Author of the publication

Data Confidentiality in E-Government and E-Commerce.

, , , and . Security and Management, page 391-394. CSREA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration and Cataloging of Engineering Environment., and . ICSI, page 720-729. IEEE Computer Society, (1990)Click traffic analysis of short URL spam on Twitter., , , , , and . CollaborateCom, page 250-259. ICST / IEEE, (2013)Fast Data Access on Multiple Broadcast Channels., and . ICDE, page 680-682. IEEE Computer Society, (2003)Text Mining Biomedical Literature for Discovering Gene-to-Gene Relationships: A Comparative Study of Algorithms., , , , , , and . IEEE/ACM Trans. Comput. Biology Bioinform., 2 (1): 62-76 (2005)A Model to Support E-Catalog Integration., , , and . DS-9, volume 239 of IFIP Conference Proceedings, page 237-251. Kluwer, (2001)Fundamentals of Database Systems, 2nd Edition., and . Benjamin/Cummings, (1994)Semantic Integrity Constraint Checking for Multiple XML Databases., , , and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)XML Schema Mappings for Heterogeneous Database Access., , and . Information & Software Technology, 44 (4): 251-257 (2002)OOER: Toward Making the E-R Approach Object-Oriented., and . ER, page 185-206. North-Holland, (1988)A Transaction Architecture for a General Purpose Semantic Data Model., and . ER, page 511-541. ER Institute, (1991)