Author of the publication

Deriving Authorizations from Process Analysis in Legacy Information Systems.

, and . SEC, volume 92 of IFIP Conference Proceedings, page 56-67. Chapman & Hall, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Deriving Global Authorizations in Federated Database Systems.. DBSec, volume 79 of IFIP Conference Proceedings, page 58-75. Chapman & Hall, (1996)An XML-based Interorganizational Knowledge Mediation Scheme to Support B2B Solution., , and . DS-9, volume 239 of IFIP Conference Proceedings, page 121-135. Kluwer, (2001)Reusability-based comparison of requirement specification methodologies., , , and . Methods and Associated Tools for the Information Systems Life Cycle, volume A-55 of IFIP Transactions, page 63-84. Elsevier, (1994)Database Security., , , and . Addison-Wesley & ACM Press, (1995)Exploiting Schema Knowledge for the Integration of Heterogeneous Sorces., , , , and . SEBD, page 103-120. (1998)Information Integration on Multiple Heterogeneous Data Sources., , , and . SEBD, page 155-170. (1998)A uniform framework for Web data modeling and integration., , , and . SEBD, page 153-166. (2000)Exploratory Analysis of Web Information Resources., , and . SEBD, page 248-255. Curran Associates, Inc., (2015)Classificazione di schemi entita'-relazione basata su tecniche neurali., and . SEBD, page 365-383. STAR - Servizio Tecnografico Area Ricerca CNR, Pisa, (1996)Securing XML Documents with Author-X., , and . IEEE Internet Comput., 5 (3): 21-31 (2001)