From post

Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.

, , и . ESORICS, том 875 из Lecture Notes in Computer Science, стр. 359-373. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Preserving Techniques for Location-Based Services.. SEBD, стр. 7-8. (2008)Object-Oriented Databases., и . Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems., , и . ACM Workshop on Role-Based Access Control, стр. 1-12. ACM, (1997)Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation., и . DEXA, стр. 500-507. Springer, (1990)Indexing Techniques for Queries on Nested Objects., и . IEEE Trans. Knowl. Data Eng., 1 (2): 196-214 (1989)Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application., , , , и . Communications and Multimedia Security, том 175 из IFIP, стр. 159-171. Springer, (2004)Learning information release policies for preventing intersection attacks., , и . MILCOM, стр. 794-799. IEEE, (2017)Systematic clustering method for l-diversity model., , , и . ADC, том 104 из CRPIT, стр. 93-102. Australian Computer Society, (2010)An Approach to Integrate Multimedi Data in a Knowledge Representation System., , и . Advanced Visual Interfaces, том 36 из World Scientific Series in Computer Science, стр. 109-123. World Scientific, (1992)Exception-Based Information Flow Control in Object-Oriented Systems., , , и . ACM Trans. Inf. Syst. Secur., 1 (1): 26-65 (1998)