Author of the publication

Decomposition of Multilevel Objects in an Object-Oriented Database.

, , , and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 375-402. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Negotiating and delegating obligations., , and . MEDES, page 281-288. ACM, (2010)Building a Fair System Using Access Rights., , and . ICISS, volume 10063 of Lecture Notes in Computer Science, page 89-108. Springer, (2016)A Certificate-Less Key Exchange Protocol for IoT., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 65-79. Springer, (2018)A Posteriori Analysis of Policy Temporal Compliance., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 133-148. Springer, (2020)Model-Driven Extraction and Analysis of Network Security Policies., , , , and . MoDELS, volume 8107 of Lecture Notes in Computer Science, page 52-68. Springer, (2013)Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective., , , , , and . PST, page 362-365. IEEE Computer Society, (2013)Revocation Schemes for Delegation Licences., , , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 190-205. Springer, (2008)OPA: Onion Policy Administration Model - Another approach to manage rights in DRM., , and . SEC, volume 232 of IFIP, page 349-360. Springer, (2007)FORM : A Federated Rights Expression Model for Open DRM Frameworks., , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 45-59. Springer, (2006)Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment., , , and . IAS, page 197-203. IEEE, (2010)