| Publication | Date of Publication | Type |
|---|
| Relational schemas with multiplicity bounds, diversity bounds and functional dependencies | 2024-10-30 | Paper |
| Transitive closure algorithms for very large databases | 2024-02-28 | Paper |
| On sampling representatives of relational schemas with a functional dependency | 2022-12-09 | Paper |
| Inference-proof updating of a weakened view under the modification of input parameters | 2022-08-25 | Paper |
| Confidentiality Policies and Their Enforcement for Controlled Query Evaluation | 2022-02-16 | Paper |
| Checking inference-proofness of attribute-disjoint and duplicate-preserving fragmentations | 2019-12-09 | Paper |
| Inferences from attribute-disjoint and duplicate-preserving relational fragmentations | 2018-06-26 | Paper |
| Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution | 2016-05-19 | Paper |
| Decomposition of object-oriented database schemas | 2015-06-17 | Paper |
| Preserving confidentiality while reacting on iterated queries and belief revisions | 2015-02-05 | Paper |
| Reasoning on Secrecy Constraints under Uncertainty to Classify Possible Actions | 2014-03-31 | Paper |
| Appropriate inferences of data dependencies in relational databases | 2012-06-19 | Paper |
| Some Remarks on Relational Database Schemes Having Few Minimal Keys | 2012-03-09 | Paper |
| A sound and complete model-generation procedure for consistent and confidentiality-preserving databases | 2011-07-18 | Paper |
| Reducing inference control to access control for normalized database schemas | 2010-04-19 | Paper |
| Combining Consistency and Confidentiality Requirements in First-Order Databases | 2009-09-29 | Paper |
| Security in Computing Systems | 2009-05-18 | Paper |
| Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control | 2008-06-24 | Paper |
| Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes | 2008-03-04 | Paper |
| Controlled query evaluation with open queries for a decidable relational submodel | 2007-10-12 | Paper |
| Foundations of Information and Knowledge Systems | 2007-02-12 | Paper |
| Solving Equations in the Relational Algebra | 2005-02-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4817042 | 2004-09-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472209 | 2004-08-04 | Paper |
| Controlled query evaluation for known policies by combining lying and refusal | 2004-03-15 | Paper |
| Adding inclusion dependencies to an object-oriented data model with uniqueness constraints | 2004-03-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4420308 | 2003-08-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413443 | 2003-07-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4782252 | 2003-05-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4796113 | 2003-04-03 | Paper |
| Security architecture of the multimedia mediator | 2002-01-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2763274 | 2002-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2728834 | 2001-11-06 | Paper |
| Lying versus refusal for known potential secrets | 2001-08-20 | Paper |
| For unknown secrecies refusal is better than lying | 2000-06-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4869520 | 1996-03-11 | Paper |
| Optimization of a subclass of conjunctive queries | 1995-03-22 | Paper |
| Objects in relational database schemes with functional, inclusion, and exclusion dependencies | 1993-11-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4694706 | 1993-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3989947 | 1992-06-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3357529 | 1991-01-01 | Paper |
| Boyce-Codd normal form and object normal forms | 1989-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3793775 | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3793777 | 1988-01-01 | Paper |
| Design of relational database schemes by deleting attributes in the canonical decomposition | 1987-01-01 | Paper |
| Some variants of the take-grant protection model | 1984-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3217645 | 1984-01-01 | Paper |
| A foundation of CODD's relational maybe-operations | 1983-01-01 | Paper |
| Inferences of multivalued dependencies in fixed and undetermined universes | 1980-01-01 | Paper |
| On the complementation rule for multivalued dependencies in database relations | 1978-01-01 | Paper |
| The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property | 1978-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4168601 | 1978-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4144799 | 1977-01-01 | Paper |
| On BI‐Immune Isols | 1977-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4404431 | 1973-01-01 | Paper |