Semantic interoperation via intelligent mediation
暂无分享,去创建一个
[1] Xiaolei Qian,et al. Inference channel-free integrity constraints in multilevel relational databases , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Timothy W. Finin,et al. Enabling Technology for Knowledge Sharing , 1991, AI Mag..
[3] Glenn H. MacEwen,et al. A logic for reasoning about security , 1992, TOCS.
[4] Jan Chomicki,et al. Declarative Definition of Object-Oriented Multidatabase Mappings , 1992, IWDOM.
[5] Vipul Kashyap,et al. So Far (Schematically) yet So Near (Semantically) , 1992, DS-5.
[6] Arnon Rosenthal,et al. Using semantic values to facilitate interoperability among heterogeneous information systems , 1994, TODS.
[7] LINDA G. DEMICHIEL,et al. Resolving Database Incompatibility: An Approach to Performing Relational Operations over Mismatched Domains , 1989, IEEE Trans. Knowl. Data Eng..
[8] Sushil Jajodia,et al. Eliminating polyinstantiation securely , 1992, Comput. Secur..
[9] Sushil Jajodia,et al. A novel decomposition of multilevel relations into single-level relations , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Dorothy E. Denning,et al. The SeaView Security Model , 1990, IEEE Trans. Software Eng..
[11] Gio Wiederhold,et al. Views, Objects, and Databases , 1986, Computer.
[12] Jack Minker,et al. Logic and Databases: A Deductive Approach , 1984, CSUR.
[13] Günther Pernul. Canonical Security Modeling for Federated Databases , 1992, DS-5.
[14] Bhavani M. Thuraisingham,et al. A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems , 1991, Proceedings Computer Security Foundations Workshop IV.
[15] Sushil Jajodia,et al. Polyinstantiation integrity in multilevel relations , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[17] Gultekin Özsoyoglu,et al. Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..
[18] Brian W. Beach,et al. Connecting software components with declarative glue , 1992, International Conference on Software Engineering.
[19] William Kent. Solving Domain Mismatch and Schema Mismatch Problems with an Object-Oriented Database Programming Language , 1991, VLDB.
[20] Nick Roussopoulos,et al. Interoperability of multiple autonomous databases , 1990, CSUR.
[21] Gio Wiederhold,et al. Mediators in the architecture of future information systems , 1992, Computer.
[22] Li Gong,et al. The complexity and composability of secure interoperation , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[23] Jeffrey D. Ullman,et al. Principles Of Database And Knowledge-Base Systems , 1979 .
[24] Dan Thomsen,et al. The LDV Secure Relational DBMS Model , 1990, DBSec.
[25] Karen R. Sollins,et al. Towards Security in an Open Systems Federation , 1992, ESORICS.
[26] Amit P. Sheth,et al. Semantic Issues in Multidatabase Systems - Preface by the Special Issue Editor , 1991, SIGMOD Rec..
[27] Sushil Jajodia,et al. A new polyinstantiation integrity constraint for multilevel relations , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[28] Ravi S. Sandhu. The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[29] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[30] Thierry Barsalou,et al. M(DM): an open framework for interoperation of multimodel multidatabase systems , 1992, [1992] Eighth International Conference on Data Engineering.
[31] Simon R. Wiseman. Control of confidentiality in databases , 1990, Comput. Secur..
[32] J. Lloyd. Foundations of Logic Programming , 1984, Symbolic Computation.
[33] Mahadev Satyanarayanan,et al. Integrating security in a large distributed system , 1989, TOCS.
[34] Ravi Krishnamurthy,et al. Language features for interoperability of databases with schematic discrepancies , 1991, SIGMOD '91.
[35] Rae K. Burns. Referential secrecy , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[36] Weimin Du,et al. Query Optimization in a Heterogeneous DBMS , 1992, VLDB.
[37] Zohar Manna,et al. The logical basis for computer programming , 1985 .
[38] Marianne Winslett,et al. Entity Modeling in the MLS Relational Model , 1992, VLDB.
[39] Thierry Barsalou,et al. On the semantic equivalence of heterogeneous representations in multimodel multidatabase systems , 1991, SGMD.
[40] Matthew L. Ginsberg,et al. Knowledge Interchange Format: the KIF of Death , 1991, AI Mag..
[41] Ronald Fagin,et al. Horn clauses and database dependencies , 1982, JACM.
[42] Gary W. Smith,et al. Modeling security-relevant data semantics , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[43] Michael Kifer,et al. Querying object-oriented databases , 1992, SIGMOD '92.
[44] Ronald J. Brachman,et al. The Future of Knowledge Representation , 1990, AAAI.