Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Willem Jonker
@article{DBLP:journals/dcc/KampPJ20, author = {Tim van de Kamp and Andreas Peter and Willem Jonker}, title = {A multi-authority approach to various predicate encryption types}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {363--390}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00686-x}, doi = {10.1007/S10623-019-00686-X}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KampPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BortolameottiEC20, author = {Riccardo Bortolameotti and Thijs van Ede and Andrea Continella and Thomas Hupperich and Maarten H. Everts and Reza Rafati and Willem Jonker and Pieter H. Hartel and Andreas Peter}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {HeadPrint: detecting anomalous communications through header-based application fingerprinting}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {1696--1705}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373862}, doi = {10.1145/3341105.3373862}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BortolameottiEC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KampSJP19, author = {Tim van de Kamp and David Stritzl and Willem Jonker and Andreas Peter}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Two-Client and Multi-client Functional Encryption for Set Intersection}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {97--115}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_6}, doi = {10.1007/978-3-030-21548-4\_6}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KampSJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BortolameottiEC19, author = {Riccardo Bortolameotti and Thijs van Ede and Andrea Continella and Maarten H. Everts and Willem Jonker and Pieter H. Hartel and Andreas Peter}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Victim-Aware Adaptive Covert Channels}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {450--471}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6\_22}, doi = {10.1007/978-3-030-37228-6\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/BortolameottiEC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KampPEJ18, author = {Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker}, title = {Multi-client Predicate-only Encryption for Conjunctive Equality Tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2018}, url = {https://eprint.iacr.org/2018/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KampPEJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BortolameottiEC17, author = {Riccardo Bortolameotti and Thijs van Ede and Marco Caselli and Maarten H. Everts and Pieter H. Hartel and Rick Hofstede and Willem Jonker and Andreas Peter}, title = {DECANTeR: DEteCtion of Anomalous outbouNd {HTTP} TRaffic by Passive Application Fingerprinting}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {373--386}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134605}, doi = {10.1145/3134600.3134605}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BortolameottiEC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KampPEJ17, author = {Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {Multi-client Predicate-Only Encryption for Conjunctive Equality Tests}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {135--157}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_7}, doi = {10.1007/978-3-030-02641-7\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/KampPEJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BortolameottiPE16, author = {Riccardo Bortolameotti and Andreas Peter and Maarten H. Everts and Willem Jonker and Pieter H. Hartel}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Reliably determining data leakage in the presence of strong attackers}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {484--495}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991095}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BortolameottiPE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KampPEJ16, author = {Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Private Sharing of IOCs and Sightings}, booktitle = {Proceedings of the 2016 {ACM} on Workshop on Information Sharing and Collaborative Security, {WISCS} 2016, Vienna, Austria, October 24 - 28, 2016}, pages = {35--38}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994544}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KampPEJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BakondiPEHJ15, author = {Bence Gabor Bakondi and Andreas Peter and Maarten H. Everts and Pieter H. Hartel and Willem Jonker}, title = {Publicly Verifiable Private Aggregation of Time-Series Data}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {50--59}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.82}, doi = {10.1109/ARES.2015.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BakondiPEHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BoschHJP14, author = {Christoph B{\"{o}}sch and Pieter H. Hartel and Willem Jonker and Andreas Peter}, title = {A Survey of Provably Secure Searchable Encryption}, journal = {{ACM} Comput. Surv.