| 2008 |
| 123 | EE | Joachim Biskup,
Sebastian Link:
Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes.
FoIKS 2008: 58-77 |
| 122 | EE | Joachim Biskup,
Bernhard M. Hämmerli,
Michael Meier,
Sebastian Schmerl,
Jens Tölle,
Michael Vogel:
08102 Working Group -- Early Warning Systems.
Network Attack Detection and Defense 2008 |
| 121 | EE | Joachim Biskup,
Julia Hielscher,
Sandra Wortmann:
A Trust- and Property-based Access Control Model.
Electr. Notes Theor. Comput. Sci. 197(2): 169-177 (2008) |
| 120 | EE | Joachim Biskup,
David W. Embley,
Jan-Hendrik Lochner:
Reducing inference control to access control for normalized database schemas.
Inf. Process. Lett. 106(1): 8-12 (2008) |
| 119 | EE | Joachim Biskup,
Torben Weibert:
Keeping secrets in incomplete databases.
Int. J. Inf. Sec. 7(3): 199-217 (2008) |
| 118 | EE | Joachim Biskup,
Lena Wiese:
Preprocessing for controlled query evaluation with availability policy.
Journal of Computer Security 16(4): 477-494 (2008) |
| 2007 |
| 117 | | Joachim Biskup,
Javier Lopez:
Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings
Springer 2007 |
| 116 | EE | Joachim Biskup,
Torben Weibert:
Confidentiality Policies for Controlled Query Evaluation.
DBSec 2007: 1-13 |
| 115 | EE | Joachim Biskup,
Ralf Menzel:
Building a Tool for Cost-Based Design of Object-Oriented Database Schemas.
ER 2007: 120-131 |
| 114 | EE | Joachim Biskup,
Christian Tsatedem,
Lena Wiese:
Secure Mediation of Join Queries by Processing Ciphertexts.
ICDE Workshops 2007: 715-724 |
| 113 | EE | Joachim Biskup,
Dominique Marc Burgard,
Torben Weibert,
Lena Wiese:
Inference Control in Logic Databases as a Constraint Satisfaction Problem.
ICISS 2007: 128-142 |
| 112 | EE | Joachim Biskup,
Barbara Carminati,
Elena Ferrari,
Frank Muller,
Sandra Wortmann:
Towards Secure Execution Orders for CompositeWeb Services.
ICWS 2007: 489-496 |
| 111 | EE | Joachim Biskup,
Jan-Hendrik Lochner:
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control.
ISC 2007: 407-422 |
| 110 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled query evaluation with open queries for a decidable relational submodel.
Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007) |
| 2006 |
| 109 | EE | Joachim Biskup,
Lena Wiese:
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.
DBSec 2006: 30-43 |
| 108 | EE | Joachim Biskup,
Ralf Menzel:
Optimising Abstract Object-Oriented Database Schemas.
ER 2006: 528-543 |
| 107 | EE | Ulrich Flegel,
Joachim Biskup:
Requirements of Information Reductions for Cooperating Intrusion Detection Agents.
ETRICS 2006: 466-480 |
| 106 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel.
FoIKS 2006: 43-62 |
| 105 | EE | Joachim Biskup,
Joerg Parthe:
Optimistic Anonymous Participation in Inter-organizational Workflow Instances.
ICISS 2006: 86-100 |
| 2005 |
| 104 | EE | Joachim Biskup,
Barbara Sprick,
Lena Wiese:
Secure Mediation with Mobile Code.
DBSec 2005: 267-280 |
| 2004 |
| 103 | | Joachim Biskup,
Torben Weibert:
Refusal in Incomplete Databases.
DBSec 2004: 143-157 |
| 102 | EE | Joachim Biskup,
Sandra Wortmann:
Towards a credential-based implementation of compound access control policies.
SACMAT 2004: 31-40 |
| 101 | | Joachim Biskup,
Piero A. Bonatti:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004) |
| 100 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled query evaluation for enforcing confidentiality in complete information systems.
Int. J. Inf. Sec. 3(1): 14-27 (2004) |
| 99 | EE | Joachim Biskup,
Jan Paredaens,
Thomas Schwentick,
Jan Van den Bussche:
Solving Equations in the Relational Algebra.
