From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic Generation of Production Rules for Integrity Maintenance., , , и . ACM Trans. Database Syst., 19 (3): 367-422 (1994)Run-time Detection of Non-Terminating Active Rule Systems., , и . DOOD, том 1013 из Lecture Notes in Computer Science, стр. 38-54. Springer, (1995)Integrity for distributed queries., , , , , и . CNS, стр. 364-372. IEEE, (2014)An authorization model for query execution in the cloud., , , , , и . VLDB J., 31 (3): 555-579 (2022)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , и . VLDB, стр. 123-134. ACM, (2007)Fragments and Loose Associations: Respecting Privacy in Data Publishing., , , , и . Proc. VLDB Endow., 3 (1): 1370-1381 (2010)DockerPolicyModules: Mandatory Access Control for Docker containers., , , и . CNS, стр. 749-750. IEEE, (2015)Assessing query privileges via safe and efficient permission composition., , , , и . ACM Conference on Computer and Communications Security, стр. 311-322. ACM, (2008)The IDEA Web Lab., , и . SIGMOD Conference, стр. 587-589. ACM Press, (1998)XML-GL: A Graphical Language for Querying and Reshaping XML Documents., , , , , и . QL, W3C, (1998)