Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating and Manipulating Identifiers for Heterogeneous, Distributed Objects., and . POS, page 235-247. Springer, (1989)Updating Replicated Data During Communications Failures., and . VLDB, page 49-58. Morgan Kaufmann, (1985)Surrogate Parenthood: Protected and Informative Graphs., , , , and . Proc. VLDB Endow., 4 (8): 518-527 (2011)Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases., , and . DBSec, volume A-47 of IFIP Transactions, page 109-121. North-Holland, (1993)Flexible Security Policies for Digital Libraries., , and . ACM Comput. Surv., 28 (4es): 110 (1996)Fast Methods for Testing Quantified Relational Calculus Assertions., and . SIGMOD Conference, page 39-50. ACM Press, (1982)A model of atomicity for multilevel transactions., , , and . S&P, page 120-134. IEEE Computer Society, (1993)A Model of Integrity Separation of Duty for a Trusted DBMS., , and . DBSec, volume A-47 of IFIP Transactions, page 237-256. North-Holland, (1993)PLUS: A provenance manager for integrated information., , , and . IRI, page 269-275. IEEE Systems, Man, and Cybernetics Society, (2011)Data Management Research at The MITRE Corporation., , , , , and . SIGMOD Rec., 24 (3): 77-82 (1995)