Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

For Unknown Secrecies Refusal is Better than Lying.. DBSec, volume 171 of IFIP Conference Proceedings, page 127-141. Kluwer, (1999)Über Projektionsmengen von Komplexitätsmaßen.. Elektronische Informationsverarbeitung und Kybernetik, 13 (7/8): 359-368 (1977)For unknown secrecies refusal is better than lying.. Data Knowl. Eng., 33 (1): 1-23 (2000)Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses.. VIS, volume 271 of Informatik-Fachberichte, page 1-21. Springer, (1991)On Inference-Proof View Processing of XML Documents., and . IEEE Trans. Dependable Secur. Comput., 10 (2): 99-113 (2013)Confidentiality enforcement by hybrid control of information flows., , and . CoRR, (2017)A Foundation of Codd's Relational Maybe-Operations.. ACM Trans. Database Syst., 8 (4): 608-636 (1983)Inference-Proof View Update Transactions with Minimal Refusals., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 104-121. Springer, (2011)Optimistic Anonymous Participation in Inter-organizational Workflow Instances., and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 86-100. Springer, (2006)Controlled Query Evaluation for Known Policies by Combining Lying and Refusal., and . FoIKS, volume 2284 of Lecture Notes in Computer Science, page 49-66. Springer, (2002)