SIAM J. Comput. 33(5): 1052-1066 (2004) |
| 2003 |
| 98 | | Joachim Biskup,
Thomas Leineweber,
Joerg Parthe:
Administration Rights in the SDSD-System.
DBSec 2003: 149-162 |
| 97 | EE | Joachim Biskup,
Torsten Polle:
Adding inclusion dependencies to an object-oriented data model with uniqueness constraints.
Acta Inf. 39(6-7): 391-449 (2003) |
| 96 | EE | Joachim Biskup,
David W. Embley:
Extracting information from heterogeneous information sources using ontologically specified target views.
Inf. Syst. 28(3): 169-212 (2003) |
| 95 | | Christian Altenschmidt,
Joachim Biskup,
Ulrich Flegel,
Yücel Karabulut:
Secure Mediation: Requirements, Design, and Architecture.
Journal of Computer Security 11(3): 365-398 (2003) |
| 2002 |
| 94 | | Joachim Biskup,
Yücel Karabulut:
A Hybrid PKI Model: Application to Secure Mediation.
DBSec 2002: 271-282 |
| 93 | EE | Christian Altenschmidt,
Joachim Biskup:
Explicit Representation of Constrained Schema Mappings for Mediated Data Integration.
DNIS 2002: 103-132 |
| 92 | EE | Joachim Biskup,
Ralf Menzel:
A Flexible Cost Model for Abstract Object-Oriented Database Schemas.
ER 2002: 444-462 |
| 91 | EE | Joachim Biskup,
Piero A. Bonatti:
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.
ESORICS 2002: 39-54 |
| 90 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
FoIKS 2002: 49-66 |
| 89 | | Joachim Biskup:
Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick.
GI Jahrestagung 2002: 423-428 |
| 88 | | Joachim Biskup,
Ulrich Flegel:
Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers.
GI Jahrestagung 2002: 488-496 |
| 2001 |
| 87 | EE | Joachim Biskup,
Ralf Menzel:
An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas.
ADBIS 2001: 366-378 |
| 86 | | Joachim Biskup,
Thomas Leineweber:
State-Dependent Security Decisions for Distributed Object-Systems.
DBSec 2001: 105-118 |
| 85 | EE | Joachim Biskup,
Barbara Sprick:
Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems.
Semantics in Databases 2001: 34-62 |
| 84 | | Joachim Biskup,
Torsten Polle:
Decomposition of object-oriented database schemas.
Ann. Math. Artif. Intell. 33(2-4): 119-155 (2001) |
| 83 | EE | Joachim Biskup,
Jan Paredaens,
Thomas Schwentick,
Jan Van den Bussche:
Solving equations in the relational algebra
CoRR cs.LO/0106034: (2001) |
| 82 | EE | Joachim Biskup,
Piero A. Bonatti:
Lying versus refusal for known potential secrets.
Data Knowl. Eng. 38(2): 199-222 (2001) |
| 2000 |
| 81 | EE | Joachim Biskup,
Ulrich Flegel:
Threshold-based identity recovery for privacy enhanced applications.
ACM Conference on Computer and Communications Security 2000: 71-79 |
| 80 | | Reind P. van de Riet,
Raban Serban,
Sylvia L. Osborn,
Arnon Rosenthal,
Vijayalakshmi Atluri,
Joachim Biskup,
Gio Wiederhold:
Panel.
DBSec 2000: 373 |
| 79 | | Christian Altenschmidt,
Joachim Biskup,
Yücel Karabulut:
Security Architecture of the Multimedia Mediator.
DBSec 2000: 77-88 |
| 78 | EE | Joachim Biskup,
Torsten Polle:
Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints.
FoIKS 2000: 31-49 |
| 77 | EE | Joachim Biskup,
David W. Embley:
Mediated Information Gain.
IDEAS 2000: 360-370 |
| 76 | EE | Joachim Biskup,
Ulrich Flegel:
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection.
Recent Advances in Intrusion Detection 2000: 28-48 |
| 75 | EE | Joachim Biskup,
Ulrich Flegel:
On Pseudonymization of Audit Data for Intrusion Detection.
Workshop on Design Issues in Anonymity and Unobservability 2000: 161-180 |
| 74 | EE | Joachim Biskup:
For unknown secrecies refusal is better than lying.
