Startseite > Personal > Prof. Dr. Joachim Biskup

zurück

Prof. Dr. Joachim Biskup: Veröffentlichungen

  • Joachim Biskup, Marcel Preuß: Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret? In: Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference (DBSec 2013), Newark, New Jersey, USA, July 2013. LNCS, volume 7964, pp. 17-32. Springer, Heidelberg (2013).
  • Shawn Merrill, Nilgun Basalp, Joachim Biskup, Erik Buchmann, Chris Clifton, Bart Kuijpers, Walied Othman, Erkay Savas: Privacy through Uncertainty in Location-Based Services. In: IEEE 14th International Conference on Mobile Data Management (MDM 2013), Milan, Italy, June 2013. MDM (2) 2013, pp. 67-72.
  • Joachim Biskup: Logic-Oriented Confidentiality Policies for Controlled Interaction Execution. In: Databases in Networked Information Systems (DNIS 2013), Aizu, Japan, March 2013. LNCS, volume 7813, pp. 1-22, Springer, Heidelberg (2013).
  • Joachim Biskup, Lan Li: On Inference-Proof View Processing of XML Documents. IEEE Transactions on Dependable and Secure Computing, volume 10(2), pp. 99-113, 2013.
  • Joachim Biskup: Dynamic policy adaptation for inference control of queries to a propositional information system. Journal of Computer Security (JCS), volume 20, no. 5, pp. 509-546, 2012.
  • Joachim Biskup, Sven Hartmann, Sebastian Link: Probabilistic Conditional Independence under Schema Certainty and Uncertainty. In: Scalable Uncertainty Management - 6th International Conference (SUM 2012), Marburg, Germany, September 2012. LNCS, volume 7520, pp. 365-378, Springer, Heidelberg (2012).
  • Joachim Biskup: Inference-usability confinement by maintaining inference-proof views of an information system. International Journal of Computational Science and Engineering, volume 7, no. 1, pp. 17-37, 2012.
  • Joachim Biskup, Cornelia Tadros: Revising Belief without Revealing Secrets. In: Foundations of Information and Knowledge Systems (FoIKS 2012), Kiel, Germany, March 2012. LNCS, volume 7153, pp. 51-70. Springer, Heidelberg (2012)
  • Joachim Biskup, Sebastian Link: Appropriate inferences of data dependencies in relational databases. Annals of Mathematics and Artificial Intelligence, volume 63(3-4), pp. 213-255, 2011
  • J. Biskup and C. Tadros. Inference-proof View Update Transactions with Minimal Refusals . In: Proceedings of the Sixth International Workshop on Data Privacy Management (DPM 2011), Leuven, Belgium, September 2011.  LNCS, volume 7122, pp. 104-121. Springer, Heidelberg (2012).
  • Joachim Biskup: Some Remarks on Relational Database Schemes Having Few Minimal Keys. In: Conceptual Modelling and Its Theoretical Foundations. LNCS, volume 7260, pp. 19-28. Springer, Heidelberg (2012).
  • Joachim Biskup: Inference Control. Encyclopedia of Cryptography and Security (2nd Ed.), pp. 600-605, Springer, Heidelberg (2011).
  • Joachim Biskup, Marcel Preuß, Lena Wiese: On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints. In: Proceedings of the 14th Information Security Conference (ISC 2011), Xi'an, China, October 2011. LNCS, volume 7001, pp. 246-261. Springer, Heidelberg (2011).
  • Joachim Biskup, Lena Wiese: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theoretical Computer Science 412(31), pp. 4044-4072, 2011.
  • Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert: Inference-proof view update transactions with forwarded refreshments. Journal of Computer Security 19(3), pp. 487-529, IOS Press, Amsterdam, 2011.
  • Joachim Biskup: History-Dependent Inference Control of Queries by Dynamic Policy Adaption. In: Proceedings of the Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, Virginia, USA, May 2011. LNCS, volume 6818, pp. 106-121. Springer, Heidelberg (2011).
  • J. Biskup and C. Tadros, "Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation", in (Short Paper) Proceedings of the 5th International Workshop on Security (IWSEC 2010), ISBN 978-4-915256-78-3,
    Information Processing Society of Japan (IPSJ), pp. 60-77, 2010.
  • J. Biskup, S. Hartmann, S. Link. J.-H. Lochner, "Efficient Inference Control for Open Relational Queries", in Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2010), Rome, Italy, June 2010, LNCS, volume 6166, Springer, pp. 162-176.
  • J. Biskup, S. Hartmann, S. Link. J.-H. Lochner, "Chasing after Secrets in Relational Databases", in Proceedings of the IV Alberto Mendelzon Workshop on Foundations of Data Management, Buenos Aires, Argentina, May 2010, CEUR Workshop Proceedings, volume 619, CEUR-WS.org.
