Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiments in Benchmarking Relational Database Machines., , , , , and . IWDM, page 106-134. Springer, (1983)An Object-Oriented Approach to Security Policies and their Access Controls for Database Management.. Future Databases, volume 3 of Advanced Database Research and Development Series, page 8-25. World Scientific, Singapore, (1992)Information Secure Systems., and . Advances in Computers, (1976)Michael E. Senko: 1931-1978.. ACM Trans. Database Syst., 4 (3): 261 (1979)A parallel, scalable, microprocessor-based database computer for performance gains and capacity growth.. IEEE Micro, 11 (6): 44-60 (1991)Database Access Control in the Presence of Context Dependent Protection Requirement., , and . IEEE Trans. Software Eng., 5 (4): 349-358 (1979)Database Security Course Module.. DBSec, page 269-301. North-Holland, (1987)A computer-aided benchmarking system for parallel and expandable database computers., , , and . FJCC, page 475-482. ACM, (1987)The Federated Databases and System: A New Generation of Advanced Database Systems., , and . DEXA, page 186-190. Springer, (1990)The Impact of the Interconnecting Network on Parallel Database Computers.. IWDM, volume 43 of The Kluwer International Series in Engineering and Computer Science, page 216-224. Kluwer, (1987)