Data Knowl. Eng. 33(1): 1-23 (2000) |
| 73 | EE | Leana Golubchik,
V. S. Subrahmanian,
Sherry Marcus,
Joachim Biskup:
Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers.
IEEE Trans. Knowl. Data Eng. 12(1): 60-77 (2000) |
| 1999 |
| 72 | | Joachim Biskup:
For Unknown Secrecies Refusal is Better than Lying.
DBSec 1999: 127-141 |
| 71 | | Joachim Biskup,
Ralf Menzel,
Torsten Polle:
Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas.
Grundlagen von Datenbanken 1999: 72-76 |
| 1998 |
| 70 | | Joachim Biskup,
Ulrich Flegel,
Yücel Karabulut:
Secure Mediation: Requirements and Design.
DBSec 1998: 127-140 |
| 69 | | Joachim Biskup:
Technical Enforcement of Informational Assurances.
DBSec 1998: 17-40 |
| 68 | EE | Alois Knoll,
Christian Altenschmidt,
Joachim Biskup,
Hans-Martin Blüthgen,
Ingo Glöckner,
Sven Hartrumpf,
Hermann Helbig,
Christiane Henning,
Reinhard Lüling,
Burkhard Monien,
Thomas Noll,
Norbert Sensen:
An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents.
ECDL 1998: 409-428 |
| 67 | EE | Christian Altenschmidt,
Joachim Biskup,
Jürgen Freitag,
Barbara Sprick:
Weakly Constraining Multimedia Types Based on a Type Embedding Ordering.
Multimedia Information Systems 1998: 121-129 |
| 1997 |
| 66 | EE | Joachim Biskup,
Andreas Kluck:
A New Approach to Inferences of Semantic Constraints.
ADBIS 1997: 72-79 |
| 65 | | Joachim Biskup,
Jürgen Freitag,
Yücel Karabulut,
Barbara Sprick:
Query Evaluation in an Object-Oriented Multimedia Mediator.
OOIS 1997: 31-43 |
| 1996 |
| 64 | EE | Joachim Biskup,
Ralf Menzel,
Torsten Polle,
Yehoshua Sagiv:
Decomposition of Relationships through Pivoting.
ER 1996: 28-41 |
| 1995 |
| 63 | | Joachim Biskup:
Grundlagen von Informationssystemen
Vieweg 1995 |
| 62 | EE | Joachim Biskup,
Ralf Menzel,
Torsten Polle:
Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas.
ADBIS 1995: 109-136 |
| 61 | | Joachim Biskup:
Database Schema Design Theory : Achievements and Challenges.
CISMOD 1995: 14-44 |
| 60 | | Joachim Biskup:
Achievements of Relational Database Schema Design Theory Revisited.
Semantics in Databases 1995: 29-54 |
| 59 | | Joachim Biskup,
Pratul Dublish,
Yehoshua Sagiv:
Optimization of a Subclass of Conjunctive Queries
Acta Inf. 32(1): 1-26 (1995) |
| 1994 |
| 58 | | Joachim Biskup,
Matthew Morgenstern,
Carl E. Landwehr:
Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994
North-Holland 1994 |
| 57 | | Joachim Biskup,
Christian Eckert:
Enforcement of State Dependent Security Specifications.
DBSec 1994: 375 |
| 56 | | Matthew Morgenstern,
Joachim Biskup,
Klaus R. Dittrich,
Carl E. Landwehr,
Marvin Schaefer:
Perspectives on Database Security - Panel Summary.
DBSec 1994: 377-390 |
| 55 | | Joachim Biskup,
Christian Eckert:
Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen.
Grundlagen von Datenbanken 1994: 11-15 |
| 54 | | Joachim Biskup,
Ralf Menzel,
Torsten Polle:
Schematransformation für F-Logik.
Grundlagen von Datenbanken 1994: 16-19 |
| 53 | | Joachim Biskup,
Ralf Menzel,
Torsten Polle:
Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata.
Grundlagen von Datenbanken 1994: 20-24 |
| 52 | | Joachim Biskup,
Gerrit Bleumer:
Reflections on Security of Database and Datatransfer Systems in Health Care.
