Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving the "Weak Status" of Weak Entity Types in Entity-Relationships Schemas., and . ER, volume 1728 of Lecture Notes in Computer Science, page 369-383. Springer, (1999)Tool Support for Enforcing Security Policies on Databases., , , and . CAiSE Forum, volume 734 of CEUR Workshop Proceedings, page 41-48. CEUR-WS.org, (2011)A combination of the Mk-II function points software estimation method with the ADISSA methodology for systems analysis and design., and . Inf. Softw. Technol., 39 (13): 855-865 (1997)Structured method for designing subsystems.. Inf. Softw. Technol., 37 (2): 79-85 (1995)A methodology for integrating access control policies within database development., , , , and . Comput. Secur., 31 (3): 299-314 (2012)One-to-One Dependencies in Database Design.. IEEE Trans. Knowl. Data Eng., 3 (3): 371-379 (1991)Special Theme of Research in Information Systems Analysis and Design -II. Data Modeling or Functional Modeling - Which Comes First? An Experimental Comparison., and . Commun. Assoc. Inf. Syst., (2005)Functional Design of a Menu-Tree Interface within Structured System Development.. Int. J. Man Mach. Stud., 33 (5): 537-556 (1990)MEERAn EER model enhanced with structure methods., and . Inf. Syst., 27 (4): 245-275 (2002)A Comparison of the FOOM and OPM Methodologies for User Comprehension of Analysis Specifications., and . Information Modeling Methods and Methodologies, Idea Group, (2005)