Author of the publication

A Method-Based Authorization Model for Object-Oriented Databases.

, , and . Security for Object-Oriented Systems, page 135-150. Springer, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic model for schema understanding and matching., , and . SMC (5), page 4768-4773. IEEE, (2004)FlexiMine - A Flexible Platform for KDD Research and Application Development., , , , , , and . Ann. Math. Artif. Intell., 39 (1-2): 175-204 (2003)TOPS: a new design for transactions in publish/subscribe middleware., and . DEBS, volume 332 of ACM International Conference Proceeding Series, page 201-210. ACM, (2008)Storage Allocation for Access Path Minimization in Network Structured Data Bases., , and . JCDKB, page 319-. Academic Press, (1978)Employee Timetabling, Constraint Networks and Knowledge-Based Rules: A Mixed Approach., , and . PATAT, volume 1153 of Lecture Notes in Computer Science, page 93-105. Springer, (1995)A Distributed Framework for the Detection of New Worm-Related Malware., , and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 179-190. Springer, (2008)Designing Secure Indexes for Encrypted Databases., , , and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 54-68. Springer, (2005)Design and implementation of a query command language using transition networks., and . COMPSAC, page 313-318. IEEE, (1979)An Improved MapReduce Algorithm for Mining Closed Frequent Itemsets., and . SwSTE, page 77-83. IEEE, (2016)Combining rules and constraints for employee timetabling., , and . Int. J. Intell. Syst., 12 (6): 419-439 (1997)