The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yasunori Ishihara: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hiroyuki Seki, Yasunori Ishihara, Minoru Ito
    Authorization Analysis of Queries in Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DOOD, 1995, pp:521-538 [Conf]
  2. Yasunori Ishihara, Toshiyuki Morita, Minoru Ito
    The Security Problem against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:303-316 [Conf]
  3. Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara
    Schema update operations preserving the expressive power in XML databases. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2005, pp:1229- [Conf]
  4. Yasunori Ishihara, Hiroyuki Seki, Minoru Ito
    Type-Consistency Problems for Queries in Object-Oriented Databases. [Citation Graph (0, 12)][DBLP]
    ICDT, 1997, pp:364-378 [Conf]
  5. Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara
    Security against Inference Attacks on Negative Information in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:49-60 [Conf]
  6. Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara
    Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:145-157 [Conf]
  7. Yasunori Ishihara, Shougo Shimizu, Hiroyuki Seki, Minoru Ito
    Refinements of Complexity Results on Type Consistency for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2001, v:62, n:4, pp:537-564 [Journal]
  8. Yasunori Ishihara, Shin Ishii, Hiroyuki Seki, Minoru Ito
    Temporal Reasoning about Two Concurrent Sequences of Events. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2004, v:34, n:2, pp:498-513 [Journal]
  9. Yasunori Ishihara, Toshiyuki Morita, Hiroyuki Seki, Minoru Ito
    An equational logic based approach to the security problem against inference attacks on object-oriented databases. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2007, v:73, n:5, pp:788-817 [Journal]

  10. Verification of the Security Against Inference Attacks on XML Databases. [Citation Graph (, )][DBLP]


  11. A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes. [Citation Graph (, )][DBLP]


  12. Extending the Tractability Results on XPath Satisfiability with Sibling Axes. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002