}, volume = {47}, number = {2}, pages = {18:1--18:51}, year = {2014}, url = {https://doi.org/10.1145/2636328}, doi = {10.1145/2636328}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BoschHJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/BoschPHJ14, author = {Christoph B{\"{o}}sch and Andreas Peter and Pieter H. Hartel and Willem Jonker}, title = {{SOFIR:} Securely outsourced Forensic image recognition}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2014, Florence, Italy, May 4-9, 2014}, pages = {2694--2698}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICASSP.2014.6854089}, doi = {10.1109/ICASSP.2014.6854089}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/BoschPHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BoschPLLTWHJ14, author = {Christoph B{\"{o}}sch and Andreas Peter and Bram Leenders and Hoon Wei Lim and Qiang Tang and Huaxiong Wang and Pieter H. Hartel and Willem Jonker}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Distributed Searchable Symmetric Encryption}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {330--337}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890956}, doi = {10.1109/PST.2014.6890956}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BoschPLLTWHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2013, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06811-4}, doi = {10.1007/978-3-319-06811-4}, isbn = {978-3-319-06810-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JonkerP13, author = {Willem Jonker and Milan Petkovic}, editor = {Willem Jonker and Milan Petkovic}, title = {Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {54--58}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_11}, doi = {10.1007/978-3-319-06811-4\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JonkerP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MakriEHPAHJ13, author = {Eleftheria Makri and Maarten H. Everts and Sebastiaan de Hoogh and Andreas Peter and Harm op den Akker and Pieter H. Hartel and Willem Jonker}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Privacy-Preserving Verification of Clinical Research}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {481--500}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/20065}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MakriEHPAHJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BoschTHJ12, author = {Christoph B{\"{o}}sch and Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Selective Document Retrieval from Encrypted Database}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {224--241}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_14}, doi = {10.1007/978-3-642-33383-5\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BoschTHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2012, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2}, doi = {10.1007/978-3-642-32873-2}, isbn = {978-3-642-32872-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/IbraimiNHJ11, author = {Luan Ibraimi and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Public-Key Encryption with Delegated Search}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {532--549}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_31}, doi = {10.1007/978-3-642-21554-4\_31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/IbraimiNHJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SedghiHJN11, author = {Saeed Sedghi and Pieter H. Hartel and Willem Jonker and Svetla Nikova}, editor = {Feng Bao and Jian Weng}, title = {Privacy Enhanced Access Control by Means of Policy Blinding}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {108--122}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_9}, doi = {10.1007/978-3-642-21031-0\_9}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SedghiHJN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BoschBHJ11, author = {Christoph B{\"{o}}sch and Richard Brinkman and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Conjunctive Wildcard Search over Encrypted Data}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {114--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_8}, doi = {10.1007/978-3-642-23556-6\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BoschBHJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2011, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6}, doi = {10.1007/978-3-642-23556-6}, isbn = {978-3-642-23555-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmam/IbraimiTHJ10, author = {Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker}, title = {Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records}, journal = {Int. J. Comput. Model. Algorithms Medicine}, volume = {1}, number = {2}, pages = {1--21}, year = {2010}, url = {https://doi.org/10.4018/jcmam.2010040101}, doi = {10.4018/JCMAM.2010040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmam/IbraimiTHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/KelkboomMBVKJ10, author = {Emile J. C. Kelkboom and Gary Garcia Molina and Jeroen Breebaart and Raymond N. J. Veldhuis and Tom A. M. Kevenaar and Willem Jonker}, title = {Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {A}}, volume = {40}, number = {3}, pages = {555--571}, year = {2010}, url = {https://doi.org/10.1109/TSMCA.2010.2041657}, doi = {10.1109/TSMCA.2010.2041657}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/KelkboomMBVKJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/SedghiLNHJ10, author = {Saeed Sedghi and Peter van Liesdonk and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Searching Keywords with Wildcards on Encrypted Data}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {138--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_10}, doi = {10.1007/978-3-642-15317-4\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/SedghiLNHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LiesdonkSDHJ10, author = {Peter van Liesdonk and Saeed Sedghi and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Computationally Efficient Searchable Symmetric