Author of the publication

Securing Access to Sensitive RDF Data.

, , , and . ESWC (Satellite Events), volume 8798 of Lecture Notes in Computer Science, page 455-460. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provenance Management for Evolving RDF Datasets., , , and . ESWC, volume 9678 of Lecture Notes in Computer Science, page 575-592. Springer, (2016)Controlling Access to XML Documents over XML Native and Relational Databases., , , and . Secure Data Management, volume 5776 of Lecture Notes in Computer Science, page 122-141. Springer, (2009)STYX: Connecting the XML Web to the World of Semantics., , , , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 759-761. Springer, (2002)Repairing Inconsistent XML Write-Access Control Policies., , and . DBPL, volume 4797 of Lecture Notes in Computer Science, page 97-111. Springer, (2007)Results of the Ontology Alignment Evaluation Initiative 2018., , , , , , , , , and 14 other author(s). OM@ISWC, volume 2288 of CEUR Workshop Proceedings, page 76-116. CEUR-WS.org, (2018)LANCE: A Generic Benchmark Generator for Linked Data., , , , and . ISWC (Posters & Demos), volume 1486 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)Benchmarking RDF Query Engines: The LDBC Semantic Publishing Benchmark., , , , , and . BLINK@ISWC, volume 1700 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Results of the Ontology Alignment Evaluation Initiative 2020., , , , , , , , , and 17 other author(s). OM@ISWC, volume 2788 of CEUR Workshop Proceedings, page 92-138. CEUR-WS.org, (2020)Interrogation de ressources XML concernant un domaine d'intérêt., , , and . Technique et Science Informatiques, 22 (10): 1243-1270 (2003)Provenance for Linked Data., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 366-381. Springer, (2013)