From post

Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.

, , и . ESORICS, том 875 из Lecture Notes in Computer Science, стр. 359-373. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations., , и . DEXA (1), том 6261 из Lecture Notes in Computer Science, стр. 368-384. Springer, (2010)TRBAC: a temporal role-based access control model., , и . ACM Workshop on Role-Based Access Control, стр. 21-30. ACM, (2000)An infrastructure for managing secure update operations on XML data., , , и . SACMAT, стр. 110-122. ACM, (2003)A Framework for Evaluating Privacy Preserving Data Mining Algorithms., , и . Data Min. Knowl. Discov., 11 (2): 121-154 (2005)Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols., , и . DBSec, том A-60 из IFIP Transactions, стр. 259-274. North-Holland, (1994)A new Authorization Model for Object-Oriented Databases., , и . DBSec, том A-60 из IFIP Transactions, стр. 199-222. North-Holland, (1994)Distributed Cooperative Updates of XML Documents., , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 147-159. Kluwer, (2002)Administration Policies in a Multipolicy Autorization System., и . DBSec, том 113 из IFIP Conference Proceedings, стр. 341-355. Chapman & Hall, (1997)Local Closed-World Assumptions for reasoning about Semantic Web data., , и . APPIA-GULP-PRODE, стр. 314-323. (2003)Tagging Stream Data for Rich Real-Time Services., , и . Proc. VLDB Endow., 2 (1): 73-84 (2009)