default search action
Reind P. van de Riet
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [j58]Reind P. van de Riet:
Introduction to the special issue on DKE 25 years. Data Knowl. Eng. 67(2): 219 (2008) - [j57]Reind P. van de Riet:
Thank you referees, authors and readers of DKE. Data Knowl. Eng. 67(2): 220-233 (2008) - [j56]Reind P. van de Riet:
Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace. Data Knowl. Eng. 67(2): 293-329 (2008) - [c35]Reind P. van de Riet:
Mokum for Correctness by Design in Relation to MDA. UNISCON 2008: 352-364 - 2004
- [j55]Reind P. van de Riet:
Editorial Introduction by the Editor for Europe. Data Knowl. Eng. 50(3): 247-260 (2004) - [j54]Reind P. van de Riet:
The future refereeing process in Cyberspace of the Data & Knowledge Engineering Journal: an attempt in guaranteeing security and privacy on three levels. Data Knowl. Eng. 50(3): 305-339 (2004) - 2003
- [j53]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in Using Databases. J. Comput. Secur. 11(3): 353-364 (2003) - 2002
- [j52]Peter P. Chen, Reind P. van de Riet:
Editorial introduction. Data Knowl. Eng. 41(2-3): 125-132 (2002) - [j51]Reind P. van de Riet:
Notes on a classification for DKE. Data Knowl. Eng. 41(2-3): 133-139 (2002) - [j50]Reind P. van de Riet:
Peter Chen honoured with the Stevens Award for advancing software development methods. Data Knowl. Eng. 41(2-3): 273-282 (2002) - [j49]Ana M. Moreno-Capuchino, Reind P. van de Riet:
Guest editorial: Special issue NLDB '01. Data Knowl. Eng. 42(3): 247-249 (2002) - [j48]Bhavani Thuraisingham, Reind P. van de Riet:
Data and applications security (Guest editorial). Data Knowl. Eng. 43(3): 235-236 (2002) - 2001
- [j47]Frank K. H. A. Dehne, Ans A. G. Steuten, Reind P. van de Riet:
WORDNET++: A lexicon for the COLOR-X-method. Data Knowl. Eng. 38(1): 3-29 (2001) - [c34]Radu Serban, Reind P. van de Riet:
Enforcing policies with private guardians. SEMAS 2001: 140-158 - [e4]Bhavani Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari:
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. IFIP Conference Proceedings 201, Kluwer 2001, ISBN 0-7923-7514-9 [contents] - [e3]Ana María Moreno, Reind P. van de Riet:
Applications of Natural Language to Information Systems, 6th International Workshop NLDB'01, June 28-29, 2001, Madrid, Spain, Proceedings. LNI P-3, GI 2001, ISBN 3-88579-332-6 [contents] - 2000
- [j46]Ana M. Moreno-Capuchino, Natalia Juristo Juzgado, Reind P. van de Riet:
Formal justification in object-oriented modelling: A linguistic approach. Data Knowl. Eng. 33(1): 25-47 (2000) - [j45]Ans A. G. Steuten, Reind P. van de Riet, Jan L. G. Dietz:
Linguistically based conceptual modeling of business communication. Data Knowl. Eng. 35(2): 121-136 (2000) - [c33]Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282 - [c32]Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold:
Panel. DBSec 2000: 367-371 - [c31]Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban:
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. DEXA 2000: 287-301 - [c30]P. R. Griffioen, P. I. Elsas, Reind P. van de Riet:
Analysing Enterprises: The Value Cycle Approach. DEXA 2000: 685-697 - [c29]Ans A. G. Steuten, Frank K. H. A. Dehne, Reind P. van de Riet:
WordNet++: A Lexicon Supporting the Color-X Method. NLDB 2000: 1-16
1990 – 1999
- 1999
- [j44]Ehud Gudes, Martin S. Olivier, Reind P. van de Riet:
Modeling, Specifying and Implementing Workflow Security in Cyberspace. J. Comput. Secur. 7(4): 287-315 (1999) - 1998
- [j43]Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn:
Internet security incidents, a survey within Dutch organizations. Comput. Secur. 17(5): 417-433 (1998) - [j42]Peter P. Chen, Reind P. van de Riet:
