From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Integrated Management of Security Policies.. DBSec, том 6818 из Lecture Notes in Computer Science, стр. 12-13. Springer, (2011)One-to-One Personalization of Data-Intensive Web Sites., , , и . WebDB (Informal Proceedings), стр. 1-6. INRIA, (1999)Active Rule Management in Chimera, , , и . Active Database Systems: Triggers and Rules For Advanced Database Processing, Morgan Kaufmann, (1996)Chimera: A Language for Designing Rule Applications., и . Active Rules in Database Systems, Springer, New York, (1999)Extending Loose Associations to Multiple Fragments., , , , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2013)Declarative Specification of Constraint Maintenance., , и . ER, том 881 из Lecture Notes in Computer Science, стр. 205-222. Springer, (1994)Choosing reputable servents in a P2P network., , , , и . WWW, стр. 376-386. ACM, (2002)Key management for multi-user encrypted databases., , , , , и . StorageSS, стр. 74-83. ACM, (2005)Supporting Concurrency in Private Data Outsourcing., , , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 648-664. Springer, (2011)Active Rules for XML: A New Paradigm for E-Services., , и . TES, стр. 77-94. (2000)