Joachim Biskup

According to our database1, Joachim Biskup
  • authored at least 160 papers between 1973 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2016
Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution.
Proceedings of the Foundations of Information and Knowledge Systems, 2016

Information Control by Policy-Based Relational Weakening Templates.
Proceedings of the Computer Security - ESORICS 2016, 2016

Controlled Management of Confidentiality-Preserving Relational Interactions.
Proceedings of the Data Privacy Management and Security Assurance, 2016

On the Simulation Assumption for Controlled Interaction Processing.
Proceedings of the Computational Models of Rationality, 2016

2015
Preserving confidentiality while reacting on iterated queries and belief revisions.
Ann. Math. Artif. Intell., 2015

Constructing Inference-Proof Belief Mediators.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Confidentiality Preserving Evaluation of Open Relational Queries.
Proceedings of the Advances in Databases and Information Systems, 2015

2014
Inference-Proof Data Publishing by Minimally Weakening a Database Instance.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Reasoning on Secrecy Constraints under Uncertainty to Classify Possible Actions.
Proceedings of the Foundations of Information and Knowledge Systems, 2014

Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Optimality and Complexity of Inference-Proof Data Filtering and CQE.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
On Inference-Proof View Processing of XML Documents.
IEEE Trans. Dependable Sec. Comput., 2013

Privacy through Uncertainty in Location-Based Services.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Logic-Oriented Confidentiality Policies for Controlled Interaction Execution.
Proceedings of the Databases in Networked Information Systems - 8th International Workshop, 2013

Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Dynamic policy adaptation for inference control of queries to a propositional information system.
Journal of Computer Security, 2012

Inference-usability confinement by maintaining inference-proof views of an information system.
IJCSE, 2012

Probabilistic Conditional Independence under Schema Certainty and Uncertainty.
Proceedings of the Scalable Uncertainty Management - 6th International Conference, 2012

Revising Belief without Revealing Secrets.
Proceedings of the Foundations of Information and Knowledge Systems, 2012

Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Some Remarks on Relational Database Schemes Having Few Minimal Keys.
Proceedings of the Conceptual Modelling and Its Theoretical Foundations, 2012

2011
Inference Control.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A sound and complete model-generation procedure for consistent and confidentiality-preserving databases.
Theor. Comput. Sci., 2011

Inference-proof view update transactions with forwarded refreshments.
Journal of Computer Security, 2011

Appropriate inferences of data dependencies in relational databases.
Ann. Math. Artif. Intell., 2011

On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints.
Proceedings of the Information Security, 14th International Conference, 2011

Inference-Proof View Update Transactions with Minimal Refusals.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

History-Dependent Inference Control of Queries by Dynamic Policy Adaption.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
Editorial ESORICS 2007.
ACM Trans. Inf. Syst. Secur., 2010

Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation.
Proceedings of the Advances in Information and Computer Security, 2010

Towards Controlled Query Evaluation for Incomplete First-Order Databases.
Proceedings of the Foundations of Information and Knowledge Systems, 2010

Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution.
Proceedings of the Databases in Networked Information Systems, 6th International Workshop, 2010

Efficient Inference Control for Open Relational Queries.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Chasing after Secrets in Relational Databases.
Proceedings of the 4th Alberto Mendelzon International Workshop on Foundations of Data Management, 2010

2009
Optimization of the Controlled Evaluation of Closed Relational Queries.
Proceedings of the Emerging Challenges for Security, 2009

Combining Consistency and Confidentiality Requirements in First-Order Databases.
Proceedings of the Information Security, 12th International Conference, 2009

Requirements and Protocols for Inference-Proof Interactions in Information Systems.
Proceedings of the Computer Security, 2009

Controlled Query Evaluation and Inference-Free View Updates.
Proceedings of the Data and Applications Security XXIII, 2009

Towards Early Warning Systems - Challenges, Technologies and Architecture.
Proceedings of the Critical Information Infrastructures Security, 2009

Security in Computing Systems - Challenges, Approaches and Solutions.
Springer, ISBN: 978-3-540-78441-8, 2009

2008
Preprocessing for controlled query evaluation with availability policy.
Journal of Computer Security, 2008

Reducing inference control to access control for normalized database schemas.
Inf. Process. Lett., 2008

Keeping secrets in incomplete databases.
Int. J. Inf. Sec., 2008

A Trust- and Property-based Access Control Model.
Electr. Notes Theor. Comput. Sci., 2008

Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes.
Proceedings of the Foundations of Information and Knowledge Systems, 2008

08102 Working Group -- Early Warning Systems.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008

2007
Controlled query evaluation with open queries for a decidable relational submodel.
Ann. Math. Artif. Intell., 2007

Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control.
Proceedings of the Information Security, 10th International Conference, 2007

Towards Secure Execution Orders for CompositeWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Inference Control in Logic Databases as a Constraint Satisfaction Problem.
Proceedings of the Information Systems Security, Third International Conference, 2007

