif. Intell., 73 (1-2): 75-123 (2015)Privacy Respecting Permissions and Rights.. DBSec, page 173-185. North-Holland, (1987)Administration Rights in the SDSD-System., , and . DBSec, volume 142 of IFIP, page 149-162. Kluwer/Springer, (2003)Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses.. VIS, volume 271 of Informatik-Fachberichte, page 1-21. Springer, (1991)Confidentiality enforcement by hybrid control of information flows., , and . CoRR, (2017)