| 2008 | 
|---|
| 73 | EE | Reind P. van de Riet:
Mokum for Correctness by Design in Relation to MDA.
UNISCON 2008: 352-364 | 
| 72 | EE | Reind P. van de Riet:
Introduction to the special issue on DKE 25 years.
Data Knowl. Eng. 67(2): 219 (2008) | 
| 71 | EE | Reind P. van de Riet:
Thank you referees, authors and readers of DKE.
Data Knowl. Eng. 67(2): 220-233 (2008) | 
| 70 | EE | Reind P. van de Riet:
Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace.
Data Knowl. Eng. 67(2): 293-329 (2008) | 
| 2004 | 
|---|
| 69 | EE | Reind P. van de Riet:
Editorial Introduction by the Editor for Europe.
Data Knowl. Eng. 50(3): 247-260 (2004) | 
| 68 | EE | Reind P. van de Riet:
The future refereeing process in Cyberspace of the Data & Knowledge Engineering Journal: an attempt in guaranteeing security and privacy on three levels.
Data Knowl. Eng. 50(3): 305-339 (2004) | 
| 2003 | 
|---|
| 67 |  | Wouter Teepe,
Reind P. van de Riet,
Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in Using Databases.
Journal of Computer Security 11(3): 353-364 (2003) | 
| 2002 | 
|---|
| 66 | EE | Peter P. Chen,
Reind P. van de Riet:
Editorial introduction.
Data Knowl. Eng. 41(2-3): 125-132 (2002) | 
| 65 | EE | Reind P. van de Riet:
Notes on a classification for DKE.
Data Knowl. Eng. 41(2-3): 133-139 (2002) | 
| 64 | EE | Reind P. van de Riet:
Peter Chen honoured with the Stevens Award for advancing software development methods.
Data Knowl. Eng. 41(2-3): 273-282 (2002) | 
| 63 | EE | Ana M. Moreno-Capuchino,
Reind P. van de Riet:
Guest editorial: Special issue NLDB '01.
Data Knowl. Eng. 42(3): 247-249 (2002) | 
| 62 | EE | Bhavani M. Thuraisingham,
Reind P. van de Riet:
Data and applications security (Guest editorial).
Data Knowl. Eng. 43(3): 235-236 (2002) | 
| 2001 | 
|---|
| 61 |  | Ana María Moreno,
Reind P. van de Riet:
Applications of Natural Language to Information Systems, 6th International Workshop NLDB'01, June 28-29, 2001, Madrid, Spain, Proceedings
GI 2001 | 
| 60 |  | Bhavani M. Thuraisingham,
Reind P. van de Riet,
Klaus R. Dittrich,
Zahir Tari:
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000
Kluwer 2001 | 
| 59 | EE | Frank K. H. A. Dehne,
Ans A. G. Steuten,
Reind P. van de Riet:
WORDNET++: A lexicon for the COLOR-X-method.
Data Knowl. Eng. 38(1): 3-29 (2001) | 
| 58 | EE | Radu Serban,
Reind P. van de Riet:
Enforcing policies with private guardians.
Electr. Notes Theor. Comput. Sci. 63:  (2001) | 
| 2000 | 
|---|
| 57 |  | Wouter Teepe,
Reind P. van de Riet,
Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases.
DBSec 2000: 271-282 | 
| 56 |  | Reind P. van de Riet,
Raban Serban,
Sylvia L. Osborn,
Arnon Rosenthal,
Vijayalakshmi Atluri,
Joachim Biskup,
Gio Wiederhold:
Panel.
DBSec 2000: 373 | 
| 55 | EE | Reind P. van de Riet,
Wouter Janssen,
Martin S. Olivier,
Radu Serban:
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace.
DEXA 2000: 287-301 | 
| 54 | EE | P. R. Griffioen,
P. I. Elsas,
Reind P. van de Riet:
Analysing Enterprises: The Value Cycle Approach.
DEXA 2000: 685-697 | 
| 53 | EE | Ans A. G. Steuten,
Frank K. H. A. Dehne,
Reind P. van de Riet:
WordNet++: A Lexicon Supporting the Color-X Method.
NLDB 2000: 1-16 | 
| 52 | EE | Ana M. Moreno-Capuchino,
Natalia Juristo Juzgado,
Reind P. van de Riet:
Formal justification in object-oriented modelling: A linguistic approach.
Data Knowl. Eng. 33(1): 25-47 (2000) | 
| 51 | EE | Ans A. G. Steuten,
Reind P. van de Riet,
Jan L. G. Dietz:
Linguistically based conceptual modeling of business communication.
Data Knowl. Eng. 35(2): 121-136 (2000) | 
| 1999 | 
|---|
| 50 |  | Ehud Gudes,
Martin S. Olivier,
Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace.
Journal of Computer Security 7(4):  (1999) | 
| 1998 | 
|---|
| 49 |  | P. I. Elsas,
P. M. Ott de Vries,
Reind P. van de Riet:
Computing Conspiracies.
