Author of the publication

Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.

, , , , and . Communications and Multimedia Security, volume 175 of IFIP, page 159-171. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MIST 2016: 8th International Workshop on Managing Insider Security Threats., and . ACM Conference on Computer and Communications Security, page 1890-1891. ACM, (2016)A Logical Approach to Cooperative Information Systems., , , and . J. Log. Program., 43 (1): 15-48 (2000)Editorial: Special Issue on Data Transparency - Uses Cases and Applications., and . ACM J. Data Inf. Qual., 14 (2): 6:1-6:3 (2022)Security-Aware Service Composition with Fine-Grained Information Flow Control., , , and . IEEE Trans. Serv. Comput., 6 (3): 330-343 (2013)Efficient and privacy-preserving enforcement of attribute-based access control., , and . IDtrust, page 63-68. ACM, (2010)Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records., , , and . ACM Trans. Priv. Secur., 22 (3): 15:1-15:36 (2019)On Using Materialization Strategies for a Temporal Authorization Model., , , , and . VIEWS, page 34-42. (1996)The Update Problem in the Distributed Database System Hermes/1., , and . ICOD, page 317-331. Wiley Heyden Ltd., (1983)5G Security and Privacy: A Research Roadmap., , and . CoRR, (2020)Towards a contextualized access to the cultural heritage world using 360 Panoramic Images., , , , and . SEKE, page 416-419. (2006)