The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Reind P. van de Riet: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Reind P. van de Riet, Anthony I. Wasserman, Martin L. Kersten, Wiebren de Jonge
    High-Level Programming Features for Improving the Efficiency of a Relational Database System. [Citation Graph (7, 12)][DBLP]
    ACM Trans. Database Syst., 1981, v:6, n:3, pp:464-485 [Journal]
  2. George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet
    Answering Queries Without Revealing Secrets. [Citation Graph (6, 5)][DBLP]
    ACM Trans. Database Syst., 1983, v:8, n:1, pp:41-59 [Journal]
  3. Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet
    Two Access Methods Using Compact Binary Trees. [Citation Graph (3, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:7, pp:799-810 [Journal]
  4. J. F. M. Burg, Reind P. van de Riet
    COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling [Citation Graph (2, 0)][DBLP]
    CAiSE, 1995, pp:26-39 [Conf]
  5. Reind P. van de Riet
    MOKUM: An Object-Oriented Active Knowledge Base System. [Citation Graph (2, 0)][DBLP]
    Data Knowl. Eng., 1989, v:4, n:1, pp:21-42 [Journal]
  6. Reind P. van de Riet, Martin L. Kersten
    A Module Definition Facility for Access Control in Communicating Data Base Systems. [Citation Graph (1, 0)][DBLP]
    DDSS, 1981, pp:255-272 [Conf]
  7. Roel Wieringa, Reind P. van de Riet
    Algebraic Specification of Object Dynamics in Knowledge Base Domains. [Citation Graph (1, 0)][DBLP]
    DS-3, 1988, pp:411-436 [Conf]
  8. Paul Buitelaar, Reind P. van de Riet
    The Use of a Lexicon to Interpret ER-Diagrams: A LIKE project. [Citation Graph (1, 7)][DBLP]
    ER, 1992, pp:162-177 [Conf]
  9. J. F. M. Burg, Reind P. van de Riet
    The Impact of Linguistics on Conceptual Models: Consistency and Understandability. [Citation Graph (1, 0)][DBLP]
    NLDB, 1995, pp:183-197 [Conf]
  10. Bram van der Vos, Jon Atle Gulla, Reind P. van de Riet
    Verification of Conceptual Models based on Linguistic Knowledge. [Citation Graph (1, 0)][DBLP]
    NLDB, 1995, pp:0-0 [Conf]
  11. Frank Dignum, T. Kemme, W. Kreuzen, Hans Weigand, Reind P. van de Riet
    Constraint Modelling Using a Conceptual Prototyping Language. [Citation Graph (1, 0)][DBLP]
    Data Knowl. Eng., 1987, v:2, n:, pp:213-254 [Journal]
  12. Frank Dignum, Reind P. van de Riet
    Knowledge base modelling based on linguistics and founded in logic. [Citation Graph (1, 0)][DBLP]
    Data Knowl. Eng., 1991, v:7, n:, pp:1-34 [Journal]
  13. Reind P. van de Riet
    Introduction to the Special Issue on Deductive and Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    Data Knowl. Eng., 1990, v:5, n:, pp:255-261 [Journal]
  14. Robert Croshere, Reind P. van de Riet, Alco Blom
    An Animation Facility to Simulate an Information and Communication System [Citation Graph (0, 0)][DBLP]
    CAiSE, 1993, pp:547-568 [Conf]
  15. J. F. M. Burg, Reind P. van de Riet, S. C. Chang
    A Data Dictionary as a Lexicon: An Application of Linguistics in Information Systems. [Citation Graph (0, 0)][DBLP]
    CIKM, 1993, pp:114-123 [Conf]
  16. Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier
    Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:182-195 [Conf]
  17. Reind P. van de Riet, Jack Beukering
    The Integration of Security and Integrity Constraints in MOKUM. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:223-244 [Conf]
  18. Reind P. van de Riet, Ehud Gudes
    An Object-Oriented Database Architecture for Providing Securty in Cyberspace. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:120-144 [Conf]
  19. Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold
    Panel. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:373- [Conf]
  20. Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
    WorkFlow Analyzed for Security and Privacy in using Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:271-282 [Conf]
  21. Martin L. Kersten, Reind P. van de Riet, Wiebren de Jonge
    Privacy and Security in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    DDSS, 1981, pp:229-241 [Conf]
  22. P. I. Elsas, Reind P. van de Riet, J. J. van Leeuwen
    Knowledge-based Audit Support. [Citation Graph (0, 0)][DBLP]
    DEXA, 1992, pp:512-518 [Conf]
  23. P. R. Griffioen, P. I. Elsas, Reind P. van de Riet
    Analysing Enterprises: The Value Cycle Approach. [Citation Graph (0, 0)][DBLP]
    DEXA, 2000, pp:685-697 [Conf]
