Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Association against dissociation: some pragmatic considerations for frequent itemset generation under fixed and variable thresholds., and . SIGKDD Explor., 7 (2): 151-159 (2005)Resolving authorization conflicts by ontology views for controlled access to a digital library., , , and . J. Knowl. Manag., 19 (1): 45-59 (2015)Design of a Data Model for Social Network Applications., , and . J. Database Manag., 18 (4): 51-79 (2007)A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System., , and . J. Netw. Syst. Manag., 19 (3): 319-342 (2011)Complex Queries on Web Graph representing a Social Network., , and . ICDIM, page 430-435. IEEE, (2006)Design of a Data Model for Social Network Applications., , and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Specification and validation of enterprise information security policies., , and . CUBE, page 801-808. ACM, (2012)Controlling Access to a Digital Library Ontology - A Graph Transformation Approach., and . IJNGC, (2014)Streaming Graph Ingestion with Resource-Aware Buffering and Graph Compression., , and . eScience, page 619-620. IEEE, (2019)A formal methodology for detection of vulnerabilities in an enterprise information system., , and . CRiSIS, page 74-81. IEEE, (2009)