Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Customisable Memory Management Framework for C++., , and . Softw. Pract. Exp., 28 (11): 1143-1183 (1998)A First Report on the A# Compiler., , , , , , and . ISSAC, page 25-31. ACM, (1994)A Role-Based Secure Database Design Tool., and . ACSAC, page 203-212. IEEE Computer Society, (1996)Rule-Based Filtering for Java Applets., , and . ACSAC, page 112-119. IEEE Computer Society, (1998)Role templates for content-based access control., and . ACM Workshop on Role-Based Access Control, page 153-159. ACM, (1997)Software Components for Computer Algebra., and . ISSAC, page 62-69. ACM, (1998)Performance Tuning in a Customizable Collector, , and . IWMM, volume 986 of Lecture Notes in Computer Science, page 179-196. Springer, (1995)Effiecient Compilation of First Order Predicates., , and . AI*IA, volume 549 of Lecture Notes in Computer Science, page 440-444. Springer, (1991)A Formal Model for Role-Based Access Control with Constraints., and . CSFW, page 136-145. IEEE Computer Society, (1996)TrustedBox: A Kernel-Level Integrity Checker.. ACSAC, page 189-198. IEEE Computer Society, (1999)