Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Object-Oriented Approach to Security Policies and their Access Controls for Database Management.. Future Databases, volume 3 of Advanced Database Research and Development Series, page 8-25. World Scientific, Singapore, (1992)Michael E. Senko: 1931-1978.. ACM Trans. Database Syst., 4 (3): 261 (1979)Information Secure Systems., and . Advances in Computers, (1976)The Federated Databases and System: A New Generation of Advanced Database Systems., , and . DEXA, page 186-190. Springer, (1990)A computer-aided benchmarking system for parallel and expandable database computers., , , and . FJCC, page 475-482. ACM, (1987)A parallel, scalable, microprocessor-based database computer for performance gains and capacity growth.. IEEE Micro, 11 (6): 44-60 (1991)Database Access Control in the Presence of Context Dependent Protection Requirement., , and . IEEE Trans. Software Eng., 5 (4): 349-358 (1979)The Impact of the Interconnecting Network on Parallel Database Computers.. IWDM, volume 43 of The Kluwer International Series in Engineering and Computer Science, page 216-224. Kluwer, (1987)Database Security Course Module.. DBSec, page 269-301. North-Holland, (1987)Will the Real VLDB Conference Please Stand Up?. SIGMOD Record, 12 (3): 8-14 (1982)