Introduction to the Special Issue Celebrating the 25th Volume of Data & Knowledge Engineering: DKE. Data Knowl. Eng. 25(1-2): 1-9 (1998) - [j41]Reind P. van de Riet:
Complex Objects: Theory and Practice from a Data- and Knowledge Engineering Perspective, as Seen in and from Yellostone Park. Data Knowl. Eng. 25(1-2): 217-238 (1998) - [j40]J. F. M. Burg, Reind P. van de Riet:
Enhancing CASE Environments by Using Linguistics. Int. J. Softw. Eng. Knowl. Eng. 8(4): 435-448 (1998) - [c28]P. I. Elsas, P. M. Ott de Vries, Reind P. van de Riet:
Computing Conspiracies. DEXA Workshop 1998: 256-266 - [c27]Reind P. van de Riet, Wouter Janssen, Peter de Gruijter:
Security Moving from Database Systems to ERP Systems. DEXA Workshop 1998: 273-280 - [c26]Martin S. Olivier, Reind P. van de Riet, Ehud Gudes:
Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 - [c25]Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn:
Internet Security Incidents, a Survey within Dutch Organisations. WebNet 1998 - 1997
- [j39]J. F. M. Burg, Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability. Data Knowl. Eng. 21(2): 131-146 (1997) - [j38]Bram van der Vos, Jon Atle Gulla, Reind P. van de Riet:
Verification of Conceptual Models Based on Linguistic Knowledge. Data Knowl. Eng. 21(2): 147-163 (1997) - [j37]Reind P. van de Riet, Andrea Junk, Ehud Gudes:
Security in Cyberspace: A Knowledge-Base Approach. Data Knowl. Eng. 24(1): 69-96 (1997) - [c24]Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 - [c23]Reind P. van de Riet:
Research in the SIKS Research School: An Example of a Cooperation in Using Linguistic Tools for Requirements Specification in Cyberspace. GI Jahrestagung 1997: 505 - [c22]M. O. Froehlich, Reind P. van de Riet:
Text Generation in Business Object Frameworks. WebNet 1997 - [c21]Reind P. van de Riet, Hans F. M. Burg:
Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy? WebNet 1997 - 1996
- [j36]Reind P. van de Riet, J. F. M. Burg:
Linguistic Tools for Modelling Alter Egos in Cyperspace: Who is responsible? J. Univers. Comput. Sci. 2(9): 623-636 (1996) - [c20]Reind P. van de Riet, Ehud Gudes:
An Object-Oriented Database Architecture for Providing Securty in Cyberspace. DBSec 1996: 120-144 - [c19]Reind P. van de Riet, J. F. M. Burg:
Modelling alter egos in cyberspace: Who is responsible? WebNet 1996 - 1995
- [c18]J. F. M. Burg, Reind P. van de Riet:
COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling. CAiSE 1995: 26-39 - [c17]J. F. M. Burg, Reind P. van de Riet:
COLOR-X Event Model: Integrated Specification of the Dynamics of Individual Objects. OOER 1995: 146-157 - [c16]J. F. M. Burg, Reind P. van de Riet:
The Impact of Linguistics on Conceptual Models: Consistency and Understandability. NLDB 1995: 183-197 - [c15]Bram van der Vos, Jon Atle Gulla, Reind P. van de Riet:
Verification of Conceptual Models based on Linguistic Knowledge. NLDB 1995 - 1994
- [c14]Reind P. van de Riet, Jack Beukering:
The Integration of Security and Integrity Constraints in MOKUM. DBSec 1994: 223-244 - 1993
- [j35]Reind P. van de Riet:
Guest editorial: Fifth generation computer systems: Success or failure? Future Gener. Comput. Syst. 9(2): 79-81 (1993) - [j34]Reind P. van de Riet:
An overview and appraisal of the Fifth Generation Computer System project. Future Gener. Comput. Syst. 9(2): 83-103 (1993) - [c13]Robert Croshere, Reind P. van de Riet, Alco Blom:
An Animation Facility to Simulate an Information and Communication System. CAiSE 1993: 547-568 - [c12]J. F. M. Burg, Reind P. van de Riet, S. C. Chang:
A Data Dictionary as a Lexicon: An Application of Linguistics in Information Systems. CIKM 1993: 114-123 - 1992
- [j33]Frank Dignum, Reind P. van de Riet:
Addition and removal of information for a knowledge base with incomplete information. Data Knowl. Eng. 8: 293-307 (1992) - [c11]P. I. Elsas, Reind P. van de Riet, J. J. van Leeuwen:
Knowledge-based Audit Support. DEXA 1992: 512-518 - [c10]Paul Buitelaar, Reind P. van de Riet:
The Use of a Lexicon to Interpret ER-Diagrams: A LIKE project. ER 1992: 162-177 - 1991
- [j32]Frank Dignum, Reind P. van de Riet:
Knowledge base modelling based on linguistics and founded in logic. Data Knowl. Eng. 7: 1-34 (1991) - 1990
- [j31]Reind P. van de Riet:
Introduction to the Special Issue on Deductive and Object-Oriented Databases. Data Knowl. Eng. 5: 255-261 (1990)
1980 – 1989
- 1989
- [j30]Reind P. van de Riet:
MOKUM: An Object-Oriented Active Knowledge Base System. Data Knowl. Eng. 4(1): 21-42 (1989) - 1988
- [c9]Roel J. Wieringa, Reind P. van de Riet:
Algebraic Specification of Object Dynamics in Knowledge Base Domains. DS-3 1988: 411-436 - 1987
- [j29]Frank Dignum, T. Kemme, W. Kreuzen, Hans Weigand, Reind P. van de Riet:
Constraint Modelling Using a Conceptual Prototyping Language. Data Knowl. Eng. 2: 213-254 (1987) - [j28]Reind P. van de Riet:
Problems with expert systems? Future Gener. Comput. Syst. 3(1): 11-16 (1987) - [j27]Reind P. van de Riet:
The state of the art of knowledge engineering at five Japanese Research Institutes - a travel report. Future Gener. Comput. Syst. 3(1): 37-49 (1987) - [j26]Reind P. van de Riet:
An impression of the research activities of MCC in the area of data- and knowledge base systems - a travel report. Future Gener. Comput. Syst. 3(2): 137-145 (1987) - [j25]Reind P. van de Riet:
Knowledge systems and prolog : by A. Walker, M. McCord, J.F. Sowa and W.G. Wilson (Addison-Wesley, Reading, MA, 1987) 475 pp. Future Gener. Comput. Syst. 3(3): 217-218 (1987) - [j24]Reind P. van de Riet:
Logic programming functions, relations and equations : by D. de Groot and G. Lindstrom (Prentice-Hall, Englewood Cliffs, NJ, 1986) 533 pp. Future Gener. Comput. Syst. 3(3): 218-219 (1987) - [j23]Reind P. van de Riet:
Artificial intelligence II. Methodology, systems, applications : by Ph. Jorrand and V. Sgurev, Eds. (North-Holland, Amsterdam, 1987) 403 pp. Future Gener. Comput. Syst. 3(3): 219-220 (1987) - [j22]Reind P. van de Riet:
Expert systems: Strategic implications and applications : by A.C. Beerel (Ellis Horwood and Wiley, Chichester, 1987) 173 pp., price: £22.50. Future Gener. Comput. Syst. 3(3): 220-221 (1987) - [j21]Reind P. van de Riet:
Prolog for programmers : by F. Kluzninak and S. Szpakowicz (Academic Press, New York, 1985) 299 pp., price: £14.95. Future Gener. Comput. Syst. 3(3): 221 (1987) - [j20]Reind P. van de Riet:
Fuzzy sets: Decision making, and expert systems : by H.J. Zimmermann (Kluwer Academic Publishers, Dordrecht, 1987) 335 pp., price: 57.50. Future Gener. Comput. Syst. 3(3): 221-222 (1987) - [j19]Reind P. van de Riet:
Advances in artificial intelligence CIIAM86 : (Kogan Page, London, 1987) 328 pp., price: £40. Future Gener. Comput. Syst. 3(3): 222 (1987) - [j18]Reind P. van de Riet:
Advances in Artificial Intelligence : by J. Hallam and C. Mellish, Eds. (Wiley, New York, 1987) 290 pp., price: £25. Future Gener. Comput. Syst. 3(3): 223 (1987) - [j17]Reind P. van de Riet:
Prolog programming for tomorrow : by J. Doores, A.R. Reiblein and S. Vadera (Sigma Press, 1987) 149 pp., price: £10.95. Future Gener. Comput. Syst. 3(3): 223-224 (1987) - [j16]Reind P. van de Riet:
Statistics with vague data : by R. Kruse and K.D. Meyer (Reidel, Dordrecht/Boston, 1987) 279 pp. Future Gener. Comput. Syst. 3(3): 224 (1987) - [j15]Reind P. van de Riet:
From optical bistability towards optical computing, the EJOB project : by P. Mandel, S.D. Smith and B.S Wherrett, Eds. (North-Holland, Amsterdam, 1987) 362 pp. Future Gener. Comput. Syst. 3(3): 225 (1987) - [j14]Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet:
