Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Step toward building Dynamic Security Infrastructure., and . SEKE, page 483-488. (2003)Information Systems Research at George Mason University., , , , , , and . SIGMOD Record, 26 (4): 69-74 (1997)On the Behavior of Multilevel Database Systems., and . DBSec, page 205-220. North-Holland, (1990)Summary of CODASYL report on "selection and acquisition of data base management systems": CODASYL system committee., , and . ACM Annual Conference, page 344-345. ACM, (1975)Avoiding Redundancies and Conflicts in Security Protocols., , and . CATA, page 321-324. ISCA, (2003)Pragmatics of Database Management (Panel).. SIGMOD Conference, page 232-234. ACM Press, (1985)SIGMOD Record 14(4), December 1985.Implementation of an Ada run-time environment., and . AFIPS National Computer Conference, page 47-55. AFIPS Press, (1983)The role of policy in requirements definition., , , , and . RE, page 277-280. IEEE Computer Society, (1993)An Introduction to the Database Sessions.. Jerusalem Conference on Information Technology, page 163. North-Holland, (1978)An Expert Database System Architecture Based on an Active and Extensible Dictionary System.. Expert Database Workshop, page 401-422. Benjamin/Cummings, (1984)