  • J. Biskup, "Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution". In S. Kikuchi, S. Sachdeva, and S. Bhalla, editors, Databases in Networked Information Systems, volume 5999 of Lecture Notes in Computer Science, pages 80-106. Springer Berlin / Heidelberg, 2010.
  • J. Biskup, C. Tadros and L. Wiese, "Towards Controlled Query Evaluation for Incomplete First-Order Databases", in
    Sixth International Symposium on Foundations of Information and Knowledge Systems (FoIKS 2010), LNCS, volume 5956,
    Springer, pp. 230-247, 2010.
  • M. Apel, J. Biskup, U. Flegel, M. Meier: Early Warning System on a National Level - Project AMSEL. In Proceedings of the European Workshop on Internet Early Warning and Network Intelligence (EWNI 2010), Hamburg, Germany, January 27th, 2010.
  • J. Biskup, L. Wiese: Combining Consistency and Confidentiality Requirements in First-Order Databases. In Proceedings of the 12th Information Security Conference, in Lecture Notes Computer Science, volume 5735, Springer Verlag, pages 121-134, 2009.
  • J. Biskup, C. Gogolin, J. Seiler and T. Weibert. Requirements and Protocols for
    Inference-Proof Interactions in Information Systems. In Proceedings of the
    14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France,
    September 2009. LNCS 5789, Springer, Berlin etc., pages 285-302.
  • Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier: Towards Early Warning Systems -- Challenges, Technologies and Architecture. In Proc. of the 4th International Workshop on Critical Information Infrastructures Security (CRITIS), pp. 151-164, LNCS 6027, Bonn, Germany, Sept. 30 - Okt. 2 2009, Springer, 2010.
  • J. Biskup, J. Seiler and T. Weibert. Controlled Query Evaluation and Inference-Free View Updates.
    In Data and Applications Security, Proceedings of the
     23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'09), Montreal, Canada, July 2009.
    LNCS 5645, Springer, Berlin etc., pages 1–16.
  • J. Biskup, J.-H. Lochner, and S. Sonntag. Optimization of the Controlled
    Evaluation of Closed Relational Queries. In Emerging Challenges for
    Security, Privacy and Trust, Proceedings of the 24th IFIP TC 11
    International Information Security Conference (SEC 2009), Pafos, Cyprus,
    May 2009, IFIP AICT 297, Springer, Berlin etc., pages 214-225
  • Biskup, Joachim: Security in Computing Systems Challenges, Approaches and Solutions. 2009, Approx. 720p., Hardcover, ISBN: 978-3-540-78441-8, Springer.
  • J. Biskup, L. Wiese, Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4), pages 477-494, IOS Press, Amsterdam, 2008.
  • Joachim Biskup, Gabriele Kern-Isberner, and Matthias Thimm. Towards Enforcement of Confidentiality in Agent Interactions. In M. Pagnucco and M. Thielscher (Eds.), Proceedings of the Twelfth International Workshop on Non-Monotonic Reasoning (NMR'08), pages 104-112. University of New South Wales, Technical Report UNSW-CSE-TR-0819, Sydney, Australia, September 2008.
  • J. Biskup, T. Weibert: Keeping Secrets in Incomplete Databases. International Journal of Information Security 7(3), pages 199-217, Springer, 2008.
  • J. Biskup, B. Hämmerli, M.Meier, S. Schmerl, J. Tölle, M. Vogel: Early Warning Systems -- 08102 Working Group. In: G. Carle, F. Dressler, R. Kemmerer, H. König, Ch. Kruegel (Eds.): Perspectives Workshop: Network Attack Detection and Defense, 2.-6. March 2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, ISSN: 862-4405, http://drops.dagstuhl.de/opus/volltexte/2008/1493, 2008.
  • J. Biskup, S. Link, Appropriate reasoning about data dependencies in fixed and undetermined universes, In: Proceedings of the 5th International Symposium on Foundations of Information and Knowledge Systems, FoIKS 2008, Pisa, Italy, Feb 2008, Lecture Notes in Computer Science 4932, Springer, Berlin etc., 2008, pages 58-77.
  • J. Biskup, J. Hielscher, S. Wortmann: A Trust- and Property-based Access Control Model. In: Electronic Notes in Theoretical Computer Science, volume 197, number 2, pp. 169-177.
  • J. Biskup, Folgerungskontrolle zum Schutz von Informationen, digma -- Zeitschrift für Datenrecht und Informationssicherheit 6,4 (2008), pages 28-33.
  • J. Biskup, D.W. Embley, J.-H. Lochner, Reducing inference control to access control for normalized database schemas, Information Processing Letters 106 (2008), pages 8-12.
