The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matthew Morgenstern: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew Morgenstern
    Active Databases as a Paradigm for Enhanced Computing Environments. [Citation Graph (26, 11)][DBLP]
    VLDB, 1983, pp:34-42 [Conf]
  2. Matthew Morgenstern
    Constraint Equations: Declarative Expression of Constraints With Automatic Enforcement. [Citation Graph (16, 11)][DBLP]
    VLDB, 1984, pp:291-300 [Conf]
  3. Matthew Morgenstern
    The Role of Constraints in Databases, Expert Systems, and Knowledge Representation. [Citation Graph (11, 0)][DBLP]
    Expert Database Workshop, 1984, pp:351-368 [Conf]
  4. Matthew Morgenstern
    Security and Inference in Multilevel Database and Knowledge-Base Systems. [Citation Graph (9, 6)][DBLP]
    SIGMOD Conference, 1987, pp:357-373 [Conf]
  5. Matthew Morgenstern
    A Unifying Approach for Conceptual Schema to Support Multiple Data Models. [Citation Graph (6, 9)][DBLP]
    ER, 1981, pp:279-297 [Conf]
  6. Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell
    Views for Multilevel Database Security. [Citation Graph (6, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:129-140 [Journal]
  7. Robert Balzer, David Dyer, Matthew Morgenstern, Robert Neches
    Specification-Based Computing Environments. [Citation Graph (2, 0)][DBLP]
    AAAI, 1983, pp:12-16 [Conf]
  8. Matthew Morgenstern
    Constraint Equations: A Concise Compilable Representation for Quantified Constraints in Semantic Networks. [Citation Graph (2, 0)][DBLP]
    AAAI, 1984, pp:255-259 [Conf]
  9. Matthew Morgenstern, Teresa F. Lunt, Bhavani M. Thuraisingham, David L. Spooner
    Security Issues in Federated Database Systems: Panel Contributions. [Citation Graph (2, 0)][DBLP]
    DBSec, 1991, pp:131-148 [Conf]
  10. Matthew Morgenstern
    A Security Model for Multilevel Objects with Bidirectional Relationships. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:53-72 [Conf]
  11. Matthew Morgenstern
    Summary of Conference Discussions. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:393-403 [Conf]
  12. Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer
    Perspectives on Database Security - Panel Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:377-390 [Conf]
  13. Matthew Morgenstern, Alexander Borgida, Catherine Lassez, David Maier, Gio Wiederhold
    Constraint-Based Systems: Knowledge About Data - Panel Report. [Citation Graph (0, 0)][DBLP]
    Expert Database Conf., 1988, pp:23-43 [Conf]
  14. Matthew Morgenstern
    Transferring Technology from Research Systems to Users. [Citation Graph (0, 0)][DBLP]
    Jerusalem Conference on Information Technology, 1978, pp:103-108 [Conf]
  15. Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman
    Views for Multilevel Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:156-172 [Conf]
  16. Matthew Morgenstern
    Connections among Application Based Objects in Directed Edge-Labelled Hypergraphs. [Citation Graph (0, 0)][DBLP]
    TFAIS, 1985, pp:79-99 [Conf]
  17. Matthew Morgenstern
    Database Technology for Reliable Systems: Issues, Impact, and Approaches (Panel). [Citation Graph (0, 0)][DBLP]
    VLDB, 1992, pp:495- [Conf]
  18. Matthew Morgenstern
    Integrating Web and Database Information for Collaboration Through Explicit Metadata. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:204-210 [Conf]

Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002