IFIP Congress (2) 1994: 549-556 |
| 51 | | Joachim Biskup:
Impacts of Creating, Implementing and Using Formal Languages.
IFIP Congress (3) 1994: 402-407 |
| 1993 |
| 50 | | Joachim Biskup,
Christian Eckert:
About the Enforcement of State Dependent Specifications.
DBSec 1993: 3-17 |
| 49 | | Joachim Biskup,
Holger Stiefeling:
Evaluation of Upper Bounds and Least Nodes as Database Operations.
FODO 1993: 197-214 |
| 48 | | Joachim Biskup,
Christian Eckert:
Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen.
Grundlagen von Datenbanken 1993: 20-24 |
| 47 | | Joachim Biskup,
Torsten Polle:
Magic-Sets: Globalisieren von Variablen und Rekursionselimination.
Grundlagen von Datenbanken 1993: 25-29 |
| 46 | | Joachim Biskup,
Christian Eckert:
Sichere Delegation in Informationssystemen.
VIS 1993: 107-133 |
| 45 | | Joachim Biskup:
Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft".
VIS 1993: 239-254 |
| 44 | | Joachim Biskup,
Pratul Dublish:
Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies.
ITA 27(3): 183-219 (1993) |
| 1992 |
| 43 | | Joachim Biskup,
Richard Hull:
Database Theory - ICDT'92, 4th International Conference, Berlin, Germany, October 14-16, 1992, Proceedings
Springer 1992 |
| 1991 |
| 42 | EE | Joachim Biskup,
Pratul Dublish:
Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies.
MFDBS 1991: 276-290 |
| 41 | | Joachim Biskup:
Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses.
VIS 1991: 1-21 |
| 40 | | Joachim Biskup,
Hans Hermann Brüggemann:
Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick.
VIS 1991: 146-158 |
| 39 | | Joachim Biskup:
Sicherheit: Gewährleistung und Begrenzung des Informationsflusses.
Entwicklungstendenzen bei Datenbanksystemen 1991: 363-388 |
| 38 | | Joachim Biskup,
János Demetrovics,
Leonid Libkin,
Ilya B. Muchnik:
On Relational Database Schemes Having Unique Minimal Key.
Elektronische Informationsverarbeitung und Kybernetik 27(4): 217-225 (1991) |
| 37 | | Joachim Biskup:
Relationship chase procedures interpreted as resolution with paramodulation.
Fundam. Inform. 15(2): 123-138 (1991) |
| 1990 |
| 36 | | Joachim Biskup:
A General Framework for Database Security (Abstract).
DBSec 1990: 169-170 |
| 35 | | Joachim Biskup:
A General Framework for Database Security.
ESORICS 1990: 35-41 |
| 34 | | Joachim Biskup:
Medical Database Security.
GI Jahrestagung (2) 1990: 212-221 |
| 33 | | Joachim Biskup:
A General Framework for Database Security.
Grundlagen von Datenbanken 1990: 7-10 |
| 32 | EE | Pratul Dublish,
Joachim Biskup,
Yehoshua Sagiv:
Optimizatioin of a Subclass of Conjunctive Queries.
ICDT 1990: 455-469 |
| 31 | | Joachim Biskup,
Uwe Räsch,
Holger Stiefeling:
An Extension of SQL for Querying Graph Relations.
Comput. Lang. 15(1): 65-82 (1990) |
| 1989 |
| 30 | | Joachim Biskup:
Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines.
DBSec 1989: 13-23 |
| 29 | | Joachim Biskup,
Hans Hermann Brüggemann:
An Object-Surrogate-Value Approach for Database Languages.
FMLDO 1989: 79-92 |
| 28 | EE | Joachim Biskup,
Hans Hermann Brüggemann:
The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract).
ICDE 1989: 348-355 |
| 27 | EE | Joachim Biskup,
Bernhard Convent:
Towards a Schema Design Methodology for Deductive Databases.
MFDBS 1989: 37-52 |
| 26 | | Joachim Biskup:
Boyce-Codd Normal Form and Object Normal Forms.
Inf. Process. Lett. 32(1): 29-33 (1989) |
| 25 | | Joachim Biskup:
Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt.
Informatik Spektrum 12(3): 158-161 (1989) |
| 1988 |
| 24 | | Joachim Biskup,
János Demetrovics,
Jan Paredaens,
Bernhard Thalheim:
MFDBS 87, 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, GDR, January 19-23, 1987, Proceedings
Springer 1988 |
| 23 | | Joachim Biskup,
Hans-Werner Graf:
Analysis of the Privacy Model for the Information System DORIS.
DBSec 1988: 123-140 |
| 22 | | Joachim Biskup,
Holger Stiefeling:
Transitive Closure Algorithms for Very Large Databases.
WG 1988: 122-147 |
| 21 | | Joachim Biskup,
Hans Hermann Brüggemann:
The Personal Model of Data: Towards a Privacy-Oriented Information System.
Computers & Security 7: 575-597 (1988) |
| 1987 |
| 20 | | Joachim Biskup:
Privacy Respecting Permissions and Rights.
DBSec 1987: 173-185 |
| 19 | EE | Joachim Biskup,
Hans Hermann Brüggemann:
Data Manipulation Languages for the Universal Relation View DURST.
MFDBS 1987: 20-41 |
| 18 | EE | Joachim Biskup,
Uwe Räsch:
The Equivalence Problem For Relational Database Schemes.
MFDBS 1987: 42-70 |
| 17 | | Joachim Biskup,
Renate Meyer:
Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition.
J. Comput. Syst. Sci. 35(1): 1-22 (1987) |
| 1986 |
| 16 | EE | Joachim Biskup,
Hans Hermann Brüggemann,
L. Schnetgöke,
M. Kramer:
One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views.
PODS 1986: 148-159 |
| 15 | EE | Joachim Biskup,
Bernhard Convent:
A Formal View Integration Method.
SIGMOD Conference 1986: 398-407 |
| 1984 |
| 14 | | Joachim Biskup:
Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values.
Fundam. Inform. 7(1): 129-150 (1984) |
| 13 | | Joachim Biskup:
Some Variants of the Take-Grant Protection Model.
Inf. Process. Lett. 19(3): 151-156 (1984) |
| 1983 |
| 12 | EE | Joachim Biskup,
Hans Hermann Brüggemann:
Universal Relation Views: A Pragmatic Approach.
VLDB 1983: 172-185 |
| 11 | EE | Joachim Biskup:
A Foundation of Codd's Relational Maybe-Operations.
ACM Trans. Database Syst. 8(4): 608-636 (1983) |
| 1982 |
| 10 | | Joachim Biskup,
Hans Hermann Brüggemann:
Towards Designing Acyclic Database Schemes.
Advances in Data Base Theory 1982: 3-25 |
| 1981 |
| 9 | EE | Joachim Biskup:
A Foundation of Codd's Relational Maybe-Operations.
XP2 Workshop on Relational Database Theory 1981 |
| 1980 |
| 8 | | Joachim Biskup:
Inferences of Multivalued Dependencies in Fixed and Undetermined Universes.
Theor. Comput. Sci. 10: 93-105 (1980) |
| 1979 |
| 7 | | Joachim Biskup:
A Formal Approach to Null Values in Database Relations.
Advances in Data Base Theory 1979: 299-341 |
| 6 | EE | Joachim Biskup,
Umeshwar Dayal,
Philip A. Bernstein:
Synthesizing Independent Database Schemas.
SIGMOD Conference 1979: 143-151 |
| 1978 |
| 5 | | Joachim Biskup:
Path Measures of Turing Machine Computations (Preliminary Report).
ICALP 1978: 90-104 |
| 4 | | Joachim Biskup:
On the Complementation Rule for Multivalued Dependencies in Database Relations.
Acta Inf. 10: 297-305 (1978) |
| 3 | | Joachim Biskup:
The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property.
SIAM J. Comput. 7(1): 115-117 (1978) |
| 1977 |
| 2 | | Joachim Biskup:
Über Projektionsmengen von Komplexitätsmaßen.
Elektronische Informationsverarbeitung und Kybernetik 13(7/8): 359-368 (1977) |
| 1973 |
| 1 | | Joachim Biskup:
Zufällige Folgen und Bi-immunität.
Automatentheorie und Formale Sprachen 1973: 202-207 |