![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. Joachim Biskup Joachim Biskup, Piero A. Bonatti : Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40 (1-2): 37-62 (2004) Joachim Biskup, Torsten Polle : Adding inclusion dependencies to an object-oriented data model with uniqueness constraints. Acta Inf. 39 (6-7): 391-449 (2003) Joachim Biskup, David W. Embley : Extracting information from heterogeneous information sources using ontologically specified target views. Inf. Syst. 28 (3): 169-212 (2003) Christian Altenschmidt , Joachim Biskup, Ulrich Flegel , Yücel Karabulut : Secure Mediation: Requirements, Design, and Architecture. Journal of Computer Security 11 (3): 365-398 (2003) Joachim Biskup, Yücel Karabulut : A Hybrid PKI Model: Application to Secure Mediation. DBSec 2002 : 271-282 Christian Altenschmidt , Joachim Biskup: Explicit Representation of Constrained Schema Mappings for Mediated Data Integration. DNIS 2002 : 103-132 Joachim Biskup, Ralf Menzel : A Flexible Cost Model for Abstract Object-Oriented Database Schemas. ER 2002 : 444-462 Joachim Biskup, Piero A. Bonatti : Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002 : 39-54 Joachim Biskup, Piero A. Bonatti : Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002 : 49-66 Joachim Biskup: Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. GI Jahrestagung 2002 : 423-428 Joachim Biskup, Ulrich Flegel : Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. GI Jahrestagung 2002 : 488-496 Joachim Biskup, Ralf Menzel : An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas. ADBIS 2001 : 366-378 Joachim Biskup, Thomas Leineweber : State-Dependent Security Decisions for Distributed Object-Systems. DBSec 2001 : 105-118 Joachim Biskup, Barbara Sprick : Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems. Semantics in Databases 2001 : 34-62 Joachim Biskup, Torsten Polle : Decomposition of object-oriented database schemas. Ann. Math. Artif. Intell. 33 (2-4): 119-155 (2001) Joachim Biskup, Piero A. Bonatti : Lying versus refusal for known potential secrets. Data Knowl. Eng. 38 (2): 199-222 (2001) Joachim Biskup, Ulrich Flegel : Threshold-based identity recovery for privacy enhanced applications. ACM Conference on Computer and Communications Security 2000 : 71-79 Reind P. van de Riet , Raban Serban , Sylvia L. Osborn , Arnon Rosenthal , Vijayalakshmi Atluri , Joachim Biskup, Gio Wiederhold : Panel. DBSec 2000 : 373 Christian Altenschmidt , Joachim Biskup, Yücel Karabulut : Security Architecture of the Multimedia Mediator. DBSec 2000 : 77-88 Joachim Biskup, Torsten Polle : Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints. FoIKS 2000 : 31-49 Joachim Biskup, David W. Embley : Mediated Information Gain. IDEAS 2000 : 360-370 Joachim Biskup, Ulrich Flegel : Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Recent Advances in Intrusion Detection 2000 : 28-48 Joachim Biskup, Ulrich Flegel : On Pseudonymization of Audit Data for Intrusion Detection. Workshop on Design Issues in Anonymity and Unobservability 2000 : 161-180 Joachim Biskup: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33 (1): 1-23 (2000) Leana Golubchik , V. S. Subrahmanian , Sherry Marcus , Joachim Biskup: Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers. IEEE