  24. Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban
    A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. [Citation Graph (0, 0)][DBLP]
    DEXA, 2000, pp:287-301 [Conf]
  25. P. I. Elsas, P. M. Ott de Vries, Reind P. van de Riet
    Computing Conspiracies. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:256-266 [Conf]
  26. Martin S. Olivier, Reind P. van de Riet, Ehud Gudes
    Specifying Application-Level Security in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:346-351 [Conf]
  27. Reind P. van de Riet, Wouter Janssen, Peter de Gruijter
    Security Moving from Database Systems to ERP Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:273-280 [Conf]
  28. J. F. M. Burg, Reind P. van de Riet
    COLOR-X Event Model: Integrated Specification of the Dynamics of Individual Objects. [Citation Graph (0, 5)][DBLP]
    OOER, 1995, pp:146-157 [Conf]
  29. Reind P. van de Riet
    Research in the SIKS Research School: An Example of a Cooperation in Using Linguistic Tools for Requirements Specification in Cyberspace. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1997, pp:505- [Conf]
  30. Reind P. van de Riet
    About ABC ALGOL: A Language for Formula Manipulation Systems. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1974, pp:222-225 [Conf]
  31. Reind P. van de Riet
    BASIS - An Interactive System for the Introductory Course in Informatics. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1977, pp:347-351 [Conf]
  32. Reind P. van de Riet
    Making Expert Systems Explicit - Response. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1986, pp:545-548 [Conf]
  33. Ans A. G. Steuten, Frank K. H. A. Dehne, Reind P. van de Riet
    WordNet++: A Lexicon Supporting the Color-X Method. [Citation Graph (0, 0)][DBLP]
    NLDB, 2000, pp:1-16 [Conf]
  34. Reind P. van de Riet
    Performance Evaluation of the BASIS System. [Citation Graph (0, 0)][DBLP]
    Performance, 1979, pp:105-122 [Conf]
  35. Reind P. van de Riet, Martin L. Kersten, Anthony I. Wasserman
    A Module Definition Facility for Access Control in Distributed Data Base Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1980, pp:59-66 [Conf]
  36. Shamkant B. Navathe, Reind P. van de Riet
    Databases for Expert Systems. [Citation Graph (0, 0)][DBLP]
    VLDB, 1984, pp:257- [Conf]
  37. Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn
    Internet Security Incidents, a Survey within Dutch Organisations. [Citation Graph (0, 0)][DBLP]
    WebNet, 1998, pp:- [Conf]
  38. M. O. Froehlich, Reind P. van de Riet
    Text Generation in Business Object Frameworks. [Citation Graph (0, 0)][DBLP]
    WebNet, 1997, pp:- [Conf]
  39. Reind P. van de Riet, J. F. M. Burg
    Modelling alter egos in cyberspace: Who is responsible? [Citation Graph (0, 0)][DBLP]
    WebNet, 1996, pp:- [Conf]
  40. Reind P. van de Riet, Hans F. M. Burg
    Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy? [Citation Graph (0, 0)][DBLP]
    WebNet, 1997, pp:- [Conf]
  41. Reind P. van de Riet
    Certification of algorithm 73: incomplete elliptic integrals. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1963, v:6, n:4, pp:167- [Journal]
  42. Reind P. van de Riet
    Algorithm 186: complex arithmetic. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1963, v:6, n:7, pp:386-387 [Journal]
  43. Reind P. van de Riet
    Algorithm 187: differences and derivatives. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1963, v:6, n:7, pp:387- [Journal]
  44. Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn
    Internet security incidents, a survey within Dutch organizations. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:5, pp:417-433 [Journal]
  45. J. F. M. Burg, Reind P. van de Riet
    The Impact of Linguistics on Conceptual Models: Consistency and Understandability. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1997, v:21, n:2, pp:131-146 [Journal]
  46. Ana M. Moreno-Capuchino, Natalia Juristo Juzgado, Reind P. van de Riet
    Formal justification in object-oriented modelling: A linguistic approach. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2000, v:33, n:1, pp:25-47 [Journal]
  47. Peter P. Chen, Reind P. van de Riet
    Editorial introduction. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:41, n:2-3, pp:125-132 [Journal]
  48. Peter P. Chen, Reind P. van de Riet
    Introduction to the Special Issue Celebrating the 25th Volume of Data & Knowledge Engineering: DKE. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1998, v:25, n:1-2, pp:1-9 [Journal]
