


default search action
Data & Knowledge Engineering, Volume 43, 2002
Volume 43, Number 1, October 2002
- Ehud Gudes, Aharon Tubman:
AutoWF - A secure Web workflow system using autonomous objects. 1-27 - Minsoo Kim, Seung J. Noh, Yeongho Kim, Suk-Ho Kang:
A customizable view for Web-based STEP data. 29-56 - Mario A. Nascimento, Eleni Tousidou, Vishal Chitkara, Yannis Manolopoulos:
Image indexing and retrieval using signature trees. 57-77 - Sourav S. Bhowmick
, Sanjay Madria, Wee Keong Ng
:
What can a web bag discover for you? 79-119
Volume 43, Number 2, November 2002
- K. Selçuk Candan, Wen-Syan Li:
Reasoning for Web document associations and its applications in site map construction. 121-150 - Wen-Syan Li, Wang-Pin Hsiung, Oliver Po, K. Selçuk Candan, Divyakant Agrawal:
Evaluations of architectural designs and implementation for database-driven web sites. 151-177 - Necip Fazil Ayan, Wen-Syan Li, Okan Kolak:
Automating extraction of logical domains in a web site. 179-205 - Fernando Berzal Galiano
, Juan C. Cubero
, Fernando Cuenca, Juan Miguel Medina
:
Relational decomposition through partial functional dependencies. 207-234
Volume 43, Number 3, December 2002
- Bhavani Thuraisingham, Reind P. van de Riet:
Data and applications security (Guest editorial). 235-236 - Elisa Bertino, Silvana Castano
, Elena Ferrari
, Marco Mesiti:
Protection and administration of XML data sources. 237-260 - Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amgad Fayad:
Consistent policy enforcement in distributed systems using mobile policies. 261-280 - Martin S. Olivier
, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. 281-292 - Steve Barker:
Protecting deductive databases from unauthorized retrieval and update requests. 293-315 - Sylvia L. Osborn:
Integrating role graphs: a tool for security integration. 317-333

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.