Author of the publication

Modeling a multi-level secure object-oriented database using views.

, , and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 190-206. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Links between the personalities, styles and performance in computer programming., , , and . CoRR, (2016)A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases., , , and . Australasian Database Conference, volume 17 of Australian Computer Science Communications, (1995)A Context-Aware Service Discovery Framework Based on Human Needs Model., , , and . ICSOC, volume 4749 of Lecture Notes in Computer Science, page 404-409. Springer, (2007)Cryptographic collusion-resistant protocols for secure sum., and . Int. J. Electron. Secur. Digit. Forensics, 9 (1): 19-34 (2017)Enriched LDA (ELDA): Combination of latent Dirichlet allocation with word co-occurrence analysis for aspect extraction., and . Expert Syst. Appl., (2017)A Novelty Detection Method Based on Frequent Itemsets., , , and . MLDM Posters, page 276-286. ibai Publishing, (2007)Electronic Promotion to New Customers using a Fixed link mkNN Learning., , , and . CSREA EEE, page 20-27. CSREA Press, (2007)CEFER: A Four Facets Framework based on Context and Emotion embedded features for Implicit and Explicit Emotion Recognition., , and . CoRR, (2022)Optimizing the performance and robustness of type-2 fuzzy group nearest-neighbor queries., , , and . Mob. Inf. Syst., 7 (2): 123-145 (2011)An Efficient Classifier Using Decision Trees and Association Rules., , and . ICDM (Posters and Workshops), page 1-12. (2007)