Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Policies for Data Management - Making Policies Mobile., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 63-75. Kluwer, (2000)Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture., and . DBSec, volume A-21 of IFIP Transactions, page 249-266. North-Holland, (1992)A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks., , , , and . PiLBA, volume 397 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques., , , , and . PiLBA, volume 397 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)Authentication and Integrity in Telecommunication Signaling Network., , and . ECBS, page 163-170. IEEE Computer Society, (2005)Access rule consistency in cooperative data access environment., , and . CollaborateCom, page 11-20. ICST / IEEE, (2012)Polyinstantiation Integrity in Multilevel Relations., and . S&P, page 104-115. IEEE Computer Society, (1990)Secure Mediated Databases., , and . ICDE, page 28-37. IEEE Computer Society, (1996)An Architecture for Supporting Interoperability among Temporal Databases., , and . Temporal Databases, Dagstuhl, volume 1399 of Lecture Notes in Computer Science, page 36-55. Springer, (1997)Keep a Few: Outsourcing Data While Maintaining Confidentiality., , , , , and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 440-455. Springer, (2009)