Author of the publication

Access Control and Management in Multilevel Database Models.

, and . ECI, volume 123 of Lecture Notes in Computer Science, page 225-235. Springer, (1981)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database Security., , , and . Addison-Wesley & ACM Press, (1995)Optimal File Allocation in a Computer Network: a Solution Method Based on the Knapsack Problem., , and . Comput. Networks, 6 (5): 345-357 (1982)A new approach to security system development., , and . NSPW, page 82-88. IEEE Computer Society Press, (1994)Conceptual Modelling of Security Information in Distributed Database Systems., and . DDSS, page 153-167. North-Holland, (1984)A Database Approach to Modelling and Managing Security Information, and . VLDB, page 532-542. IEEE Computer Society, (1981)Access Control and Management in Multilevel Database Models., and . ECI, volume 123 of Lecture Notes in Computer Science, page 225-235. Springer, (1981)A Quantitative Approach to Evaluating Reliability in Distributed Data Bases., and . JCDKB, page 29-40. Academic Press, (1982)On Evaluating Availability in Distributed Database Systems., , and . Berkeley Workshop, page 154-171. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, (1981)A Data Dictionary for Distributed Databases., and . DDB, page 17-33. North-Holland Publishing Company, (1980)An authorization mechanism for UNIX-based cooperative environments., , and . Inf. Syst., 16 (5): 509-535 (1991)