Author of the publication

Path Measures of Turing Machine Computations (Preliminary Report).

. ICALP, volume 62 of Lecture Notes in Computer Science, page 90-104. Springer, (1978)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confidentiality enforcement by hybrid control of information flows., , and . CoRR, (2017)A Foundation of Codd's Relational Maybe-Operations.. ACM Trans. Database Syst., 8 (4): 608-636 (1983)Inference-Proof View Update Transactions with Minimal Refusals., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 104-121. Springer, (2011)Sicherheit: Gewährleistung und Begrenzung des Informationsflusses.. Entwicklungstendenzen bei Datenbanksystemen, Oldenbourg Verlag, Müchen, Wien, (1991)Optimistic Anonymous Participation in Inter-organizational Workflow Instances., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 86-100. Springer, (2006)Controlled Query Evaluation for Known Policies by Combining Lying and Refusal., and . FoIKS, volume 2284 of Lecture Notes in Computer Science, page 49-66. Springer, (2002)Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses.. VIS, volume 271 of Informatik-Fachberichte, page 1-21. Springer, (1991)Preserving confidentiality while reacting on iterated queries and belief revisions., and . Ann. Math. Artif. Intell., 73 (1-2): 75-123 (2015)Privacy Respecting Permissions and Rights.. DBSec, page 173-185. North-Holland, (1987)Administration Rights in the SDSD-System., , and . DBSec, volume 142 of IFIP, page 149-162. Kluwer/Springer, (2003)