Author of the publication

Enforcing Mandatory Access Control in Object Bases.

, , and . Security for Object-Oriented Systems, page 96-116. Springer, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MIST 2016: 8th International Workshop on Managing Insider Security Threats., and . ACM Conference on Computer and Communications Security, page 1890-1891. ACM, (2016)A Logical Approach to Cooperative Information Systems., , , and . J. Log. Program., 43 (1): 15-48 (2000)Editorial of special issue on security and privacy in cloud computing., , and . J. Inf. Secur. Appl., (2016)Security-Aware Service Composition with Fine-Grained Information Flow Control., , , and . IEEE Trans. Serv. Comput., 6 (3): 330-343 (2013)Editorial: Special Issue on Data Transparency - Uses Cases and Applications., and . ACM J. Data Inf. Qual., 14 (2): 6:1-6:3 (2022)Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs., , , , , , and . IEEE Internet Things J., 9 (14): 12563-12572 (2022)Efficient systematic clustering method for k-anonymization., , and . Acta Informatica, 48 (1): 51-66 (2011)Learning information release policies for preventing intersection attacks., , and . MILCOM, page 794-799. IEEE, (2017)Object-Oriented Databases., and . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation., and . DEXA, page 500-507. Springer, (1990)