Welcome to D
SIGMOD 2003
PODS 2003
SIGMOD-RECOR
ADBIS
CIDR 2003
CIKM 2003
DASFAA 2003
Data Enginee
DEBS
DMKD 2003
DOLAP 2003
DPDJ 2003
ER
GIS 2003
Hypertext 20
ICDE 2003
ICDM 2003
ICDT 2003
JCDL 2003
KRDB 2003
MIR 2003
MIS 2003
MMDB 2003
RIDE 2003
SBBD 2003
SIGIR 2003
SIGIR-FORUM
SIGKDD 2003
SIGKDD-EXP
SSDBM 2003
TIME 2003
TODS
VLDB 2003
VLDB Journal
WIDM 2003
About DiSC 2
Editorial Bo
Acknowledgem
DiSC 2004 Pr
ADVIS
DiSC'04 Feed
DiSC'04 Site
Search DiSC'
<<<Author Index>>>
Copyright No

Joachim Biskup

Papers on DiSC'04


An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas

Publications


Note: Links lead to the DBLP on the Web.

Joachim Biskup

Joachim Biskup, Piero A. Bonatti : Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40 (1-2): 37-62 (2004)

Joachim Biskup, Torsten Polle : Adding inclusion dependencies to an object-oriented data model with uniqueness constraints. Acta Inf. 39 (6-7): 391-449 (2003)

Joachim Biskup, David W. Embley : Extracting information from heterogeneous information sources using ontologically specified target views. Inf. Syst. 28 (3): 169-212 (2003)

Christian Altenschmidt , Joachim Biskup, Ulrich Flegel , Yücel Karabulut : Secure Mediation: Requirements, Design, and Architecture. Journal of Computer Security 11 (3): 365-398 (2003)

Joachim Biskup, Yücel Karabulut : A Hybrid PKI Model: Application to Secure Mediation. DBSec 2002 : 271-282

Christian Altenschmidt , Joachim Biskup: Explicit Representation of Constrained Schema Mappings for Mediated Data Integration. DNIS 2002 : 103-132

Joachim Biskup, Ralf Menzel : A Flexible Cost Model for Abstract Object-Oriented Database Schemas. ER 2002 : 444-462

Joachim Biskup, Piero A. Bonatti : Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002 : 39-54

Joachim Biskup, Piero A. Bonatti : Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002 : 49-66

Joachim Biskup: Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. GI Jahrestagung 2002 : 423-428

Joachim Biskup, Ulrich Flegel : Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. GI Jahrestagung 2002 : 488-496

Joachim Biskup, Ralf Menzel : An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas. ADBIS 2001 : 366-378

Joachim Biskup, Thomas Leineweber : State-Dependent Security Decisions for Distributed Object-Systems. DBSec 2001 : 105-118

Joachim Biskup, Barbara Sprick : Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems. Semantics in Databases 2001 : 34-62

Joachim Biskup, Torsten Polle : Decomposition of object-oriented database schemas. Ann. Math. Artif. Intell. 33 (2-4): 119-155 (2001)

Joachim Biskup, Piero A. Bonatti : Lying versus refusal for known potential secrets. Data Knowl. Eng. 38 (2): 199-222 (2001)

Joachim Biskup, Ulrich Flegel : Threshold-based identity recovery for privacy enhanced applications. ACM Conference on Computer and Communications Security 2000 : 71-79

Reind P. van de Riet , Raban Serban , Sylvia L. Osborn , Arnon Rosenthal , Vijayalakshmi Atluri , Joachim Biskup, Gio Wiederhold : Panel. DBSec 2000 : 373

Christian Altenschmidt , Joachim Biskup, Yücel Karabulut : Security Architecture of the Multimedia Mediator. DBSec 2000 : 77-88

Joachim Biskup, Torsten Polle : Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints. FoIKS 2000 : 31-49

Joachim Biskup, David W. Embley : Mediated Information Gain. IDEAS 2000 : 360-370

Joachim Biskup, Ulrich Flegel : Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Recent Advances in Intrusion Detection 2000 : 28-48

Joachim Biskup, Ulrich Flegel : On Pseudonymization of Audit Data for Intrusion Detection. Workshop on Design Issues in Anonymity and Unobservability 2000 : 161-180

Joachim Biskup: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33 (1): 1-23 (2000)

Leana Golubchik , V. S. Subrahmanian , Sherry Marcus , Joachim Biskup: Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers. IEEE Trans. Knowl. Data Eng. 12 (1): 60-77 (2000)

Joachim Biskup: For Unknown Secrecies Refusal is Better than Lying. DBSec 1999 : 127-141

Joachim Biskup, Ralf Menzel , Torsten Polle : Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas. Grundlagen von Datenbanken 1999 : 72-76

Joachim Biskup, Ulrich Flegel , Yücel Karabulut : Secure Mediation: Requirements and Design. DBSec 1998 : 127-140

Joachim Biskup: Technical Enforcement of Informational Assurances. DBSec 1998 : 17-40

Alois Knoll , Christian Altenschmidt , Joachim Biskup, H.-M. Blüthgen , Ingo Glöckner , Sven Hartrumpf , Hermann Helbig , C. Henning , Reinhard Lüling , Burkhard Monien , Thomas Noll , Norbert Sensen : An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents. ECDL 1998 : 409-428

Christian Altenschmidt , Joachim Biskup, Jürgen Freitag , Barbara Sprick : Weakly Constraining Multimedia Types Based on a Type Embedding Ordering. Multimedia Information Systems 1998 : 121-129

Joachim Biskup, Andreas Kluck : A New Approach to Inferences of Semantic Constraints. ADBIS 1997 : 72-79

Joachim Biskup, Jürgen Freitag , Yücel Karabulut , Barbara Sprick : Query Evaluation in an Object-Oriented Multimedia Mediator. OOIS 1997 : 31-43

Joachim Biskup, Ralf Menzel , Torsten Polle , Yehoshua Sagiv : Decomposition of Relationships through Pivoting. ER 1996 : 28-41

Joachim Biskup: Grundlagen von Informationssystemen Vieweg 1995

Joachim Biskup, Ralf Menzel , Torsten Polle : Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas. ADBIS 1995 : 109-136

Joachim Biskup: Database Schema Design Theory : Achievements and Challenges. CISMOD 1995 : 14-44

Joachim Biskup: Achievements of Relational Database Schema Design Theory Revisited. Semantics in Databases 1995 : 29-54

Joachim Biskup, Pratul Dublish , Yehoshua Sagiv : Optimization of a Subclass of Conjunctive Queries Acta Inf. 32 (1): 1-26 (1995)

Joachim Biskup, Matthew Morgenstern , Carl E. Landwehr : Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994 North-Holland 1994

Joachim Biskup, Christian Eckert : Enforcement of State Dependent Security Specifications. DBSec 1994 : 375

Matthew Morgenstern , Joachim Biskup, Klaus R. Dittrich , Carl E. Landwehr , Marvin Schaefer : Perspectives on Database Security - Panel Summary. DBSec 1994 : 377-390

Joachim Biskup, Christian Eckert : Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen. Grundlagen von Datenbanken 1994 : 11-15

Joachim Biskup, Ralf Menzel , Torsten Polle : Schematransformation für F-Logik. Grundlagen von Datenbanken 1994 : 16-19

Joachim Biskup, Ralf Menzel , Torsten Polle : Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata. Grundlagen von Datenbanken 1994 : 20-24

Joachim Biskup, Gerrit Bleumer : Reflections on Security of Database and Datatransfer Systems in Health Care. IFIP Congress (2) 1994 : 549-556

Joachim Biskup: Impacts of Creating, Implementing and Using Formal Languages. IFIP Congress (3) 1994 : 402-407

Joachim Biskup, Christian Eckert : About the Enforcement of State Dependent Specifications. DBSec 1993 : 3-17

Joachim Biskup, Holger Stiefeling : Evaluation of Upper Bounds and Least Nodes as Database Operations. FODO 1993 : 197-214

Joachim Biskup, Christian Eckert : Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen. Grundlagen von Datenbanken 1993 : 20-24

Joachim Biskup, Torsten Polle : Magic-Sets: Globalisieren von Variablen und Rekursionselimination. Grundlagen von Datenbanken 1993 : 25-29