Trans. Knowl. Data Eng. 12 (1): 60-77 (2000) Joachim Biskup: For Unknown Secrecies Refusal is Better than Lying. DBSec 1999 : 127-141 Joachim Biskup, Ralf Menzel , Torsten Polle : Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas. Grundlagen von Datenbanken 1999 : 72-76 Joachim Biskup, Ulrich Flegel , Yücel Karabulut : Secure Mediation: Requirements and Design. DBSec 1998 : 127-140 Joachim Biskup: Technical Enforcement of Informational Assurances. DBSec 1998 : 17-40 Alois Knoll , Christian Altenschmidt , Joachim Biskup, H.-M. Blüthgen , Ingo Glöckner , Sven Hartrumpf , Hermann Helbig , C. Henning , Reinhard Lüling , Burkhard Monien , Thomas Noll , Norbert Sensen : An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents. ECDL 1998 : 409-428 Christian Altenschmidt , Joachim Biskup, Jürgen Freitag , Barbara Sprick : Weakly Constraining Multimedia Types Based on a Type Embedding Ordering. Multimedia Information Systems 1998 : 121-129 Joachim Biskup, Andreas Kluck : A New Approach to Inferences of Semantic Constraints. ADBIS 1997 : 72-79 Joachim Biskup, Jürgen Freitag , Yücel Karabulut , Barbara Sprick : Query Evaluation in an Object-Oriented Multimedia Mediator. OOIS 1997 : 31-43 Joachim Biskup, Ralf Menzel , Torsten Polle , Yehoshua Sagiv : Decomposition of Relationships through Pivoting. ER 1996 : 28-41 Joachim Biskup: Grundlagen von Informationssystemen Vieweg 1995 Joachim Biskup, Ralf Menzel , Torsten Polle : Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas. ADBIS 1995 : 109-136 Joachim Biskup: Database Schema Design Theory : Achievements and Challenges. CISMOD 1995 : 14-44 Joachim Biskup: Achievements of Relational Database Schema Design Theory Revisited. Semantics in Databases 1995 : 29-54 Joachim Biskup, Pratul Dublish , Yehoshua Sagiv : Optimization of a Subclass of Conjunctive Queries Acta Inf. 32 (1): 1-26 (1995) Joachim Biskup, Matthew Morgenstern , Carl E. Landwehr : Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994 North-Holland 1994 Joachim Biskup, Christian Eckert : Enforcement of State Dependent Security Specifications. DBSec 1994 : 375 Matthew Morgenstern , Joachim Biskup, Klaus R. Dittrich , Carl E. Landwehr , Marvin Schaefer : Perspectives on Database Security - Panel Summary. DBSec 1994 : 377-390 Joachim Biskup, Christian Eckert : Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen. Grundlagen von Datenbanken 1994 : 11-15 Joachim Biskup, Ralf Menzel , Torsten Polle : Schematransformation für F-Logik. Grundlagen von Datenbanken 1994 : 16-19 Joachim Biskup, Ralf Menzel , Torsten Polle : Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata. Grundlagen von Datenbanken 1994 : 20-24 Joachim Biskup, Gerrit Bleumer : Reflections on Security of Database and Datatransfer Systems in Health Care. IFIP Congress (2) 1994 : 549-556 Joachim Biskup: Impacts of Creating, Implementing and Using Formal Languages. IFIP Congress (3) 1994 : 402-407 Joachim Biskup, Christian Eckert : About the Enforcement of State Dependent Specifications. DBSec 1993 : 3-17 Joachim Biskup, Holger Stiefeling : Evaluation of Upper Bounds and Least Nodes as Database Operations. FODO 1993 : 197-214 Joachim Biskup, Christian Eckert : Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen. Grundlagen