Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic query rewriting schemes for multitenant SaaS applications., , , and . Autom. Softw. Eng., 23 (4): 535-568 (2016)Aspect-oriented design and implementation of adaptable access control for Electronic Medical Records., , and . Int. J. Medical Informatics, 79 (3): 181-203 (2010)Type-directed weaving of aspects for higher-order functional languages., , and . PEPM, page 78-87. ACM, (2006)Designing aspects for side-effect localization., , , and . PEPM, page 189-198. ACM, (2009)Aspect-Based Instrumentation for Locating Memory Leaks in Java Programs., and . COMPSAC (2), page 23-28. IEEE Computer Society, (2007)978-0-7695-2870-0.A Rapid Development Environment for Synthesizing Guideline-Based Decision Support Systems., , , , and . IMSCCS (2), page 548-554. IEEE Computer Society, (2006)0-7695-2581-4.Using Dynamic Aspects for Delegating Fine-Grained Access Rights.. APSEC, page 783-789. IEEE Computer Society, (2005)Toward a tenant-aware query rewriting engine for Universal Table schema-mapping., , and . CloudCom, page 833-838. IEEE Computer Society, (2012)An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation., , , , , and . CSE (3), page 182-188. IEEE Computer Society, (2009)A Scripting Language for Automating Secure Multiparty Computation., , , and . AsiaJCIS, page 127-134. IEEE Computer Society, (2013)