From post

Advances in Database Technology  EDBT 2000

, , , , , , и . том 1777 из Lecture Notes in Computer Science, глава XML: Current Developments and Future Challenges for the Database Community, стр. 3-17. Springer Berlin / Heidelberg, (2000)
DOI: doi:10.1007/3-540-46439-5_1

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Advances in Database Technology  EDBT 2000, , , , , , и . том 1777 из Lecture Notes in Computer Science, глава XML: Current Developments and Future Challenges for the Database Community, стр. 3-17. Springer Berlin / Heidelberg, (2000)Automatic Generation of Production Rules for Integrity Maintenance., , , и . ACM Trans. Database Syst., 19 (3): 367-422 (1994)Improving Android security by widening the role of Mandatory Access Control., , , и . Tiny Trans. Comput. Sci., (2016)Run-time Detection of Non-Terminating Active Rule Systems., , и . DOOD, том 1013 из Lecture Notes in Computer Science, стр. 38-54. Springer, (1995)Assessing query privileges via safe and efficient permission composition., , , , и . ACM Conference on Computer and Communications Security, стр. 311-322. ACM, (2008)The IDEA Web Lab., , и . SIGMOD Conference, стр. 587-589. ACM Press, (1998)A Review of Repairing Techniques for Integrity Maintenance., и . Rules in Database Systems, стр. 333-346. Springer, (1993)Integrity for distributed queries., , , , , и . CNS, стр. 364-372. IEEE, (2014)DockerPolicyModules: Mandatory Access Control for Docker containers., , , и . CNS, стр. 749-750. IEEE, (2015)Over-encryption: Management of Access Control Evolution on Outsourced Data., , , , и . VLDB, стр. 123-134. ACM, (2007)