Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alter-egos and Roles: Supporting Workflow Security in Cyberspaces., , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 182-195. Chapman & Hall, (1997)An Object-Oriented Database Architecture for Providing Securty in Cyberspace., and . DBSec, volume 79 of IFIP Conference Proceedings, page 120-144. Chapman & Hall, (1996)Combining rules and constraints for employee timetabling., , and . Int. J. Intell. Syst., 12 (6): 419-439 (1997)Efficient and Private Approximations of Distributed Databases Calculations., , , and . CoRR, (2016)Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases., , and . DBSec, page 85-98. North-Holland, (1990)Probabilistic model for schema understanding and matching., , and . SMC (5), page 4768-4773. IEEE, (2004)Resolving Information Flow Conflicts in RBAC Systems., and . DBSec, volume 4127 of Lecture Notes in Computer Science, page 148-162. Springer, (2006)FlexiMine - A Flexible Platform for KDD Research and Application Development., , , , , , and . Ann. Math. Artif. Intell., 39 (1-2): 175-204 (2003)Designing Secure Indexes for Encrypted Databases., , , and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 54-68. Springer, (2005)Incremental Frequent Itemsets Mining with MapReduce., and . ADBIS, volume 10509 of Lecture Notes in Computer Science, page 247-261. Springer, (2017)