DEXA Workshop 1998: 256-266 | 
| 48 |  | Reind P. van de Riet,
Wouter Janssen,
Peter de Gruijter:
Security Moving from Database Systems to ERP Systems.
DEXA Workshop 1998: 273-280 | 
| 47 |  | Martin S. Olivier,
Reind P. van de Riet,
Ehud Gudes:
Specifying Application-Level Security in Workflow Systems.
DEXA Workshop 1998: 346-351 | 
| 46 |  | Martin Caminada,
Reind P. van de Riet,
Arjen van Zanten,
Leendert van Doorn:
Internet Security Incidents, a Survey within Dutch Organisations.
WebNet 1998 | 
| 45 | EE | Martin Caminada,
Reind P. van de Riet,
Arjen van Zanten,
Leendert van Doorn:
Internet security incidents, a survey within Dutch organizations.
Computers & Security 17(5): 417-433 (1998) | 
| 44 | EE | Peter P. Chen,
Reind P. van de Riet:
Introduction to the Special Issue Celebrating the 25th Volume of Data & Knowledge Engineering: DKE.
Data Knowl. Eng. 25(1-2): 1-9 (1998) | 
| 43 | EE | Reind P. van de Riet:
Complex Objects: Theory and Practice from a Data- and Knowledge Engineering Perspective, as Seen in and from Yellostone Park.
Data Knowl. Eng. 25(1-2): 217-238 (1998) | 
| 42 | EE | J. F. M. Burg,
Reind P. van de Riet:
Enhancing CASE Environments by Using Linguistics.
International Journal of Software Engineering and Knowledge Engineering 8(4): 435-448 (1998) | 
| 1997 | 
|---|
| 41 |  | Ehud Gudes,
Reind P. van de Riet,
J. F. M. Burg,
Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
DBSec 1997: 182-195 | 
| 40 |  | Reind P. van de Riet:
Research in the SIKS Research School: An Example of a Cooperation in Using Linguistic Tools for Requirements Specification in Cyberspace.
GI Jahrestagung 1997: 505 | 
| 39 |  | Reind P. van de Riet,
Hans F. M. Burg:
Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy?
WebNet 1997 | 
| 38 |  | M. O. Froehlich,
Reind P. van de Riet:
Text Generation in Business Object Frameworks.
WebNet 1997 | 
| 37 | EE | J. F. M. Burg,
Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability.
Data Knowl. Eng. 21(2): 131-146 (1997) | 
| 36 | EE | Bram van der Vos,
Jon Atle Gulla,
Reind P. van de Riet:
Verification of Conceptual Models Based on Linguistic Knowledge.
Data Knowl. Eng. 21(2): 147-163 (1997) | 
| 35 | EE | Reind P. van de Riet,
Andrea Junk,
Ehud Gudes:
Security in Cyberspace: A Knowledge-Base Approach.
Data Knowl. Eng. 24(1): 69-96 (1997) | 
| 1996 | 
|---|
| 34 |  | Reind P. van de Riet,
Ehud Gudes:
An Object-Oriented Database Architecture for Providing Securty in Cyberspace.
DBSec 1996: 120-144 | 
| 33 |  | Reind P. van de Riet,
J. F. M. Burg:
Modelling alter egos in cyberspace: Who is responsible?
WebNet 1996 | 
| 32 |  | Reind P. van de Riet,
J. F. M. Burg:
Linguistic Tools for Modelling Alter Egos in Cyperspace: Who is responsible?
J. UCS 2(9): 623-636 (1996) | 
| 1995 | 
|---|
| 31 |  | J. F. M. Burg,
Reind P. van de Riet:
COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling
CAiSE 1995: 26-39 | 
| 30 |  | Bram van der Vos,
Jon Atle Gulla,
Reind P. van de Riet:
Verification of Conceptual Models based on Linguistic Knowledge.
NLDB 1995: 0- | 
| 29 |  | J. F. M. Burg,
Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability.
NLDB 1995: 183-197 | 
| 28 | EE | J. F. M. Burg,
Reind P. van de Riet:
COLOR-X Event Model: Integrated Specification of the Dynamics of Individual Objects.
OOER 1995: 146-157 | 
| 1994 | 
|---|
| 27 |  | Reind P. van de Riet,
Jack Beukering:
The Integration of Security and Integrity Constraints in MOKUM.
DBSec 1994: 223-244 | 
| 1993 | 
|---|
| 26 |  | Robert Croshere,
Reind P. van de Riet,
Alco Blom:
An Animation Facility to Simulate an Information and Communication System
CAiSE 1993: 547-568 | 
| 25 | EE | J. F. M. Burg,
Reind P. van de Riet,
S. C. Chang:
A Data Dictionary as a Lexicon: An Application of Linguistics in Information Systems.
CIKM 1993: 114-123 | 
| 1992 | 
|---|
| 24 |  | P. I. Elsas,
Reind P. van de Riet,
J. J. van Leeuwen:
Knowledge-based Audit Support.
