Search dblp for Publications

export results for "toc:db/journals/dke/dke43.bht:"

 download as .bib file

@article{DBLP:journals/dke/AyanLK02,
  author       = {Necip Fazil Ayan and
                  Wen{-}Syan Li and
                  Okan Kolak},
  title        = {Automating extraction of logical domains in a web site},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {2},
  pages        = {179--205},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00055-1},
  doi          = {10.1016/S0169-023X(02)00055-1},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/AyanLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/Barker02,
  author       = {Steve Barker},
  title        = {Protecting deductive databases from unauthorized retrieval and update
                  requests},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {293--315},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00126-X},
  doi          = {10.1016/S0169-023X(02)00126-X},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/Barker02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/BertinoCFM02,
  author       = {Elisa Bertino and
                  Silvana Castano and
                  Elena Ferrari and
                  Marco Mesiti},
  title        = {Protection and administration of {XML} data sources},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {237--260},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00127-1},
  doi          = {10.1016/S0169-023X(02)00127-1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dke/BertinoCFM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/BerzalCCM02,
  author       = {Fernando Berzal Galiano and
                  Juan C. Cubero and
                  Fernando Cuenca and
                  Juan Miguel Medina},
  title        = {Relational decomposition through partial functional dependencies},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {2},
  pages        = {207--234},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00056-3},
  doi          = {10.1016/S0169-023X(02)00056-3},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/BerzalCCM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/BhowmickMN02,
  author       = {Sourav S. Bhowmick and
                  Sanjay Madria and
                  Wee Keong Ng},
  title        = {What can a web bag discover for you?},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {1},
  pages        = {79--119},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00123-4},
  doi          = {10.1016/S0169-023X(02)00123-4},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/BhowmickMN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/CandanL02,
  author       = {K. Sel{\c{c}}uk Candan and
                  Wen{-}Syan Li},
  title        = {Reasoning for Web document associations and its applications in site
                  map construction},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {2},
  pages        = {121--150},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00053-8},
  doi          = {10.1016/S0169-023X(02)00053-8},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/CandanL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/ChapinFJF02,
  author       = {Susan Chapin and
                  Donald B. Faatz and
                  Sushil Jajodia and
                  Amgad Fayad},
  title        = {Consistent policy enforcement in distributed systems using mobile
                  policies},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {261--280},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00128-3},
  doi          = {10.1016/S0169-023X(02)00128-3},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/ChapinFJF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/GudesT02,
  author       = {Ehud Gudes and
                  Aharon Tubman},
  title        = {AutoWF - {A} secure Web workflow system using autonomous objects},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {1},
  pages        = {1--27},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00058-7},
  doi          = {10.1016/S0169-023X(02)00058-7},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/GudesT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/KimNKK02,
  author       = {Minsoo Kim and
                  Seung J. Noh and
                  Yeongho Kim and
                  Suk{-}Ho Kang},
  title        = {A customizable view for Web-based {STEP} data},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {1},
  pages        = {29--56},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00101-5},
  doi          = {10.1016/S0169-023X(02)00101-5},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/KimNKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/LiHPCA02,
  author       = {Wen{-}Syan Li and
                  Wang{-}Pin Hsiung and
                  Oliver Po and
                  K. Sel{\c{c}}uk Candan and
                  Divyakant Agrawal},
  title        = {Evaluations of architectural designs and implementation for database-driven
                  web sites},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {2},
  pages        = {151--177},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00054-X},
  doi          = {10.1016/S0169-023X(02)00054-X},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/LiHPCA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/NascimentoTCM02,
  author       = {Mario A. Nascimento and
                  Eleni Tousidou and
                  Vishal Chitkara and
                  Yannis Manolopoulos},
  title        = {Image indexing and retrieval using signature trees},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {1},
  pages        = {57--77},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00122-2},
  doi          = {10.1016/S0169-023X(02)00122-2},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/NascimentoTCM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/OlivierG02,
  author       = {Martin S. Olivier and
                  Ehud Gudes},
  title        = {Wrappers - a mechanism to support state-based authorisation in Web
                  applications},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {281--292},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00129-5},
  doi          = {10.1016/S0169-023X(02)00129-5},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/OlivierG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/Osborn02,
  author       = {Sylvia L. Osborn},
  title        = {Integrating role graphs: a tool for security integration},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {317--333},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00130-1},
  doi          = {10.1016/S0169-023X(02)00130-1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/Osborn02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/ThuraisinghamR02,
  author       = {Bhavani Thuraisingham and
                  Reind P. van de Riet},
  title        = {Data and applications security (Guest editorial)},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {235--236},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00125-8},
  doi          = {10.1016/S0169-023X(02)00125-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/ThuraisinghamR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics