Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System., and . DBSec, volume A-47 of IFIP Transactions, page 215-234. North-Holland, (1993)A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems., and . DBSec, volume A-47 of IFIP Transactions, page 199-214. North-Holland, (1993)Effects of SeaView Decomposition of Multilevel Relations on Database Performance., and . DBSec, volume A-6 of IFIP Transactions, page 203-225. North-Holland, (1991)Multilevel Secure Transaction Processing: Status and Prospects., , , , and . DBSec, volume 79 of IFIP Conference Proceedings, page 79-98. Chapman & Hall, (1996)An Extended Transaction Model Approach for Multilevel Secure Transaction Processing., and . DBSec, volume 215 of IFIP Conference Proceedings, page 255-268. Kluwer, (2001)Schedulability related issues in end-to-end systems., and . ICECCS, page 215-222. IEEE Computer Society, (1995)A privilege management and enforcement system for distributed resource sharing., , , , , , , , and . WETICE, page 106-111. IEEE Computer Society, (1996)An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies., , and . ICISS, volume 3803 of Lecture Notes in Computer Science, page 134-147. Springer, (2005)Design of Partially Replicated Distributed Database Systems: An Integrated Methodology., , and . SIGMETRICS, page 187-196. ACM, (1988)Traffic Placement Policies for Multi-Band Network., , , , and . SIGCOMM, page 94-105. ACM, (1989)