Author of the publication

Access Controls by Object-Oriented Concepts.

, , and . DBSec, volume 113 of IFIP Conference Proceedings, page 325-340. Chapman & Hall, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Representation of the Time Dimension in Enterprise Data Warehouses - A Business Related Practical Approach., and . ICEIS (1), page 416-424. (2004)A View Integration Approach for the Design of Multilevel Security., and . ER, page 483-509. ER Institute, (1991)Development of a Grid Service for Scalable Decision Tree Construction from Grid Databases., , and . PPAM, volume 3911 of Lecture Notes in Computer Science, page 616-624. Springer, (2005)BIER - The Behaviour Integrated Entity Realtionship Approach., , , and . ER, page 147-166. North-Holland, (1986)Using Role-Templates for Handling Recurring Role Structures., , , and . DBSec, volume 142 of IFIP Conference Proceedings, page 191-204. Kluwer, (1998)Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse., , and . IRI, page 170-176. IEEE Systems, Man, and Cybernetics Society, (2007)Leveraging the web of data via linked widgets., , , , , and . J. Serv. Sci. Res., 6 (1): 7-27 (2014)Guest Editorial: Advances in Applied Security., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (4): 1-3 (2011)Guest Editorial: Emerging Software Reliability and System Security Technologies., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (1): 1-3 (2014)Security aspects of ubiquitous computing in healthcare., , and . Elektrotech. Informationstechnik, 123 (4): 156-161 (2006)