  • J. Biskup, R. Menzel, Building a Tool for Cost-Based Design of Object-Oriented Database Schemas, In C.Parent, K.-D. Schewe, V. C. Storey and B. Thalheim (eds.); Proceedings of the 26th International Conference on Conceptual Modeling (ER 2007), LNCS, Volume 4801, pages 120-131, Springer, 2007.
  • J. Biskup and J.-H. Lochner: Enforcing confidentiality in relational databases by reducing inference control to access control, In: Information Security, 10th International Conference (ISC 2007), Valparaiso, Chile, October 9-12, 2007, Volume 4779 of LNCS, Springer, pages 407-422.
  • Joachim Biskup, Javier Lopez (Eds.): Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, LNCS 4734, Springer.
  • J. Biskup, P. Bonatti: Controlled query evaluation with open queries for a decidable relational submodel. Annals of Mathematics and Artifical Intelligence, volume 50, numbers 1-2, pages 39-77, 2007.
  • J. Biskup, T. Weibert: Confidentiality Policies for Controlled Query Evaluation. In: Proceedings of the 21th IFIP WG11.3 Working Conference on Data and Applications Security, LNCS 4602, Springer, 2007.
  • J. Biskup, D. M. Burgard, T. Weibert, L. Wiese: Inference Control in Logic Databases as a Constraint Satisfaction Problem. Third International Conference on Information Systems Security, Delhi, India. Lecture Notes in Computer Science 4812, Springer, 2007.
  • J. Biskup, C. Tsatedem, L. Wiese: Secure mediation of join queries by processing ciphertexts. In: Proceedings of the First International Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP'07), IEEE 23rd International Conference on Data Engineering, IEEE Computer Society, 2007, ISBN: 978-1-4244-0832-0.
  • J. Biskup, E. Ferrari, B. Carminati, F. Müller, S. Wortmann: Towards Secure Execution Orders for Web Services. In: Proceedings of the 2007 IEEE International Conference on Web Services, pages 489-496, IEEE Computer Society, 2007.
  • U. Flegel, J. Biskup: Requirements of Information Reductions for Cooperating Intrusion Detection Agents . In Günter Müller, editor, Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006) , number 3995 in Lecture Notes in Computer Science , pages 466-480 , Freiburg, Germany, June 2006, Springer , ISBN 3-540-34640-6.
  • J. Biskup, J. Parthe: Optimistic anonymous participation in inter-organizational workflow instances, Dortmund, März 2006. (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2006)
  • J. Biskup, P. Bonatti: Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. In J. Dix, S.J. Hegner, editors, Proceedings of the Fourth International Symposium on Foundations of Information and Knowledge Systems (FoIKS), in Lecture Notes Computer Science, pages 43-62, volume 3861, Springer Verlag, 2006.
  • J. Biskup, L. Wiese: On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. In Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2006), in Lecture Notes Computer Science, volume 4127, Springer Verlag, pages 30-43, 2006.
  • J. Biskup, R. Menzel: Optimising abstract object-oriented database schemas. In Proceedings of the 25th International Conference on Conceptual Modeling (ER 2006), in Lecture Notes Computer Science, volume 4215, Springer Verlag, pages 528 -- 543, 2006.
  • J. Biskup, J. Parthe: Optimistic anonymous participation in inter-organizational workflow instances. In Proceedings of the 2nd International Conference on Information Systems Security (ICISS 2006) , in Lecture Notes Computer Science, volume 4332, Springer Verlag, pages 86-100, 2006.
  • J. Biskup, T. Weibert: Keeping Secrets in Incomplete Databases [Extended Abstract], Foundations of Computer Security - FCS'05, Chicago, IL, June 30 - July 1, 2005.
  • J. Biskup, B. Sprick, L. Wiese: Secure Mediation with Mobile Code. In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2005), Lecture Notes in Computer Science 3654, pages 267-280, Springer Verlag, 2005.
  • J. Biskup, P.A. Bonatti: Controlled query evaluation for enforcing confidentiality in complete information systems, In: International Journal of Information Security, Special issue on ESORICS 2002, Volume 3, Number 1, October 2004, ISSN 1615-5262, Springer Verlag
  • J. Biskup, S. Wortmann: Towards a Credential-based Implementation of Compound Access Control Policies. In 2004 Symposium on Access Control Models and Technologies, Juni 2004, IBM, Yorktown Heights, New York, USA.
  • J. Biskup, T. Leineweber, J. Parthe: Administration Rights in the SDSD-System, Data and Applications Security XVII Status and Prospects (ed.: S. De Capitani di Vimercati, I. Ray, I. Ray), Kluwer, Boston etc., 2004, pp. 149 - 162; see also longer version in a technical report from 2003.
