Author of the publication

View security as the basis for data warehouse security.

, and . DMDW, volume 28 of CEUR Workshop Proceedings, page 8. CEUR-WS.org, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Example of Knowledge-Based Query Processing in a CAD/CAM DBMS., , and . VLDB, page 363-370. Morgan Kaufmann, (1984)Fit for purpose: engineering principles for selecting an appropriate type of data exchange standard., , , , and . Inf. Syst. E Bus. Manag., 12 (4): 495-515 (2014)Fit for Purpose: Toward an Engineering Basis for Data Exchange Standards., , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 91-103. Springer, (2013)Abstracting and Refining Authorization in SQL., and . Secure Data Management, volume 3178 of Lecture Notes in Computer Science, page 148-162. Springer, (2004)The Database Design and Evaluation Workbench (DDEW) Project at CCA., , , , , , and . IEEE Database Eng. Bull., 7 (4): 10-15 (1984)Surrogate Parenthood: Protected and Informative Graphs., , , , and . Proc. VLDB Endow., 4 (8): 518-527 (2011)Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control., , , and . SACMAT, page 217-219. ACM, (2018)Outerjoin Simplification and Reordering for Query Optimization., and . ACM Trans. Database Syst., 22 (1): 43-73 (1997)The Role of Schema Matching in Large Enterprises, , , , , , , and . CoRR, (2009)A Database Designer's Workbench., , , , , , and . ER, page 347-360. North-Holland, (1986)