


default search action
Joachim Biskup
Person information
- affiliation: Technical University of Dortmund, Germany
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c122]Joachim Biskup
:
Relational Schemas with Multiplicity Bounds, Diversity Bounds and Functional Dependencies. FoIKS 2024: 45-63 - 2022
- [j43]Maximilian Berens
, Joachim Biskup
, Marcel Preuß:
Uniform probabilistic generation of relation instances satisfying a functional dependency. Inf. Syst. 103: 101848 (2022) - [c121]Maximilian Berens, Joachim Biskup:
On Sampling Representatives of Relational Schemas with a Functional Dependency. FoIKS 2022: 1-19 - [p3]Joachim Biskup:
Keynote: Construction of Inference-Proof Agent Interactions. Mach. Learn. under Resour. Constraints Vol. 3 (3) 2022: 391-412 - 2020
- [c120]Joachim Biskup, Marcel Preuß:
Can We Probabilistically Generate Uniformly Distributed Relation Instances Efficiently? ADBIS 2020: 75-89 - [c119]Joachim Biskup:
Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered. DBSec 2020: 79-99
2010 – 2019
- 2019
- [j42]Joachim Biskup
, Marcel Preuß:
Checking inference-proofness of attribute-disjoint and duplicate-preserving fragmentations. Ann. Math. Artif. Intell. 87(1-2): 43-82 (2019) - [j41]Joachim Biskup, Christine Dahn
, Katharina Diekmann, Ralf Menzel, Dirk Schalge, Lena Wiese
:
Publishing inference-proof relational data: An implementation and experiments. Data Knowl. Eng. 120: 1-44 (2019) - 2018
- [c118]Joachim Biskup, Marcel Preuß:
Inferences from Attribute-Disjoint and Duplicate-Preserving Relational Fragmentations. FoIKS 2018: 77-96 - 2017
- [j40]Joachim Biskup, Martin Bring, Michael Bulinski:
Inference control of open relational queries under closed-world semantics based on theorem proving. Inf. Syst. 70: 32-47 (2017) - [c117]Joachim Biskup, Marcel Preuß:
Inference-Proof Updating of a Weakened View Under the Modification of Input Parameters. ESORICS (2) 2017: 381-401 - [c116]Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Inference-proof Data Filtering for a Probabilistic Setting. PrivOn@ISWC 2017 - [i3]Joachim Biskup, Cornelia Tadros, Jaouad Zarouali:
Confidentiality enforcement by hybrid control of information flows. CoRR abs/1707.08482 (2017) - 2016
- [c115]Joachim Biskup, Cornelia Tadros:
On the Simulation Assumption for Controlled Interaction Processing. Computational Models of Rationality 2016: 133-149 - [c114]Joachim Biskup, Ralf Menzel, Jaouad Zarouali:
Controlled Management of Confidentiality-Preserving Relational Interactions. DPM/QASA@ESORICS 2016: 61-77 - [c113]Joachim Biskup, Marcel Preuß:
Information Control by Policy-Based Relational Weakening Templates. ESORICS (2) 2016: 361-381 - [c112]Joachim Biskup:
Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction Execution. FoIKS 2016: 211-234 - 2015
- [j39]Joachim Biskup, Cornelia Tadros:
Preserving confidentiality while reacting on iterated queries and belief revisions. Ann. Math. Artif. Intell. 73(1-2): 75-123 (2015) - [c111]Joachim Biskup, Martin Bring, Michael Bulinski:
Confidentiality Preserving Evaluation of Open Relational Queries. ADBIS 2015: 431-445 - [c110]Joachim Biskup, Cornelia Tadros:
Constructing Inference-Proof Belief Mediators. DBSec 2015: 188-203 - 2014
- [c109]Joachim Biskup, Piero A. Bonatti
, Clemente Galdi
, Luigi Sauro:
Optimality and Complexity of Inference-Proof Data Filtering and CQE. ESORICS (2) 2014: 165-181 - [c108]Joachim Biskup, Cornelia Tadros:
Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services. ESSoS 2014: 35-44 - [c107]Joachim Biskup, Gabriele Kern-Isberner, Patrick Krümpelmann, Cornelia Tadros:
Reasoning on Secrecy Constraints under Uncertainty to Classify Possible Actions. FoIKS 2014: 97-116 - [c106]Joachim Biskup, Marcel Preuß:
Inference-Proof Data Publishing by Minimally Weakening a Database Instance. ICISS 2014: 30-49 - 2013
- [j38]Joachim Biskup, Lan Li:
On Inference-Proof View Processing of XML Documents. IEEE Trans. Dependable Secur. Comput. 10(2): 99-113 (2013) - [c105]Joachim Biskup, Marcel Preuß:
Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret? DBSec 2013: 17-32 - [c104]Joachim Biskup:
Logic-Oriented Confidentiality Policies for Controlled Interaction Execution. DNIS 2013: 1-22 - [c103]Shawn Merrill, Nilgun Basalp, Joachim Biskup, Erik Buchmann, Chris Clifton, Bart Kuijpers
, Walied Othman, Erkay Savas:
Privacy through Uncertainty in Location-Based Services. MDM (2) 2013: 67-72 - 2012
- [j37]Joachim Biskup:
Inference-usability confinement by maintaining inference-proof views of an information system. Int. J. Comput. Sci. Eng. 7(1): 17-37 (2012) - [j36]Joachim Biskup:
Dynamic policy adaptation for inference control of queries to a propositional information system. J. Comput. Secur. 20(5): 509-546 (2012) - [c102]Joachim Biskup:
Some Remarks on Relational Database Schemes Having Few Minimal Keys. Conceptual Modelling and Its Theoretical Foundations 2012: 19-28 - [c101]Joachim Biskup, Sven Hartmann, Sebastian Link
, Jan-Hendrik Lochner, Torsten Schlotmann:
Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies. DBSec 2012: 56-73 - [c100]Joachim Biskup, Cornelia Tadros:
Revising Belief without Revealing Secrets. FoIKS 2012: 51-70 - [c99]Joachim Biskup, Sven Hartmann, Sebastian Link
:
Probabilistic Conditional Independence under Schema Certainty and Uncertainty. SUM 2012: 365-378 - 2011
- [j35]Joachim Biskup, Sebastian Link
:
Appropriate inferences of data dependencies in relational databases. Ann. Math. Artif. Intell. 63(3-4): 213-255 (2011) - [j34]Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert:
Inference-proof view update transactions with forwarded refreshments. J. Comput. Secur. 19(3): 487-529 (2011) - [j33]Joachim Biskup, Lena Wiese
:
A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theor. Comput. Sci. 412(31): 4044-4072 (2011) - [c98]Joachim Biskup:
History-Dependent Inference Control of Queries by Dynamic Policy Adaption. DBSec 2011: 106-121 - [c97]Joachim Biskup, Cornelia Tadros:
Inference-Proof View Update Transactions with Minimal Refusals. DPM/SETOP 2011: 104-121 - [c96]Joachim Biskup, Marcel Preuß, Lena Wiese
:
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints. ISC 2011: 246-261 - [r1]Joachim Biskup:
Inference Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 600-605 - 2010
- [j32]Joachim Biskup, Javier López:
Editorial ESORICS 2007. ACM Trans. Inf. Syst. Secur. 13(3): 19:1-19:2 (2010) - [c95]Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner:
Chasing after Secrets in Relational Databases. AMW 2010 - [c94]Joachim Biskup, Sven Hartmann, Sebastian Link
, Jan-Hendrik Lochner:
Efficient Inference Control for Open Relational Queries. DBSec 2010: 162-176 - [c93]Joachim Biskup:
Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution. DNIS 2010: 80-106 - [c92]Joachim Biskup, Cornelia Tadros, Lena Wiese
:
Towards Controlled Query Evaluation for Incomplete First-Order Databases. FoIKS 2010: 230-247 - [c91]Joachim Biskup, Cornelia Tadros:
Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation. IWSEC (Short Papers) 2010: 60-77
2000 – 2009
- 2009
- [b2]Joachim Biskup:
