Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Updating Replicated Data During Communications Failures., and . VLDB, page 49-58. Morgan Kaufmann, (1985)Generating and Manipulating Identifiers for Heterogeneous, Distributed Objects., and . POS, page 235-247. Springer, (1989)Surrogate Parenthood: Protected and Informative Graphs, , , , and . CoRR, (2011)Flexible Security Policies for Digital Libraries., , and . ACM Comput. Surv., 28 (4es): 110 (1996)Fast Methods for Testing Quantified Relational Calculus Assertions., and . SIGMOD Conference, page 39-50. ACM Press, (1982)A model of atomicity for multilevel transactions., , , and . S&P, page 120-134. IEEE Computer Society, (1993)Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases., , and . DBSec, volume A-47 of IFIP Transactions, page 109-121. North-Holland, (1993)Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data., , and . VLDB, page 126-136. IEEE Computer Society, (1980)CAD/CAM Database Management., , , , and . IEEE Database Eng. Bull., 7 (2): 12-20 (1984)Capturing Provenance in the Wild., , , and . IPAW, volume 6378 of Lecture Notes in Computer Science, page 98-101. Springer, (2010)