Author of the publication

A Database Approach to Modelling and Managing Security Information

, and . VLDB, page 532-542. IEEE Computer Society, (1981)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database Security., , , and . Addison-Wesley & ACM Press, (1995)Optimal File Allocation in a Computer Network: a Solution Method Based on the Knapsack Problem., , and . Comput. Networks, 6 (5): 345-357 (1982)A new approach to security system development., , and . NSPW, page 82-88. IEEE Computer Society Press, (1994)Conceptual Modelling of Security Information in Distributed Database Systems., and . DDSS, page 153-167. North-Holland, (1984)On Evaluating Availability in Distributed Database Systems., , and . Berkeley Workshop, page 154-171. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, (1981)A Data Dictionary for Distributed Databases., and . DDB, page 17-33. North-Holland Publishing Company, (1980)Access Control and Management in Multilevel Database Models., and . ECI, volume 123 of Lecture Notes in Computer Science, page 225-235. Springer, (1981)A Database Approach to Modelling and Managing Security Information, and . VLDB, page 532-542. IEEE Computer Society, (1981)A Quantitative Approach to Evaluating Reliability in Distributed Data Bases., and . JCDKB, page 29-40. Academic Press, (1982)A Conceptual Framework for Security Systems: The Action-Entity Model., , and . IFIP Congress, page 127-132. North-Holland/IFIP, (1983)