The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Joachim Biskup: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joachim Biskup, Umeshwar Dayal, Philip A. Bernstein
    Synthesizing Independent Database Schemas. [Citation Graph (29, 9)][DBLP]
    SIGMOD Conference, 1979, pp:143-151 [Conf]
  2. Joachim Biskup
    A Foundation of Codd's Relational Maybe-Operations. [Citation Graph (26, 13)][DBLP]
    ACM Trans. Database Syst., 1983, v:8, n:4, pp:608-636 [Journal]
  3. Joachim Biskup
    A Formal Approach to Null Values in Database Relations. [Citation Graph (22, 0)][DBLP]
    Advances in Data Base Theory, 1979, pp:299-341 [Conf]
  4. Joachim Biskup, Bernhard Convent
    A Formal View Integration Method. [Citation Graph (16, 20)][DBLP]
    SIGMOD Conference, 1986, pp:398-407 [Conf]
  5. Joachim Biskup, Hans Hermann Brüggemann
    Universal Relation Views: A Pragmatic Approach. [Citation Graph (10, 15)][DBLP]
    VLDB, 1983, pp:172-185 [Conf]
  6. Joachim Biskup, Hans Hermann Brüggemann, L. Schnetgöke, M. Kramer
    One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views. [Citation Graph (4, 9)][DBLP]
    PODS, 1986, pp:148-159 [Conf]
  7. Joachim Biskup, Hans Hermann Brüggemann
    Towards Designing Acyclic Database Schemes. [Citation Graph (3, 0)][DBLP]
    Advances in Data Base Theory, 1982, pp:3-25 [Conf]
  8. Joachim Biskup, Hans-Werner Graf
    Analysis of the Privacy Model for the Information System DORIS. [Citation Graph (3, 0)][DBLP]
    DBSec, 1988, pp:123-140 [Conf]
  9. Joachim Biskup, Bernhard Convent
    Towards a Schema Design Methodology for Deductive Databases. [Citation Graph (3, 13)][DBLP]
    MFDBS, 1989, pp:37-52 [Conf]
  10. Pratul Dublish, Joachim Biskup, Yehoshua Sagiv
    Optimizatioin of a Subclass of Conjunctive Queries. [Citation Graph (2, 6)][DBLP]
    ICDT, 1990, pp:455-469 [Conf]
  11. Joachim Biskup, Hans Hermann Brüggemann
    Data Manipulation Languages for the Universal Relation View DURST. [Citation Graph (2, 9)][DBLP]
    MFDBS, 1987, pp:20-41 [Conf]
  12. Joachim Biskup, Uwe Räsch
    The Equivalence Problem For Relational Database Schemes. [Citation Graph (2, 32)][DBLP]
    MFDBS, 1987, pp:42-70 [Conf]
  13. Joachim Biskup, Holger Stiefeling
    Transitive Closure Algorithms for Very Large Databases. [Citation Graph (2, 0)][DBLP]
    WG, 1988, pp:122-147 [Conf]
  14. Joachim Biskup
    On the Complementation Rule for Multivalued Dependencies in Database Relations. [Citation Graph (2, 0)][DBLP]
    Acta Inf., 1978, v:10, n:, pp:297-305 [Journal]
  15. Joachim Biskup, Uwe Räsch, Holger Stiefeling
    An Extension of SQL for Querying Graph Relations. [Citation Graph (2, 0)][DBLP]
    Comput. Lang., 1990, v:15, n:1, pp:65-82 [Journal]
  16. Joachim Biskup
    Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values. [Citation Graph (2, 0)][DBLP]
    Fundam. Inform., 1984, v:7, n:1, pp:129-150 [Journal]
  17. Joachim Biskup, Ralf Menzel, Torsten Polle
    Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas. [Citation Graph (1, 9)][DBLP]
    ADBIS, 1995, pp:109-136 [Conf]
  18. Joachim Biskup
    Database Schema Design Theory : Achievements and Challenges. [Citation Graph (1, 0)][DBLP]
    CISMOD, 1995, pp:14-44 [Conf]
  19. Joachim Biskup
    Privacy Respecting Permissions and Rights. [Citation Graph (1, 0)][DBLP]
    DBSec, 1987, pp:173-185 [Conf]
  20. Joachim Biskup, Hans Hermann Brüggemann
    The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). [Citation Graph (1, 22)][DBLP]
    ICDE, 1989, pp:348-355 [Conf]
  21. Joachim Biskup, Hans Hermann Brüggemann
    The Personal Model of Data: Towards a Privacy-Oriented Information System. [Citation Graph (1, 0)][DBLP]
    Computers & Security, 1988, v:7, n:, pp:575-597 [Journal]
  22. Joachim Biskup
    Boyce-Codd Normal Form and Object Normal Forms. [Citation Graph (1, 0)][DBLP]
    Inf. Process. Lett., 1989, v:32, n:1, pp:29-33 [Journal]
  23. Joachim Biskup, Renate Meyer
    Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition. [Citation Graph (1, 0)][DBLP]
    J. Comput. Syst. Sci., 1987, v:35, n:1, pp:1-22 [Journal]
  24. Joachim Biskup
    Inferences of Multivalued Dependencies in Fixed and Undetermined Universes. [Citation Graph (1, 0)][DBLP]
    Theor. Comput. Sci., 1980, v:10, n:, pp:93-105 [Journal]
  25. Joachim Biskup, Ralf Menzel
    An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP]
    ADBIS, 2001, pp:366-378 [Conf]
  26. Joachim Biskup, Andreas Kluck