von Datenbanken 1993 : 20-24 Joachim Biskup, Torsten Polle : Magic-Sets: Globalisieren von Variablen und Rekursionselimination. Grundlagen von Datenbanken 1993 : 25-29 Joachim Biskup, Christian Eckert : Sichere Delegation in Informationssystemen. VIS 1993 : 107-133 Joachim Biskup: Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". VIS 1993 : 239-254 Joachim Biskup, Pratul Dublish : Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies. ITA 27 (3): 183-219 (1993) Joachim Biskup, Richard Hull : Database Theory - ICDT'92, 4th International Conference, Berlin, Germany, October 14-16, 1992, Proceedings Springer 1992 Joachim Biskup, Pratul Dublish : Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies. MFDBS 1991 : 276-290 Joachim Biskup: Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses. VIS 1991 : 1-21 Joachim Biskup, Hans Hermann Brüggemann : Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick. VIS 1991 : 146-158 Joachim Biskup: Sicherheit: Gewährleistung und Begrenzung des Informationsflusses. Entwicklungstendenzen bei Datenbanksystemen 1991 : 363-388 Joachim Biskup, János Demetrovics , Leonid Libkin , Ilya B. Muchnik : On Relational Database Schemes Having Unique Minimal Key. Elektronische Informationsverarbeitung und Kybernetik 27 (4): 217-225 (1991) Joachim Biskup: Relationship chase procedures interpreted as resolution with paramodulation. Fundam. Inform. 15 (2): 123-138 (1991) Joachim Biskup: A General Framework for Database Security (Abstract). DBSec 1990 : 169-170 Joachim Biskup: Medical Database Security. GI Jahrestagung (2) 1990 : 212-221 Joachim Biskup: A General Framework for Database Security. Grundlagen von Datenbanken 1990 : 7-10 Pratul Dublish , Joachim Biskup, Yehoshua Sagiv : Optimizatioin of a Subclass of Conjunctive Queries. ICDT 1990 : 455-469 Joachim Biskup, Uwe Räsch , Holger Stiefeling : An Extension of SQL for Querying Graph Relations. Comput. Lang. 15 (1): 65-82 (1990) Joachim Biskup: Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. DBSec 1989 : 13-23 Joachim Biskup, Hans Hermann Brüggemann : An Object-Surrogate-Value Approach for Database Languages. FMLDO 1989 : 79-92 Joachim Biskup, Hans Hermann Brüggemann : The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989 : 348-355 Joachim Biskup, Bernhard Convent : Towards a Schema Design Methodology for Deductive Databases. MFDBS 1989 : 37-52 Joachim Biskup: Boyce-Codd Normal Form and Object Normal Forms. Inf. Process. Lett. 32 (1): 29-33 (1989) Joachim Biskup: Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt. Informatik Spektrum 12 (3): 158-161 (1989) Joachim Biskup, János Demetrovics , Jan Paredaens , Bernhard Thalheim : MFDBS 87, 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, GDR, January 19-23, 1987, Proceedings Springer 1988 Joachim Biskup, Hans-Werner Graf : Analysis of the Privacy Model for the Information System DORIS. DBSec 1988 : 123-140 Joachim Biskup, Holger Stiefeling : Transitive Closure Algorithms for Very Large Databases. WG 1988 : 122-147 Joachim Biskup, Hans Hermann Brüggemann : The Personal Model of Data: Towards a Privacy-Oriented Information System. Computers & Security 7 : 575-597 (1988) Joachim Biskup: Privacy Respecting Permissions and Rights. DBSec 1987 : 173-185 