dblp.uni-trier.dewww.uni-trier.de

Joachim Biskup Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
127EEJoachim Biskup, Jens Seiler, Torben Weibert: Controlled Query Evaluation and Inference-Free View Updates. DBSec 2009: 1-16
126EEJoachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert: Requirements and Protocols for Inference-Proof Interactions in Information Systems. ESORICS 2009: 285-302
125EEJoachim Biskup, Lena Wiese: Combining Consistency and Confidentiality Requirements in First-Order Databases. ISC 2009: 121-134
124EEJoachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag: Optimization of the Controlled Evaluation of Closed Relational Queries. SEC 2009: 214-225
2008
123EEJoachim Biskup, Sebastian Link: Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes. FoIKS 2008: 58-77
122EEJoachim Biskup, Bernhard M. Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, Michael Vogel: 08102 Working Group -- Early Warning Systems. Network Attack Detection and Defense 2008
121EEJoachim Biskup, Julia Hielscher, Sandra Wortmann: A Trust- and Property-based Access Control Model. Electr. Notes Theor. Comput. Sci. 197(2): 169-177 (2008)
120EEJoachim Biskup, David W. Embley, Jan-Hendrik Lochner: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1): 8-12 (2008)
119EEJoachim Biskup, Torben Weibert: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3): 199-217 (2008)
118EEJoachim Biskup, Lena Wiese: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4): 477-494 (2008)
2007
117 Joachim Biskup, Javier Lopez: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings Springer 2007
116EEJoachim Biskup, Torben Weibert: Confidentiality Policies for Controlled Query Evaluation. DBSec 2007: 1-13
115EEJoachim Biskup, Ralf Menzel: Building a Tool for Cost-Based Design of Object-Oriented Database Schemas. ER 2007: 120-131
114EEJoachim Biskup, Christian Tsatedem, Lena Wiese: Secure Mediation of Join Queries by Processing Ciphertexts. ICDE Workshops 2007: 715-724
113EEJoachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese: Inference Control in Logic Databases as a Constraint Satisfaction Problem. ICISS 2007: 128-142
112EEJoachim Biskup, Barbara Carminati, Elena Ferrari, Frank Muller, Sandra Wortmann: Towards Secure Execution Orders for CompositeWeb Services. ICWS 2007: 489-496
111EEJoachim Biskup, Jan-Hendrik Lochner: Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. ISC 2007: 407-422
110EEJoachim Biskup, Piero A. Bonatti: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007)
2006
109EEJoachim Biskup, Lena Wiese: On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. DBSec 2006: 30-43
108EEJoachim Biskup, Ralf Menzel: Optimising Abstract Object-Oriented Database Schemas. ER 2006: 528-543
107EEUlrich Flegel, Joachim Biskup: Requirements of Information Reductions for Cooperating Intrusion Detection Agents. ETRICS 2006: 466-480
106EEJoachim Biskup, Piero A. Bonatti: Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. FoIKS 2006: 43-62
105EEJoachim Biskup, Joerg Parthe: Optimistic Anonymous Participation in Inter-organizational Workflow Instances. ICISS 2006: 86-100
2005
104EEJoachim Biskup, Barbara Sprick, Lena Wiese: Secure Mediation with Mobile Code. DBSec 2005: 267-280
2004
103 Joachim Biskup, Torben Weibert: Refusal in Incomplete Databases. DBSec 2004: 143-157
102EEJoachim Biskup, Sandra Wortmann: Towards a credential-based implementation of compound access control policies. SACMAT 2004: 31-40
101 Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004)
100EEJoachim Biskup, Piero A. Bonatti: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1): 14-27 (2004)
99EEJoachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche: Solving Equations in the Relational Algebra. SIAM J. Comput. 33(5): 1052-1066 (2004)
2003
98 Joachim Biskup, Thomas Leineweber, Joerg Parthe: Administration Rights in the SDSD-System. DBSec 2003: 149-162
97EEJoachim Biskup, Torsten Polle: Adding inclusion dependencies to an object-oriented data model with uniqueness constraints. Acta Inf. 39(6-7): 391-449 (2003)
96EEJoachim Biskup, David W. Embley: Extracting information from heterogeneous information sources using ontologically specified target views. Inf. Syst. 28(3): 169-212 (2003)
95 Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut: Secure Mediation: Requirements, Design, and Architecture. Journal of Computer Security 11(3): 365-398 (2003)
2002
94 Joachim Biskup, Yücel Karabulut: A Hybrid PKI Model: Application to Secure Mediation. DBSec 2002: 271-282
93EEChristian Altenschmidt, Joachim Biskup: Explicit Representation of Constrained Schema Mappings for Mediated Data Integration. DNIS 2002: 103-132
92EEJoachim Biskup, Ralf Menzel: A Flexible Cost Model for Abstract Object-Oriented Database Schemas. ER 2002: 444-462
91EEJoachim Biskup, Piero A. Bonatti: Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002: 39-54
90EEJoachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002: 49-66
89 Joachim Biskup: Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. GI Jahrestagung 2002: 423-428
88 Joachim Biskup, Ulrich Flegel: Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. GI Jahrestagung 2002: 488-496
2001
87EEJoachim Biskup, Ralf Menzel: An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas. ADBIS 2001: 366-378
86 Joachim Biskup, Thomas Leineweber: State-Dependent Security Decisions for Distributed Object-Systems. DBSec 2001: 105-118
85EEJoachim Biskup, Barbara Sprick: Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems. Semantics in Databases 2001: 34-62
84 Joachim Biskup, Torsten Polle: Decomposition of object-oriented database schemas. Ann. Math. Artif. Intell. 33(2-4): 119-155 (2001)
83EEJoachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche: Solving equations in the relational algebra CoRR cs.LO/0106034: (2001)
82EEJoachim Biskup, Piero A. Bonatti: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2): 199-222 (2001)
2000
81EEJoachim Biskup, Ulrich Flegel: Threshold-based identity recovery for privacy enhanced applications. ACM Conference on Computer and Communications Security 2000: 71-79
80 Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold: Panel. DBSec 2000: 373
79 Christian Altenschmidt, Joachim Biskup, Yücel Karabulut: Security Architecture of the Multimedia Mediator. DBSec 2000: 77-88
78EEJoachim Biskup, Torsten Polle: Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints. FoIKS 2000: 31-49
77EEJoachim Biskup, David W. Embley: Mediated Information Gain. IDEAS 2000: 360-370
76EEJoachim Biskup, Ulrich Flegel: Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Recent Advances in Intrusion Detection 2000: 28-48
75EEJoachim Biskup, Ulrich Flegel: On Pseudonymization of Audit Data for Intrusion Detection. Workshop on Design Issues in Anonymity and Unobservability 2000: 161-180
74EEJoachim Biskup: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1): 1-23 (2000)
73EELeana Golubchik, V. S. Subrahmanian, Sherry Marcus, Joachim Biskup: Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers. IEEE Trans. Knowl. Data Eng. 12(1): 60-77 (2000)
1999
72 Joachim Biskup: For Unknown Secrecies Refusal is Better than Lying. DBSec 1999: 127-141
71 Joachim Biskup, Ralf Menzel, Torsten Polle: Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas. Grundlagen von Datenbanken 1999: 72-76
1998
70 Joachim Biskup, Ulrich Flegel, Yücel Karabulut: Secure Mediation: Requirements and Design. DBSec 1998: 127-140
69 Joachim Biskup: Technical Enforcement of Informational Assurances. DBSec 1998: 17-40
68EEAlois Knoll, Christian Altenschmidt, Joachim Biskup, Hans-Martin Blüthgen, Ingo Glöckner, Sven Hartrumpf, Hermann Helbig, Christiane Henning, Reinhard Lüling, Burkhard Monien, Thomas Noll, Norbert Sensen: An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents. ECDL 1998: 409-428
67EEChristian Altenschmidt, Joachim Biskup, Jürgen Freitag, Barbara Sprick: Weakly Constraining Multimedia Types Based on a Type Embedding Ordering. Multimedia Information Systems 1998: 121-129
1997
66EEJoachim Biskup, Andreas Kluck: A New Approach to Inferences of Semantic Constraints. ADBIS 1997: 72-79
65 Joachim Biskup, Jürgen Freitag, Yücel Karabulut, Barbara Sprick: Query Evaluation in an Object-Oriented Multimedia Mediator. OOIS 1997: 31-43
1996
64EEJoachim Biskup, Ralf Menzel, Torsten Polle, Yehoshua Sagiv: Decomposition of Relationships through Pivoting. ER 1996: 28-41
1995
63 Joachim Biskup: Grundlagen von Informationssystemen Vieweg 1995
62EEJoachim Biskup, Ralf Menzel, Torsten Polle: Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas. ADBIS 1995: 109-136
61 Joachim Biskup: Database Schema Design Theory : Achievements and Challenges. CISMOD 1995: 14-44
60 Joachim Biskup: Achievements of Relational Database Schema Design Theory Revisited. Semantics in Databases 1995: 29-54
59 Joachim Biskup, Pratul Dublish, Yehoshua Sagiv: Optimization of a Subclass of Conjunctive Queries Acta Inf. 32(1): 1-26 (1995)
1994
58 Joachim Biskup, Matthew Morgenstern, Carl E. Landwehr: Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994 North-Holland 1994
57 Joachim Biskup, Christian Eckert: Enforcement of State Dependent Security Specifications. DBSec 1994: 375
56 Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer: Perspectives on Database Security - Panel Summary. DBSec 1994: 377-390
55 Joachim Biskup, Christian Eckert: Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen. Grundlagen von Datenbanken 1994: 11-15
54 Joachim Biskup, Ralf Menzel, Torsten Polle: Schematransformation für F-Logik. Grundlagen von Datenbanken 1994: 16-19
53 Joachim Biskup, Ralf Menzel, Torsten Polle: Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata. Grundlagen von Datenbanken 1994: 20-24
52 Joachim Biskup, Gerrit Bleumer: Reflections on Security of Database and Datatransfer Systems in Health Care. IFIP Congress (2) 1994: 549-556
51 Joachim Biskup: Impacts of Creating, Implementing and Using Formal Languages. IFIP Congress (3) 1994: 402-407
1993
50 Joachim Biskup, Christian Eckert: About the Enforcement of State Dependent Specifications. DBSec 1993: 3-17
49 Joachim Biskup, Holger Stiefeling: Evaluation of Upper Bounds and Least Nodes as Database Operations. FODO 1993: 197-214
48 Joachim Biskup, Christian Eckert: Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen. Grundlagen von Datenbanken 1993: 20-24
47 Joachim Biskup, Torsten Polle: Magic-Sets: Globalisieren von Variablen und Rekursionselimination. Grundlagen von Datenbanken 1993: 25-29
46 Joachim Biskup, Christian Eckert: Sichere Delegation in Informationssystemen. VIS 1993: 107-133
45 Joachim Biskup: Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". VIS 1993: 239-254
44 Joachim Biskup, Pratul Dublish: Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies. ITA 27(3): 183-219 (1993)
1992
43 Joachim Biskup, Richard Hull: Database Theory - ICDT'92, 4th International Conference, Berlin, Germany, October 14-16, 1992, Proceedings Springer 1992
1991
42EEJoachim Biskup, Pratul Dublish: Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies. MFDBS 1991: 276-290
41 Joachim Biskup: Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses. VIS 1991: 1-21
40 Joachim Biskup, Hans Hermann Brüggemann: Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick. VIS 1991: 146-158
39 Joachim Biskup: Sicherheit: Gewährleistung und Begrenzung des Informationsflusses. Entwicklungstendenzen bei Datenbanksystemen 1991: 363-388
38 Joachim Biskup, János Demetrovics, Leonid Libkin, Ilya B. Muchnik: On Relational Database Schemes Having Unique Minimal Key. Elektronische Informationsverarbeitung und Kybernetik 27(4): 217-225 (1991)
37 Joachim Biskup: Relationship chase procedures interpreted as resolution with paramodulation. Fundam. Inform. 15(2): 123-138 (1991)
1990
36 Joachim Biskup: A General Framework for Database Security (Abstract). DBSec 1990: 169-170
35 Joachim Biskup: A General Framework for Database Security. ESORICS 1990: 35-41
34 Joachim Biskup: Medical Database Security. GI Jahrestagung (2) 1990: 212-221
33 Joachim Biskup: A General Framework for Database Security. Grundlagen von Datenbanken 1990: 7-10
32EEPratul Dublish, Joachim Biskup, Yehoshua Sagiv: Optimizatioin of a Subclass of Conjunctive Queries. ICDT 1990: 455-469
31 Joachim Biskup, Uwe Räsch, Holger Stiefeling: An Extension of SQL for Querying Graph Relations. Comput. Lang. 15(1): 65-82 (1990)
1989
30 Joachim Biskup: Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. DBSec 1989: 13-23
29 Joachim Biskup, Hans Hermann Brüggemann: An Object-Surrogate-Value Approach for Database Languages. FMLDO 1989: 79-92
28EEJoachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989: 348-355
27EEJoachim Biskup, Bernhard Convent: Towards a Schema Design Methodology for Deductive Databases. MFDBS 1989: 37-52
26 Joachim Biskup: Boyce-Codd Normal Form and Object Normal Forms. Inf. Process. Lett. 32(1): 29-33 (1989)
25 Joachim Biskup: Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt. Informatik Spektrum 12(3): 158-161 (1989)
1988
24 Joachim Biskup, János Demetrovics, Jan Paredaens, Bernhard Thalheim: MFDBS 87, 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, GDR, January 19-23, 1987, Proceedings Springer 1988
23 Joachim Biskup, Hans-Werner Graf: Analysis of the Privacy Model for the Information System DORIS. DBSec 1988: 123-140
22EEJoachim Biskup, Holger Stiefeling: Transitive Closure Algorithms for Very Large Databases. WG 1988: 122-147
21 Joachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data: Towards a Privacy-Oriented Information System. Computers & Security 7: 575-597 (1988)
1987
20 Joachim Biskup: Privacy Respecting Permissions and Rights. DBSec 1987: 173-185
19EEJoachim Biskup, Hans Hermann Brüggemann: Data Manipulation Languages for the Universal Relation View DURST. MFDBS 1987: 20-41
18EEJoachim Biskup, Uwe Räsch: The Equivalence Problem For Relational Database Schemes. MFDBS 1987: 42-70
17 Joachim Biskup, Renate Meyer: Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition. J. Comput. Syst. Sci. 35(1): 1-22 (1987)
1986
16EEJoachim Biskup, Hans Hermann Brüggemann, L. Schnetgöke, M. Kramer: One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views. PODS 1986: 148-159
15EEJoachim Biskup, Bernhard Convent: A Formal View Integration Method. SIGMOD Conference 1986: 398-407
1984
14 Joachim Biskup: Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values. Fundam. Inform. 7(1): 129-150 (1984)
13 Joachim Biskup: Some Variants of the Take-Grant Protection Model. Inf. Process. Lett. 19(3): 151-156 (1984)
1983
12EEJoachim Biskup, Hans Hermann Brüggemann: Universal Relation Views: A Pragmatic Approach. VLDB 1983: 172-185
11EEJoachim Biskup: A Foundation of Codd's Relational Maybe-Operations. ACM Trans. Database Syst. 8(4): 608-636 (1983)
1982
10 Joachim Biskup, Hans Hermann Brüggemann: Towards Designing Acyclic Database Schemes. Advances in Data Base Theory 1982: 3-25
1981
9EEJoachim Biskup: A Foundation of Codd's Relational Maybe-Operations. XP2 Workshop on Relational Database Theory 1981
1980
8 Joachim Biskup: Inferences of Multivalued Dependencies in Fixed and Undetermined Universes. Theor. Comput. Sci. 10: 93-105 (1980)
1979
7 Joachim Biskup: A Formal Approach to Null Values in Database Relations. Advances in Data Base Theory 1979: 299-341
6EEJoachim Biskup, Umeshwar Dayal, Philip A. Bernstein: Synthesizing Independent Database Schemas. SIGMOD Conference 1979: 143-151
1978
5EEJoachim Biskup: Path Measures of Turing Machine Computations (Preliminary Report). ICALP 1978: 90-104
4 Joachim Biskup: On the Complementation Rule for Multivalued Dependencies in Database Relations. Acta Inf. 10: 297-305 (1978)
3 Joachim Biskup: The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property. SIAM J. Comput. 7(1): 115-117 (1978)
1977
2 Joachim Biskup: Über Projektionsmengen von Komplexitätsmaßen. Elektronische Informationsverarbeitung und Kybernetik 13(7/8): 359-368 (1977)
1973
1EEJoachim Biskup: Zufällige Folgen und Bi-immunität. Automatentheorie und Formale Sprachen 1973: 202-207

Coauthor Index

1Christian Altenschmidt [67] [68] [79] [93] [95]
2Vijayalakshmi Atluri (Vijay Atluri) [80]
3Philip A. Bernstein [6]
4Gerrit Bleumer [52]
5Hans-Martin Blüthgen [68]
6Piero A. Bonatti [82] [90] [91] [100] [101] [106] [110]
7Hans Hermann Brüggemann [10] [12] [16] [19] [21] [28] [29] [40]
8Dominique Marc Burgard [113]
9Jan Van den Bussche [83] [99]
10Barbara Carminati [112]
11Bernhard Convent [15] [27]
12Umeshwar Dayal [6]
13János Demetrovics [24] [38]
14Klaus R. Dittrich [56]
15Pratul Dublish [32] [42] [44] [59]
16Christian Eckert [46] [48] [50] [55] [57]
17David W. Embley [77] [96] [120]
18Elena Ferrari [112]
19Ulrich Flegel [70] [75] [76] [81] [88] [95] [107]
20Jürgen Freitag [65] [67]
21Ingo Glöckner [68]
22Christian Gogolin [126]
23Leana Golubchik [73]
24Hans-Werner Graf [23]
25Bernhard M. Hämmerli [122]
26Sven Hartrumpf [68]
27Hermann Helbig [68]
28Christiane Henning [68]
29Julia Hielscher [121]
30Richard Hull [43]
31Yücel Karabulut [65] [70] [79] [94] [95]
32Andreas Kluck [66]
33Alois Knoll [68]
34M. Kramer [16]
35Carl E. Landwehr [56] [58]
36Thomas Leineweber [86] [98]
37Leonid Libkin [38]
38Sebastian Link [123]
39Jan-Hendrik Lochner [111] [120] [124]
40Javier Lopez [117]
41Reinhard Lüling [68]
42Sherry Marcus [73]
43Michael Meier [122]
44Ralf Menzel [53] [54] [62] [64] [71] [87] [92] [108] [115]
45Renate Meyer [17]
46Burkhard Monien [68]
47Matthew Morgenstern [56] [58]
48Ilya B. Muchnik [38]
49Frank Muller [112]
50Thomas Noll [68]
51Sylvia L. Osborn [80]
52Jan Paredaens [24] [83] [99]
53Joerg Parthe [98] [105]
54Torsten Polle [47] [53] [54] [62] [64] [71] [78] [84] [97]
55Uwe Räsch [18] [31]
56Reind P. van de Riet [80]
57Arnon Rosenthal (Arnie Rosenthal) [80]
58Yehoshua Sagiv [32] [59] [64]
59Marvin Schaefer [56]
60Sebastian Schmerl [122]
61L. Schnetgöke [16]
62Thomas Schwentick [83] [99]
63Jens Seiler [126] [127]
64Norbert Sensen [68]
65Raban Serban [80]
66Sebastian Sonntag [124]
67Barbara Sprick [65] [67] [85] [104]
68Holger Stiefeling [22] [31] [49]
69V. S. Subrahmanian [73]
70Bernhard Thalheim [24]
71Jens Tölle [122]
72Christian Tsatedem [114]
73Michael Vogel [122]
74Torben Weibert [103] [113] [116] [119] [126] [127]
75Gio Wiederhold [80]
76Lena Wiese [104] [109] [113] [114] [118] [125]
77Sandra Wortmann [102] [112] [121]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)