| Publication | Date of Publication | Type |
|---|
Cardinality-based inference control in sum-only data cubes Computer Security — ESORICS 2002 | 2022-02-16 | Paper |
Can-Follow Concurrency Control IEEE Transactions on Computers | 2018-06-12 | Paper |
An Application-Level Data Transparent Authentication Scheme without Communication Overhead IEEE Transactions on Computers | 2017-07-27 | Paper |
Encryption and Fragmentation for Data Confidentiality in the Cloud Foundations of Security Analysis and Design VII | 2015-05-27 | Paper |
Enforcing subscription-based authorization policies in cloud scenarios Data and Applications Security and Privacy XXVI | 2012-11-13 | Paper |
Distributed Computing - IWDC 2003 Lecture Notes in Computer Science | 2009-08-06 | Paper |
Flexible support for multiple access control policies ACM Transactions on Database Systems | 2008-06-18 | Paper |
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution Applied Cryptography and Network Security | 2007-09-24 | Paper |
Unauthorized inferences in semistructured databases Information Sciences | 2006-10-19 | Paper |
Looking into the seeds of time: Discovering temporal patterns in large transaction sets Information Sciences | 2006-05-16 | Paper |
A fragile watermarking scheme for detecting malicious modifications of database relations Information Sciences | 2006-05-16 | Paper |
Journal on Data Semantics II Lecture Notes in Computer Science | 2005-08-17 | Paper |
| scientific article; zbMATH DE number 2100560 (Why is no real title available?) | 2004-09-14 | Paper |
| scientific article; zbMATH DE number 2100564 (Why is no real title available?) | 2004-09-14 | Paper |
| scientific article; zbMATH DE number 2090937 (Why is no real title available?) | 2004-08-13 | Paper |
| scientific article; zbMATH DE number 2088770 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2080028 (Why is no real title available?) | 2004-08-04 | Paper |
Intrusion detection in distributed systems. An abstraction-based approach. Advances in Information Security | 2004-01-11 | Paper |
scientific article; zbMATH DE number 1869805 (Why is no real title available?) Distributed and Parallel Databases | 2003-02-17 | Paper |
| scientific article; zbMATH DE number 1836553 (Why is no real title available?) | 2003-02-04 | Paper |
Consistent policy enforcement in distributed systems using mobile policies Data & Knowledge Engineering | 2003-01-21 | Paper |
A comparative performance analysis of reliable group rekey transport protocols for secure multicast Performance Evaluation | 2003-01-21 | Paper |
| Distributed policies for data management -- making policies mobile | 2002-12-04 | Paper |
| scientific article; zbMATH DE number 1836538 (Why is no real title available?) | 2002-11-27 | Paper |
| scientific article; zbMATH DE number 1836542 (Why is no real title available?) | 2002-11-27 | Paper |
| Protecting file systems against corruption using checksums | 2002-11-14 | Paper |
Solving multi-granularity temporal constraint networks Artificial Intelligence | 2002-09-09 | Paper |
An algebraic representation of calendars Annals of Mathematics and Artificial Intelligence | 2002-07-09 | Paper |
scientific article; zbMATH DE number 1747796 (Why is no real title available?) Distributed and Parallel Databases | 2002-05-30 | Paper |
| scientific article; zbMATH DE number 1718513 (Why is no real title available?) | 2002-03-12 | Paper |
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity Information Sciences | 2001-10-14 | Paper |
A general framework for time granularity and its application to temporal reasoning. Annals of Mathematics and Artificial Intelligence | 2000-09-10 | Paper |
Scalable threshold closure Theoretical Computer Science | 2000-08-23 | Paper |
| scientific article; zbMATH DE number 1458810 (Why is no real title available?) | 2000-06-14 | Paper |
An algorithm for dynamic data allocation in distributed systems Information Processing Letters | 1997-02-28 | Paper |
Maintaining replicated authorizations in distributed database systems Data & Knowledge Engineering | 1997-02-27 | Paper |
A short technical paper: Determining whether a vote assignment is dominated Information Sciences | 1991-01-01 | Paper |
Lossless outer joins with incomplete information BIT | 1990-01-01 | Paper |
An Extension of "Representative Instances and γ-Acyclic Relational Schemes" IEEE Transactions on Software Engineering | 1987-01-01 | Paper |
On equivalence of relational and network database models Information Processing Letters | 1985-01-01 | Paper |
| scientific article; zbMATH DE number 3881905 (Why is no real title available?) | 1984-01-01 | Paper |
Representative instances and γ-acyclic relational schemes IEEE Transactions on Software Engineering | 1984-01-01 | Paper |
Realizing units as Whitehead torsions in low dimension Contemporary Mathematics | 1983-01-01 | Paper |
Entity-relationship diagrams which are in BCNF International Journal of Computer & Information Sciences | 1983-01-01 | Paper |
The Problem of Equivalence for Entity-Relationship Diagrams IEEE Transactions on Software Engineering | 1983-01-01 | Paper |
A Scheme of Parallel Processing for MIMD Systems IEEE Transactions on Software Engineering | 1983-01-01 | Paper |
| Combinatorial Equivalence between Group Presentations | 1982-01-01 | Paper |
| On the Two-Realizability of Chain Complexes | 1981-01-01 | Paper |
| Spaces Dominated by Two-complexes | 1981-01-01 | Paper |
Surjective stability of units and simple homotopy type Journal of Pure and Applied Algebra | 1980-01-01 | Paper |
Homotopy classification of lens spaces for one-relator groups with torsion Pacific Journal of Mathematics | 1980-01-01 | Paper |
On 2-dimensional CW-complexes with a single 2-cell Pacific Journal of Mathematics | 1979-01-01 | Paper |