Author of the publication

Countermeasures for Protecting Legally Sensitive Web-Powered Databases and Web Portals.

, and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SQL Code Poisoning.. Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Benchmarking and Data Generation in Moving Objects Databases.. Encyclopedia of Database Technologies and Applications, Idea Group, (2005)History-independence: a fresh look at the case of R-trees.. SAC, page 7-12. ACM, (2012)Quadtrees (and Family)., and . Encyclopedia of Database Systems (2nd ed.), Springer, (2018)Processing skyline queries in temporal databases., , and . SAC, page 893-899. ACM, (2017)Processing of Spatio-Temporal Queries in Image Databases., , and . ADBIS, volume 1691 of Lecture Notes in Computer Science, page 85-97. Springer, (1999)Time split linear quadtree for indexing image databases., , and . ICIP (2), page 733-736. IEEE, (2001)Overlapping B+-Trees: An Implementation of a Transaction Time Access Method., , and . Data Knowl. Eng., 29 (3): 381-404 (1999)SOPE: A Spatial Order Preserving Encryption Model for Multi-dimensional Data., , and . CoRR, (2017)Countermeasures for Protecting Legally Sensitive Web-Powered Databases and Web Portals., and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)