Joachim Biskup, Christian Eckert : Sichere Delegation in Informationssystemen. VIS 1993 : 107-133

Joachim Biskup: Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". VIS 1993 : 239-254

Joachim Biskup, Pratul Dublish : Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies. ITA 27 (3): 183-219 (1993)

Joachim Biskup, Richard Hull : Database Theory - ICDT'92, 4th International Conference, Berlin, Germany, October 14-16, 1992, Proceedings Springer 1992

Joachim Biskup, Pratul Dublish : Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies. MFDBS 1991 : 276-290

Joachim Biskup: Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses. VIS 1991 : 1-21

Joachim Biskup, Hans Hermann Brüggemann : Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick. VIS 1991 : 146-158

Joachim Biskup: Sicherheit: Gewährleistung und Begrenzung des Informationsflusses. Entwicklungstendenzen bei Datenbanksystemen 1991 : 363-388

Joachim Biskup, János Demetrovics , Leonid Libkin , Ilya B. Muchnik : On Relational Database Schemes Having Unique Minimal Key. Elektronische Informationsverarbeitung und Kybernetik 27 (4): 217-225 (1991)

Joachim Biskup: Relationship chase procedures interpreted as resolution with paramodulation. Fundam. Inform. 15 (2): 123-138 (1991)

Joachim Biskup: A General Framework for Database Security (Abstract). DBSec 1990 : 169-170

Joachim Biskup: Medical Database Security. GI Jahrestagung (2) 1990 : 212-221

Joachim Biskup: A General Framework for Database Security. Grundlagen von Datenbanken 1990 : 7-10

Pratul Dublish , Joachim Biskup, Yehoshua Sagiv : Optimizatioin of a Subclass of Conjunctive Queries. ICDT 1990 : 455-469

Joachim Biskup, Uwe Räsch , Holger Stiefeling : An Extension of SQL for Querying Graph Relations. Comput. Lang. 15 (1): 65-82 (1990)

Joachim Biskup: Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. DBSec 1989 : 13-23

Joachim Biskup, Hans Hermann Brüggemann : An Object-Surrogate-Value Approach for Database Languages. FMLDO 1989 : 79-92

Joachim Biskup, Hans Hermann Brüggemann : The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989 : 348-355

Joachim Biskup, Bernhard Convent : Towards a Schema Design Methodology for Deductive Databases. MFDBS 1989 : 37-52

Joachim Biskup: Boyce-Codd Normal Form and Object Normal Forms. Inf. Process. Lett. 32 (1): 29-33 (1989)

Joachim Biskup: Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt. Informatik Spektrum 12 (3): 158-161 (1989)

Joachim Biskup, János Demetrovics , Jan Paredaens , Bernhard Thalheim : MFDBS 87, 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, GDR, January 19-23, 1987, Proceedings Springer 1988

Joachim Biskup, Hans-Werner Graf : Analysis of the Privacy Model for the Information System DORIS. DBSec 1988 : 123-140

Joachim Biskup, Holger Stiefeling : Transitive Closure Algorithms for Very Large Databases. WG 1988 : 122-147

Joachim Biskup, Hans Hermann Brüggemann : The Personal Model of Data: Towards a Privacy-Oriented Information System. Computers & Security 7 : 575-597 (1988)

Joachim Biskup: Privacy Respecting Permissions and Rights. DBSec 1987 : 173-185

Joachim Biskup, Hans Hermann Brüggemann : Data Manipulation Languages for the Universal Relation View DURST. MFDBS 1987 : 20-41

Joachim Biskup, Uwe Räsch : The Equivalence Problem For Relational Database Schemes. MFDBS 1987 : 42-70

Joachim Biskup, Renate Meyer : Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition. J. Comput. Syst. Sci. 35 (1): 1-22 (1987)

Joachim Biskup, Hans Hermann Brüggemann , L. Schnetgöke , M. Kramer : One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views. PODS 1986 : 148-159

Joachim Biskup, Bernhard Convent : A Formal View Integration Method. SIGMOD Conference 1986 : 398-407

Joachim Biskup: Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values. Fundam. Inform. 7 (1): 129-150 (1984)

Joachim Biskup: Some Variants of the Take-Grant Protection Model. Inf. Process. Lett. 19 (3): 151-156 (1984)

