2010 | ||
---|---|---|
128 | Joachim Biskup, Cornelia Tadros, Lena Wiese: Towards Controlled Query Evaluation for Incomplete First-Order Databases. FoIKS 2010: 230-247 | |
2009 | ||
127 | Joachim Biskup, Jens Seiler, Torben Weibert: Controlled Query Evaluation and Inference-Free View Updates. DBSec 2009: 1-16 | |
126 | Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert: Requirements and Protocols for Inference-Proof Interactions in Information Systems. ESORICS 2009: 285-302 | |
125 | Joachim Biskup, Lena Wiese: Combining Consistency and Confidentiality Requirements in First-Order Databases. ISC 2009: 121-134 | |
124 | Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag: Optimization of the Controlled Evaluation of Closed Relational Queries. SEC 2009: 214-225 | |
2008 | ||
123 | Joachim Biskup, Sebastian Link: Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes. FoIKS 2008: 58-77 | |
122 | Joachim Biskup, Bernhard M. Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, Michael Vogel: 08102 Working Group -- Early Warning Systems. Network Attack Detection and Defense 2008 | |
121 | Joachim Biskup, Julia Hielscher, Sandra Wortmann: A Trust- and Property-based Access Control Model. Electr. Notes Theor. Comput. Sci. 197(2): 169-177 (2008) | |
120 | Joachim Biskup, David W. Embley, Jan-Hendrik Lochner: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1): 8-12 (2008) | |
119 | Joachim Biskup, Torben Weibert: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3): 199-217 (2008) | |
118 | Joachim Biskup, Lena Wiese: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4): 477-494 (2008) | |
2007 | ||
117 | Joachim Biskup, Javier Lopez: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings Springer 2007 | |
116 | Joachim Biskup, Torben Weibert: Confidentiality Policies for Controlled Query Evaluation. DBSec 2007: 1-13 | |
115 | Joachim Biskup, Ralf Menzel: Building a Tool for Cost-Based Design of Object-Oriented Database Schemas. ER 2007: 120-131 | |
114 | Joachim Biskup, Christian Tsatedem, Lena Wiese: Secure Mediation of Join Queries by Processing Ciphertexts. ICDE Workshops 2007: 715-724 | |
113 | Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese: Inference Control in Logic Databases as a Constraint Satisfaction Problem. ICISS 2007: 128-142 | |
112 | Joachim Biskup, Barbara Carminati, Elena Ferrari, Frank Muller, Sandra Wortmann: Towards Secure Execution Orders for CompositeWeb Services. ICWS 2007: 489-496 | |
111 | Joachim Biskup, Jan-Hendrik Lochner: Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. ISC 2007: 407-422 | |
110 | Joachim Biskup, Piero A. Bonatti: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007) | |
2006 | ||
109 | Joachim Biskup, Lena Wiese: On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. DBSec 2006: 30-43 | |
108 | Joachim Biskup, Ralf Menzel: Optimising Abstract Object-Oriented Database Schemas. ER 2006: 528-543 | |
107 | Ulrich Flegel, Joachim Biskup: Requirements of Information Reductions for Cooperating Intrusion Detection Agents. ETRICS 2006: 466-480 | |
106 | Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. FoIKS 2006: 43-62 | |
105 | Joachim Biskup, Joerg Parthe: Optimistic Anonymous Participation in Inter-organizational Workflow Instances. ICISS 2006: 86-100 | |
2005 | ||
104 | Joachim Biskup, Barbara Sprick, Lena Wiese: Secure Mediation with Mobile Code. DBSec 2005: 267-280 | |
2004 | ||
103 | Joachim Biskup, Torben Weibert: Refusal in Incomplete Databases. DBSec 2004: 143-157 | |
102 | Joachim Biskup, Sandra Wortmann: Towards a credential-based implementation of compound access control policies. SACMAT 2004: 31-40 | |
101 | Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004) | |
100 | Joachim Biskup, Piero A. Bonatti: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1): 14-27 (2004) | |
99 | Joachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche: Solving Equations in the Relational Algebra. SIAM J. Comput. 33(5): 1052-1066 (2004) | |
2003 | ||
98 | Joachim Biskup, Thomas Leineweber, Joerg Parthe: Administration Rights in the SDSD-System. DBSec 2003: 149-162 | |
97 | Joachim Biskup, Torsten Polle: Adding inclusion dependencies to an object-oriented data model with uniqueness constraints. Acta Inf. 39(6-7): 391-449 (2003) | |
96 | Joachim Biskup, David W. Embley: Extracting information from heterogeneous information sources using ontologically specified target views. Inf. Syst. 28(3): 169-212 (2003) | |
95 | Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut: Secure Mediation: Requirements, Design, and Architecture. Journal of Computer Security 11(3): 365-398 (2003) | |
2002 | ||
94 | Joachim Biskup, Yücel Karabulut: A Hybrid PKI Model: Application to Secure Mediation. DBSec 2002: 271-282 | |
93 | Christian Altenschmidt, Joachim Biskup: Explicit Representation of Constrained Schema Mappings for Mediated Data Integration. DNIS 2002: 103-132 | |
92 | Joachim Biskup, Ralf Menzel: A Flexible Cost Model for Abstract Object-Oriented Database Schemas. ER 2002: 444-462 | |
91 | Joachim Biskup, Piero A. Bonatti: Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002: 39-54 | |
90 | Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002: 49-66 | |
89 | Joachim Biskup: Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. GI Jahrestagung 2002: 423-428 | |
88 | Joachim Biskup, Ulrich Flegel: Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. GI Jahrestagung 2002: 488-496 | |
2001 | ||
87 | Joachim Biskup, Ralf Menzel: An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas. ADBIS 2001: 366-378 | |
86 | Joachim Biskup, Thomas Leineweber: State-Dependent Security Decisions for Distributed Object-Systems. DBSec 2001: 105-118 | |
85 | Joachim Biskup, Barbara Sprick: Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems. Semantics in Databases 2001: 34-62 | |
84 | Joachim Biskup, Torsten Polle: Decomposition of object-oriented database schemas. Ann. Math. Artif. Intell. 33(2-4): 119-155 (2001) | |
83 | Joachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche: Solving equations in the relational algebra CoRR cs.LO/0106034: (2001) | |
82 | Joachim Biskup, Piero A. Bonatti: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2): 199-222 (2001) | |
2000 | ||
81 | Joachim Biskup, Ulrich Flegel: Threshold-based identity recovery for privacy enhanced applications. ACM Conference on Computer and Communications Security 2000: 71-79 | |
80 | Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold: Panel. DBSec 2000: 373 | |
79 | Christian Altenschmidt, Joachim Biskup, Yücel Karabulut: Security Architecture of the Multimedia Mediator. DBSec 2000: 77-88 | |
78 | Joachim Biskup, Torsten Polle: Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints. FoIKS 2000: 31-49 | |
77 | Joachim Biskup, David W. Embley: Mediated Information Gain. IDEAS 2000: 360-370 | |
76 | Joachim Biskup, Ulrich Flegel: Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Recent Advances in Intrusion Detection 2000: 28-48 | |
75 | Joachim Biskup, Ulrich Flegel: On Pseudonymization of Audit Data for Intrusion Detection. Workshop on Design Issues in Anonymity and Unobservability 2000: 161-180 | |
74 | Joachim Biskup: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1): 1-23 (2000) | |
73 | Leana Golubchik, V. S. Subrahmanian, Sherry Marcus, Joachim Biskup: Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers. IEEE Trans. Knowl. Data Eng. 12(1): 60-77 (2000) | |
1999 | ||
72 | Joachim Biskup: For Unknown Secrecies Refusal is Better than Lying. DBSec 1999: 127-141 | |
71 | Joachim Biskup, Ralf Menzel, Torsten Polle: Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas. Grundlagen von Datenbanken 1999: 72-76 | |
1998 | ||
70 | Joachim Biskup, Ulrich Flegel, Yücel Karabulut: Secure Mediation: Requirements and Design. DBSec 1998: 127-140 | |
69 | Joachim Biskup: Technical Enforcement of Informational Assurances. DBSec 1998: 17-40 | |
68 | Alois Knoll, Christian Altenschmidt, Joachim Biskup, Hans-Martin Blüthgen, Ingo Glöckner, Sven Hartrumpf, Hermann Helbig, Christiane Henning, Reinhard Lüling, Burkhard Monien, Thomas Noll, Norbert Sensen: An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents. ECDL 1998: 409-428 | |
67 | Christian Altenschmidt, Joachim Biskup, Jürgen Freitag, Barbara Sprick: Weakly Constraining Multimedia Types Based on a Type Embedding Ordering. Multimedia Information Systems 1998: 121-129 | |
1997 | ||
66 | Joachim Biskup, Andreas Kluck: A New Approach to Inferences of Semantic Constraints. ADBIS 1997: 72-79 | |
65 | Joachim Biskup, Jürgen Freitag, Yücel Karabulut, Barbara Sprick: Query Evaluation in an Object-Oriented Multimedia Mediator. OOIS 1997: 31-43 | |
1996 | ||
64 | Joachim Biskup, Ralf Menzel, Torsten Polle, Yehoshua Sagiv: Decomposition of Relationships through Pivoting. ER 1996: 28-41 | |
1995 | ||
63 | Joachim Biskup: Grundlagen von Informationssystemen Vieweg 1995 | |
62 | Joachim Biskup, Ralf Menzel, Torsten Polle: Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas. ADBIS 1995: 109-136 | |
61 | Joachim Biskup: Database Schema Design Theory : Achievements and Challenges. CISMOD 1995: 14-44 | |
60 | Joachim Biskup: Achievements of Relational Database Schema Design Theory Revisited. Semantics in Databases 1995: 29-54 | |
59 | Joachim Biskup, Pratul Dublish, Yehoshua Sagiv: Optimization of a Subclass of Conjunctive Queries Acta Inf. 32(1): 1-26 (1995) | |
1994 | ||
58 | Joachim Biskup, Matthew Morgenstern, Carl E. Landwehr: Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994 North-Holland 1994 | |
57 | Joachim Biskup, Christian Eckert: Enforcement of State Dependent Security Specifications. DBSec 1994: 375 | |
56 | Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer: Perspectives on Database Security - Panel Summary. DBSec 1994: 377-390 | |
55 | Joachim Biskup, Christian Eckert: Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen. Grundlagen von Datenbanken 1994: 11-15 | |
54 | Joachim Biskup, Ralf Menzel, Torsten Polle: Schematransformation für F-Logik. Grundlagen von Datenbanken 1994: 16-19 | |
53 | Joachim Biskup, Ralf Menzel, Torsten Polle: Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata. Grundlagen von Datenbanken 1994: 20-24 | |
52 | Joachim Biskup, Gerrit Bleumer: Reflections on Security of Database and Datatransfer Systems in Health Care. IFIP Congress (2) 1994: 549-556 | |
51 | Joachim Biskup: Impacts of Creating, Implementing and Using Formal Languages. IFIP Congress (3) 1994: 402-407 | |
1993 | ||
50 | Joachim Biskup, Christian Eckert: About the Enforcement of State Dependent Specifications. DBSec 1993: 3-17 | |
49 | Joachim Biskup, Holger Stiefeling: Evaluation of Upper Bounds and Least Nodes as Database Operations. FODO 1993: 197-214 | |
48 | Joachim Biskup, Christian Eckert: Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen. Grundlagen von Datenbanken 1993: 20-24 | |
47 | Joachim Biskup, Torsten Polle: Magic-Sets: Globalisieren von Variablen und Rekursionselimination. Grundlagen von Datenbanken 1993: 25-29 | |
46 | Joachim Biskup, Christian Eckert: Sichere Delegation in Informationssystemen. VIS 1993: 107-133 | |
45 | Joachim Biskup: Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". VIS 1993: 239-254 | |
44 | Joachim Biskup, Pratul Dublish: Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies. ITA 27(3): 183-219 (1993) | |
1992 | ||
43 | Joachim Biskup, Richard Hull: Database Theory - ICDT'92, 4th International Conference, Berlin, Germany, October 14-16, 1992, Proceedings Springer 1992 | |
1991 | ||
42 | Joachim Biskup, Pratul Dublish: Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies. MFDBS 1991: 276-290 | |
41 | Joachim Biskup: Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses. VIS 1991: 1-21 | |
40 | Joachim Biskup, Hans Hermann Brüggemann: Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick. VIS 1991: 146-158 | |
39 | Joachim Biskup: Sicherheit: Gewährleistung und Begrenzung des Informationsflusses. Entwicklungstendenzen bei Datenbanksystemen 1991: 363-388 | |
38 | Joachim Biskup, János Demetrovics, Leonid Libkin, Ilya B. Muchnik: On Relational Database Schemes Having Unique Minimal Key. Elektronische Informationsverarbeitung und Kybernetik 27(4): 217-225 (1991) | |
37 | Joachim Biskup: Relationship chase procedures interpreted as resolution with paramodulation. Fundam. Inform. 15(2): 123-138 (1991) | |
1990 | ||
36 | Joachim Biskup: A General Framework for Database Security (Abstract). DBSec 1990: 169-170 | |
35 | Joachim Biskup: A General Framework for Database Security. ESORICS 1990: 35-41 | |
34 | Joachim Biskup: Medical Database Security. GI Jahrestagung (2) 1990: 212-221 | |
