2008 |
73 | EE | Reind P. van de Riet:
Mokum for Correctness by Design in Relation to MDA.
UNISCON 2008: 352-364 |
72 | EE | Reind P. van de Riet:
Introduction to the special issue on DKE 25 years.
Data Knowl. Eng. 67(2): 219 (2008) |
71 | EE | Reind P. van de Riet:
Thank you referees, authors and readers of DKE.
Data Knowl. Eng. 67(2): 220-233 (2008) |
70 | EE | Reind P. van de Riet:
Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace.
Data Knowl. Eng. 67(2): 293-329 (2008) |
2004 |
69 | EE | Reind P. van de Riet:
Editorial Introduction by the Editor for Europe.
Data Knowl. Eng. 50(3): 247-260 (2004) |
68 | EE | Reind P. van de Riet:
The future refereeing process in Cyberspace of the Data & Knowledge Engineering Journal: an attempt in guaranteeing security and privacy on three levels.
Data Knowl. Eng. 50(3): 305-339 (2004) |
2003 |
67 | | Wouter Teepe,
Reind P. van de Riet,
Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in Using Databases.
Journal of Computer Security 11(3): 353-364 (2003) |
2002 |
66 | EE | Peter P. Chen,
Reind P. van de Riet:
Editorial introduction.
Data Knowl. Eng. 41(2-3): 125-132 (2002) |
65 | EE | Reind P. van de Riet:
Notes on a classification for DKE.
Data Knowl. Eng. 41(2-3): 133-139 (2002) |
64 | EE | Reind P. van de Riet:
Peter Chen honoured with the Stevens Award for advancing software development methods.
Data Knowl. Eng. 41(2-3): 273-282 (2002) |
63 | EE | Ana M. Moreno-Capuchino,
Reind P. van de Riet:
Guest editorial: Special issue NLDB '01.
Data Knowl. Eng. 42(3): 247-249 (2002) |
62 | EE | Bhavani M. Thuraisingham,
Reind P. van de Riet:
Data and applications security (Guest editorial).
Data Knowl. Eng. 43(3): 235-236 (2002) |
2001 |
61 | | Ana María Moreno,
Reind P. van de Riet:
Applications of Natural Language to Information Systems, 6th International Workshop NLDB'01, June 28-29, 2001, Madrid, Spain, Proceedings
GI 2001 |
60 | | Bhavani M. Thuraisingham,
Reind P. van de Riet,
Klaus R. Dittrich,
Zahir Tari:
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000
Kluwer 2001 |
59 | EE | Frank K. H. A. Dehne,
Ans A. G. Steuten,
Reind P. van de Riet:
WORDNET++: A lexicon for the COLOR-X-method.
Data Knowl. Eng. 38(1): 3-29 (2001) |
58 | EE | Radu Serban,
Reind P. van de Riet:
Enforcing policies with private guardians.
Electr. Notes Theor. Comput. Sci. 63: (2001) |
2000 |
57 | | Wouter Teepe,
Reind P. van de Riet,
Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases.
DBSec 2000: 271-282 |
56 | | Reind P. van de Riet,
Raban Serban,
Sylvia L. Osborn,
Arnon Rosenthal,
Vijayalakshmi Atluri,
Joachim Biskup,
Gio Wiederhold:
Panel.
DBSec 2000: 373 |
55 | EE | Reind P. van de Riet,
Wouter Janssen,
Martin S. Olivier,
Radu Serban:
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace.
DEXA 2000: 287-301 |
54 | EE | P. R. Griffioen,
P. I. Elsas,
Reind P. van de Riet:
Analysing Enterprises: The Value Cycle Approach.
DEXA 2000: 685-697 |
53 | EE | Ans A. G. Steuten,
Frank K. H. A. Dehne,
Reind P. van de Riet:
WordNet++: A Lexicon Supporting the Color-X Method.
NLDB 2000: 1-16 |
52 | EE | Ana M. Moreno-Capuchino,
Natalia Juristo Juzgado,
Reind P. van de Riet:
Formal justification in object-oriented modelling: A linguistic approach.
Data Knowl. Eng. 33(1): 25-47 (2000) |
51 | EE | Ans A. G. Steuten,
Reind P. van de Riet,
Jan L. G. Dietz:
Linguistically based conceptual modeling of business communication.
Data Knowl. Eng. 35(2): 121-136 (2000) |
1999 |
50 | | Ehud Gudes,
Martin S. Olivier,
Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace.
Journal of Computer Security 7(4): (1999) |
1998 |
49 | | P. I. Elsas,
P. M. Ott de Vries,
Reind P. van de Riet:
Computing Conspiracies.
DEXA Workshop 1998: 256-266 |
48 | | Reind P. van de Riet,
Wouter Janssen,
Peter de Gruijter:
Security Moving from Database Systems to ERP Systems.
DEXA Workshop 1998: 273-280 |
47 | | Martin S. Olivier,
Reind P. van de Riet,
Ehud Gudes:
Specifying Application-Level Security in Workflow Systems.
DEXA Workshop 1998: 346-351 |
46 | | Martin Caminada,
Reind P. van de Riet,
Arjen van Zanten,
Leendert van Doorn:
Internet Security Incidents, a Survey within Dutch Organisations.
WebNet 1998 |
45 | EE | Martin Caminada,
Reind P. van de Riet,
Arjen van Zanten,
Leendert van Doorn:
Internet security incidents, a survey within Dutch organizations.
Computers & Security 17(5): 417-433 (1998) |
44 | EE | Peter P. Chen,
Reind P. van de Riet:
Introduction to the Special Issue Celebrating the 25th Volume of Data & Knowledge Engineering: DKE.
Data Knowl. Eng. 25(1-2): 1-9 (1998) |
43 | EE | Reind P. van de Riet:
Complex Objects: Theory and Practice from a Data- and Knowledge Engineering Perspective, as Seen in and from Yellostone Park.
Data Knowl. Eng. 25(1-2): 217-238 (1998) |
42 | EE | J. F. M. Burg,
Reind P. van de Riet:
Enhancing CASE Environments by Using Linguistics.
International Journal of Software Engineering and Knowledge Engineering 8(4): 435-448 (1998) |
1997 |
41 | | Ehud Gudes,
Reind P. van de Riet,
J. F. M. Burg,
Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
DBSec 1997: 182-195 |
40 | | Reind P. van de Riet:
Research in the SIKS Research School: An Example of a Cooperation in Using Linguistic Tools for Requirements Specification in Cyberspace.
GI Jahrestagung 1997: 505 |
39 | | Reind P. van de Riet,
Hans F. M. Burg:
Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy?
WebNet 1997 |
38 | | M. O. Froehlich,
Reind P. van de Riet:
Text Generation in Business Object Frameworks.
WebNet 1997 |
37 | EE | J. F. M. Burg,
Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability.
Data Knowl. Eng. 21(2): 131-146 (1997) |
36 | EE | Bram van der Vos,
Jon Atle Gulla,
Reind P. van de Riet:
Verification of Conceptual Models Based on Linguistic Knowledge.
Data Knowl. Eng. 21(2): 147-163 (1997) |
35 | EE | Reind P. van de Riet,
Andrea Junk,
Ehud Gudes:
Security in Cyberspace: A Knowledge-Base Approach.
Data Knowl. Eng. 24(1): 69-96 (1997) |
1996 |
34 | | Reind P. van de Riet,
Ehud Gudes:
An Object-Oriented Database Architecture for Providing Securty in Cyberspace.
DBSec 1996: 120-144 |
33 | | Reind P. van de Riet,
J. F. M. Burg:
Modelling alter egos in cyberspace: Who is responsible?
WebNet 1996 |
32 | | Reind P. van de Riet,
J. F. M. Burg:
Linguistic Tools for Modelling Alter Egos in Cyperspace: Who is responsible?
J. UCS 2(9): 623-636 (1996) |
1995 |
31 | | J. F. M. Burg,
Reind P. van de Riet:
COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling
CAiSE 1995: 26-39 |
30 | | Bram van der Vos,
Jon Atle Gulla,
Reind P. van de Riet:
Verification of Conceptual Models based on Linguistic Knowledge.
NLDB 1995: 0- |
29 | | J. F. M. Burg,
Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability.
NLDB 1995: 183-197 |
28 | EE | J. F. M. Burg,
Reind P. van de Riet:
COLOR-X Event Model: Integrated Specification of the Dynamics of Individual Objects.
OOER 1995: 146-157 |
1994 |
27 | | Reind P. van de Riet,
Jack Beukering:
The Integration of Security and Integrity Constraints in MOKUM.
DBSec 1994: 223-244 |
1993 |
26 | | Robert Croshere,
Reind P. van de Riet,
Alco Blom:
An Animation Facility to Simulate an Information and Communication System
CAiSE 1993: 547-568 |
25 | EE | J. F. M. Burg,
Reind P. van de Riet,
S. C. Chang:
A Data Dictionary as a Lexicon: An Application of Linguistics in Information Systems.
CIKM 1993: 114-123 |
1992 |
24 | | P. I. Elsas,
Reind P. van de Riet,
J. J. van Leeuwen:
Knowledge-based Audit Support.
DEXA 1992: 512-518 |
23 | EE | Paul Buitelaar,
Reind P. van de Riet:
The Use of a Lexicon to Interpret ER-Diagrams: A LIKE project.
ER 1992: 162-177 |
22 | | Frank Dignum,
Reind P. van de Riet:
Addition and removal of information for a knowledge base with incomplete information.
Data Knowl. Eng. 8: 293-307 (1992) |
1991 |
21 | | Frank Dignum,
Reind P. van de Riet:
Knowledge base modelling based on linguistics and founded in logic.
Data Knowl. Eng. 7: 1-34 (1991) |
1990 |
20 | | Reind P. van de Riet:
Introduction to the Special Issue on Deductive and Object-Oriented Databases.
Data Knowl. Eng. 5: 255-261 (1990) |
1989 |
19 | | Reind P. van de Riet:
MOKUM: An Object-Oriented Active Knowledge Base System.
Data Knowl. Eng. 4(1): 21-42 (1989) |
1988 |
18 | | Roel Wieringa,
Reind P. van de Riet:
Algebraic Specification of Object Dynamics in Knowledge Base Domains.
DS-3 1988: 411-436 |
1987 |
17 | | Frank Dignum,
T. Kemme,
W. Kreuzen,
Hans Weigand,
Reind P. van de Riet:
Constraint Modelling Using a Conceptual Prototyping Language.
Data Knowl. Eng. 2: 213-254 (1987) |
16 | | Wiebren de Jonge,
Andrew S. Tanenbaum,
Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees.
IEEE Trans. Software Eng. 13(7): 799-810 (1987) |
1986 |
15 | | Reind P. van de Riet:
Making Expert Systems Explicit - Response.
IFIP Congress 1986: 545-548 |
1984 |
14 | EE | Shamkant B. Navathe,
Reind P. van de Riet:
Databases for Expert Systems.
VLDB 1984: 257 |
1983 |
13 | EE | George L. Sicherman,
Wiebren de Jonge,
Reind P. van de Riet:
Answering Queries Without Revealing Secrets.
ACM Trans. Database Syst. 8(1): 41-59 (1983) |
12 | | Reind P. van de Riet,
Martin L. Kersten,
Wiebren de Jonge,
Anthony I. Wasserman:
Privacy and security in information systems using programming language features.
Inf. Syst. 8(2): 95-103 (1983) |
1981 |
11 | | Martin L. Kersten,
Reind P. van de Riet,
Wiebren de Jonge:
Privacy and Security in Distributed Database Systems.
DDSS 1981: 229-241 |
10 | | Reind P. van de Riet,
Martin L. Kersten:
A Module Definition Facility for Access Control in Communicating Data Base Systems.
DDSS 1981: 255-272 |
9 | EE | Reind P. van de Riet,
Anthony I. Wasserman,
Martin L. Kersten,
Wiebren de Jonge:
High-Level Programming Features for Improving the Efficiency of a Relational Database System.
ACM Trans. Database Syst. 6(3): 464-485 (1981) |
1980 |
8 | | Reind P. van de Riet,
Martin L. Kersten,
Anthony I. Wasserman:
A Module Definition Facility for Access Control in Distributed Data Base Systems.
IEEE Symposium on Security and Privacy 1980: 59-66 |
1979 |
7 | | Reind P. van de Riet:
Performance Evaluation of the BASIS System.
Performance 1979: 105-122 |
6 | | Reind P. van de Riet,
R. Wiggers:
Practice and Experience with BASIS: an Interactive Programming System for Introductory Courses in Informatics.
Softw., Pract. Exper. 9(6): 463-476 (1979) |
1977 |
5 | | Reind P. van de Riet:
BASIS - An Interactive System for the Introductory Course in Informatics.
IFIP Congress 1977: 347-351 |
1974 |
4 | | Reind P. van de Riet:
About ABC ALGOL: A Language for Formula Manipulation Systems.
IFIP Congress 1974: 222-225 |
1963 |
3 | EE | Reind P. van de Riet:
Certification of algorithm 73: incomplete elliptic integrals.
Commun. ACM 6(4): 167 (1963) |
2 | EE | Reind P. van de Riet:
Algorithm 186: complex arithmetic.
Commun. ACM 6(7): 386-387 (1963) |
1 | EE | Reind P. van de Riet:
Algorithm 187: differences and derivatives.
Commun. ACM 6(7): 387 (1963) |