Author of the publication

A Model of Authorization for Object-Oriented Databases based on Object Views.

, , , and . DOOD, volume 1013 of Lecture Notes in Computer Science, page 503-520. Springer, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An XML Algebra For Online Processing of XML Documents., and . iiWAS, page 503. ACM, (2013)Scrambling Covert Channels in Multilevel Secure Database Systems.. SIS, page 81-93. ICEIS Press, (2002)Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases., , , and . J. Univers. Comput. Sci., 3 (6): 730-753 (1997)Design of Object-Oriented Databases - From Functional Specifications to Object Structures.. Australian Database Conference, page 55-67. World Scientific, (1993)Behavioural Object Clustering., , and . Future Databases, volume 3 of Advanced Database Research and Development Series, page 186-193. World Scientific, Singapore, (1992)Discovering Periodic Patterns in System Logs., , and . LWA, volume 1226 of CEUR Workshop Proceedings, page 156-161. CEUR-WS.org, (2014)Scheduling Parallel Data Transfers in Multi-tiered Persistent Storage., , and . ACIIDS (Companion), volume 1716 of Communications in Computer and Information Science, page 437-449. Springer, (2022)Living with Inconsistencies in a Multidatabase System.. DEXA Workshops, page 905-909. IEEE Computer Society, (2004)Processing of Continuous Queries over Unlimited Data Streams., and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 799-809. Springer, (2002)Optimization of Data Stream Processing., and . SIGMOD Record, 33 (3): 34-39 (2004)