Joachim Biskup, Hans Hermann Brüggemann : Universal Relation Views: A Pragmatic Approach. VLDB 1983 : 172-185

Joachim Biskup: A Foundation of Codd's Relational Maybe-Operations. ACM Trans. Database Syst. 8 (4): 608-636 (1983)

Joachim Biskup, Hans Hermann Brüggemann : Towards Designing Acyclic Database Schemes. Advances in Data Base Theory 1982 : 3-25

Joachim Biskup: A Foundation of Codd's Relational Maybe-Operations. XP2 Workshop on Relational Database Theory 1981

Joachim Biskup: Inferences of Multivalued Dependencies in Fixed and Undetermined Universes. Theor. Comput. Sci. 10 : 93-105 (1980)

Joachim Biskup: A Formal Approach to Null Values in Database Relations. Advances in Data Base Theory 1979 : 299-341

Joachim Biskup, Umeshwar Dayal , Philip A. Bernstein : Synthesizing Independent Database Schemas. SIGMOD Conference 1979 : 143-151

Joachim Biskup: Path Measures of Turing Machine Computations (Preliminary Report). ICALP 1978 : 90-104

Joachim Biskup: On the Complementation Rule for Multivalued Dependencies in Database Relations. Acta Inf. 10 : 297-305 (1978)

Joachim Biskup: The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property. SIAM J. Comput. 7 (1): 115-117 (1978)

Joachim Biskup: Über Projektionsmengen von Komplexitätsmaßen. Elektronische Informationsverarbeitung und Kybernetik 13 (7/8): 359-368 (1977)

Joachim Biskup: Zufällige Folgen und Bi-immunität. Automatentheorie und Formale Sprachen 1973 : 202-207

1 [ 66 ] [ 67 ] [ 78 ] [ 91 ] [ 93 ]

2 [ 79 ]

3 [ 6 ]

4 [ 51 ]

5 [ 67 ]

6 [ 81 ] [ 88 ] [ 89 ] [ 96 ]

7 [ 10 ] [ 12 ] [ 16 ] [ 19 ] [ 21 ] [ 28 ] [ 29 ] [ 39 ]

8 [ 15 ] [ 27 ]

9 [ 6 ]

10 [ 24 ] [ 37 ]

11 [ 55 ]

12 [ 32 ] [ 41 ] [ 43 ] [ 58 ]

13 [ 45 ] [ 47 ] [ 49 ] [ 54 ] [ 56 ]

14 [ 76 ] [ 94 ]

15 [ 69 ] [ 74 ] [ 75 ] [ 80 ] [ 86 ] [ 93 ]

16 [ 64 ] [ 66 ]

17 [ 67 ]

18 [ 72 ]

19 [ 23 ]

20 [ 67 ]

21 [ 67 ]

22 [ 67 ]

23 [ 42 ]

24 [ 64 ] [ 69 ] [ 78 ] [ 92 ] [ 93 ]

25 [ 65 ]

26 [ 67 ]

27 [ 16 ]

28 [ 55 ] [ 57 ]

29 [ 84 ]

30 [ 37 ]

31 [ 67 ]

32 [ 72 ]

33 [ 52 ] [ 53 ] [ 61 ] [ 63 ] [ 70 ] [ 85 ] [ 90 ]

34 [ 17 ]

35 [ 67 ]

36 [ 55 ] [ 57 ]

37 [ 37 ]

38 [ 67 ]

39 [ 79 ]

40 [ 24 ]

41 [ 46 ] [ 52 ] [ 53 ] [ 61 ] [ 63 ] [ 70 ] [ 77 ] [ 82 ] [ 95 ]

42 [ 18 ] [ 31 ]

43 [ 79 ]

44 [ 79 ]

45 [ 32 ] [ 58 ] [ 63 ]

46 [ 55 ]

47 [ 16 ]

48 [ 67 ]

49 [ 79 ]

50 [ 64 ] [ 66 ] [ 83 ]

51 [ 22 ] [ 31 ] [ 48 ]

52 [ 72 ]

53 [ 24 ]

54 [ 79 ]




©2004 Association for Computing Machinery