Security in Computing Systems - Challenges, Approaches and Solutions. Springer 2009, ISBN 978-3-540-78441-8, pp. I-XXVII, 1-694 - [c90]Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier
:
Towards Early Warning Systems - Challenges, Technologies and Architecture. CRITIS 2009: 151-164 - [c89]Joachim Biskup, Jens Seiler, Torben Weibert:
Controlled Query Evaluation and Inference-Free View Updates. DBSec 2009: 1-16 - [c88]Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert:
Requirements and Protocols for Inference-Proof Interactions in Information Systems. ESORICS 2009: 285-302 - [c87]Joachim Biskup, Lena Wiese
:
Combining Consistency and Confidentiality Requirements in First-Order Databases. ISC 2009: 121-134 - [c86]Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag:
Optimization of the Controlled Evaluation of Closed Relational Queries. SEC 2009: 214-225 - 2008
- [j31]Joachim Biskup, Torben Weibert:
Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3): 199-217 (2008) - [j30]Joachim Biskup, David W. Embley, Jan-Hendrik Lochner:
Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1): 8-12 (2008) - [j29]Joachim Biskup, Lena Wiese
:
Preprocessing for controlled query evaluation with availability policy. J. Comput. Secur. 16(4): 477-494 (2008) - [c85]Joachim Biskup, Sebastian Link
:
Appropriate Reasoning about Data Dependencies in Fixed and Undetermined Universes. FoIKS 2008: 58-77 - [i2]Joachim Biskup, Bernhard M. Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, Michael Vogel:
08102 Working Group -- Early Warning Systems. Network Attack Detection and Defense 2008 - 2007
- [j28]Joachim Biskup, Piero A. Bonatti
:
Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007) - [c84]Joachim Biskup, Torben Weibert:
Confidentiality Policies for Controlled Query Evaluation. DBSec 2007: 1-13 - [c83]Joachim Biskup, Ralf Menzel
:
Building a Tool for Cost-Based Design of Object-Oriented Database Schemas. ER 2007: 120-131 - [c82]Joachim Biskup, Christian Tsatedem, Lena Wiese
:
Secure Mediation of Join Queries by Processing Ciphertexts. ICDE Workshops 2007: 715-724 - [c81]Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese
:
Inference Control in Logic Databases as a Constraint Satisfaction Problem. ICISS 2007: 128-142 - [c80]Joachim Biskup, Barbara Carminati
, Elena Ferrari
, Frank Müller, Sandra Wortmann:
Towards Secure Execution Orders for CompositeWeb Services. ICWS 2007: 489-496 - [c79]Joachim Biskup, Jan-Hendrik Lochner:
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. ISC 2007: 407-422 - [c78]Joachim Biskup, Julia Hielscher, Sandra Wortmann:
A Trust- and Property-based Access Control Model. STM@ESORICS 2007: 169-177 - [e4]Joachim Biskup, Javier López:
Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Lecture Notes in Computer Science 4734, Springer 2007, ISBN 978-3-540-74834-2 [contents] - 2006
- [c77]Joachim Biskup, Lena Wiese
:
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. DBSec 2006: 30-43 - [c76]Joachim Biskup, Ralf Menzel
:
Optimising Abstract Object-Oriented Database Schemas. ER 2006: 528-543 - [c75]Ulrich Flegel, Joachim Biskup:
Requirements of Information Reductions for Cooperating Intrusion Detection Agents. ETRICS 2006: 466-480 - [c74]Joachim Biskup, Piero A. Bonatti
:
Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. FoIKS 2006: 43-62 - [c73]Joachim Biskup, Joerg Parthe:
Optimistic Anonymous Participation in Inter-organizational Workflow Instances. ICISS 2006: 86-100 - 2005
- [c72]Joachim Biskup, Barbara Sprick, Lena Wiese
:
Secure Mediation with Mobile Code. DBSec 2005: 267-280 - 2004
- [j27]Joachim Biskup, Piero A. Bonatti
:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004) - [j26]Joachim Biskup, Piero A. Bonatti:
Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1): 14-27 (2004) - [j25]Joachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche
:
Solving Equations in the Relational Algebra. SIAM J. Comput. 33(5): 1052-1066 (2004) - [c71]Joachim Biskup, Torben Weibert:
Refusal in Incomplete Databases. DBSec 2004: 143-157 - [c70]Joachim Biskup, Sandra Wortmann:
Towards a credential-based implementation of compound access control policies. SACMAT 2004: 31-40 - 2003
- [j24]Joachim Biskup, Torsten Polle:
Adding inclusion dependencies to an object-oriented data model with uniqueness constraints. Acta Informatica 39(6-7): 391-449 (2003) - [j23]Joachim Biskup, David W. Embley:
Extracting information from heterogeneous information sources using ontologically specified target views. Inf. Syst. 28(3): 169-212 (2003) - [j22]Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut:
Secure Mediation: Requirements, Design, and Architecture. J. Comput. Secur. 11(3): 365-398 (2003) - [c69]Joachim Biskup, Thomas Leineweber, Joerg Parthe:
Administration Rights in the SDSD-System. DBSec 2003: 149-162 - 2002
- [c68]Joachim Biskup, Yücel Karabulut:
A Hybrid PKI Model: Application to Secure Mediation. DBSec 2002: 271-282 - [c67]Christian Altenschmidt, Joachim Biskup:
Explicit Representation of Constrained Schema Mappings for Mediated Data Integration. DNIS 2002: 103-132 - [c66]Joachim Biskup, Ralf Menzel
:
A Flexible Cost Model for Abstract Object-Oriented Database Schemas. ER 2002: 444-462 - [c65]Joachim Biskup, Piero A. Bonatti:
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002: 39-54 - [c64]Joachim Biskup, Piero A. Bonatti:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002: 49-66 - [c63]Joachim Biskup:
Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. GI Jahrestagung 2002: 423-428 - [c62]Joachim Biskup, Ulrich Flegel:
Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. GI Jahrestagung 2002: 488-494 - 2001
- [j21]Joachim Biskup, Torsten Polle:
Decomposition of object-oriented database schemas. Ann. Math. Artif. Intell. 33(2-4): 119-155 (2001) - [j20]Joachim Biskup, Piero A. Bonatti
:
Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2): 199-222 (2001) - [c61]Joachim Biskup, Ralf Menzel
:
An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas. ADBIS 2001: 366-378 - [c60]Joachim Biskup, Thomas Leineweber:
State-Dependent Security Decisions for Distributed Object-Systems. DBSec 2001: 105-118 - [c59]Joachim Biskup, Barbara Sprick:
Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems. Semantics in Databases 2001: 34-62 - [i1]Joachim Biskup, Jan Paredaens, Thomas Schwentick, Jan Van den Bussche:
Solving equations in the relational algebra. CoRR cs.LO/0106034 (2001) - 2000
- [j19]Joachim Biskup:
For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1): 1-23 (2000) - [j18]Leana Golubchik, V. S. Subrahmanian, Sherry Marcus, Joachim Biskup:
Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers. IEEE Trans. Knowl. Data Eng. 12(1): 60-77 (2000) - [c58]Joachim Biskup, Ulrich Flegel:
Threshold-based identity recovery for privacy enhanced applications. CCS 2000: 71-79 - [c57]Christian Altenschmidt, Joachim Biskup, Yücel Karabulut:
Security Architecture of the Multimedia Mediator. DBSec 2000: 77-88 - [c56]Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold:
Panel. DBSec 2000: 367-371 - [c55]Joachim Biskup, Ulrich Flegel:
On Pseudonymization of Audit Data for Intrusion Detection. Workshop on Design Issues in Anonymity and Unobservability 2000: 161-180 - [c54]Joachim Biskup, Torsten Polle:
Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints. FoIKS 2000: 31-49 - [c53]Joachim Biskup, David W. Embley:
Mediated Information Gain. IDEAS 2000: 360-370 - [c52]Joachim Biskup, Ulrich Flegel:
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Recent Advances in Intrusion Detection 2000: 28-48
1990 – 1999
- 1999
- [c51]Joachim Biskup:
For Unknown Secrecies Refusal is Better than Lying. DBSec 1999: 127-141 - [c50]Joachim Biskup, Ralf Menzel, Torsten Polle:
Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas. Grundlagen von Datenbanken 1999: 72-76 - [p2]Joachim Biskup:
Selbstbestimmte technische Durchsetzung informationeller Zusicherungen. Angewandte Mathematik, insbesondere Informatik 1999: 35-57 - 1998
- [c49]Joachim Biskup:
Technical Enforcement of Informational Assurances. DBSec 1998: 17-40 - [c48]Joachim Biskup, Ulrich Flegel, Yücel Karabulut:
Secure Mediation: Requirements and Design. DBSec 1998: 127-140 - [c47]Alois C. Knoll, Christian Altenschmidt, Joachim Biskup, Hans-Martin Blüthgen, Ingo Glöckner, Sven Hartrumpf, Hermann Helbig, Christiane Henning, Reinhard Lüling, Burkhard Monien, Thomas Noll, Norbert Sensen:
An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents. ECDL 1998: 409-428 - [c46]Christian Altenschmidt, Joachim Biskup, Jürgen Freitag, Barbara Sprick:
Weakly Constraining Multimedia Types Based on a Type Embedding Ordering. Multimedia Information Systems 1998: 121-129 - 1997
- [c45]Joachim Biskup, Andreas Kluck:
A New Approach to Inferences of Semantic Constraints. ADBIS 1997: 72-79 - [c44]Joachim Biskup, Jürgen Freitag, Yücel Karabulut, Barbara Sprick:
Query Evaluation in an Object-Oriented Multimedia Mediator. OOIS 1997: 31-43 - 1996
- [c43]Joachim Biskup, Ralf Menzel
, Torsten Polle, Yehoshua Sagiv:
Decomposition of Relationships through Pivoting. ER 1996: 28-41 - 1995
- [b1]Joachim Biskup:
Grundlagen von Informationssystemen. Vieweg 1995, ISBN 3-528-05494-8 - [j17]Joachim Biskup, Pratul Dublish, Yehoshua Sagiv:
Optimization of a Subclass of Conjunctive Queries. Acta Informatica 32(1): 1-26 (1995) - [c42]Joachim Biskup, Ralf Menzel
, Torsten Polle:
Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas. ADBIS 1995: 109-136 - [c41]Joachim Biskup:
Database Schema Design Theory : Achievements and Challenges. CISMOD 1995: 14-44 - [c40]Joachim Biskup:
Achievements of Relational Database Schema Design Theory Revisited. Semantics in Databases 1995: 29-54 - 1994
- [c39]Joachim Biskup, Christian Eckert:
Enforcement of State Dependent Security Specifications. DBSec 1994: 375 - [c38]Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer:
Perspectives on Database Security - Panel Summary. DBSec 1994: 377-390 - [c37]Joachim Biskup, Christian Eckert:
Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen. Grundlagen von Datenbanken 1994: 11-15 - [c36]Joachim Biskup, Ralf Menzel, Torsten Polle:
Schematransformation für F-Logik. Grundlagen von Datenbanken 1994: 16-19 - [c35]Joachim Biskup, Ralf Menzel, Torsten Polle:
Transformation von Entity-Relationship-Schemata in objektorientierte Datenbankschemata. Grundlagen von Datenbanken 1994: 20-24 - [c34]Joachim Biskup:
Impacts of Creating, Implementing and Using Formal Languages. IFIP Congress (3) 1994: 402-407 - [c33]Joachim Biskup, Gerrit Bleumer:
Reflections on Security of Database and Datatransfer Systems in Health Care. IFIP Congress (2) 1994: 549-556 - [e3]Joachim Biskup, Matthew Morgenstern, Carl E. Landwehr:
Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994. IFIP Transactions A-60, North-Holland 1994, ISBN 0-444-81976-2 [contents] - 1993
- [j16]Joachim Biskup, Pratul Dublish:
Objects in Relational Database Schemes with Functional Inclusion, and Exclusion Dependencies. RAIRO Theor. Informatics Appl. 27(3): 183-219 (1993) - [c32]Joachim Biskup, Christian Eckert:
About the Enforcement of State Dependent Specifications. DBSec 1993: 3-17 - [c31]Joachim Biskup, Holger Stiefeling:
Evaluation of Upper Bounds and Least Nodes as Database Operations. FODO 1993: 197-214 - [c30]Joachim Biskup, Christian Eckert:
Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen. Grundlagen von Datenbanken 1993: 20-24 - [c29]Joachim Biskup, Torsten Polle:
Magic-Sets: Globalisieren von Variablen und Rekursionselimination. Grundlagen von Datenbanken 1993: 25-29 - [c28]Joachim Biskup, Christian Eckert:
Sichere Delegation in Informationssystemen. VIS 1993: 107-133 - [c27]Joachim Biskup:
Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". VIS 1993: 239-254 - 1992
- [e2]Joachim Biskup, Richard Hull:
Database Theory - ICDT'92, 4th International Conference, Berlin, Germany, October 14-16, 1992, Proceedings. Lecture Notes in Computer Science 646, Springer 1992, ISBN 3-540-56039-4 [contents] - 1991
- [j15]Joachim Biskup, János Demetrovics, Leonid Libkin, Ilya B. Muchnik:
On Relational Database Schemes Having Unique Minimal Key. J. Inf. Process. Cybern. 27(4): 217-225 (1991) - [j14]Joachim Biskup:
Relationship chase procedures interpreted as resolution with paramodulation. Fundam. Informaticae 15(2): 123-138 (1991) - [c26]Joachim Biskup, Pratul Dublish:
Objects in Relational Database Schemes with Functional, Inclusion and Exclusion Dependencies. MFDBS 1991: 276-290 - [c25]Joachim Biskup:
Sicherheit in Informationssystemen - Gewährleistung und Begrenzung des Informationsflusses. VIS 1991: 1-21 - [c24]Joachim Biskup, Hans Hermann Brüggemann:
Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick. VIS 1991: 146-158 - [p1]Joachim Biskup:
Sicherheit: Gewährleistung und Begrenzung des Informationsflusses. Entwicklungstendenzen bei Datenbanksystemen 1991: 363-388 - 1990
- [j13]Joachim Biskup, Uwe Räsch, Holger Stiefeling:
An Extension of SQL for Querying Graph Relations. Comput. Lang. 15(1): 65-82 (1990) - [c23]Joachim Biskup:
A General Framework for Database Security (Abstract). DBSec 1990: 169-170 - [c22]Joachim Biskup:
A General Framework for Database Security. ESORICS 1990: 35-41 - [c21]Joachim Biskup:
Medical Database Security. GI Jahrestagung (2) 1990: 212-221 - [c20]Joachim Biskup:
A General Framework for Database Security. Grundlagen von Datenbanken 1990: 7-10 - [c19]Pratul Dublish, Joachim Biskup, Yehoshua Sagiv:
Optimizatioin of a Subclass of Conjunctive Queries. ICDT 1990: 455-469
1980 – 1989
- 1989
- [j12]Joachim Biskup:
Verantwortung des Hochschullehrers für Informatik - Zur Diskussion gestellt. Inform. Spektrum 12(3): 158-161 (1989) - [j11]Joachim Biskup:
Boyce-Codd Normal Form and Object Normal Forms. Inf. Process. Lett. 32(1): 29-33 (1989) - [c18]Joachim Biskup:
Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. DBSec 1989: 13-23 - [c17]Joachim Biskup, Hans Hermann Brüggemann:
An Object-Surrogate-Value Approach for Database Languages. FMLDO 1989: 79-92 - [c16]Joachim Biskup, Hans Hermann Brüggemann:
The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989: 348-355 - [c15]Joachim Biskup, Bernhard Convent:
Towards a Schema Design Methodology for Deductive Databases. MFDBS 1989: 37-52 - 1988
- [j10]Joachim Biskup, Hans Hermann Brüggemann:
The personal model of data: Towards a privacy-oriented information system. Comput. Secur. 7(6): 575-597 (1988) - [c14]Joachim Biskup, Hans-Werner Graf:
Analysis of the Privacy Model for the Information System DORIS. DBSec 1988: 123-140 - [c13]Joachim Biskup, Holger Stiefeling:
Transitive Closure Algorithms for Very Large Databases. WG 1988: 122-147 - [e1]Joachim Biskup, János Demetrovics, Jan Paredaens, Bernhard Thalheim:
MFDBS 87, 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, GDR, January 19-23, 1987, Proceedings. Lecture Notes in Computer Science 305, Springer 1988, ISBN 3-540-19121-6 [contents] - 1987
- [j9]Joachim Biskup, Renate Meyer:
Design of Relational Database Schemes by Deleting Attributes in the Canonical Decomposition. J. Comput. Syst. Sci. 35(1): 1-22 (1987) - [c12]Joachim Biskup:
Privacy Respecting Permissions and Rights. DBSec 1987: 173-185 - [c11]Joachim Biskup, Hans Hermann Brüggemann:
Data Manipulation Languages for the Universal Relation View DURST. MFDBS 1987: 20-41 - [c10]Joachim Biskup, Uwe Räsch:
The Equivalence Problem For Relational Database Schemes. MFDBS 1987: 42-70 - 1986
- [c9]Joachim Biskup, Hans Hermann Brüggemann, L. Schnetgöke, M. Kramer:
One Flavor Assumption and Gamma-Acyclicity for Universal Relation Views. PODS 1986: 148-159 - [c8]Joachim Biskup, Bernhard Convent:
A Formal View Integration Method. SIGMOD Conference 1986: 398-407 - 1984
- [j8]Joachim Biskup:
Extending the Relational Algebra for Relations with Maybe Tuples and Existential and Universal Null Values. Fundam. Inform. 7(1): 129-150 (1984) - [j7]Joachim Biskup:
Some Variants of the Take-Grant Protection Model. Inf. Process. Lett. 19(3): 151-156 (1984) - 1983
- [j6]Joachim Biskup:
A Foundation of Codd's Relational Maybe-Operations. ACM Trans. Database Syst. 8(4): 608-636 (1983) - [c7]Joachim Biskup, Hans Hermann Brüggemann:
Universal Relation Views: A Pragmatic Approach. VLDB 1983: 172-185 - 1982
- [c6]Joachim Biskup, Hans Hermann Brüggemann:
Towards Designing Acyclic Database Schemes. Advances in Data Base Theory 1982: 3-25 - 1981
- [c5]Joachim Biskup:
A Foundation of Codd's Relational Maybe-Operations. XP2 Workshop on Relational Database Theory 1981 - 1980
- [j5]Joachim Biskup:
Inferences of Multivalued Dependencies in Fixed and Undetermined Universes. Theor. Comput. Sci. 10: 93-105 (1980)
1970 – 1979
- 1979
- [c4]Joachim Biskup:
A Formal Approach to Null Values in Database Relations. Advances in Data Base Theory 1979: 299-341 - [c3]Joachim Biskup, Umeshwar Dayal, Philip A. Bernstein:
Synthesizing Independent Database Schemas. SIGMOD Conference 1979: 143-151 - 1978
- [j4]Joachim Biskup:
On the Complementation Rule for Multivalued Dependencies in Database Relations. Acta Informatica 10: 297-305 (1978) - [j3]Joachim Biskup:
The Time Measure of One-Tape Turing Machines Does Not Have the Parallel Computation Property. SIAM J. Comput. 7(1): 115-117 (1978) - [c2]Joachim Biskup:
Path Measures of Turing Machine Computations (Preliminary Report). ICALP 1978: 90-104 - 1977
- [j2]Joachim Biskup:
Über Projektionsmengen von Komplexitätsmaßen. J. Inf. Process. Cybern. 13(7/8): 359-368 (1977) - [j1]Joachim Biskup:
On BI-Immune Isols. Math. Log. Q. 23(31-35): 469-484 (1977) - 1973
- [c1]Joachim Biskup:
Zufällige Folgen und Bi-immunität. Automatentheorie und Formale Sprachen 1973: 202-207
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint