![]() |
| 1997 | ||
|---|---|---|
| 6 | Eike Born, Thomas Delica, Werner Ehrl, Lutz Richter, Reinhard Riedl: Characterization of Workloads for Distributed DB/DC-Processing. Inf. Sci. 97(1&2): 5-33 (1997) | |
| 1996 | ||
| 5 | EE | Eike Born: Enforcing legal ownership rights by an access control system. Computers & Security 15(3): 212-220 (1996) |
| 4 | EE | Eike Born: Analytical performance modelling of lock management in distributed systems. Distributed Systems Engineering 3(1): 68- (1996) |
| 1994 | ||
| 3 | EE | Eike Born, Helmut G. Stiegler: Discretionary access control by means of usage conditions. Computers & Security 13(5): 437-450 (1994) |
| 1993 | ||
| 2 | Eike Born, Sigmar Zäske: Performance-Analyse eines verteilten Lock-Management auf Mehrrechner-Systemen. Datenbank Rundbrief 11: 49-50 (1993) | |
| 1991 | ||
| 1 | Eike Born: B1-Funktionalität für Betriebssysteme: Sicherheitskennzeichen für Exportkanäle. VIS 1991: 159-178 | |
| 1 | Thomas Delica | [6] |
| 2 | Werner Ehrl | [6] |
| 3 | Lutz Richter | [6] |
| 4 | Reinhard Riedl | [6] |
| 5 | Helmut G. Stiegler | [3] |
| 6 | Sigmar Zäske | [2] |