DEXA 1992: 512-518 | 
| 23 | EE | Paul Buitelaar,
Reind P. van de Riet:
The Use of a Lexicon to Interpret ER-Diagrams: A LIKE project.
ER 1992: 162-177 | 
| 22 |  | Frank Dignum,
Reind P. van de Riet:
Addition and removal of information for a knowledge base with incomplete information.
Data Knowl. Eng. 8: 293-307 (1992) | 
| 1991 | 
|---|
| 21 |  | Frank Dignum,
Reind P. van de Riet:
Knowledge base modelling based on linguistics and founded in logic.
Data Knowl. Eng. 7: 1-34 (1991) | 
| 1990 | 
|---|
| 20 |  | Reind P. van de Riet:
Introduction to the Special Issue on Deductive and Object-Oriented Databases.
Data Knowl. Eng. 5: 255-261 (1990) | 
| 1989 | 
|---|
| 19 |  | Reind P. van de Riet:
MOKUM: An Object-Oriented Active Knowledge Base System.
Data Knowl. Eng. 4(1): 21-42 (1989) | 
| 1988 | 
|---|
| 18 |  | Roel Wieringa,
Reind P. van de Riet:
Algebraic Specification of Object Dynamics in Knowledge Base Domains.
DS-3 1988: 411-436 | 
| 1987 | 
|---|
| 17 |  | Frank Dignum,
T. Kemme,
W. Kreuzen,
Hans Weigand,
Reind P. van de Riet:
Constraint Modelling Using a Conceptual Prototyping Language.
Data Knowl. Eng. 2: 213-254 (1987) | 
| 16 |  | Wiebren de Jonge,
Andrew S. Tanenbaum,
Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees.
IEEE Trans. Software Eng. 13(7): 799-810 (1987) | 
| 1986 | 
|---|
| 15 |  | Reind P. van de Riet:
Making Expert Systems Explicit - Response.
IFIP Congress 1986: 545-548 | 
| 1984 | 
|---|
| 14 | EE | Shamkant B. Navathe,
Reind P. van de Riet:
Databases for Expert Systems.
VLDB 1984: 257 | 
| 1983 | 
|---|
| 13 | EE | George L. Sicherman,
Wiebren de Jonge,
Reind P. van de Riet:
Answering Queries Without Revealing Secrets.
ACM Trans. Database Syst. 8(1): 41-59 (1983) | 
| 12 |  | Reind P. van de Riet,
Martin L. Kersten,
Wiebren de Jonge,
Anthony I. Wasserman:
Privacy and security in information systems using programming language features.
Inf. Syst. 8(2): 95-103 (1983) | 
| 1981 | 
|---|
| 11 |  | Martin L. Kersten,
Reind P. van de Riet,
Wiebren de Jonge:
Privacy and Security in Distributed Database Systems.
DDSS 1981: 229-241 | 
| 10 |  | Reind P. van de Riet,
Martin L. Kersten:
A Module Definition Facility for Access Control in Communicating Data Base Systems.
DDSS 1981: 255-272 | 
| 9 | EE | Reind P. van de Riet,
Anthony I. Wasserman,
Martin L. Kersten,
Wiebren de Jonge:
High-Level Programming Features for Improving the Efficiency of a Relational Database System.
ACM Trans. Database Syst. 6(3): 464-485 (1981) | 
| 1980 | 
|---|
| 8 |  | Reind P. van de Riet,
Martin L. Kersten,
Anthony I. Wasserman:
A Module Definition Facility for Access Control in Distributed Data Base Systems.
IEEE Symposium on Security and Privacy 1980: 59-66 | 
| 1979 | 
|---|
| 7 |  | Reind P. van de Riet:
Performance Evaluation of the BASIS System.
Performance 1979: 105-122 | 
| 6 |  | Reind P. van de Riet,
R. Wiggers:
Practice and Experience with BASIS: an Interactive Programming System for Introductory Courses in Informatics.
Softw., Pract. Exper. 9(6): 463-476 (1979) | 
| 1977 | 
|---|
| 5 |  | Reind P. van de Riet:
BASIS - An Interactive System for the Introductory Course in Informatics.
IFIP Congress 1977: 347-351 | 
| 1974 | 
|---|
| 4 |  | Reind P. van de Riet:
About ABC ALGOL: A Language for Formula Manipulation Systems.
IFIP Congress 1974: 222-225 | 
| 1963 | 
|---|
| 3 | EE | Reind P. van de Riet:
Certification of algorithm 73: incomplete elliptic integrals.
Commun. ACM 6(4): 167 (1963) | 
| 2 | EE | Reind P. van de Riet:
Algorithm 186: complex arithmetic.
Commun. ACM 6(7): 386-387 (1963) | 
| 1 | EE | Reind P. van de Riet:
Algorithm 187: differences and derivatives.
Commun. ACM 6(7): 387 (1963) |