Secure Mediation of Join Queries by Processing Ciphertexts.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Building a Tool for Cost-Based Design of Object-Oriented Database Schemas.
Proceedings of the Conceptual Modeling, 2007

Confidentiality Policies for Controlled Query Evaluation.
Proceedings of the Data and Applications Security XXI, 2007

2006
Optimistic Anonymous Participation in Inter-organizational Workflow Instances.
Proceedings of the Information Systems Security, Second International Conference, 2006

Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel.
Proceedings of the Foundations of Information and Knowledge Systems, 2006

Requirements of Information Reductions for Cooperating Intrusion Detection Agents.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Optimising Abstract Object-Oriented Database Schemas.
Proceedings of the Conceptual Modeling, 2006

On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.
Proceedings of the Data and Applications Security XX, 2006

2005
Secure Mediation with Mobile Code.
Proceedings of the Data and Applications Security XIX, 2005

2004
Solving Equations in the Relational Algebra.
SIAM J. Comput., 2004

Controlled query evaluation for enforcing confidentiality in complete information systems.
Int. J. Inf. Sec., 2004

Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
Ann. Math. Artif. Intell., 2004

Towards a credential-based implementation of compound access control policies.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Refusal in Incomplete Databases.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Secure Mediation: Requirements, Design, and Architecture.
Journal of Computer Security, 2003

Extracting information from heterogeneous information sources using ontologically specified target views.
Inf. Syst., 2003

Adding inclusion dependencies to an object-oriented data model with uniqueness constraints.
Acta Inf., 2003

Administration Rights in the SDSD-System.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers.
Proceedings of the Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI), 30. September, 2002

Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick.
Proceedings of the Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI), 30. September, 2002

Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.
Proceedings of the Computer Security, 2002

A Flexible Cost Model for Abstract Object-Oriented Database Schemas.
Proceedings of the Conceptual Modeling, 2002

Explicit Representation of Constrained Schema Mappings for Mediated Data Integration.
Proceedings of the Databases in Networked Information Systems, 2002

A Hybrid PKI Model: Application to Secure Mediation.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Lying versus refusal for known potential secrets.
Data Knowl. Eng., 2001

Solving equations in the relational algebra
CoRR, 2001

Decomposition of object-oriented database schemas.
Ann. Math. Artif. Intell., 2001

Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems.
Proceedings of the Semantics in Databases, 2001

State-Dependent Security Decisions for Distributed Object-Systems.
Proceedings of the Database and Application Security XV, 2001

An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas.
Proceedings of the Advances in Databases and Information Systems, 2001

2000
Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers.
IEEE Trans. Knowl. Data Eng., 2000

For unknown secrecies refusal is better than lying.
Data Knowl. Eng., 2000

Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

Mediated Information Gain.
Proceedings of the 2000 International Database Engineering and Applications Symposium, 2000

Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints.
Proceedings of the Foundations of Information and Knowledge Systems, 2000

On Pseudonymization of Audit Data for Intrusion Detection.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

Panel.
Proceedings of the Data and Application Security, 2000

Security Architecture of the Multimedia Mediator.
Proceedings of the Data and Application Security, 2000

Threshold-based identity recovery for privacy enhanced applications.
Proceedings of the CCS 2000, 2000

1999
Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas.
Grundlagen von Datenbanken, 1999

For Unknown Secrecies Refusal is Better than Lying.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
Weakly Constraining Multimedia Types Based on a Type Embedding Ordering.
Proceedings of the Advances in Multimedia Information Systems, 4th International Workshop, 1998

An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents.
Proceedings of the Research and Advanced Technology for Digital Libraries, 1998

Secure Mediation: Requirements and Design.
Proceedings of the Database Security XII: Status and Prospects, 1998

Technical Enforcement of Informational Assurances.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
Query Evaluation in an Object-Oriented Multimedia Mediator.
OOIS, 1997

A New Approach to Inferences of Semantic Constraints.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997

1996
Decomposition of Relationships through Pivoting.
Proceedings of the Conceptual Modeling, 1996

1995
Optimization of a Subclass of Conjunctive Queries.
Acta Inf., 1995

Achievements of Relational Database Schema Design Theory Revisited.
Proceedings of the Semantics in Databases, 1995

Database Schema Design Theory : Achievements and Challenges.
CISMOD, 1995

Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas.
Proceedings of the Advances in Databases and Information Systems, 1995

Grundlagen von Informationssystemen
Vieweg, ISBN: 3-528-05494-8, 1995

1994
Reflections on Security of Database and Datatransfer Systems in Health Care.
Proceedings of the Applications and Impacts, Information Processing '94, Volume 2, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

Impacts of Creating, Implementing and Using Formal Languages.
Proceedings of the Linkage and Developing Countries, Information Processing '94, Volume 3, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata.
Grundlagen von Datenbanken, 1994

