![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. Michael Gertz 27 Michael Gertz, Erik Guldentops , Leon Strous : Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium. Kluwer 2002 26 Michael Gertz, Kai-Uwe Sattler : Integrating Scientific Data through External Concept-based annotations. DIWeb 2002 : 87-101 25 Christina Yip Chung , Michael Gertz, Neel Sundaresan : Reverse Engineering for Web Data: From Visual to Semantic Structures. ICDE 2002 24 Premkumar T. Devanbu , Michael Gertz, April Kwong , Chip Martel , G. Nuckolls , Stuart G. Stubblebine : Flexible authentication of XML documents. ACM Conference on Computer and Communications Security 2001 : 136-145 23 Bruce Rosenstock , Michael Gertz: Web-based scholarship: annotating the digital library. JCDL 2001 : 104-105 22 Marco Bremer , Michael Gertz: Web Data Indexing Through External Semantic-carrying Annotations. RIDE-DM 2001 : 69-76 21 April Kwong , Michael Gertz: Authentic Publication of XML Document Data. WISE (1) 2001 : 331-340 20 Can Türker , Michael Gertz: Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems. VLDB Journal 10 (4): 241-269 (2001) 19 Premkumar T. Devanbu , Michael Gertz, Chip Martel , Stuart G. Stubblebine : Authentic Third-party Data Publication. DBSec 2000 : 101-112 18 Christina Yip Chung , Michael Gertz, Karl N. Levitt : Discovery of Multi-Level Security Policies. DBSec 2000 : 173-184 17 Christina Yip Chung , Michael Gertz, Karl N. Levitt : DEMIDS: A Misuse Detection System for Database Systems. IICIS 1999 : 159-178 16 Christina Yip Chung , Michael Gertz, Karl N. Levitt : Misuse Detection in Database Systems Through User Profiling. Recent Advances in Intrusion Detection 1999 15 Michael Gertz, Ingo Schmitt : Data Integration Techniques based on Data Quality Aspects. Föderierte Datenbanken 1998 : 1-19 14 Michael Gertz: Managing Data Quality and Integrity in Federated Databases. IICIS 1998 : 211-230 13 Alexander Scharnofske , Udo W. Lipeck , Michael Gertz: SubQuery-By-Example: Eine orthogonale Erweiterung von QBE. BTW 1997 : 132-152 12 Michael Gertz, Udo W. Lipeck : An Extensible Framework for Repairing Constraint Violations. IICIS 1997 : 89-111 11 Michael Gertz: Diagnosis and Repair of Constraint Violations in Database Systems. Datenbank Rundbrief 19 : 96 (1997) 10 Michael Gertz: An Extensible Framework for Repairing Constraint Violations. FMLDO 1996 : 41-56 9 Michael Gertz: Diagnosis and Repair of Constraint Violations in Database Systems. DISDBIS 19 : (1996) 8 Michael Gertz, Udo W. Lipeck : Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints. DKE 20 (2): 163-193 (1996) 7 Vram Kouramajian , Michael Gertz: A Visual Query Editor for Temporal Databases. OOER 1995 : 388-399 6 Michael Gertz, Udo W. Lipeck : "Temporal" Integrity Constraints in Temporal Databases. Temporal Databases 1995 : 77-92 5 Michael Gertz: Specifying Reactive Integrity Control for Active Databases. RIDE-ADS 1994 : 62-70 4 Udo W. Lipeck , Michael Gertz, Gunter Saake : Transitional Monitoring of Dynamic Inegrity Constraints. Data Engineering Bulletin 17 (2): 38-42 (1994) 3 Michael Gertz: Integritätssicherung in aktiven Datenbanken. Grundlagen von Datenbanken 1993 : 001-005 2 Michael Gertz, Udo W. Lipeck : Deriving Integrity Maintaining Triggers from Transition Graphs. ICDE 1993 : 22-29 1 Michael Gertz: Deriving Integrity Constraints Maintaining Triggers from Transition Graphs. Grundlagen von Datenbanken 1992 : 40-44 ![]() DiSC'02 © 2003 Association for Computing Machinery |