Author of the publication

A Fast Algorithm for Detecting Second Paths in Database Inference Analysis.

, , and . J. Comput. Secur., 3 (2/3): 147-168 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Layered Knowledge Chunks for Database Inference., , and . DBSec, volume A-47 of IFIP Transactions, page 275-295. North-Holland, (1993)Using Conceptual Graphs to Represent Database Inference Security Analysis, and . Jour. Computing and Info. Tech., 4 (4): 291-307 (1994)Grounded Conceptual Graph Models., and . ICCS, volume 5113 of Lecture Notes in Computer Science, page 269-281. Springer, (2008)PCCG: An Optional Tracked Grid for Creating Conceptual Graphs., and . ICCS, volume 1257 of Lecture Notes in Computer Science, page 617-620. Springer, (1997)AERIE: Database Inference Modeling and Detection Using Conceptual Graphs., and . Workshop on Conceptual Graphs, volume 754 of Lecture Notes in Computer Science, page 206-215. Springer, (1992)Specifying multiple-viewed software requirements with conceptual graphs.. J. Syst. Softw., 19 (3): 207-224 (1992)Protecting databases from inference attacks., , and . Comput. Secur., 16 (8): 687-708 (1997)Towards Building Active Knowledge Systems with Conceptual Graphs. Proceedings of the 11th International Conference on Conceptual Structures (ICCS 2003), page 296-308. (2003)Understanding and Modeling Context in Data Integration., and . Int. J. Concept. Struct. Smart Appl., 2 (1): 1-17 (2014)Specifying Constraints for Detecting Inconsistencies in A Conceptual Graph Knowledge Base., and . Int. J. Concept. Struct. Smart Appl., 5 (2): 34-64 (2017)