Encryption}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {87--100}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_7}, doi = {10.1007/978-3-642-15546-8\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/LiesdonkSDHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2010, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8}, doi = {10.1007/978-3-642-15546-8}, isbn = {978-3-642-15545-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PetkovicJ09, author = {Milan Petkovic and Willem Jonker}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {1--3}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0326}, doi = {10.3233/JCS-2009-0326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PetkovicJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/IbraimiTHJ09, author = {Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {1--12}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_1}, doi = {10.1007/978-3-642-00843-6\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/IbraimiTHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IbraimiPNHJ09, author = {Luan Ibraimi and Milan Petkovic and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Heung Youl Youm and Moti Yung}, title = {Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {309--323}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_23}, doi = {10.1007/978-3-642-10838-9\_23}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IbraimiPNHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2009, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5}, doi = {10.1007/978-3-642-04219-5}, isbn = {978-3-642-04218-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZychPJ08, author = {Anna Zych and Milan Petkovic and Willem Jonker}, title = {Efficient key management for cryptographically enforced access control}, journal = {Comput. Stand. Interfaces}, volume = {30}, number = {6}, pages = {410--417}, year = {2008}, url = {https://doi.org/10.1016/j.csi.2008.03.009}, doi = {10.1016/J.CSI.2008.03.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ZychPJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TangHJ08, author = {Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Inter-domain Identity-Based Proxy Re-encryption}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {332--347}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_26}, doi = {10.1007/978-3-642-01440-6\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TangHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SedghiDHJ08, author = {Saeed Sedghi and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Towards an Information Theoretic Analysis of Searchable Encryption}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {345--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_23}, doi = {10.1007/978-3-540-88625-9\_23}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/SedghiDHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/IbraimiTHJ08, author = {Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {185--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_12}, doi = {10.1007/978-3-540-85259-9\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/IbraimiTHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2008, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9}, doi = {10.1007/978-3-540-85259-9}, isbn = {978-3-540-85258-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZychPJ07, author = {Anna Zych and Milan Petkovic and Willem Jonker}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {95--97}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_8}, doi = {10.1007/978-3-540-73538-0\_8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZychPJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/ZychPJ07, author = {Anna Zych and Milan Petkovic and Willem Jonker}, editor = {Mariemma Inmaculada Yag{\"{u}}e del Valle and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {A Key Management Method for Cryptographically Enforced Access Control}, booktitle = {Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007}, pages = {9--22}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Thu, 24 Jan 2008 19:53:15 +0100}, biburl = {https://dblp.org/rec/conf/sis/ZychPJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/PetkovicJ07, author = {Milan Petkovic and Willem Jonker}, editor = {Milan Petkovic and Willem Jonker}, title = {Privacy and Security Issues in a Digital World}, booktitle = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, pages = {3--10}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6\_1}, doi = {10.1007/978-3-540-69861-6\_1}, timestamp = {Tue, 16 May 2017 14:01:42 +0200}, biburl = {https://dblp.org/rec/books/sp/07/PetkovicJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/PetkovicJB07, author = {Milan Petkovic and Willem Jonker and Henk M. Blanken}, editor = {Henk M. Blanken and Henk Ernst Blok and Ling Feng and Arjen P. de Vries}, title = {A Spatio-Temporal and a Probabilistic Approach for Video Retrieval}, booktitle = {Multimedia Retrieval}, series = {Data-Centric Systems and Applications}, pages = {251--269}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72895-5\_9}, doi = {10.1007/978-3-540-72895-5\_9}, timestamp = {Tue, 16 May 2017 14:01:43 +0200}, biburl = {https://dblp.org/rec/books/sp/07/PetkovicJB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Jonker07, author = {Willem Jonker}, editor = {Milan Petkovic and Willem Jonker}, title = {An Introduction to Digital Rights Management Systems}, booktitle = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, pages = {257--265}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6\_17}, doi = {10.1007/978-3-540-69861-6\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/Jonker07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/MihajlovicPJB07, author = {Vojkan Mihajlovic and Milan Petkovic and Willem Jonker and Henk M. Blanken}, editor = {Henk M. Blanken and Henk Ernst Blok and Ling Feng and Arjen P. de Vries}, title = {Multimodal Content-based Video Retrieval}, booktitle = {Multimedia Retrieval}, series = {Data-Centric Systems and Applications}, pages = {271--294}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72895-5\_10}, doi = {10.1007/978-3-540-72895-5\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/MihajlovicPJB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/KosterJ07, author = {R. Paul Koster and Willem Jonker}, editor = {Henk M. Blanken and Henk Ernst Blok and Ling Feng and Arjen P. de Vries}, title = {Digital Rights Management}, booktitle = {Multimedia Retrieval}, series = {Data-Centric Systems and Applications}, pages = {321--345}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72895-5\_12}, doi = {10.1007/978-3-540-72895-5\_12}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/KosterJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/PetkovicCSJ07, author = {Milan Petkovic and Claudine Conrado and Geert Jan Schrijen and Willem Jonker}, editor = {Milan Petkovic and Willem Jonker}, title = {Enhancing Privacy for Digital Rights Management}, booktitle = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, pages = {347--364}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6\_23}, doi = {10.1007/978-3-540-69861-6\_23}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/PetkovicCSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/PJ2007, editor = {Milan Petkovic and Willem Jonker}, title = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6}, doi = {10.1007/978-3-540-69861-6}, isbn = {978-3-540-69860-9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/PJ2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2007, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6}, doi = {10.1007/978-3-540-75248-6}, isbn = {978-3-540-75247-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/SmiljanicKJ06, author = {Marko Smiljanic and Maurice van Keulen and Willem Jonker}, editor = {Roger S. Barga and Xiaofang Zhou}, title = {Using Element Clustering to Increase the Efficiency of {XML} Schema Matching}, booktitle = {Proceedings of the 22nd International Conference on Data Engineering Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}}, pages = {45}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDEW.2006.159}, doi = {10.1109/ICDEW.2006.159}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/SmiljanicKJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/SmiljanicKJ06a, author = {Marko Smiljanic and Maurice van Keulen and Willem Jonker}, editor = {Roger S. Barga and Xiaofang Zhou}, title = {Effectiveness Bounds for Non-Exhaustive Schema Matching Systems}, booktitle = {Proceedings of the 22nd International Conference on Data Engineering Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}}, pages = {83}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDEW.2006.51}, doi = {10.1109/ICDEW.2006.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/SmiljanicKJ06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2006, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662}, doi = {10.1007/11844662}, isbn = {978-3-540-38984-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/SmiljanicKJ05, author = {Marko Smiljanic and Maurice van Keulen and Willem Jonker}, editor = {Kim Viborg Andersen and John K. Debenham and Roland R. Wagner}, title = {Formalizing the {XML} Schema Matching Problem as a Constraint Optimization Problem}, booktitle = {Database and Expert Systems Applications, 16th International Conference, {DEXA} 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3588}, pages = {333--342}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11546924\_33}, doi = {10.1007/11546924\_33}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/SmiljanicKJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/WombacherWJKP05, author = {Andreas Wombacher and Roel J. Wieringa and Willem Jonker and Predrag Knezevic and Stanislav Pokraev}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero and Gonzalo M{\'{e}}ndez and Lawrence Cavedon and David B. Martin and Annika Hinze and George Buchanan and Mar{\'{\i}}a S. P{\'{e}}rez and V{\'{\i}}ctor Robles and Jan Humble and Antonia Albani and Jan L. G. Dietz and Herv{\'{e}} Panetto and Monica Scannapieco and Terry A. Halpin and Peter Spyns and Johannes Maria Zaha and Esteban Zim{\'{a}}nyi and Emmanuel Stefanakis and Tharam S. Dillon and Ling Feng and Mustafa Jarrar and Jos Lehmann and Aldo de Moor and Erik Duval and Lora Aroyo}, title = {Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions}, booktitle = {On the Move to Meaningful Internet Systems 2005: {OTM} 2005 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, GADA, MIOS+INTEROP, ORM, PhDS, SeBGIS, SWWS, and {WOSE} 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3762}, pages = {526--536}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11575863\_72}, doi = {10.1007/11575863\_72}, timestamp = {Tue, 11 Apr 2023 12:52:01 +0200}, biburl = {https://dblp.org/rec/conf/otm/WombacherWJKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrinkmanSDJ05, author = {Richard Brinkman and Berry Schoenmakers and Jeroen Doumen and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Experiments with Queries over Encrypted Data Using Secret Sharing}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {33--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_3}, doi = {10.1007/11552338\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrinkmanSDJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2005, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338}, doi = {10.1007/11552338}, isbn = {3-540-28798-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/FengJ04, author = {Ling Feng and Willem Jonker}, title = {Preparations for encrypted {XML} metadata querying}, journal = {Comput. Syst. Sci. Eng.}, volume = {19}, number = {3}, year = {2004}, timestamp = {Tue, 20 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/FengJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BrinkmanFDHJ04, author = {Richard Brinkman and Ling Feng and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, title = {Efficient Tree Search in Encrypted Data}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {14--21}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83065.3}, doi = {10.1201/1086/44530.13.3.20040701/83065.3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BrinkmanFDHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/PetkovicJ04, author = {Milan Petkovic and Willem Jonker}, title = {Integrated use of different content derivation techniques within a multimedia database management system}, journal = {J. Vis. Commun. Image Represent.}, volume = {15}, number = {3}, pages = {303--329}, year = {2004}, url = {https://doi.org/10.1016/j.jvcir.2004.04.001}, doi = {10.1016/J.JVCIR.2004.04.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/PetkovicJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spm/JonkerL04, author = {Willem Jonker and Jean{-}Paul M. G. Linnartz}, title = {Digital rights management in consumer electronics products}, journal = {{IEEE} Signal Process. Mag.}, volume = {21}, number = {2}, pages = {82--91}, year = {2004}, url = {https://doi.org/10.1109/MSP.2004.1276116}, doi = {10.1109/MSP.2004.1276116}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spm/JonkerL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/FengAJ04, author = {Ling Feng and Peter M. G. Apers and Willem Jonker}, editor = {Fernando Galindo and Makoto Takizawa and Roland Traunm{\"{u}}ller}, title = {Towards Context-Aware Data Management for Ambient Intelligence}, booktitle = {Database and Expert Systems Applications, 15th International Conference, {DEXA} 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3180}, pages = {422--431}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30075-5\_41}, doi = {10.1007/978-3-540-30075-5\_41}, timestamp = {Sat, 30 Sep 2023 09:38:52 +0200}, biburl = {https://dblp.org/rec/conf/dexa/FengAJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrinkmanDJ04, author = {Richard Brinkman and Jeroen Doumen and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Using Secret Sharing for Searching in Encrypted Data}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {18--27}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_2}, doi = {10.1007/978-3-540-30073-1\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrinkmanDJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ConradoPJ04, author = {Claudine Conrado and Milan Petkovic and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy-Preserving Digital Rights Management}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {83--99}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_7}, doi = {10.1007/978-3-540-30073-1\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ConradoPJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/BrinkmanFDHJ04, author = {Richard Brinkman and Ling Feng and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Efficient Tree Search in Encrypted Data}, booktitle = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, pages = {126--135}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Tue, 14 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/BrinkmanFDHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2004, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99822}, doi = {10.1007/B99822}, isbn = {3-540-22983-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0031003, author = {Milan Petkovic and Willem Jonker}, title = {Content-Based Video Retrieval - {A} Database Perspective}, series = {Multimedia systems and applications}, volume = {25}, publisher = {Springer}, year = {2003}, url = {http://www.springer.com/computer/security+and+cryptology/book/978-1-4020-7617-6}, isbn = {978-1-4419-5396-4}, timestamp = {Fri, 31 May 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0031003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/Jonker03, author = {Willem Jonker}, title = {{XML} and secure data management in an ambient world}, journal = {Comput. Syst. Sci. Eng.}, volume = {18}, number = {5}, pages = {311--317}, year = {2003}, timestamp = {Wed, 05 May 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/Jonker03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/ConradoKSJ03, author = {Claudine Conrado and Frank Kamperman and Geert Jan Schrijen and Willem Jonker}, title = {Privacy in an Identity-based {DRM} System}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {389--395}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232053}, doi = {10.1109/DEXA.2003.1232053}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexaw/ConradoKSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/PetkovicMJ03, author = {Milan Petkovic and Vojkan Mihajlovic and Willem Jonker}, title = {Techniques for automatic video content derivation}, booktitle = {Proceedings of the 2003 International Conference on Image Processing, {ICIP} 2003, Barcelona, Catalonia, Spain, September 14-18, 2003}, pages = {611--614}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICIP.2003.1246754}, doi = {10.1109/ICIP.2003.1246754}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/PetkovicMJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/FengJ03, author = {Ling Feng and Willem Jonker}, editor = {Robert Meersman and Zahir Tari}, title = {Efficient Processing of Secured {XML} Metadata}, booktitle = {On The Move to Meaningful Internet Systems 2003: {OTM} 2003 Workshops, {OTM} Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and {WRSM} 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2889}, pages = {704--717}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39962-9\_72}, doi = {10.1007/978-3-540-39962-9\_72}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/FengJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wedelmusic/ChongCEHJL03, author = {Cheun Ngen Chong and Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Willem Jonker and Yee Wei Law}, title = {LicenseScript: a novel digital rights language and its semantics}, booktitle = {3rd International Conference on {WEB} Delivering of Music {(WEDELMUSIC} 2003), 15-17 September 2003, Leeds, {UK}}, pages = {122--129}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/WDM.2003.1233885}, doi = {10.1109/WDM.2003.1233885}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wedelmusic/ChongCEHJL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xml/SmiljanicFJ03, author = {Marko Smiljanic and Ling Feng and Willem Jonker}, editor = {Henk M. Blanken and Torsten Grabs and Hans{-}J{\"{o}}rg Schek and Ralf Schenkel and Gerhard Weikum}, title = {Web-Based Distributed {XML} Query Processing}, booktitle = {Intelligent Search on {XML} Data, Applications, Languages, Models, Implementations, and Benchmarks}, series = {Lecture Notes in Computer Science}, volume = {2818}, pages = {207--216}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45194-5\_14}, doi = {10.1007/978-3-540-45194-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/xml/SmiljanicFJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/PetkovicJ02, author = {Milan Petkovic and Willem Jonker}, editor = {Christian S. Jensen and Keith G. Jeffery and Jaroslav Pokorn{\'{y}} and Simonas Saltenis and Elisa Bertino and Klemens B{\"{o}}hm and Matthias Jarke}, title = {Cobra: {A} Content-Based Video Retrieval System}, booktitle = {Advances in Database Technology - {EDBT} 2002, 8th International Conference on Extending Database Technology, Prague, Czech Republic, March 25-27, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2287}, pages = {736--738}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45876-X\_47}, doi = {10.1007/3-540-45876-X\_47}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/edbt/PetkovicJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbtw/PetkovicMJ02, author = {Milan Petkovic and Vojkan Mihajlovic and Willem Jonker}, editor = {Akmal B. Chaudhri and Rainer Unland and Chabane Djeraba and Wolfgang Lindner}, title = {Extending a {DBMS} to Support Content-Based Video Retrieval: {A} Formula 1 Case Study}, booktitle = {XML-Based Data Management and Multimedia Engineering - {EDBT} 2002 Workshops, {EDBT} 2002 Workshops XMLDM, MDDE, and YRWS, Prague, Czech Republic, March 24-28, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2490}, pages = {318--341}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36128-6\_18}, doi = {10.1007/3-540-36128-6\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/edbtw/PetkovicMJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/PetkovicZBJAWK02, author = {Milan Petkovic and Roelof van Zwol and Henk Ernst Blok and Willem Jonker and Peter M. G. Apers and Menzo Windhouwer and Martin L. Kersten}, editor = {Rakesh Agrawal and Klaus R. Dittrich}, title = {Content-Based Video Indexing for the Support of Digital Library Search}, booktitle = {Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26 - March 1, 2002}, pages = {494--495}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICDE.2002.994766}, doi = {10.1109/ICDE.2002.994766}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/PetkovicZBJAWK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/PetkovicMJD02, author = {Milan Petkovic and Vojkan Mihajlovic and Willem Jonker and Slobodanka Djordjevic{-}Kajan}, title = {Multi-modal extraction of highlights from {TV} Formula 1 programs}, booktitle = {Proceedings of the 2002 {IEEE} International Conference on Multimedia and Expo, {ICME} 2002, Lausanne, Switzerland. August 26-29, 2002. Volume {I}}, pages = {817--820}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICME.2002.1035907}, doi = {10.1109/ICME.2002.1035907}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/PetkovicMJD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codas/DerksDGJ01, author = {Wijnand Derks and Juliane Dehnert and Paul W. P. J. Grefen and Willem Jonker}, editor = {Hongjun Lu and Stefano Spaccapietra}, title = {Customized Atomicity Specification for Transactional Workflows}, booktitle = {Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, {CODAS} 2001, Beijing, China, April 23-24, 2001.}, pages = {155--164}, publisher = {{IEEE} Computer Society}, year = {2001}, timestamp = {Fri, 02 Aug 2019 08:43:55 +0200}, biburl = {https://dblp.org/rec/conf/codas/DerksDGJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbtel/WijnandsDDJ01, author = {Jeroen Wijnands and Sietse Dijkstra and Wijnand Derks and Willem Jonker}, editor = {Willem Jonker}, title = {Experimenting {NT} Cluster Technology for Massive {CDR} Processing}, booktitle = {Databases in Telecommunications II, {VLDB} 2001 International Workshop, DBTel 2001 Rome, Italy, September 10, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2209}, pages = {19--36}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45432-2\_3}, doi = {10.1007/3-540-45432-2\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/dbtel/WijnandsDDJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/event/PetkovicJ01, author = {Milan Petkovic and Willem Jonker}, title = {Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events}, booktitle = {{IEEE} Workshop on Detection and Recognition of Events in Video, {EVENT} 2001, Vancouver, BC, Canada, July 8, 2001, Proceedings}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/EVENT.2001.938869}, doi = {10.1109/EVENT.2001.938869}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/event/PetkovicJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/BoertjesJW01, author = {Erik M. Boertjes and Willem Jonker and Jeroen Wijnands}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin and Tzi{-}cker Chiueh and Wolfgang Klas and Aidong Zhang}, title = {Multimedia information services enabling: an architectural approach}, booktitle = {Proceedings of the 2001 {ACM} workshops on Multimedia: multimedia information retrieval, Ottawa, ON, Canada, September 30 - October 5, 2001}, pages = {18--23}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/500933.500940}, doi = {10.1145/500933.500940}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/BoertjesJW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/viip/PetkovicJZ01, author = {Milan Petkovic and Willem Jonker and Z. Zivkovic}, editor = {M. H. Hamza}, title = {Recognizing Strokes in Tennis Videos using Hidden Markov Models}, booktitle = {Proceedings of the {IASTED} International Conference on Visualization, Imaging and Image Processing {(VIIP} 2001), Marbella, Spain, September 3-5, 2001}, pages = {512--516}, publisher = {{ACTA} Press}, year = {2001}, timestamp = {Mon, 17 Jan 2005 15:16:16 +0100}, biburl = {https://dblp.org/rec/conf/viip/PetkovicJZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/BlokWZPAKJ01, author = {Henk Ernst Blok and Menzo Windhouwer and Roelof van Zwol and Milan Petkovic and Peter M. G. Apers and Martin L. Kersten and Willem Jonker}, editor = {Peter M. G. Apers and Paolo Atzeni and Stefano Ceri and Stefano Paraboschi and Kotagiri Ramamohanarao and Richard T. Snodgrass}, title = {Flexible and scalable digital library search}, booktitle = {{VLDB} 2001, Proceedings of 27th International Conference on Very Large Data Bases, September 11-14, 2001, Roma, Italy}, pages = {705--706}, publisher = {Morgan Kaufmann}, year = {2001}, url = {http://www.vldb.org/conf/2001/P705.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vldb/BlokWZPAKJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbtel/2001, editor = {Willem Jonker}, title = {Databases in Telecommunications II, {VLDB} 2001 International Workshop, DBTel 2001 Rome, Italy, September 10, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2209}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45432-2}, doi = {10.1007/3-540-45432-2}, isbn = {3-540-42623-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbtel/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/DerksDEJW00, author = {Wijnand Derks and Sietse Dijkstra and H. D. Enting and Willem Jonker and Jeroen Wijnands}, editor = {Mohamed T. Ibrahim and Josef K{\"{u}}ng and Norman Revell}, title = {Experimenting {NUMA} for Scalable {CDR} Processing}, booktitle = {Database and Expert Systems Applications, 11th International Conference, {DEXA} 2000, London, UK, September 4-8, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1873}, pages = {970--980}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44469-6\_91}, doi = {10.1007/3-540-44469-6\_91}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/DerksDEJW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbtel/1999, editor = {Willem Jonker}, title = {Databases in Telecommunications, International Workshop Co-located with VLDB-99, Edinburgh, Scotland, UK, September 6, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1819}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10721056}, doi = {10.1007/10721056}, isbn = {3-540-67667-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbtel/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldbw/DerksDJW99, author = {Wijnand Derks and Sietse Dijkstra and Willem Jonker and Jeroen Wijnands}, editor = {Willem Jonker}, title = {Assesment of Scaleable Database Architectures for {CDR} Analysis - An Experimental Approach}, booktitle = {Databases in Telecommunications, International Workshop Co-located with VLDB-99, Edinburgh, Scotland, UK, September 6, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1819}, pages = {133--143}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10721056\_10}, doi = {10.1007/10721056\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/vldbw/DerksDJW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/workflow/JonkerNDV99, author = {Willem Jonker and Wim Nijenhuis and Zef Damen and Martin Verwijmeren}, editor = {Christoph Bussler and Paul W. P. J. Grefen and Heiko Ludwig and Ming{-}Chien Shan}, title = {Workflow Management Systems and Cross-Organisational Logistics}, booktitle = {Proceedings of the Workshop on Cross-Organisational Workflow Management and Co-ordination, San Francisco, USA, February 22, 1999}, series = {{CEUR} Workshop Proceedings}, volume = {17}, publisher = {CEUR-WS.org}, year = {1999}, url = {https://ceur-ws.org/Vol-17/Jonker.ps}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/workflow/JonkerNDV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/DerksJ98, author = {Wijnand Derks and Willem Jonker}, editor = {Roland R. Wagner}, title = {Practical Experiences with Materialized Views in a Very Large Data Store for Telecommunication Service Management}, booktitle = {Ninth International Workshop on Database and Expert Systems Applications, Vienna, Austria, August 24-28, 1998, Proceedings}, pages = {881--886}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/DEXA.1998.707509}, doi = {10.1109/DEXA.1998.707509}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/DerksJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mis/WoudstraVPEJHHH98, author = {A. Woudstra and D. D. Velthausz and H. J. G. de Poot and F. Moelaert El{-}Hadidy and Willem Jonker and Maurice A. W. Houtsma and R. G. Heller and J. N. H. Heemskerk}, editor = {Sushil Jajodia and M. Tamer {\"{O}}zsu and Asuman Dogac}, title = {Modeling and Retrieving Audiovisual Information: {A} Soccer Video Retrieval System}, booktitle = {Advances in Multimedia Information Systems, 4th International Workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1508}, pages = {161--173}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49651-3\_16}, doi = {10.1007/3-540-49651-3\_16}, timestamp = {Tue, 21 Mar 2023 21:01:40 +0100}, biburl = {https://dblp.org/rec/conf/mis/WoudstraVPEJHHH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/JonkerS95, author = {Willem Jonker and Heribert Sch{\"{u}}tz}, editor = {Michael J. Carey and Donovan A. Schneider}, title = {The {ECRC} Multi Database System}, booktitle = {Proceedings of the 1995 {ACM} {SIGMOD} International Conference on Management of Data, San Jose, California, USA, May 22-25, 1995}, pages = {490}, publisher = {{ACM} Press}, year = {1995}, url = {https://doi.org/10.1145/223784.223903}, doi = {10.1145/223784.223903}, timestamp = {Tue, 16 Aug 2022 23:04:20 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/JonkerS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/deductive/BressanJS93, author = {St{\'{e}}phane Bressan and Willem Jonker and Andrea Sikeler}, editor = {Raghu Ramakrishnan}, title = {Extending Deductive Databases with Object Orientation}, booktitle = {Proceedings of the Workshop on Programming with Logic Databases. In Conjunction with ILPS, Vancouver, BC, Canada, October 30, 1993}, series = {Technical Report}, volume = {{\#}1183}, pages = {167}, publisher = {University of Wisconsin}, year = {1993}, timestamp = {Wed, 20 Jun 2018 17:26:07 +0200}, biburl = {https://dblp.org/rec/conf/deductive/BressanJS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rules/BayerJ93, author = {Petra Bayer and Willem Jonker}, editor = {Norman W. Paton and M. Howard Williams}, title = {A Framework for Supporting Triggers in Deductive Databases}, booktitle = {Rules in Database Systems. Proceedings of the 1st International Workshop on Rules in Database Systems, Edinburgh, Scotland, 30 August - 1 September 1993}, series = {Workshops in Computing}, pages = {316--330}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/978-1-4471-3225-7\_19}, doi = {10.1007/978-1-4471-3225-7\_19}, timestamp = {Mon, 24 Jun 2019 12:03:37 +0200}, biburl = {https://dblp.org/rec/conf/rules/BayerJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/JonkerG93, author = {Willem Jonker and Bob Goedhart}, title = {{KBS} Development: From Design Models to Implementations}, booktitle = {SEKE'93, The 5th International Conference on Software Engineering and Knowledge Engineering, Tutorials, June 14-15, 1993, Technical Program, June 16-18, 1993, Hotel Sofitel, San Francisco Bay, {USA}}, pages = {657--664}, publisher = {Knowledge Systems Institute}, year = {1993}, timestamp = {Wed, 21 Feb 2007 11:27:24 +0100}, biburl = {https://dblp.org/rec/conf/seke/JonkerG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ekaw/JonkerS92, author = {Willem Jonker and Jan Willem Spee}, editor = {Thomas Wetter and Klaus{-}Dieter Althoff and John H. Boose and Brian R. Gaines and Marc Linster}, title = {Yet Another Formalisation of {KADS} Conceptual Models}, booktitle = {Current Developments in Knowledge Acquisition - EKAW'92, 6th European Knowledge Acquisition Workshop, Heidelberg and Kaiserslautern, Germany, May 18-22, 1992}, series = {Lecture Notes in Computer Science}, volume = {599}, pages = {211--229}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55546-3\_42}, doi = {10.1007/3-540-55546-3\_42}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/ekaw/JonkerS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/JagerJWW90, author = {Paul de Jager and Willem Jonker and Albert Wammes and Johan Wester}, editor = {Juan Quemada and Jos{\'{e}} A. Ma{\~{n}}as and Enrique V{\'{a}}zquez}, title = {An Interactive Programming Environment for {LOTOS}}, booktitle = {Formal Description Techniques, III, Proceedings of the {IFIP} {TC6/WG6.1} Third International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols, {FORTE} '90, Madrid, Spain, 5-8 November 1990}, pages = {581--584}, publisher = {North-Holland}, year = {1990}, timestamp = {Thu, 03 Jan 2002 11:58:39 +0100}, biburl = {https://dblp.org/rec/conf/forte/JagerJWW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.