    A New Approach to Inferences of Semantic Constraints. [Citation Graph (0, 15)][DBLP]
    ADBIS, 1997, pp:72-79 [Conf]
  27. Joachim Biskup
    Zufällige Folgen und Bi-immunität. [Citation Graph (0, 0)][DBLP]
    Automatentheorie und Formale Sprachen, 1973, pp:202-207 [Conf]
  28. Joachim Biskup, Ulrich Flegel
    Threshold-based identity recovery for privacy enhanced applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:71-79 [Conf]
  29. Joachim Biskup
    Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:13-23 [Conf]
  30. Joachim Biskup, Torben Weibert
    Refusal in Incomplete Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:143-157 [Conf]
  31. Joachim Biskup, Lena Wiese
    On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:30-43 [Conf]
  32. Joachim Biskup, Barbara Sprick, Lena Wiese
    Secure Mediation with Mobile Code. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:267-280 [Conf]
  33. Christian Altenschmidt, Joachim Biskup, Yücel Karabulut
    Security Architecture of the Multimedia Mediator. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:77-88 [Conf]
  34. Joachim Biskup
    A General Framework for Database Security (Abstract). [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:169-170 [Conf]
  35. Joachim Biskup
    Technical Enforcement of Informational Assurances. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:17-40 [Conf]
  36. Joachim Biskup
    For Unknown Secrecies Refusal is Better than Lying. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:127-141 [Conf]
  37. Joachim Biskup, Christian Eckert
    About the Enforcement of State Dependent Specifications. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:3-17 [Conf]
  38. Joachim Biskup, Christian Eckert
    Enforcement of State Dependent Security Specifications. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:375- [Conf]
  39. Joachim Biskup, Ulrich Flegel, Yücel Karabulut
    Secure Mediation: Requirements and Design. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:127-140 [Conf]
  40. Joachim Biskup, Yücel Karabulut
    A Hybrid PKI Model: Application to Secure Mediation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:271-282 [Conf]
  41. Joachim Biskup, Thomas Leineweber
    State-Dependent Security Decisions for Distributed Object-Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:105-118 [Conf]
  42. Joachim Biskup, Thomas Leineweber, Joerg Parthe
    Administration Rights in the SDSD-System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:149-162 [Conf]
  43. Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer
    Perspectives on Database Security - Panel Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:377-390 [Conf]
  44. Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold
    Panel. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:373- [Conf]
  45. Joachim Biskup, Ulrich Flegel
    On Pseudonymization of Audit Data for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:161-180 [Conf]
  46. Christian Altenschmidt, Joachim Biskup
    Explicit Representation of Constrained Schema Mappings for Mediated Data Integration. [Citation Graph (0, 0)][DBLP]
    DNIS, 2002, pp:103-132 [Conf]
  47. Joachim Biskup, Ralf Menzel
    A Flexible Cost Model for Abstract Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP]
    ER, 2002, pp:444-462 [Conf]
  48. Joachim Biskup, Ralf Menzel
    Optimising Abstract Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP]
    ER, 2006, pp:528-543 [Conf]
  49. Joachim Biskup, Ralf Menzel, Torsten Polle, Yehoshua Sagiv
    Decomposition of Relationships through Pivoting. [Citation Graph (0, 18)][DBLP]
    ER, 1996, pp:28-41 [Conf]
  50. Alois Knoll, Christian Altenschmidt, Joachim Biskup, Hans-Martin Blüthgen, Ingo Glöckner, Sven Hartrumpf, Hermann Helbig, Christiane Henning, Reinhard Lüling, Burkhard Monien, Thomas Noll, Norbert Sensen
    An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents. [Citation Graph (0, 0)][DBLP]
    ECDL, 1998, pp:409-428 [Conf]
  51. Joachim Biskup, Piero A. Bonatti
    Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:39-54 [Conf]
  52. Ulrich Flegel, Joachim Biskup
    Requirements of Information Reductions for Cooperating Intrusion Detection Agents. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:466-480 [Conf]
  53. Joachim Biskup, Hans Hermann Brüggemann
    An Object-Surrogate-Value Approach for Database Languages. [Citation Graph (0, 0)][DBLP]
    FMLDO, 1989, pp:79-92 [Conf]
  54. Joachim Biskup, Holger Stiefeling
    Evaluation of Upper Bounds and Least Nodes as Database Operations. [Citation Graph (0, 0)][DBLP]
    FODO, 1993, pp:197-214 [Conf]
  55. Joachim Biskup, Piero A. Bonatti
    Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2002, pp:49-66 [Conf]
  56. Joachim Biskup, Piero A. Bonatti
    Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2006, pp:43-62 [Conf]
  57. Joachim Biskup, Torsten Polle
    Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2000, pp:31-49 [Conf]
  58. Joachim Biskup
    Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:423-428 [Conf]
  59. Joachim Biskup
    Medical Database Security. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 1990, pp:212-221 [Conf]
  60. Joachim Biskup, Ulrich Flegel
    Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:488-496 [Conf]
  61. Joachim Biskup
    A General Framework for Database Security. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1990, pp:7-10 [Conf]
  62. Joachim Biskup, Christian Eckert
    Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1993, pp:20-24 [Conf]
  63. Joachim Biskup, Christian Eckert
    Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1994, pp:11-15 [Conf]
  64. Joachim Biskup, Ralf Menzel, Torsten Polle
    Schematransformation für F-Logik. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1994, pp:16-19 [Conf]
  65. Joachim Biskup, Ralf Menzel, Torsten Polle
    Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1994, pp:20-24 [Conf]
  66. Joachim Biskup, Ralf Menzel, Torsten Polle
    Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1999, pp:72-76 [Conf]
  67. Joachim Biskup, Torsten Polle
    Magic-Sets: Globalisieren von Variablen und Rekursionselimination. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1993, pp:25-29 [Conf]
  68. Joachim Biskup
    Path Measures of Turing Machine Computations (Preliminary Report). [Citation Graph (0, 0)][DBLP]
    ICALP, 1978, pp:90-104 [Conf]
  69. Joachim Biskup, Joerg Parthe
    Optimistic Anonymous Participation in Inter-organizational Workflow Instances. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:86-100 [Conf]
  70. Joachim Biskup, David W. Embley
    Mediated Information Gain. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2000, pp:360-370 [Conf]
  71. Joachim Biskup
    Impacts of Creating, Implementing and Using Formal Languages. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (3), 1994, pp:402-407 [Conf]
  72. Joachim Biskup, Gerrit Bleumer
    Reflections on Security of Database and Datatransfer Systems in Health Care. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1994, pp:549-556 [Conf]
  73. Joachim Biskup, Pratul Dublish
    Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies. [Citation Graph (0, 8)][DBLP]
    MFDBS, 1991, pp:276-290 [Conf]
  74. Christian Altenschmidt, Joachim Biskup, Jürgen Freitag, Barbara Sprick
    Weakly Constraining Multimedia Types Based on a Type Embedding Ordering. [Citation Graph (0, 0)][DBLP]
    Multimedia Information Systems, 1998, pp:121-129 [Conf]
  75. Joachim Biskup, Jürgen Freitag, Yücel Karabulut, Barbara Sprick
    Query Evaluation in an Object-Oriented Multimedia Mediator. [Citation Graph (0, 0)][DBLP]
    OOIS, 1997, pp:31-43 [Conf]
  76. Joachim Biskup, Ulrich Flegel
    Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:28-48 [Conf]
  77. Joachim Biskup, Sandra Wortmann
    Towards a credential-based implementation of compound access control policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:31-40 [Conf]
  78. Joachim Biskup
    Achievements of Relational Database Schema Design Theory Revisited. [Citation Graph (0, 0)][DBLP]
    Semantics in Databases, 1995, pp:29-54 [Conf]
  79. Joachim Biskup, Barbara Sprick
    Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    Semantics in Databases, 2001, pp:34-62 [Conf]
  80. Joachim Biskup
    Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:1-21 [Conf]
  81. Joachim Biskup
    Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". [Citation Graph (0, 0)][DBLP]
    VIS, 1993, pp:239-254 [Conf]
  82. Joachim Biskup, Hans Hermann Brüggemann
    Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:146-158 [Conf]
  83. Joachim Biskup, Christian Eckert
    Sichere Delegation in Informationssystemen. [Citation Graph (0, 0)][DBLP]
    VIS, 1993, pp:107-133 [Conf]
  84. Joachim Biskup
    A Foundation of Codd's Relational Maybe-Operations. [Citation Graph (0, 0)][DBLP]
    XP2 Workshop on Relational Database Theory, 1981, pp:- [Conf]
  85. Joachim Biskup, Pratul Dublish, Yehoshua Sagiv
    Optimization of a Subclass of Conjunctive Queries [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1995, v:32, n:1, pp:1-26 [Journal]
  86. Joachim Biskup, Torsten Polle
    Adding inclusion dependencies to an object-oriented data model with uniqueness constraints. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 2003, v:39, n:6-7, pp:391-449 [Journal]
  87. Joachim Biskup, Piero A. Bonatti
    Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2004, v:40, n:1-2, pp:37-62 [Journal]
  88. Joachim Biskup, Torsten Polle
    Decomposition of object-oriented database schemas. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2001, v:33, n:2-4, pp:119-155 [Journal]
  89. Joachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche
    Solving equations in the relational algebra [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  90. Joachim Biskup
    For unknown secrecies refusal is better than lying. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2000, v:33, n:1, pp:1-23 [Journal]
  91. Joachim Biskup, Piero A. Bonatti
    Lying versus refusal for known potential secrets. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2001, v:38, n:2, pp:199-222 [Journal]
  92. Joachim Biskup, János Demetrovics, Leonid Libkin, Ilya B. Muchnik
    On Relational Database Schemes Having Unique Minimal Key. [Citation Graph (0, 0)][DBLP]
    Elektronische Informationsverarbeitung und Kybernetik, 1991, v:27, n:4, pp:217-225 [Journal]
  93. Joachim Biskup
    Über Projektionsmengen von Komplexitätsmaßen. [Citation Graph (0, 0)][DBLP]
    Elektronische Informationsverarbeitung und Kybernetik, 1977, v:13, n:7/8, pp:359-368 [Journal]
  94. Joachim Biskup
    Relationship chase procedures interpreted as resolution with paramodulation. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 1991, v:15, n:2, pp:123-138 [Journal]
  95. Joachim Biskup, Piero A. Bonatti
    Controlled query evaluation for enforcing confidentiality in complete information systems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:1, pp:14-27 [Journal]
  96. Joachim Biskup
    Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1989, v:12, n:3, pp:158-161 [Journal]
  97. Joachim Biskup
    Some Variants of the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1984, v:19, n:3, pp:151-156 [Journal]
  98. Joachim Biskup, David W. Embley
    Extracting information from heterogeneous information sources using ontologically specified target views. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2003, v:28, n:3, pp:169-212 [Journal]
  99. Joachim Biskup, Pratul Dublish
    Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies. [Citation Graph (0, 0)][DBLP]
    ITA, 1993, v:27, n:3, pp:183-219 [Journal]
  100. Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut
    Secure Mediation: Requirements, Design, and Architecture. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:365-398 [Journal]
  101. Joachim Biskup
    The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1978, v:7, n:1, pp:115-117 [Journal]
  102. Joachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche
    Solving Equations in the Relational Algebra. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2004, v:33, n:5, pp:1052-1066 [Journal]
  103. Leana Golubchik, V. S. Subrahmanian, Sherry Marcus, Joachim Biskup
    Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:1, pp:60-77 [Journal]
  104. Joachim Biskup, Torben Weibert
    Confidentiality Policies for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:1-13 [Conf]
  105. Joachim Biskup, Ralf Menzel
    Building a Tool for Cost-Based Design of Object-Oriented Database Schemas. [Citation Graph (0, 0)][DBLP]
    ER, 2007, pp:120-131 [Conf]
  106. Joachim Biskup, Barbara Carminati, Elena Ferrari, Frank Muller, Sandra Wortmann
    Towards Secure Execution Orders for CompositeWeb Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:489-496 [Conf]
  107. Joachim Biskup, Jan-Hendrik Lochner
    Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:407-422 [Conf]
  108. Joachim Biskup, Piero A. Bonatti
    Controlled query evaluation with open queries for a decidable relational submodel. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2007, v:50, n:1-2, pp:39-77 [Journal]

  109. 08102 Working Group -- Early Warning Systems. [Citation Graph (, )][DBLP]


  110. Efficient Inference Control for Open Relational Queries. [Citation Graph (, )][DBLP]


  111. Controlled Query Evaluation and Inference-Free View Updates. [Citation Graph (, )][DBLP]


  112. Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution. [Citation Graph (, )][DBLP]


  113. A General Framework for Database Security. [Citation Graph (, )][DBLP]


  114. Requirements and Protocols for Inference-Proof Interactions in Information Systems. [Citation Graph (, )][DBLP]


  115. Towards Controlled Query Evaluation for Incomplete First-Order Databases. [Citation Graph (, )][DBLP]


  116. Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes. [Citation Graph (, )][DBLP]


  117. Secure Mediation of Join Queries by Processing Ciphertexts. [Citation Graph (, )][DBLP]


  118. Inference Control in Logic Databases as a Constraint Satisfaction Problem. [Citation Graph (, )][DBLP]


  119. Combining Consistency and Confidentiality Requirements in First-Order Databases. [Citation Graph (, )][DBLP]


  120. Optimization of the Controlled Evaluation of Closed Relational Queries. [Citation Graph (, )][DBLP]


  121. Towards Early Warning Systems - Challenges, Technologies and Architecture. [Citation Graph (, )][DBLP]


  122. Chasing after Secrets in Relational Databases. [Citation Graph (, )][DBLP]


  123. A Trust- and Property-based Access Control Model. [Citation Graph (, )][DBLP]


Search in 0.138secs, Finished in 0.144secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002