Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal File Allocation in a Computer Network: a Solution Method Based on the Knapsack Problem., , and . Comput. Networks, 6 (5): 345-357 (1982)Database Security., , , and . Addison-Wesley & ACM Press, (1995)A new approach to security system development., , and . NSPW, page 82-88. IEEE Computer Society Press, (1994)Towards a new approach to secure database design., and . Comput. Secur., 2 (1): 49-62 (1983)An Availability Model for Distributed Transaction Systems., , and . IEEE Trans. Software Eng., 11 (5): 483-491 (1985)Conceptual Modelling of Security Information in Distributed Database Systems., and . DDSS, page 153-167. North-Holland, (1984)Security design in distributed database systems., and . J. Syst. Softw., 3 (3): 219-229 (1983)Creating a Conceptual Model of a Data Dictionary for Distributed Data Bases., and . DATA BASE, 11 (1): 12-18 (1979)On Evaluating Availability in Distributed Database Systems., , and . Berkeley Workshop, page 154-171. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, (1981)A Data Dictionary for Distributed Databases., and . DDB, page 17-33. North-Holland Publishing Company, (1980)