Search the dblp DataBase
Reind P. van de Riet :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Reind P. van de Riet , Anthony I. Wasserman , Martin L. Kersten , Wiebren de Jonge High-Level Programming Features for Improving the Efficiency of a Relational Database System. [Citation Graph (7, 12)][DBLP ] ACM Trans. Database Syst., 1981, v:6, n:3, pp:464-485 [Journal ] George L. Sicherman , Wiebren de Jonge , Reind P. van de Riet Answering Queries Without Revealing Secrets. [Citation Graph (6, 5)][DBLP ] ACM Trans. Database Syst., 1983, v:8, n:1, pp:41-59 [Journal ] Wiebren de Jonge , Andrew S. Tanenbaum , Reind P. van de Riet Two Access Methods Using Compact Binary Trees. [Citation Graph (3, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:7, pp:799-810 [Journal ] J. F. M. Burg , Reind P. van de Riet COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling [Citation Graph (2, 0)][DBLP ] CAiSE, 1995, pp:26-39 [Conf ] Reind P. van de Riet MOKUM: An Object-Oriented Active Knowledge Base System. [Citation Graph (2, 0)][DBLP ] Data Knowl. Eng., 1989, v:4, n:1, pp:21-42 [Journal ] Reind P. van de Riet , Martin L. Kersten A Module Definition Facility for Access Control in Communicating Data Base Systems. [Citation Graph (1, 0)][DBLP ] DDSS, 1981, pp:255-272 [Conf ] Roel Wieringa , Reind P. van de Riet Algebraic Specification of Object Dynamics in Knowledge Base Domains. [Citation Graph (1, 0)][DBLP ] DS-3, 1988, pp:411-436 [Conf ] Paul Buitelaar , Reind P. van de Riet The Use of a Lexicon to Interpret ER-Diagrams: A LIKE project. [Citation Graph (1, 7)][DBLP ] ER, 1992, pp:162-177 [Conf ] J. F. M. Burg , Reind P. van de Riet The Impact of Linguistics on Conceptual Models: Consistency and Understandability. [Citation Graph (1, 0)][DBLP ] NLDB, 1995, pp:183-197 [Conf ] Bram van der Vos , Jon Atle Gulla , Reind P. van de Riet Verification of Conceptual Models based on Linguistic Knowledge. [Citation Graph (1, 0)][DBLP ] NLDB, 1995, pp:0-0 [Conf ] Frank Dignum , T. Kemme , W. Kreuzen , Hans Weigand , Reind P. van de Riet Constraint Modelling Using a Conceptual Prototyping Language. [Citation Graph (1, 0)][DBLP ] Data Knowl. Eng., 1987, v:2, n:, pp:213-254 [Journal ] Frank Dignum , Reind P. van de Riet Knowledge base modelling based on linguistics and founded in logic. [Citation Graph (1, 0)][DBLP ] Data Knowl. Eng., 1991, v:7, n:, pp:1-34 [Journal ] Reind P. van de Riet Introduction to the Special Issue on Deductive and Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] Data Knowl. Eng., 1990, v:5, n:, pp:255-261 [Journal ] Robert Croshere , Reind P. van de Riet , Alco Blom An Animation Facility to Simulate an Information and Communication System [Citation Graph (0, 0)][DBLP ] CAiSE, 1993, pp:547-568 [Conf ] J. F. M. Burg , Reind P. van de Riet , S. C. Chang A Data Dictionary as a Lexicon: An Application of Linguistics in Information Systems. [Citation Graph (0, 0)][DBLP ] CIKM, 1993, pp:114-123 [Conf ] Ehud Gudes , Reind P. van de Riet , J. F. M. Burg , Martin S. Olivier Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:182-195 [Conf ] Reind P. van de Riet , Jack Beukering The Integration of Security and Integrity Constraints in MOKUM. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:223-244 [Conf ] Reind P. van de Riet , Ehud Gudes An Object-Oriented Database Architecture for Providing Securty in Cyberspace. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:120-144 [Conf ] Reind P. van de Riet , Raban Serban , Sylvia L. Osborn , Arnon Rosenthal , Vijayalakshmi Atluri , Joachim Biskup , Gio Wiederhold Panel. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:373- [Conf ] Wouter Teepe , Reind P. van de Riet , Martin S. Olivier WorkFlow Analyzed for Security and Privacy in using Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:271-282 [Conf ] Martin L. Kersten , Reind P. van de Riet , Wiebren de Jonge Privacy and Security in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] DDSS, 1981, pp:229-241 [Conf ] P. I. Elsas , Reind P. van de Riet , J. J. van Leeuwen Knowledge-based Audit Support. [Citation Graph (0, 0)][DBLP ] DEXA, 1992, pp:512-518 [Conf ] P. R. Griffioen , P. I. Elsas , Reind P. van de Riet Analysing Enterprises: The Value Cycle Approach. [Citation Graph (0, 0)][DBLP ] DEXA, 2000, pp:685-697 [Conf ] Reind P. van de Riet , Wouter Janssen , Martin S. Olivier , Radu Serban A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. [Citation Graph (0, 0)][DBLP ] DEXA, 2000, pp:287-301 [Conf ] P. I. Elsas , P. M. Ott de Vries , Reind P. van de Riet Computing Conspiracies. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:256-266 [Conf ] Martin S. Olivier , Reind P. van de Riet , Ehud Gudes Specifying Application-Level Security in Workflow Systems. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:346-351 [Conf ] Reind P. van de Riet , Wouter Janssen , Peter de Gruijter Security Moving from Database Systems to ERP Systems. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:273-280 [Conf ] J. F. M. Burg , Reind P. van de Riet COLOR-X Event Model: Integrated Specification of the Dynamics of Individual Objects. [Citation Graph (0, 5)][DBLP ] OOER, 1995, pp:146-157 [Conf ] Reind P. van de Riet Research in the SIKS Research School: An Example of a Cooperation in Using Linguistic Tools for Requirements Specification in Cyberspace. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1997, pp:505- [Conf ] Reind P. van de Riet About ABC ALGOL: A Language for Formula Manipulation Systems. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1974, pp:222-225 [Conf ] Reind P. van de Riet BASIS - An Interactive System for the Introductory Course in Informatics. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1977, pp:347-351 [Conf ] Reind P. van de Riet Making Expert Systems Explicit - Response. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1986, pp:545-548 [Conf ] Ans A. G. Steuten , Frank K. H. A. Dehne , Reind P. van de Riet WordNet++: A Lexicon Supporting the Color-X Method. [Citation Graph (0, 0)][DBLP ] NLDB, 2000, pp:1-16 [Conf ] Reind P. van de Riet Performance Evaluation of the BASIS System. [Citation Graph (0, 0)][DBLP ] Performance, 1979, pp:105-122 [Conf ] Reind P. van de Riet , Martin L. Kersten , Anthony I. Wasserman A Module Definition Facility for Access Control in Distributed Data Base Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1980, pp:59-66 [Conf ] Shamkant B. Navathe , Reind P. van de Riet Databases for Expert Systems. [Citation Graph (0, 0)][DBLP ] VLDB, 1984, pp:257- [Conf ] Martin Caminada , Reind P. van de Riet , Arjen van Zanten , Leendert van Doorn Internet Security Incidents, a Survey within Dutch Organisations. [Citation Graph (0, 0)][DBLP ] WebNet, 1998, pp:- [Conf ] M. O. Froehlich , Reind P. van de Riet Text Generation in Business Object Frameworks. [Citation Graph (0, 0)][DBLP ] WebNet, 1997, pp:- [Conf ] Reind P. van de Riet , J. F. M. Burg Modelling alter egos in cyberspace: Who is responsible? [Citation Graph (0, 0)][DBLP ] WebNet, 1996, pp:- [Conf ] Reind P. van de Riet , Hans F. M. Burg Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy? [Citation Graph (0, 0)][DBLP ] WebNet, 1997, pp:- [Conf ] Reind P. van de Riet Certification of algorithm 73: incomplete elliptic integrals. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1963, v:6, n:4, pp:167- [Journal ] Reind P. van de Riet Algorithm 186: complex arithmetic. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1963, v:6, n:7, pp:386-387 [Journal ] Reind P. van de Riet Algorithm 187: differences and derivatives. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1963, v:6, n:7, pp:387- [Journal ] Martin Caminada , Reind P. van de Riet , Arjen van Zanten , Leendert van Doorn Internet security incidents, a survey within Dutch organizations. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:5, pp:417-433 [Journal ] J. F. M. Burg , Reind P. van de Riet The Impact of Linguistics on Conceptual Models: Consistency and Understandability. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1997, v:21, n:2, pp:131-146 [Journal ] Ana M. Moreno-Capuchino , Natalia Juristo Juzgado , Reind P. van de Riet Formal justification in object-oriented modelling: A linguistic approach. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2000, v:33, n:1, pp:25-47 [Journal ] Peter P. Chen , Reind P. van de Riet Editorial introduction. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:41, n:2-3, pp:125-132 [Journal ] Peter P. Chen , Reind P. van de Riet Introduction to the Special Issue Celebrating the 25th Volume of Data & Knowledge Engineering: DKE. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1998, v:25, n:1-2, pp:1-9 [Journal ] Frank K. H. A. Dehne , Ans A. G. Steuten , Reind P. van de Riet WORDNET++: A lexicon for the COLOR-X-method. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2001, v:38, n:1, pp:3-29 [Journal ] Frank Dignum , Reind P. van de Riet Addition and removal of information for a knowledge base with incomplete information. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1992, v:8, n:, pp:293-307 [Journal ] Ana M. Moreno-Capuchino , Reind P. van de Riet Guest editorial: Special issue NLDB '01. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:42, n:3, pp:247-249 [Journal ] Reind P. van de Riet Notes on a classification for DKE. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:41, n:2-3, pp:133-139 [Journal ] Reind P. van de Riet Peter Chen honoured with the Stevens Award for advancing software development methods. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:41, n:2-3, pp:273-282 [Journal ] Reind P. van de Riet Editorial Introduction by the Editor for Europe. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2004, v:50, n:3, pp:247-260 [Journal ] Reind P. van de Riet The future refereeing process in Cyberspace of the Data & Knowledge Engineering Journal: an attempt in guaranteeing security and privacy on three levels. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2004, v:50, n:3, pp:305-339 [Journal ] Reind P. van de Riet Complex Objects: Theory and Practice from a Data- and Knowledge Engineering Perspective, as Seen in and from Yellostone Park. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1998, v:25, n:1-2, pp:217-238 [Journal ] Reind P. van de Riet , Andrea Junk , Ehud Gudes Security in Cyberspace: A Knowledge-Base Approach. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1997, v:24, n:1, pp:69-96 [Journal ] Bhavani M. Thuraisingham , Reind P. van de Riet Data and applications security (Guest editorial). [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:3, pp:235-236 [Journal ] Bram van der Vos , Jon Atle Gulla , Reind P. van de Riet Verification of Conceptual Models Based on Linguistic Knowledge. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1997, v:21, n:2, pp:147-163 [Journal ] Ans A. G. Steuten , Reind P. van de Riet , Jan L. G. Dietz Linguistically based conceptual modeling of business communication. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2000, v:35, n:2, pp:121-136 [Journal ] Radu Serban , Reind P. van de Riet Enforcing policies with private guardians. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:63, n:, pp:- [Journal ] J. F. M. Burg , Reind P. van de Riet Enhancing CASE Environments by Using Linguistics. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 1998, v:8, n:4, pp:435-448 [Journal ] Reind P. van de Riet , Martin L. Kersten , Wiebren de Jonge , Anthony I. Wasserman Privacy and security in information systems using programming language features. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1983, v:8, n:2, pp:95-103 [Journal ] Ehud Gudes , Martin S. Olivier , Reind P. van de Riet Modeling, Specifying and Implementing Workflow Security in Cyberspace. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal ] Wouter Teepe , Reind P. van de Riet , Martin S. Olivier WorkFlow Analyzed for Security and Privacy in Using Databases. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:3, pp:353-364 [Journal ] Reind P. van de Riet , J. F. M. Burg Linguistic Tools for Modelling Alter Egos in Cyperspace: Who is responsible? [Citation Graph (0, 0)][DBLP ] J. UCS, 1996, v:2, n:9, pp:623-636 [Journal ] Reind P. van de Riet , R. Wiggers Practice and Experience with BASIS: an Interactive Programming System for Introductory Courses in Informatics. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1979, v:9, n:6, pp:463-476 [Journal ] Mokum for Correctness by Design in Relation to MDA. [Citation Graph (, )][DBLP ] Introduction to the special issue on DKE 25 years. [Citation Graph (, )][DBLP ] Thank you referees, authors and readers of DKE. [Citation Graph (, )][DBLP ] Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace. [Citation Graph (, )][DBLP ] Search in 0.154secs, Finished in 0.157secs