Остановите войну!
for scientists:
default search action
Reind P. van de Riet
- > Home > Persons > Reind P. van de Riet
Publications
- 2003
- [j53]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in Using Databases. J. Comput. Secur. 11(3): 353-364 (2003) - 2002
- [j48]Bhavani Thuraisingham, Reind P. van de Riet:
Data and applications security (Guest editorial). Data Knowl. Eng. 43(3): 235-236 (2002) - 2001
- [j47]Frank K. H. A. Dehne, Ans A. G. Steuten, Reind P. van de Riet:
WORDNET++: A lexicon for the COLOR-X-method. Data Knowl. Eng. 38(1): 3-29 (2001) - [c34]Radu Serban, Reind P. van de Riet:
Enforcing policies with private guardians. SEMAS 2001: 140-158 - [e4]Bhavani Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari:
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. IFIP Conference Proceedings 201, Kluwer 2001, ISBN 0-7923-7514-9 [contents] - 2000
- [j45]Ans A. G. Steuten, Reind P. van de Riet, Jan L. G. Dietz:
Linguistically based conceptual modeling of business communication. Data Knowl. Eng. 35(2): 121-136 (2000) - [c33]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282 - [c32]Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold:
Panel. DBSec 2000: 367-371 - [c31]Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban:
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. DEXA 2000: 287-301 - [c29]Ans A. G. Steuten, Frank K. H. A. Dehne, Reind P. van de Riet:
WordNet++: A Lexicon Supporting the Color-X Method. NLDB 2000: 1-16 - 1999
- [j44]Ehud Gudes, Martin S. Olivier, Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace. J. Comput. Secur. 7(4): 287-315 (1999) - 1998
- [j43]Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn:
Internet security incidents, a survey within Dutch organizations. Comput. Secur. 17(5): 417-433 (1998) - [j40]J. F. M. Burg, Reind P. van de Riet:
Enhancing CASE Environments by Using Linguistics. Int. J. Softw. Eng. Knowl. Eng. 8(4): 435-448 (1998) - [c27]Reind P. van de Riet, Wouter Janssen, Peter de Gruijter:
Security Moving from Database Systems to ERP Systems. DEXA Workshop 1998: 273-280 - [c26]Martin S. Olivier, Reind P. van de Riet, Ehud Gudes:
Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 - [c25]Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn:
Internet Security Incidents, a Survey within Dutch Organisations. WebNet 1998 - 1997
- [j39]J. F. M. Burg, Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability. Data Knowl. Eng. 21(2): 131-146 (1997) - [j37]Reind P. van de Riet, Andrea Junk, Ehud Gudes:
Security in Cyberspace: A Knowledge-Base Approach. Data Knowl. Eng. 24(1): 69-96 (1997) - [c24]Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 - 1996
- [j36]Reind P. van de Riet, J. F. M. Burg:
Linguistic Tools for Modelling Alter Egos in Cyperspace: Who is responsible? J. Univers. Comput. Sci. 2(9): 623-636 (1996) - [c20]Reind P. van de Riet, Ehud Gudes:
An Object-Oriented Database Architecture for Providing Securty in Cyberspace. DBSec 1996: 120-144 - [c19]Reind P. van de Riet, J. F. M. Burg:
Modelling alter egos in cyberspace: Who is responsible? WebNet 1996 - 1995
- [c18]J. F. M. Burg, Reind P. van de Riet:
COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling. CAiSE 1995: 26-39 - [c17]J. F. M. Burg, Reind P. van de Riet:
COLOR-X Event Model: Integrated Specification of the Dynamics of Individual Objects. OOER 1995: 146-157 - [c16]J. F. M. Burg, Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability. NLDB 1995: 183-197 - 1993
- [c12]J. F. M. Burg, Reind P. van de Riet, S. C. Chang:
A Data Dictionary as a Lexicon: An Application of Linguistics in Information Systems. CIKM 1993: 114-123 - 1992
- [j33]Frank Dignum, Reind P. van de Riet:
Addition and removal of information for a knowledge base with incomplete information. Data Knowl. Eng. 8: 293-307 (1992) - 1991
- [j32]Frank Dignum, Reind P. van de Riet:
Knowledge base modelling based on linguistics and founded in logic. Data Knowl. Eng. 7: 1-34 (1991) - 1988
- [c9]Roel J. Wieringa, Reind P. van de Riet:
Algebraic Specification of Object Dynamics in Knowledge Base Domains. DS-3 1988: 411-436 - 1987
- [j29]Frank Dignum, T. Kemme, W. Kreuzen, Hans Weigand, Reind P. van de Riet:
Constraint Modelling Using a Conceptual Prototyping Language. Data Knowl. Eng. 2: 213-254 (1987) - [j14]Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees. IEEE Trans. Software Eng. 13(7): 799-810 (1987) - 1984
- [j9]Louis O. Hertzberger, Reind P. van de Riet:
Progress in the fifth generation inference architectures. Future Gener. Comput. Syst. 1(2): 93-102 (1984) - [c7]Shamkant B. Navathe, Reind P. van de Riet:
Databases for Expert Systems. VLDB 1984: 257 - [e2]Reind P. van de Riet, Witold Litwin:
Distributed Data Sharing Systems, Proceedings of the Third International Seminar on Distributed Data Sharing Systems, DDSS 1984, Parma, Italy, 28-30 March, 1984. North-Holland 1984, ISBN 0-444-87637-5 [contents] - 1983
- [j8]Reind P. van de Riet, Martin L. Kersten, Wiebren de Jonge, Anthony I. Wasserman:
Privacy and security in information systems using programming language features. Inf. Syst. 8(2): 95-103 (1983) - [j7]George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet:
Answering Queries Without Revealing Secrets. ACM Trans. Database Syst. 8(1): 41-59 (1983) - 1981
- [j6]Reind P. van de Riet, Anthony I. Wasserman, Martin L. Kersten, Wiebren de Jonge:
High-Level Programming Features for Improving the Efficiency of a Relational Database System. ACM Trans. Database Syst. 6(3): 464-485 (1981) - [c6]Martin L. Kersten, Reind P. van de Riet, Wiebren de Jonge:
Privacy and Security in Distributed Database Systems. DDSS 1981: 229-241 - [c5]Reind P. van de Riet, Martin L. Kersten:
A Module Definition Facility for Access Control in Communicating Data Base Systems. DDSS 1981: 255-272 - [e1]Reind P. van de Riet, Witold Litwin:
Distributed Data Sharing Systems, Proceedings of the Second International Seminar on Distributed Data Sharing Systems, DDSS 1981, Amsterdam, The Netherlands, 3-5 June, 1981. North-Holland 1981, ISBN 0-444-86374-5 [contents] - 1980
- [c4]Reind P. van de Riet, Martin L. Kersten, Anthony I. Wasserman:
A Module Definition Facility for Access Control in Distributed Data Base Systems. S&P 1980: 59-66
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-24 02:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint