Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimistic Anonymous Participation in Inter-organizational Workflow Instances., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 86-100. Springer, (2006)Controlled Query Evaluation for Known Policies by Combining Lying and Refusal., and . FoIKS, volume 2284 of Lecture Notes in Computer Science, page 49-66. Springer, (2002)Confidentiality enforcement by hybrid control of information flows., , and . CoRR, (2017)A Foundation of Codd's Relational Maybe-Operations.. ACM Trans. Database Syst., 8 (4): 608-636 (1983)Inference-Proof View Update Transactions with Minimal Refusals., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 104-121. Springer, (2011)On Inference-Proof View Processing of XML Documents., and . IEEE Trans. Dependable Secur. Comput., 10 (2): 99-113 (2013)For Unknown Secrecies Refusal is Better than Lying.. DBSec, volume 171 of IFIP Conference Proceedings, page 127-141. Kluwer, (1999)For unknown secrecies refusal is better than lying.. Data Knowl. Eng., 33 (1): 1-23 (2000)Über Projektionsmengen von Komplexitätsmaßen.. Elektronische Informationsverarbeitung und Kybernetik, 13 (7/8): 359-368 (1977)Preserving confidentiality while reacting on iterated queries and belief revisions., and . Ann. Math. Artif. Intell., 73 (1-2): 75-123 (2015)