Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Evaluation of a Database System in Multiple Backend Configurations., , , , , , , and . IWDM, page 91-111. Springer, (1985)Privacy and Security of Data Communications and Data Bases., , and . VLDB Surveys, page 223-248. North-Holland, (1978)A Message-Oriented Implementation of a Multi-Backend Database System (MDBS)., , , and . IWDM, page 242-266. Springer, (1983)Operating system security a tutorial of current research., , and . COMPSAC, page 220-228. IEEE, (1978)Numerical experimentation with routines for solving nonlinear systems of equations., , and . ACM Annual Conference, ACM, (1973)Development of a multifacetted undergraduate program in Computer and Information Science., and . SIGCSE, page 8-12. ACM, (1972)Recent Results on the Attribute Based Data Model - A Tutorial.. VLDB, page 526-528. ACM, (1975)The Implementation of a Multibackend Database System (MDBS): Part II - The Design of a Prototype MDBS., , , , , , and . Advanced Database Machine Architecture, page 327-385. Prentice-Hall, (1983)Structure memory designs for a database computer., , and . ACM Annual Conference, page 343-350. ACM, (1977)Database Access Control in the Presence of Context Dependent Protection Requirement., , and . IEEE Trans. Software Eng., 5 (4): 349-358 (1979)