33 | Joachim Biskup: A General Framework for Database Security. Grundlagen von Datenbanken 1990: 7-10 | |
32 | Pratul Dublish, Joachim Biskup, Yehoshua Sagiv: Optimizatioin of a Subclass of Conjunctive Queries. ICDT 1990: 455-469 | |
31 | Joachim Biskup, Uwe Räsch, Holger Stiefeling: An Extension of SQL for Querying Graph Relations. Comput. Lang. 15(1): 65-82 (1990) | |
1989 | ||
30 | Joachim Biskup: Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. DBSec 1989: 13-23 | |
29 | Joachim Biskup, Hans Hermann Brüggemann: An Object-Surrogate-Value Approach for Database Languages. FMLDO 1989: 79-92 | |
28 | Joachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989: 348-355 | |
27 | Joachim Biskup, Bernhard Convent: Towards a Schema Design Methodology for Deductive Databases. MFDBS 1989: 37-52 | |
26 | Joachim Biskup: Boyce-Codd Normal Form and Object Normal Forms. Inf. Process. Lett. 32(1): 29-33 (1989) | |
25 | Joachim Biskup: Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt. Informatik Spektrum 12(3): 158-161 (1989) | |
1988 | ||
24 | Joachim Biskup, János Demetrovics, Jan Paredaens, Bernhard Thalheim: MFDBS 87, 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, GDR, January 19-23, 1987, Proceedings Springer 1988 | |
23 | Joachim Biskup, Hans-Werner Graf: Analysis of the Privacy Model for the Information System DORIS. DBSec 1988: 123-140 | |
22 | Joachim Biskup, Holger Stiefeling: Transitive Closure Algorithms for Very Large Databases. WG 1988: 122-147 | |
21 | Joachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data: Towards a Privacy-Oriented Information System. Computers & Security 7: 575-597 (1988) | |
1987 | ||
20 | Joachim Biskup: Privacy Respecting Permissions and Rights. DBSec 1987: 173-185 | |
19 | Joachim Biskup, Hans Hermann Brüggemann: Data Manipulation Languages for the Universal Relation View DURST. MFDBS 1987: 20-41 | |
18 | Joachim Biskup, Uwe Räsch: The Equivalence Problem For Relational Database Schemes. MFDBS 1987: 42-70 | |
17 | Joachim Biskup, Renate Meyer: Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition. J. Comput. Syst. Sci. 35(1): 1-22 (1987) | |
1986 | ||
16 | Joachim Biskup, Hans Hermann Brüggemann, L. Schnetgöke, M. Kramer: One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views. PODS 1986: 148-159 | |
15 | Joachim Biskup, Bernhard Convent: A Formal View Integration Method. SIGMOD Conference 1986: 398-407 | |
1984 | ||
14 | Joachim Biskup: Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values. Fundam. Inform. 7(1): 129-150 (1984) | |
13 | Joachim Biskup: Some Variants of the Take-Grant Protection Model. Inf. Process. Lett. 19(3): 151-156 (1984) | |
1983 | ||
12 | Joachim Biskup, Hans Hermann Brüggemann: Universal Relation Views: A Pragmatic Approach. VLDB 1983: 172-185 | |
11 | Joachim Biskup: A Foundation of Codd's Relational Maybe-Operations. ACM Trans. Database Syst. 8(4): 608-636 (1983) | |
1982 | ||
10 | Joachim Biskup, Hans Hermann Brüggemann: Towards Designing Acyclic Database Schemes. Advances in Data Base Theory 1982: 3-25 | |
1981 | ||
9 | Joachim Biskup: A Foundation of Codd's Relational Maybe-Operations. XP2 Workshop on Relational Database Theory 1981 | |
1980 | ||
8 | Joachim Biskup: Inferences of Multivalued Dependencies in Fixed and Undetermined Universes. Theor. Comput. Sci. 10: 93-105 (1980) | |
1979 | ||
7 | Joachim Biskup: A Formal Approach to Null Values in Database Relations. Advances in Data Base Theory 1979: 299-341 | |
6 | Joachim Biskup, Umeshwar Dayal, Philip A. Bernstein: Synthesizing Independent Database Schemas. SIGMOD Conference 1979: 143-151 | |
1978 | ||
5 | Joachim Biskup: Path Measures of Turing Machine Computations (Preliminary Report). ICALP 1978: 90-104 | |
4 | Joachim Biskup: On the Complementation Rule for Multivalued Dependencies in Database Relations. Acta Inf. 10: 297-305 (1978) | |
3 | Joachim Biskup: The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property. SIAM J. Comput. 7(1): 115-117 (1978) | |
1977 | ||
2 | Joachim Biskup: Über Projektionsmengen von Komplexitätsmaßen. Elektronische Informationsverarbeitung und Kybernetik 13(7/8): 359-368 (1977) | |
1973 | ||
1 | Joachim Biskup: Zufällige Folgen und Bi-immunität. Automatentheorie und Formale Sprachen 1973: 202-207 |