Author of the publication

Towards Controlled Query Evaluation for Incomplete First-Order Databases.

, , and . FoIKS, volume 5956 of Lecture Notes in Computer Science, page 230-247. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution.. FoIKS, volume 9616 of Lecture Notes in Computer Science, page 211-234. Springer, (2016)Inference-Proof View Update Transactions with Minimal Refusals., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 104-121. Springer, (2011)Controlled Query Evaluation for Known Policies by Combining Lying and Refusal., and . FoIKS, volume 2284 of Lecture Notes in Computer Science, page 49-66. Springer, (2002)Optimistic Anonymous Participation in Inter-organizational Workflow Instances., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 86-100. Springer, (2006)Publishing inference-proof relational data: An implementation and experiments., , , , , and . Data Knowl. Eng., (2019)Administration Rights in the SDSD-System., , and . DBSec, volume 142 of IFIP, page 149-162. Kluwer/Springer, (2003)Privacy Respecting Permissions and Rights.. DBSec, page 173-185. North-Holland, (1987)Über Projektionsmengen von Komplexitätsmaßen.. Elektronische Informationsverarbeitung und Kybernetik, 13 (7/8): 359-368 (1977)For Unknown Secrecies Refusal is Better than Lying.. DBSec, volume 171 of IFIP Conference Proceedings, page 127-141. Kluwer, (1999)Confidentiality enforcement by hybrid control of information flows., , and . CoRR, (2017)