Joachim Biskup, Hans Hermann Brüggemann : Data Manipulation Languages for the Universal Relation View DURST. MFDBS 1987 : 20-41 Joachim Biskup, Uwe Räsch : The Equivalence Problem For Relational Database Schemes. MFDBS 1987 : 42-70 Joachim Biskup, Renate Meyer : Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition. J. Comput. Syst. Sci. 35 (1): 1-22 (1987) Joachim Biskup, Hans Hermann Brüggemann , L. Schnetgöke , M. Kramer : One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views. PODS 1986 : 148-159 Joachim Biskup, Bernhard Convent : A Formal View Integration Method. SIGMOD Conference 1986 : 398-407 Joachim Biskup: Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values. Fundam. Inform. 7 (1): 129-150 (1984) Joachim Biskup: Some Variants of the Take-Grant Protection Model. Inf. Process. Lett. 19 (3): 151-156 (1984) Joachim Biskup, Hans Hermann Brüggemann : Universal Relation Views: A Pragmatic Approach. VLDB 1983 : 172-185 Joachim Biskup: A Foundation of Codd's Relational Maybe-Operations. ACM Trans. Database Syst. 8 (4): 608-636 (1983) Joachim Biskup, Hans Hermann Brüggemann : Towards Designing Acyclic Database Schemes. Advances in Data Base Theory 1982 : 3-25 Joachim Biskup: A Foundation of Codd's Relational Maybe-Operations. XP2 Workshop on Relational Database Theory 1981 Joachim Biskup: Inferences of Multivalued Dependencies in Fixed and Undetermined Universes. Theor. Comput. Sci. 10 : 93-105 (1980) Joachim Biskup: A Formal Approach to Null Values in Database Relations. Advances in Data Base Theory 1979 : 299-341 Joachim Biskup, Umeshwar Dayal , Philip A. Bernstein : Synthesizing Independent Database Schemas. SIGMOD Conference 1979 : 143-151 Joachim Biskup: Path Measures of Turing Machine Computations (Preliminary Report). ICALP 1978 : 90-104 Joachim Biskup: On the Complementation Rule for Multivalued Dependencies in Database Relations. Acta Inf. 10 : 297-305 (1978) Joachim Biskup: The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property. SIAM J. Comput. 7 (1): 115-117 (1978) Joachim Biskup: Über Projektionsmengen von Komplexitätsmaßen. Elektronische Informationsverarbeitung und Kybernetik 13 (7/8): 359-368 (1977) Joachim Biskup: Zufällige Folgen und Bi-immunität. Automatentheorie und Formale Sprachen 1973 : 202-207 1 [ 66 ] [ 67 ] [ 78 ] [ 91 ] [ 93 ] 2 [ 79 ] 3 [ 6 ] 4 [ 51 ] 5 [ 67 ] 6 [ 81 ] [ 88 ] [ 89 ] [ 96 ] 7 [ 10 ] [ 12 ] [ 16 ] [ 19 ] [ 21 ] [ 28 ] [ 29 ] [ 39 ] 8 [ 15 ] [ 27 ] 9 [ 6 ] 10 [ 24 ] [ 37 ] 11 [ 55 ] 12 [ 32 ] [ 41 ] [ 43 ] [ 58 ] 13 [ 45 ] [ 47 ] [ 49 ] [ 54 ] [ 56 ] 14 [ 76 ] [ 94 ] 15 [ 69 ] [ 74 ] [ 75 ] [ 80 ] [ 86 ] [ 93 ] 16 [ 64 ] [ 66 ] 17 [ 67 ] 18 [ 72 ] 19 [ 23 ] 20 [ 67 ] 21 [ 67 ] 22 [ 67 ] 23 [ 42 ] 24 [ 64 ] [ 69 ] [ 78 ] [ 92 ] [ 93 ] 25 [ 65 ] 26 [ 67 ] 27 [ 16 ] 28 [ 55 ] [ 57 ] 29 [ 84 ] 30 [ 37 ] 31 [ 67 ] 32 [ 72 ] 33 [ 52 ] [ 53 ] [ 61 ] [ 63 ] [ 70 ] [ 85 ] [ 90 ] 34 [ 17 ] 35 [ 67 ] 36 [ 55 ] [ 57 ] 37 [ 37 ] 38 [ 67 ] 39 [ 79 ] 40 [ 24 ] 41 [ 46 ] [ 52 ] [ 53 ] [ 61 ] [ 63 ] [ 70 ] [ 77 ] [ 82 ] [ 95 ] 42 [ 18 ] [ 31 ] 43 [ 79 ] 44 [ 79 ] 45 [ 32 ] [ 58 ] [ 63 ] 46 [ 55 ] 47 [ 16 ] 48 [ 67 ] 49 [ 79 ] 50 [ 64 ] [ 66 ] [ 83 ] 51 [ 22 ] [ 31 ] [ 48 ] 52 [ 72 ] 53 [ 24 ] 54 [ 79 ] ![]() ©2004 Association for Computing Machinery |