Two Access Methods Using Compact Binary Trees. IEEE Trans. Software Eng. 13(7): 799-810 (1987) - 1986
- [j13]Hideo Aiso, Frank Kuo, Reind P. van de Riet:
Editorial. Future Gener. Comput. Syst. 2(1): 3-4 (1986) - [j12]Reind P. van de Riet:
Expert database systems. Future Gener. Comput. Syst. 2(3): 191-199 (1986) - [j11]Reind P. van de Riet:
Parallel processing, the technology of fifth generation computers: R.K. Miller Published by: SEAI, Technical Publications, Madison, Georgia, USA. Number of pages: 123. Future Gener. Comput. Syst. 2(3): 203-204 (1986) - [c8]Reind P. van de Riet:
Making Expert Systems Explicit - Response. IFIP Congress 1986: 545-548 - 1985
- [j10]Reind P. van de Riet:
Welcome. Future Gener. Comput. Syst. 1(3): 151 (1985) - 1984
- [j9]Louis O. Hertzberger, Reind P. van de Riet:
Progress in the fifth generation inference architectures. Future Gener. Comput. Syst. 1(2): 93-102 (1984) - [c7]Shamkant B. Navathe, Reind P. van de Riet:
Databases for Expert Systems. VLDB 1984: 257 - [e2]Reind P. van de Riet, Witold Litwin:
Distributed Data Sharing Systems, Proceedings of the Third International Seminar on Distributed Data Sharing Systems, DDSS 1984, Parma, Italy, 28-30 March, 1984. North-Holland 1984, ISBN 0-444-87637-5 [contents] - 1983
- [j8]Reind P. van de Riet, Martin L. Kersten, Wiebren de Jonge, Anthony I. Wasserman:
Privacy and security in information systems using programming language features. Inf. Syst. 8(2): 95-103 (1983) - [j7]George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet:
Answering Queries Without Revealing Secrets. ACM Trans. Database Syst. 8(1): 41-59 (1983) - 1981
- [j6]Reind P. van de Riet, Anthony I. Wasserman, Martin L. Kersten, Wiebren de Jonge:
High-Level Programming Features for Improving the Efficiency of a Relational Database System. ACM Trans. Database Syst. 6(3): 464-485 (1981) - [c6]Martin L. Kersten, Reind P. van de Riet, Wiebren de Jonge:
Privacy and Security in Distributed Database Systems. DDSS 1981: 229-241 - [c5]Reind P. van de Riet, Martin L. Kersten:
A Module Definition Facility for Access Control in Communicating Data Base Systems. DDSS 1981: 255-272 - [e1]Reind P. van de Riet, Witold Litwin:
Distributed Data Sharing Systems, Proceedings of the Second International Seminar on Distributed Data Sharing Systems, DDSS 1981, Amsterdam, The Netherlands, 3-5 June, 1981. North-Holland 1981, ISBN 0-444-86374-5 [contents] - 1980
- [c4]Reind P. van de Riet, Martin L. Kersten, Anthony I. Wasserman:
A Module Definition Facility for Access Control in Distributed Data Base Systems. S&P 1980: 59-66
1970 – 1979
- 1979
- [j5]Reind P. van de Riet:
The little language compiler course project. ACM SIGCSE Bull. 11(4): 31-48 (1979) - [j4]Reind P. van de Riet, R. Wiggers:
Practice and Experience with BASIS: an Interactive Programming System for Introductory Courses in Informatics. Softw. Pract. Exp. 9(6): 463-476 (1979) - [c3]Reind P. van de Riet:
Performance Evaluation of the BASIS System. Performance 1979: 105-122 - 1977
- [c2]Reind P. van de Riet:
BASIS - An Interactive System for the Introductory Course in Informatics. IFIP Congress 1977: 347-351 - 1974
- [c1]Reind P. van de Riet:
About ABC ALGOL: A Language for Formula Manipulation Systems. IFIP Congress 1974: 222-225
1960 – 1969
- 1963
- [j3]Reind P. van de Riet:
Certification of algorithm 73: incomplete elliptic integrals. Commun. ACM 6(4): 167 (1963) - [j2]Reind P. van de Riet:
Algorithm 186: complex arithmetic. Commun. ACM 6(7): 386-387 (1963) - [j1]Reind P. van de Riet:
Algorithm 187: differences and derivatives. Commun. ACM 6(7): 387 (1963)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint