Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The state of the art of knowledge engineering at five Japanese Research Institutes - a travel report.. Future Gener. Comput. Syst., 3 (1): 37-49 (1987)Constraint Modelling Using a Conceptual Prototyping Language., , , , and . Data Knowl. Eng., (1987)WorkFlow Analyzed for Security and Privacy in using Databases., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 271-282. Kluwer, (2000)WordNet++: A Lexicon Supporting the Color-X Method., , and . NLDB, volume 1959 of Lecture Notes in Computer Science, page 1-16. Springer, (2000)Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy?, and . WebNet, AACE, (1997)Formal justification in object-oriented modelling: A linguistic approach., , and . Data Knowl. Eng., 33 (1): 25-47 (2000)BASIS - An Interactive System for the Introductory Course in Informatics.. IFIP Congress, page 347-351. (1977)Privacy and security in information systems using programming language features, , , and . Information Systems, 8 (2): 95--103 (1983)WordNet - An Electronic Lexical Database, , , , , , , , , and 14 other author(s). MIT Press, (1998)A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace., , , and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 287-301. Springer, (2000)