Joachim Biskup
Orcid: 0000-0001-5281-1567Affiliations:
- Technical University of Dortmund, Germany
According to our database1,
Joachim Biskup
authored at least 167 papers
between 1973 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Relational Schemas with Multiplicity Bounds, Diversity Bounds and Functional Dependencies.
Proceedings of the Foundations of Information and Knowledge Systems, 2024
2022
Uniform probabilistic generation of relation instances satisfying a functional dependency.
Inf. Syst., 2022
Proceedings of the Foundations of Information and Knowledge Systems, 2022
Proceedings of the Machine Learning under Resource Constraints - Volume 3: Applications, 2022
2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Can We Probabilistically Generate Uniformly Distributed Relation Instances Efficiently?
Proceedings of the Advances in Databases and Information Systems, 2020
2019
Data Knowl. Eng., 2019
Checking inference-proofness of attribute-disjoint and duplicate-preserving fragmentations.
Ann. Math. Artif. Intell., 2019
2018
Inferences from Attribute-Disjoint and Duplicate-Preserving Relational Fragmentations.
Proceedings of the Foundations of Information and Knowledge Systems, 2018
2017
Inference control of open relational queries under closed-world semantics based on theorem proving.
Inf. Syst., 2017
Proceedings of the 5th Workshop on Society, 2017
Inference-Proof Updating of a Weakened View Under the Modification of Input Parameters.
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution.
Proceedings of the Foundations of Information and Knowledge Systems, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
On the Simulation Assumption for Controlled Interaction Processing.
Proceedings of the Computational Models of Rationality, 2016
2015
Ann. Math. Artif. Intell., 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Advances in Databases and Information Systems, 2015
2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Foundations of Information and Knowledge Systems, 2014
Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013
Proceedings of the Databases in Networked Information Systems - 8th International Workshop, 2013
Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
Dynamic policy adaptation for inference control of queries to a propositional information system.
J. Comput. Secur., 2012
Inference-usability confinement by maintaining inference-proof views of an information system.
Int. J. Comput. Sci. Eng., 2012
Proceedings of the Scalable Uncertainty Management - 6th International Conference, 2012
Proceedings of the Foundations of Information and Knowledge Systems, 2012
Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Conceptual Modelling and Its Theoretical Foundations, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
A sound and complete model-generation procedure for consistent and confidentiality-preserving databases.
Theor. Comput. Sci., 2011
J. Comput. Secur., 2011
Ann. Math. Artif. Intell., 2011
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints.
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Foundations of Information and Knowledge Systems, 2010
Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution.
Proceedings of the Databases in Networked Information Systems, 6th International Workshop, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 4th Alberto Mendelzon International Workshop on Foundations of Data Management, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Computer Security, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the Critical Information Infrastructures Security, 2009
Springer, ISBN: 978-3-540-78441-8, 2009
2008
J. Comput. Secur., 2008
Inf. Process. Lett., 2008
Proceedings of the Foundations of Information and Knowledge Systems, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
2007
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007
Ann. Math. Artif. Intell., 2007
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control.
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the Conceptual Modeling, 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the Conceptual Modeling, 2006
Proceedings of the Data and Applications Security XX, 2006
2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Controlled query evaluation for enforcing confidentiality in complete information systems.
Int. J. Inf. Sec., 2004
Ann. Math. Artif. Intell., 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Extracting information from heterogeneous information sources using ontologically specified target views.
Inf. Syst., 2003
Adding inclusion dependencies to an object-oriented data model with uniqueness constraints.
Acta Informatica, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers.
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002
Proceedings of the Computer Security, 2002
Proceedings of the Conceptual Modeling, 2002
Explicit Representation of Constrained Schema Mappings for Mediated Data Integration.
Proceedings of the Databases in Networked Information Systems, 2002
A Hybrid PKI Model: Application to Secure Mediation.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems.
Proceedings of the Semantics in Databases, 2001
State-Dependent Security Decisions for Distributed Object-Systems.
Proceedings of the Database and Application Security XV, 2001
An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas.
Proceedings of the Advances in Databases and Information Systems, 2001
2000
Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers.
IEEE Trans. Knowl. Data Eng., 2000
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the 2000 International Database Engineering and Applications Symposium, 2000
Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints.
Proceedings of the Foundations of Information and Knowledge Systems, 2000
Proceedings of the Designing Privacy Enhancing Technologies, 2000
Proceedings of the Data and Application Security, 2000
Proceedings of the CCS 2000, 2000
1999
Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas.
Proceedings of the 11. Workshop Grundlagen von Datenbanken, 1999
Proceedings of the Angewandte Mathematik, 1999
1998
Proceedings of the Advances in Multimedia Information Systems, 4th International Workshop, 1998
An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents.