Schematransformation für F-Logik.
Grundlagen von Datenbanken, 1994

Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen.
Grundlagen von Datenbanken, 1994

Perspectives on Database Security - Panel Summary.
Proceedings of the Database Security, 1994

Enforcement of State Dependent Security Specifications.
Proceedings of the Database Security, 1994

1993
Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies.
ITA, 1993

Sichere Delegation in Informationssystemen.
Proceedings of the Verläßliche Informationssysteme, 1993

Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft".
Proceedings of the Verläßliche Informationssysteme, 1993

Magic-Sets: Globalisieren von Variablen und Rekursionselimination.
Grundlagen von Datenbanken, 1993

Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen.
Grundlagen von Datenbanken, 1993

Evaluation of Upper Bounds and Least Nodes as Database Operations.
Proceedings of the Foundations of Data Organization and Algorithms, 1993

About the Enforcement of State Dependent Specifications.
Proceedings of the Database Security, 1993

1991
Relationship chase procedures interpreted as resolution with paramodulation.
Fundam. Inform., 1991

On Relational Database Schemes Having Unique Minimal Key.
Elektronische Informationsverarbeitung und Kybernetik, 1991

Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick.
Proceedings of the VIS'91, 1991

Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses.
Proceedings of the VIS'91, 1991

Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies.
Proceedings of the MFDBS 91, 1991

Sicherheit: Gewährleistung und Begrenzung des Informationsflusses.
Entwicklungstendenzen bei Datenbanksystemen, 1991

1990
An Extension of SQL for Querying Graph Relations.
Comput. Lang., 1990

Optimizatioin of a Subclass of Conjunctive Queries.
Proceedings of the ICDT'90, 1990

A General Framework for Database Security.
Grundlagen von Datenbanken, 1990

Medical Database Security.
Proceedings of the GI, 1990

A General Framework for Database Security.
Proceedings of the ESORICS 90, 1990

A General Framework for Database Security (Abstract).
Proceedings of the Database Security, 1990

1989
Boyce-Codd Normal Form and Object Normal Forms.
Inf. Process. Lett., 1989

Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt.
Informatik Spektrum, 1989

Towards a Schema Design Methodology for Deductive Databases.
Proceedings of the MFDBS 89, 1989

The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract).
Proceedings of the Fifth International Conference on Data Engineering, 1989

An Object-Surrogate-Value Approach for Database Languages.
Proceedings of the Workshop on Foundations of Models and Languages for Data and Objects, 1989

Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines.
Proceedings of the Database Security, 1989

1988
The personal model of data: Towards a privacy-oriented information system.
Computers & Security, 1988

Transitive Closure Algorithms for Very Large Databases.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 1988

Analysis of the Privacy Model for the Information System DORIS.
Proceedings of the Database Security, 1988

1987
Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition.
J. Comput. Syst. Sci., 1987

The Equivalence Problem For Relational Database Schemes.
Proceedings of the MFDBS 87, 1987

Data Manipulation Languages for the Universal Relation View DURST.
Proceedings of the MFDBS 87, 1987

Privacy Respecting Permissions and Rights.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
A Formal View Integration Method.
Proceedings of the 1986 ACM SIGMOD International Conference on Management of Data, 1986

One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views.
Proceedings of the Fifth ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1986

1984
Some Variants of the Take-Grant Protection Model.
Inf. Process. Lett., 1984

Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values.
Fundam. Inform., 1984

1983
A Foundation of Codd's Relational Maybe-Operations.
ACM Trans. Database Syst., 1983

Universal Relation Views: A Pragmatic Approach.
Proceedings of the 9th International Conference on Very Large Data Bases, October 31, 1983

1982
Towards Designing Acyclic Database Schemes.
Proceedings of the Advances in Data Base Theory, 1982

1981
A Foundation of Codd's Relational Maybe-Operations.
Proceedings of the XP2 Workshop on Relational Database Theory, 1981

1980
Inferences of Multivalued Dependencies in Fixed and Undetermined Universes.
Theor. Comput. Sci., 1980

1979
Synthesizing Independent Database Schemas.
Proceedings of the 1979 ACM SIGMOD International Conference on Management of Data, Boston, Massachusetts, May 30, 1979

A Formal Approach to Null Values in Database Relations.
Proceedings of the Advances in Data Base Theory, 1979

1978
The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property.
SIAM J. Comput., 1978

On the Complementation Rule for Multivalued Dependencies in Database Relations.
Acta Inf., 1978

Path Measures of Turing Machine Computations (Preliminary Report).
Proceedings of the Automata, 1978

1977
On BI-Immune Isols.
Math. Log. Q., 1977

Über Projektionsmengen von Komplexitätsmaßen.
Elektronische Informationsverarbeitung und Kybernetik, 1977

1973
Zufällige Folgen und Bi-immunität.
Proceedings of the 1. Fachtagung über Automatentheorie und Formale Sprachen, 1973


  Loading...