Author of the publication

Privacy and security in information systems using programming language features

, , , and . Information Systems, 8 (2): 95--103 (1983)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy and security in information systems using programming language features, , , and . Information Systems, 8 (2): 95--103 (1983)A graphp-oriented model for articulation of ontology interdependencies, , and . Proceedings of Conference on Extending Database Technology (EDBT-2000), Konstanz (Germany), (March 2000)Crossing the Divide Between Computer Vision and Databases in Search of Image Databases., , and . VDB, volume 126 of IFIP Conference Proceedings, page 223-239. Chapman & Hall, (1998)The Complexity of Transformation-Based Join Enumeration., , and . VLDB, page 306-315. Morgan Kaufmann, (1997)Goblin: a DBPL designed for Advanced Database Applications.. DEXA, page 345-349. Springer-Verlag, Wien, (1991)Query Optimization Strategies for Browsing Sessions., and . FMLDO, volume 93/9 of Informatik-Berichte des IfI, page 69-84. Technische Universität Clausthal, (1993)MIL Primitives for Querying a Fragmented World, and . VLDB J., 8 (2): 101--119 (October 1999)Instant-On Scientific Data Warehouses - Lazy ETL for Data-Intensive Research., , , , and . BIRTE, volume 154 of Lecture Notes in Business Information Processing, page 60-75. Springer, (2012)Content-Based Retrieval in Multimedia Databases Based on Feature Models., and . AMCP, volume 1554 of Lecture Notes in Computer Science, page 119-130. Springer, (1998)X-device query processing by bitwise distribution., , , and . DaMoN, page 48-54. ACM, (2012)