Author of the publication

A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases.

, , , and . Australasian Database Conference, volume 17 of Australian Computer Science Communications, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An XML Algebra For Online Processing of XML Documents., and . iiWAS, page 503. ACM, (2013)Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases., , , and . J. Univers. Comput. Sci., 3 (6): 730-753 (1997)Design of Object-Oriented Databases - From Functional Specifications to Object Structures.. Australian Database Conference, page 55-67. World Scientific, (1993)Scrambling Covert Channels in Multilevel Secure Database Systems.. SIS, page 81-93. ICEIS Press, (2002)Behavioural Object Clustering., , and . Future Databases, volume 3 of Advanced Database Research and Development Series, page 186-193. World Scientific, Singapore, (1992)Scheduling Parallel Data Transfers in Multi-tiered Persistent Storage., , and . ACIIDS (Companion), volume 1716 of Communications in Computer and Information Science, page 437-449. Springer, (2022)Discovering Periodic Patterns in System Logs., , and . LWA, volume 1226 of CEUR Workshop Proceedings, page 156-161. CEUR-WS.org, (2014)Living with Inconsistencies in a Multidatabase System.. DEXA Workshops, page 905-909. IEEE Computer Society, (2004)Optimization of Data Stream Processing., and . SIGMOD Record, 33 (3): 34-39 (2004)Processing of Continuous Queries over Unlimited Data Streams., and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 799-809. Springer, (2002)