Publication | Date of Publication | Type |
---|
State of the art on quality control for data streams: a systematic literature review | 2023-06-20 | Paper |
Deadlock Detection in the Face of Transaction and Data Dependencies | 2022-12-09 | Paper |
An authorization model and its formal semantics | 2022-03-07 | Paper |
Signature and Access Control Policies for XML Documents | 2022-02-16 | Paper |
Security and privacy in the IoT | 2018-04-20 | Paper |
ID2S Password-Authenticated Key Exchange Protocols | 2017-05-16 | Paper |
Towards optimal two-dimensional indexing for constraint databases | 2016-05-26 | Paper |
Homomorphic Encryption and Applications | 2015-02-03 | Paper |
Building access control policy model for privacy preserving and testing policy conflicting problems | 2014-07-29 | Paper |
Private Information Retrieval | 2013-10-23 | Paper |
Efficient systematic clustering method for \(k\)-anonymization | 2012-03-23 | Paper |
Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach | 2012-01-11 | Paper |
Access Control for Databases: Concepts and Systems | 2011-06-17 | Paper |
A Federated Digital Identity Management Approach for Business Processes | 2010-03-04 | Paper |
Information Security | 2006-10-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5692292 | 2005-09-28 | Paper |
Introducing dynamic behavior in amalgamated knowledge bases | 2004-09-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4817028 | 2004-09-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q3046888 | 2004-08-12 | Paper |
Handling Expiration of Multigranular Temporal Objects | 2004-03-30 | Paper |
Enhancing the expressive power of the U-Datalog language | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448414 | 2004-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4439685 | 2003-12-15 | Paper |
Refined rules termination analysis through transactions. | 2003-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4410912 | 2003-07-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4801086 | 2003-04-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2775882 | 2003-02-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4793175 | 2003-02-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4792547 | 2003-02-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4794429 | 2003-02-17 | Paper |
Protection and administration of XML data sources | 2003-01-21 | Paper |
Hierarchical data placement for navigational multimedia applications | 2003-01-21 | Paper |
Modeling spatio-temporal constraints for multimedia objects | 2002-07-29 | Paper |
Finitely representable nested relations | 2002-07-25 | Paper |
Using spatial data access structures for filtering nearest neighbor queries | 2002-03-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766904 | 2002-01-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2764150 | 2002-01-22 | Paper |
A logical approach to cooperative information systems | 2000-12-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4246804 | 1999-06-16 | Paper |
Definition and analysis of index organizations for object-oriented database systems | 1998-09-27 | Paper |
Data security | 1998-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4371829 | 1998-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4344101 | 1997-07-13 | Paper |
On the number of descendants in an object DAG | 1997-02-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4855370 | 1995-11-09 | Paper |
Query optimization by using knowledge about data semantics | 1993-04-01 | Paper |
Correctness of semantic integrity checking in database management systems | 1988-01-01 | Paper |