Author of the publication

Modeling a multi-level secure object-oriented database using views.

, , and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 190-206. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent-based modeling of consumer decision making process based on power distance and personality., , , , , and . Knowl. Based Syst., 24 (7): 1075-1095 (2011)Semi-Automatic Labeling of Training Data Sets in Text Classification., and . Computer and Information Science, 4 (6): 48-56 (2011)Cryptographic collusion-resistant protocols for secure sum., and . Int. J. Electron. Secur. Digit. Forensics, 9 (1): 19-34 (2017)A Human-Centric Approach to Group-Based Context-Awareness, , , and . CoRR, (2011)Enriched LDA (ELDA): Combination of latent Dirichlet allocation with word co-occurrence analysis for aspect extraction., and . Expert Syst. Appl., (2017)A Novelty Detection Method Based on Frequent Itemsets., , , and . MLDM Posters, page 276-286. ibai Publishing, (2007)CEFER: A Four Facets Framework based on Context and Emotion embedded features for Implicit and Explicit Emotion Recognition., , and . CoRR, (2022)A novel similarity measure for spatial entity resolution based on data granularity model: Managing inconsistencies in place descriptions., , , and . Appl. Intell., 51 (8): 6104-6123 (2021)Electronic Promotion to New Customers using a Fixed link mkNN Learning., , , and . CSREA EEE, page 20-27. CSREA Press, (2007)A Model of Authorization for Object-Oriented Databases based on Object Views., , , and . DOOD, volume 1013 of Lecture Notes in Computer Science, page 503-520. Springer, (1995)