The following pages link to Joachim Biskup (Q429430):
Displaying 50 items.
- Appropriate inferences of data dependencies in relational databases (Q429431) (← links)
- A sound and complete model-generation procedure for consistent and confidentiality-preserving databases (Q549726) (← links)
- Some variants of the take-grant protection model (Q801669) (← links)
- Reducing inference control to access control for normalized database schemas (Q963323) (← links)
- Design of relational database schemes by deleting attributes in the canonical decomposition (Q1096418) (← links)
- Boyce-Codd normal form and object normal forms (Q1123648) (← links)
- Inferences of multivalued dependencies in fixed and undetermined universes (Q1131835) (← links)
- On the complementation rule for multivalued dependencies in database relations (Q1244989) (← links)
- Optimization of a subclass of conjunctive queries (Q1346219) (← links)
- Adding inclusion dependencies to an object-oriented data model with uniqueness constraints (Q1424353) (← links)
- Controlled query evaluation for known policies by combining lying and refusal (Q1424926) (← links)
- Inferences from attribute-disjoint and duplicate-preserving relational fragmentations (Q1647476) (← links)
- On sampling representatives of relational schemas with a functional dependency (Q2103897) (← links)
- Inference-proof updating of a weakened view under the modification of input parameters (Q2167727) (← links)
- Preserving confidentiality while reacting on iterated queries and belief revisions (Q2254634) (← links)
- Checking inference-proofness of attribute-disjoint and duplicate-preserving fragmentations (Q2278100) (← links)
- Decomposition of object-oriented database schemas (Q2349818) (← links)
- Controlled query evaluation with open queries for a decidable relational submodel (Q2385449) (← links)
- (Q2728834) (← links)
- Lying versus refusal for known potential secrets (Q2734661) (← links)
- (Q2763274) (← links)
- (Q2765453) (← links)
- Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution (Q2807082) (← links)
- Objects in relational database schemes with functional, inclusion, and exclusion dependencies (Q3142272) (← links)
- (Q3217645) (← links)
- Some Remarks on Relational Database Schemes Having Few Minimal Keys (Q3223995) (← links)
- A foundation of CODD's relational maybe-operations (Q3323314) (← links)
- (Q3357529) (← links)
- Combining Consistency and Confidentiality Requirements in First-Order Databases (Q3399206) (← links)
- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control (Q3507889) (← links)
- Security in Computing Systems (Q3627305) (← links)
- (Q3793775) (← links)
- (Q3793777) (← links)
- (Q3989947) (← links)
- (Q4144799) (← links)
- The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property (Q4151730) (← links)
- On BI‐Immune Isols (Q4163525) (← links)
- (Q4168601) (← links)
- (Q4404431) (← links)
- (Q4413443) (← links)
- (Q4420308) (← links)
- (Q4472209) (← links)
- Solving Equations in the Relational Algebra (Q4651505) (← links)
- (Q4694706) (← links)
- (Q4782252) (← links)
- (Q4796113) (← links)
- (Q4817042) (← links)
- (Q4869520) (← links)
- For unknown secrecies refusal is better than lying (Q4955647) (← links)
- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation (Q5030177) (← links)