Search the dblp DataBase
Joachim Biskup :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Joachim Biskup , Umeshwar Dayal , Philip A. Bernstein Synthesizing Independent Database Schemas. [Citation Graph (29, 9)][DBLP ] SIGMOD Conference, 1979, pp:143-151 [Conf ] Joachim Biskup A Foundation of Codd's Relational Maybe-Operations. [Citation Graph (26, 13)][DBLP ] ACM Trans. Database Syst., 1983, v:8, n:4, pp:608-636 [Journal ] Joachim Biskup A Formal Approach to Null Values in Database Relations. [Citation Graph (22, 0)][DBLP ] Advances in Data Base Theory, 1979, pp:299-341 [Conf ] Joachim Biskup , Bernhard Convent A Formal View Integration Method. [Citation Graph (16, 20)][DBLP ] SIGMOD Conference, 1986, pp:398-407 [Conf ] Joachim Biskup , Hans Hermann Brüggemann Universal Relation Views: A Pragmatic Approach. [Citation Graph (10, 15)][DBLP ] VLDB, 1983, pp:172-185 [Conf ] Joachim Biskup , Hans Hermann Brüggemann , L. Schnetgöke , M. Kramer One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views. [Citation Graph (4, 9)][DBLP ] PODS, 1986, pp:148-159 [Conf ] Joachim Biskup , Hans Hermann Brüggemann Towards Designing Acyclic Database Schemes. [Citation Graph (3, 0)][DBLP ] Advances in Data Base Theory, 1982, pp:3-25 [Conf ] Joachim Biskup , Hans-Werner Graf Analysis of the Privacy Model for the Information System DORIS. [Citation Graph (3, 0)][DBLP ] DBSec, 1988, pp:123-140 [Conf ] Joachim Biskup , Bernhard Convent Towards a Schema Design Methodology for Deductive Databases. [Citation Graph (3, 13)][DBLP ] MFDBS, 1989, pp:37-52 [Conf ] Pratul Dublish , Joachim Biskup , Yehoshua Sagiv Optimizatioin of a Subclass of Conjunctive Queries. [Citation Graph (2, 6)][DBLP ] ICDT, 1990, pp:455-469 [Conf ] Joachim Biskup , Hans Hermann Brüggemann Data Manipulation Languages for the Universal Relation View DURST. [Citation Graph (2, 9)][DBLP ] MFDBS, 1987, pp:20-41 [Conf ] Joachim Biskup , Uwe Räsch The Equivalence Problem For Relational Database Schemes. [Citation Graph (2, 32)][DBLP ] MFDBS, 1987, pp:42-70 [Conf ] Joachim Biskup , Holger Stiefeling Transitive Closure Algorithms for Very Large Databases. [Citation Graph (2, 0)][DBLP ] WG, 1988, pp:122-147 [Conf ] Joachim Biskup On the Complementation Rule for Multivalued Dependencies in Database Relations. [Citation Graph (2, 0)][DBLP ] Acta Inf., 1978, v:10, n:, pp:297-305 [Journal ] Joachim Biskup , Uwe Räsch , Holger Stiefeling An Extension of SQL for Querying Graph Relations. [Citation Graph (2, 0)][DBLP ] Comput. Lang., 1990, v:15, n:1, pp:65-82 [Journal ] Joachim Biskup Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values. [Citation Graph (2, 0)][DBLP ] Fundam. Inform., 1984, v:7, n:1, pp:129-150 [Journal ] Joachim Biskup , Ralf Menzel , Torsten Polle Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas. [Citation Graph (1, 9)][DBLP ] ADBIS, 1995, pp:109-136 [Conf ] Joachim Biskup Database Schema Design Theory : Achievements and Challenges. [Citation Graph (1, 0)][DBLP ] CISMOD, 1995, pp:14-44 [Conf ] Joachim Biskup Privacy Respecting Permissions and Rights. [Citation Graph (1, 0)][DBLP ] DBSec, 1987, pp:173-185 [Conf ] Joachim Biskup , Hans Hermann Brüggemann The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). [Citation Graph (1, 22)][DBLP ] ICDE, 1989, pp:348-355 [Conf ] Joachim Biskup , Hans Hermann Brüggemann The Personal Model of Data: Towards a Privacy-Oriented Information System. [Citation Graph (1, 0)][DBLP ] Computers & Security, 1988, v:7, n:, pp:575-597 [Journal ] Joachim Biskup Boyce-Codd Normal Form and Object Normal Forms. [Citation Graph (1, 0)][DBLP ] Inf. Process. Lett., 1989, v:32, n:1, pp:29-33 [Journal ] Joachim Biskup , Renate Meyer Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition. [Citation Graph (1, 0)][DBLP ] J. Comput. Syst. Sci., 1987, v:35, n:1, pp:1-22 [Journal ] Joachim Biskup Inferences of Multivalued Dependencies in Fixed and Undetermined Universes. [Citation Graph (1, 0)][DBLP ] Theor. Comput. Sci., 1980, v:10, n:, pp:93-105 [Journal ] Joachim Biskup , Ralf Menzel An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP ] ADBIS, 2001, pp:366-378 [Conf ] Joachim Biskup , Andreas Kluck A New Approach to Inferences of Semantic Constraints. [Citation Graph (0, 15)][DBLP ] ADBIS, 1997, pp:72-79 [Conf ] Joachim Biskup Zufällige Folgen und Bi-immunität. [Citation Graph (0, 0)][DBLP ] Automatentheorie und Formale Sprachen, 1973, pp:202-207 [Conf ] Joachim Biskup , Ulrich Flegel Threshold-based identity recovery for privacy enhanced applications. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:71-79 [Conf ] Joachim Biskup Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:13-23 [Conf ] Joachim Biskup , Torben Weibert Refusal in Incomplete Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:143-157 [Conf ] Joachim Biskup , Lena Wiese On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:30-43 [Conf ] Joachim Biskup , Barbara Sprick , Lena Wiese Secure Mediation with Mobile Code. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:267-280 [Conf ] Christian Altenschmidt , Joachim Biskup , Yücel Karabulut Security Architecture of the Multimedia Mediator. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:77-88 [Conf ] Joachim Biskup A General Framework for Database Security (Abstract). [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:169-170 [Conf ] Joachim Biskup Technical Enforcement of Informational Assurances. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:17-40 [Conf ] Joachim Biskup For Unknown Secrecies Refusal is Better than Lying. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:127-141 [Conf ] Joachim Biskup , Christian Eckert About the Enforcement of State Dependent Specifications. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:3-17 [Conf ] Joachim Biskup , Christian Eckert Enforcement of State Dependent Security Specifications. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:375- [Conf ] Joachim Biskup , Ulrich Flegel , Yücel Karabulut Secure Mediation: Requirements and Design. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:127-140 [Conf ] Joachim Biskup , Yücel Karabulut A Hybrid PKI Model: Application to Secure Mediation. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:271-282 [Conf ] Joachim Biskup , Thomas Leineweber State-Dependent Security Decisions for Distributed Object-Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:105-118 [Conf ] Joachim Biskup , Thomas Leineweber , Joerg Parthe Administration Rights in the SDSD-System. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:149-162 [Conf ] Matthew Morgenstern , Joachim Biskup , Klaus R. Dittrich , Carl E. Landwehr , Marvin Schaefer Perspectives on Database Security - Panel Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:377-390 [Conf ] Reind P. van de Riet , Raban Serban , Sylvia L. Osborn , Arnon Rosenthal , Vijayalakshmi Atluri , Joachim Biskup , Gio Wiederhold Panel. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:373- [Conf ] Joachim Biskup , Ulrich Flegel On Pseudonymization of Audit Data for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:161-180 [Conf ] Christian Altenschmidt , Joachim Biskup Explicit Representation of Constrained Schema Mappings for Mediated Data Integration. [Citation Graph (0, 0)][DBLP ] DNIS, 2002, pp:103-132 [Conf ] Joachim Biskup , Ralf Menzel A Flexible Cost Model for Abstract Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP ] ER, 2002, pp:444-462 [Conf ] Joachim Biskup , Ralf Menzel Optimising Abstract Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP ] ER, 2006, pp:528-543 [Conf ] Joachim Biskup , Ralf Menzel , Torsten Polle , Yehoshua Sagiv Decomposition of Relationships through Pivoting. [Citation Graph (0, 18)][DBLP ] ER, 1996, pp:28-41 [Conf ] Alois Knoll , Christian Altenschmidt , Joachim Biskup , Hans-Martin Blüthgen , Ingo Glöckner , Sven Hartrumpf , Hermann Helbig , Christiane Henning , Reinhard Lüling , Burkhard Monien , Thomas Noll , Norbert Sensen An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents. [Citation Graph (0, 0)][DBLP ] ECDL, 1998, pp:409-428 [Conf ] Joachim Biskup , Piero A. Bonatti Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:39-54 [Conf ] Ulrich Flegel , Joachim Biskup Requirements of Information Reductions for Cooperating Intrusion Detection Agents. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:466-480 [Conf ] Joachim Biskup , Hans Hermann Brüggemann An Object-Surrogate-Value Approach for Database Languages. [Citation Graph (0, 0)][DBLP ] FMLDO, 1989, pp:79-92 [Conf ] Joachim Biskup , Holger Stiefeling Evaluation of Upper Bounds and Least Nodes as Database Operations. [Citation Graph (0, 0)][DBLP ] FODO, 1993, pp:197-214 [Conf ] Joachim Biskup , Piero A. Bonatti Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP ] FoIKS, 2002, pp:49-66 [Conf ] Joachim Biskup , Piero A. Bonatti Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. [Citation Graph (0, 0)][DBLP ] FoIKS, 2006, pp:43-62 [Conf ] Joachim Biskup , Torsten Polle Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints. [Citation Graph (0, 0)][DBLP ] FoIKS, 2000, pp:31-49 [Conf ] Joachim Biskup Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 2002, pp:423-428 [Conf ] Joachim Biskup Medical Database Security. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (2), 1990, pp:212-221 [Conf ] Joachim Biskup , Ulrich Flegel Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 2002, pp:488-496 [Conf ] Joachim Biskup A General Framework for Database Security. [Citation Graph (0, 0)][DBLP ] Grundlagen von Datenbanken, 1990, pp:7-10 [Conf ] Joachim Biskup , Christian Eckert Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen. [Citation Graph (0, 0)][DBLP ] Grundlagen von Datenbanken, 1993, pp:20-24 [Conf ] Joachim Biskup , Christian Eckert Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen. [Citation Graph (0, 0)][DBLP ] Grundlagen von Datenbanken, 1994, pp:11-15 [Conf ] Joachim Biskup , Ralf Menzel , Torsten Polle Schematransformation für F-Logik. [Citation Graph (0, 0)][DBLP ] Grundlagen von Datenbanken, 1994, pp:16-19 [Conf ] Joachim Biskup , Ralf Menzel , Torsten Polle Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata. [Citation Graph (0, 0)][DBLP ] Grundlagen von Datenbanken, 1994, pp:20-24 [Conf ] Joachim Biskup , Ralf Menzel , Torsten Polle Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas. [Citation Graph (0, 0)][DBLP ] Grundlagen von Datenbanken, 1999, pp:72-76 [Conf ] Joachim Biskup , Torsten Polle Magic-Sets: Globalisieren von Variablen und Rekursionselimination. [Citation Graph (0, 0)][DBLP ] Grundlagen von Datenbanken, 1993, pp:25-29 [Conf ] Joachim Biskup Path Measures of Turing Machine Computations (Preliminary Report). [Citation Graph (0, 0)][DBLP ] ICALP, 1978, pp:90-104 [Conf ] Joachim Biskup , Joerg Parthe Optimistic Anonymous Participation in Inter-organizational Workflow Instances. [Citation Graph (0, 0)][DBLP ] ICISS, 2006, pp:86-100 [Conf ] Joachim Biskup , David W. Embley Mediated Information Gain. [Citation Graph (0, 0)][DBLP ] IDEAS, 2000, pp:360-370 [Conf ] Joachim Biskup Impacts of Creating, Implementing and Using Formal Languages. [Citation Graph (0, 0)][DBLP ] IFIP Congress (3), 1994, pp:402-407 [Conf ] Joachim Biskup , Gerrit Bleumer Reflections on Security of Database and Datatransfer Systems in Health Care. [Citation Graph (0, 0)][DBLP ] IFIP Congress (2), 1994, pp:549-556 [Conf ] Joachim Biskup , Pratul Dublish Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies. [Citation Graph (0, 8)][DBLP ] MFDBS, 1991, pp:276-290 [Conf ] Christian Altenschmidt , Joachim Biskup , Jürgen Freitag , Barbara Sprick Weakly Constraining Multimedia Types Based on a Type Embedding Ordering. [Citation Graph (0, 0)][DBLP ] Multimedia Information Systems, 1998, pp:121-129 [Conf ] Joachim Biskup , Jürgen Freitag , Yücel Karabulut , Barbara Sprick Query Evaluation in an Object-Oriented Multimedia Mediator. [Citation Graph (0, 0)][DBLP ] OOIS, 1997, pp:31-43 [Conf ] Joachim Biskup , Ulrich Flegel Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:28-48 [Conf ] Joachim Biskup , Sandra Wortmann Towards a credential-based implementation of compound access control policies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:31-40 [Conf ] Joachim Biskup Achievements of Relational Database Schema Design Theory Revisited. [Citation Graph (0, 0)][DBLP ] Semantics in Databases, 1995, pp:29-54 [Conf ] Joachim Biskup , Barbara Sprick Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems. [Citation Graph (0, 0)][DBLP ] Semantics in Databases, 2001, pp:34-62 [Conf ] Joachim Biskup Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses. [Citation Graph (0, 0)][DBLP ] VIS, 1991, pp:1-21 [Conf ] Joachim Biskup Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". [Citation Graph (0, 0)][DBLP ] VIS, 1993, pp:239-254 [Conf ] Joachim Biskup , Hans Hermann Brüggemann Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick. [Citation Graph (0, 0)][DBLP ] VIS, 1991, pp:146-158 [Conf ] Joachim Biskup , Christian Eckert Sichere Delegation in Informationssystemen. [Citation Graph (0, 0)][DBLP ] VIS, 1993, pp:107-133 [Conf ] Joachim Biskup A Foundation of Codd's Relational Maybe-Operations. [Citation Graph (0, 0)][DBLP ] XP2 Workshop on Relational Database Theory, 1981, pp:- [Conf ] Joachim Biskup , Pratul Dublish , Yehoshua Sagiv Optimization of a Subclass of Conjunctive Queries [Citation Graph (0, 0)][DBLP ] Acta Inf., 1995, v:32, n:1, pp:1-26 [Journal ] Joachim Biskup , Torsten Polle Adding inclusion dependencies to an object-oriented data model with uniqueness constraints. [Citation Graph (0, 0)][DBLP ] Acta Inf., 2003, v:39, n:6-7, pp:391-449 [Journal ] Joachim Biskup , Piero A. Bonatti Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2004, v:40, n:1-2, pp:37-62 [Journal ] Joachim Biskup , Torsten Polle Decomposition of object-oriented database schemas. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2001, v:33, n:2-4, pp:119-155 [Journal ] Joachim Biskup , Jan Paredaens , Thomas Schwentick , Jan Van den Bussche Solving equations in the relational algebra [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Joachim Biskup For unknown secrecies refusal is better than lying. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2000, v:33, n:1, pp:1-23 [Journal ] Joachim Biskup , Piero A. Bonatti Lying versus refusal for known potential secrets. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2001, v:38, n:2, pp:199-222 [Journal ] Joachim Biskup , János Demetrovics , Leonid Libkin , Ilya B. Muchnik On Relational Database Schemes Having Unique Minimal Key. [Citation Graph (0, 0)][DBLP ] Elektronische Informationsverarbeitung und Kybernetik, 1991, v:27, n:4, pp:217-225 [Journal ] Joachim Biskup Über Projektionsmengen von Komplexitätsmaßen. [Citation Graph (0, 0)][DBLP ] Elektronische Informationsverarbeitung und Kybernetik, 1977, v:13, n:7/8, pp:359-368 [Journal ] Joachim Biskup Relationship chase procedures interpreted as resolution with paramodulation. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 1991, v:15, n:2, pp:123-138 [Journal ] Joachim Biskup , Piero A. Bonatti Controlled query evaluation for enforcing confidentiality in complete information systems. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:14-27 [Journal ] Joachim Biskup Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 1989, v:12, n:3, pp:158-161 [Journal ] Joachim Biskup Some Variants of the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1984, v:19, n:3, pp:151-156 [Journal ] Joachim Biskup , David W. Embley Extracting information from heterogeneous information sources using ontologically specified target views. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 2003, v:28, n:3, pp:169-212 [Journal ] Joachim Biskup , Pratul Dublish Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies. [Citation Graph (0, 0)][DBLP ] ITA, 1993, v:27, n:3, pp:183-219 [Journal ] Christian Altenschmidt , Joachim Biskup , Ulrich Flegel , Yücel Karabulut Secure Mediation: Requirements, Design, and Architecture. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:3, pp:365-398 [Journal ] Joachim Biskup The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1978, v:7, n:1, pp:115-117 [Journal ] Joachim Biskup , Jan Paredaens , Thomas Schwentick , Jan Van den Bussche Solving Equations in the Relational Algebra. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2004, v:33, n:5, pp:1052-1066 [Journal ] Leana Golubchik , V. S. Subrahmanian , Sherry Marcus , Joachim Biskup Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:60-77 [Journal ] Joachim Biskup , Torben Weibert Confidentiality Policies for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:1-13 [Conf ] Joachim Biskup , Ralf Menzel Building a Tool for Cost-Based Design of Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP ] ER, 2007, pp:120-131 [Conf ] Joachim Biskup , Barbara Carminati , Elena Ferrari , Frank Muller , Sandra Wortmann Towards Secure Execution Orders for CompositeWeb Services. [Citation Graph (0, 0)][DBLP ] ICWS, 2007, pp:489-496 [Conf ] Joachim Biskup , Jan-Hendrik Lochner Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. [Citation Graph (0, 0)][DBLP ] ISC, 2007, pp:407-422 [Conf ] Joachim Biskup , Piero A. Bonatti Controlled query evaluation with open queries for a decidable relational submodel. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2007, v:50, n:1-2, pp:39-77 [Journal ] 08102 Working Group -- Early Warning Systems. [Citation Graph (, )][DBLP ] Efficient Inference Control for Open Relational Queries. [Citation Graph (, )][DBLP ] Controlled Query Evaluation and Inference-Free View Updates. [Citation Graph (, )][DBLP ] Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution. [Citation Graph (, )][DBLP ] A General Framework for Database Security. [Citation Graph (, )][DBLP ] Requirements and Protocols for Inference-Proof Interactions in Information Systems. [Citation Graph (, )][DBLP ] Towards Controlled Query Evaluation for Incomplete First-Order Databases. [Citation Graph (, )][DBLP ] Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes. [Citation Graph (, )][DBLP ] Secure Mediation of Join Queries by Processing Ciphertexts. [Citation Graph (, )][DBLP ] Inference Control in Logic Databases as a Constraint Satisfaction Problem. [Citation Graph (, )][DBLP ] Combining Consistency and Confidentiality Requirements in First-Order Databases. [Citation Graph (, )][DBLP ] Optimization of the Controlled Evaluation of Closed Relational Queries. [Citation Graph (, )][DBLP ] Towards Early Warning Systems - Challenges, Technologies and Architecture. [Citation Graph (, )][DBLP ] Chasing after Secrets in Relational Databases. [Citation Graph (, )][DBLP ] A Trust- and Property-based Access Control Model. [Citation Graph (, )][DBLP ] Search in 0.057secs, Finished in 0.061secs