Author of the publication

Using Schema Information for Querying Databases.

, , and . KRDB, volume 2 of CEUR Workshop Proceedings, CEUR-WS.org, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Security Agents for the DOK Federated System.. DBSec, volume 113 of IFIP Conference Proceedings, page 35-59. Chapman & Hall, (1997)A Role-Based Access Control for Intranet Security., and . IEEE Internet Comput., 1 (5): 24-34 (1997)Special Issue: Distributed Objects and Applications '99., and . Concurr. Comput. Pract. Exp., 13 (7): 503-505 (2001)Using agents for secure access to data in the Internet.. IEEE Commun. Mag., 35 (6): 136-140 (1997)Book Preview., , and . Interactions, 7 (6): 47-50 (2000)Toward the Right Communication Protocol for Web Services., , , and . Int. J. Web Serv. Res., 2 (2): 19-42 (2005)A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis., , , , , , , and . IEEE Trans. Emerg. Top. Comput., 2 (3): 267-279 (2014)A least flow-time first load sharing approach for distributed server farm., , , and . J. Parallel Distributed Comput., 65 (7): 832-842 (2005)Efficient threshold password-authenticated secret sharing protocols for cloud computing., , , , , , , , and . J. Parallel Distributed Comput., (2019)A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids., , , and . ACM Comput. Surv., 55 (14s): 331:1-331:37 (2023)