  49. Frank K. H. A. Dehne, Ans A. G. Steuten, Reind P. van de Riet
    WORDNET++: A lexicon for the COLOR-X-method. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2001, v:38, n:1, pp:3-29 [Journal]
  50. Frank Dignum, Reind P. van de Riet
    Addition and removal of information for a knowledge base with incomplete information. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1992, v:8, n:, pp:293-307 [Journal]
  51. Ana M. Moreno-Capuchino, Reind P. van de Riet
    Guest editorial: Special issue NLDB '01. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:42, n:3, pp:247-249 [Journal]
  52. Reind P. van de Riet
    Notes on a classification for DKE. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:41, n:2-3, pp:133-139 [Journal]
  53. Reind P. van de Riet
    Peter Chen honoured with the Stevens Award for advancing software development methods. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:41, n:2-3, pp:273-282 [Journal]
  54. Reind P. van de Riet
    Editorial Introduction by the Editor for Europe. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2004, v:50, n:3, pp:247-260 [Journal]
  55. Reind P. van de Riet
    The future refereeing process in Cyberspace of the Data & Knowledge Engineering Journal: an attempt in guaranteeing security and privacy on three levels. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2004, v:50, n:3, pp:305-339 [Journal]
  56. Reind P. van de Riet
    Complex Objects: Theory and Practice from a Data- and Knowledge Engineering Perspective, as Seen in and from Yellostone Park. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1998, v:25, n:1-2, pp:217-238 [Journal]
  57. Reind P. van de Riet, Andrea Junk, Ehud Gudes
    Security in Cyberspace: A Knowledge-Base Approach. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1997, v:24, n:1, pp:69-96 [Journal]
  58. Bhavani M. Thuraisingham, Reind P. van de Riet
    Data and applications security (Guest editorial). [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:235-236 [Journal]
  59. Bram van der Vos, Jon Atle Gulla, Reind P. van de Riet
    Verification of Conceptual Models Based on Linguistic Knowledge. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1997, v:21, n:2, pp:147-163 [Journal]
  60. Ans A. G. Steuten, Reind P. van de Riet, Jan L. G. Dietz
    Linguistically based conceptual modeling of business communication. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2000, v:35, n:2, pp:121-136 [Journal]
  61. Radu Serban, Reind P. van de Riet
    Enforcing policies with private guardians. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:63, n:, pp:- [Journal]
  62. J. F. M. Burg, Reind P. van de Riet
    Enhancing CASE Environments by Using Linguistics. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 1998, v:8, n:4, pp:435-448 [Journal]
  63. Reind P. van de Riet, Martin L. Kersten, Wiebren de Jonge, Anthony I. Wasserman
    Privacy and security in information systems using programming language features. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1983, v:8, n:2, pp:95-103 [Journal]
  64. Ehud Gudes, Martin S. Olivier, Reind P. van de Riet
    Modeling, Specifying and Implementing Workflow Security in Cyberspace. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:4, pp:- [Journal]
  65. Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
    WorkFlow Analyzed for Security and Privacy in Using Databases. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:353-364 [Journal]
  66. Reind P. van de Riet, J. F. M. Burg
    Linguistic Tools for Modelling Alter Egos in Cyperspace: Who is responsible? [Citation Graph (0, 0)][DBLP]
    J. UCS, 1996, v:2, n:9, pp:623-636 [Journal]
  67. Reind P. van de Riet, R. Wiggers
    Practice and Experience with BASIS: an Interactive Programming System for Introductory Courses in Informatics. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1979, v:9, n:6, pp:463-476 [Journal]

  68. Mokum for Correctness by Design in Relation to MDA. [Citation Graph (, )][DBLP]


  69. Introduction to the special issue on DKE 25 years. [Citation Graph (, )][DBLP]


  70. Thank you referees, authors and readers of DKE. [Citation Graph (, )][DBLP]


  71. Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace. [Citation Graph (, )][DBLP]


Search in 0.154secs, Finished in 0.157secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002