Proceedings of the Research and Advanced Technology for Digital Libraries, 1998
Secure Mediation: Requirements and Design.
Proceedings of the Database Security XII: Status and Prospects, 1998
Technical Enforcement of Informational Assurances.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Proceedings of the 1997 International Conference on Object Oriented Information Systems, 1997
A New Approach to Inferences of Semantic Constraints.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997
1996
Proceedings of the Conceptual Modeling, 1996
1995
Proceedings of the Semantics in Databases, 1995
Proceedings of the Information Systems and Data Management, 1995
Proceedings of the Advances in Databases and Information Systems, 1995
Grundlagen von Informationssystemen
Vieweg, ISBN: 3-528-05494-8, 1995
1994
Reflections on Security of Database and Datatransfer Systems in Health Care.
Proceedings of the Applications and Impacts, Information Processing '94, Volume 2, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994
Impacts of Creating, Implementing and Using Formal Languages.
Proceedings of the Linkage and Developing Countries, Information Processing '94, Volume 3, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994
Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata.
Proceedings of the Kurzfassungen 6. Workshop Grundlagen von Datenbanken, 1994
Schematransformation für F-Logik.
Proceedings of the Kurzfassungen 6. Workshop Grundlagen von Datenbanken, 1994
Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen.
Proceedings of the Kurzfassungen 6. Workshop Grundlagen von Datenbanken, 1994
Perspectives on Database Security - Panel Summary.
Proceedings of the Database Security, 1994
Enforcement of State Dependent Security Specifications.
Proceedings of the Database Security, 1994
1993
Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies.
RAIRO Theor. Informatics Appl., 1993
Sichere Delegation in Informationssystemen.
Proceedings of the Verläßliche Informationssysteme, 1993
Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft".
Proceedings of the Verläßliche Informationssysteme, 1993
Magic-Sets: Globalisieren von Variablen und Rekursionselimination.
Proceedings of the Tagung des Arbeitskreises der GI Datenbanken: Grundlagen von Informationssystemen, 1993
Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen.
Proceedings of the Tagung des Arbeitskreises der GI Datenbanken: Grundlagen von Informationssystemen, 1993
Proceedings of the Foundations of Data Organization and Algorithms, 1993
About the Enforcement of State Dependent Specifications.
Proceedings of the Database Security, 1993
1991
Relationship chase procedures interpreted as resolution with paramodulation.
Fundam. Informaticae, 1991
On Relational Database Schemes Having Unique Minimal Key.
J. Inf. Process. Cybern., 1991
Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick.
Proceedings of the VIS'91, 1991
Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses.
Proceedings of the VIS'91, 1991
Sicherheit: Gewährleistung und Begrenzung des Informationsflusses.
Proceedings of the Entwicklungstendenzen bei Datenbanksystemen., 1991
1990
A General Framework for Database Security.
Proceedings of the Kurzfassungen des 2. Workshops "Grundlagen von Datenbanken", 1990
A General Framework for Database Security (Abstract).
Proceedings of the Database Security, 1990
1989
Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt.
Inform. Spektrum, 1989
Proceedings of the MFDBS 89, 1989
The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract).
Proceedings of the Fifth International Conference on Data Engineering, 1989
An Object-Surrogate-Value Approach for Database Languages.
Proceedings of the Workshop on Foundations of Models and Languages for Data and Objects, 1989
Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines.
Proceedings of the Database Security, 1989
1988
Comput. Secur., 1988
Proceedings of the Graph-Theoretic Concepts in Computer Science, 1988
Analysis of the Privacy Model for the Information System DORIS.
Proceedings of the Database Security, 1988
1987
Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition.
J. Comput. Syst. Sci., 1987
Proceedings of the MFDBS 87, 1987
Proceedings of the MFDBS 87, 1987
Privacy Respecting Permissions and Rights.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1986
Proceedings of the 1986 ACM SIGMOD International Conference on Management of Data, 1986
Proceedings of the Fifth ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1986
1984
Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values.
Fundam. Inform., 1984
1983
Proceedings of the 9th International Conference on Very Large Data Bases, October 31, 1983
1982
Towards Designing Acyclic Database Schemes.
Proceedings of the Advances in Data Base Theory, 1982
1980
Theor. Comput. Sci., 1980
1979
Proceedings of the 1979 ACM SIGMOD International Conference on Management of Data, Boston, Massachusetts, USA, May 30, 1979
A Formal Approach to Null Values in Database Relations.
Proceedings of the Advances in Data Base Theory, 1979
1978
The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property.
SIAM J. Comput., 1978
Acta Informatica, 1978
Proceedings of the Automata, 1978
1977
Über Projektionsmengen von Komplexitätsmaßen.
J. Inf. Process. Cybern., 1977
1973
Proceedings of the 1. Fachtagung über Automatentheorie und Formale Sprachen, 1973