Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploratory analysis of textual data streams., , and . Future Gener. Comput. Syst., (2017)A Semantic Approach for Resource Discovery in Distributed Systems., , , and . SEBD, page 442-450. (2004)Securing XML Documents with Author-X., , and . IEEE Internet Comput., 5 (3): 21-31 (2001)An Approach to Deriving Global Authorizations in Federated Database Systems.. DBSec, volume 79 of IFIP Conference Proceedings, page 58-75. Chapman & Hall, (1996)An XML-based Interorganizational Knowledge Mediation Scheme to Support B2B Solution., , and . DS-9, volume 239 of IFIP Conference Proceedings, page 121-135. Kluwer, (2001)Reusability-based comparison of requirement specification methodologies., , , and . Methods and Associated Tools for the Information Systems Life Cycle, volume A-55 of IFIP Transactions, page 63-84. Elsevier, (1994)Database Security., , , and . Addison-Wesley & ACM Press, (1995)Exploiting Schema Knowledge for the Integration of Heterogeneous Sorces., , , , and . SEBD, page 103-120. (1998)Information Integration on Multiple Heterogeneous Data Sources., , , and . SEBD, page 155-170. (1998)Exploratory Analysis of Web Information Resources., , and . SEBD, page 248-255. Curran Associates, Inc., (2015)