  • J. Biskup, P.A. Bonatti: Controlled query evaluation for known policies by combining lying and refusal In Annals of Mathematics and Artificial Intelligence, 40, , pp. 37-62, 2004, Kluwer Academic Publishers .
  • J. Biskup, T. Weibert: Refusal in incomplete databases, Research Directions in Data and Applications Security XVIII (ed.: C. Farkas, P. Samarati), Kluwer/Springer, Boston etc., 2004, pp. 143 - 157.
  • J. Biskup, J. Paredaens, Th. Schwentick, J. van den Bussche: Solving equations in the relational algebra, SIAM Journal on Computing 33,5 (2004), pp. 1052 - 1066.
  • J. Biskup, S. Wortmann: Towards a credential-based implementation of compound access control policies , Dortmund, November 2003. (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2003)
  • J. Biskup, T. Leineweber, J. Parthe: Administration Rights in the SDSD-System , Dortmund, 06/2003. (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2003)
  • C. Altenschmidt and J. Biskup and U. Flegel and J. Karabulut: Secure Mediation: Requirements, Design and Architecture. Journal of Computer Security , Vol. 11, No. 3 , pages 365-398, June 2003, IOS Press , ISSN 0926-227X.
  • Joachim Biskup and David W. Embley: Extracting information from heterogeneous information sources using ontologically specified target views. Information Systems, Volume 28, Number 3, May 2003, pages 169-212; see also older technical report.
  • J. Biskup, Y. Karabulut: Mediating Between Strangers: A Trust Management Based Approach. 2nd Annual PKI Research Workshop, pages 80-95, April 2003, Gaithersburg, USA.
  • J. Biskup, Y. Karabulut: A Hybrid PKI Model: Application to Secure Mediation. In E. Gudes, S. Shenoi (Editors), Research Directions in Data and application Security , 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, pages 271-282, Kluwer Academic Publishers, 2003.
  • J. Biskup, T. Polle: Adding inclusion dependencies to an object-oriented data model with uniqueness constraints . In Acta Informatica 39 , pp. 391-449, 2003, Springer Verlag.
  • J. Biskup, P.A. Bonatti: Controlled query evaluation for known policies by combining lying and refusal In Annals of Mathematics and Artificial Intelligence, 40, , pp. 37-62, 2004, Kluwer Academic Publishers .
  • J. Biskup, B. Sprick: Towards Unifying Semantic Constraints and Security Constraints . In L. Bertossi, G. Katona, K.-D. Schewe, B. Thalheim (Eds.): Semantics in Databases, LNCS 2582, pp. 34-62, 2003, Springer Verlag.
  • J. Biskup and U. Flegel: Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers (in German). In Sigrid Schubert, Bernd Reusch and Norbert Jesse, editors, Informatik bewegt, Proceedings of the 32. annual conference of the Gesellschaft für Informatik e.V.(GI) (Informatik 2002) , number P-19 in Lecture Notes in Informatics , pages 488-494, Dortmund, Germany, October 2002, Köllen Verlag , ISBN 3-88579-348-2; see also longer version in a technical report.
  • J. Biskup and U. Flegel: Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers (in German), Dortmund, August 2002. (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2002)
  • J. Biskup, P. Bonatti: Controlled query evaluation for known policies by combining lying and refusal, Proc. 2nd International Symposium on Foundations of Information and Knowledge Systems, FoIKS 2002, Schloss Salzau, Febr. 2002, Lecture Notes in Computer Science 2284, Springer, Berlin etc., 2002, pp. 49 - 66.
  • J. Biskup, R. Menzel: A Flexible Cost Model for Abstract Object-Oriented Database Schemas. In S. Spaccapietra, S. T. March and Y. Kambayashi (Eds.): ER 2002, LNCS 2503, pp. 444-462, 2002, Springer Verlag.
  • J. Biskup, Y. Karabulut: A Hybrid PKI Model with an Application for Secure Mediation (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2002)
  • J. Biskup, P. Bonatti: Confidentiality policies and their enforcement for controlled query evaluation. In D. Gollmann et al. (Eds.): Computer Security - ESORICS 2002, LNCS 2502, pp. 39-55, 2002, Springer Verlag.
  • J. Biskup: Credential-basierte Zugriffskontrolle: Wurzeln und Ausblick (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2002)
  • J. Biskup: Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick, Workshop "Credential-basierte Zugriffskontrolle in offenen interoperablen IT-Systemen", In: "Informatik bewegt", Proc. Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik (ed.: S. Schubert, B. Reusch, N. Jesse), Lecture Notes in Informatics P-19, Gesellschaft für Informatik, Bonn, 2002, pp. 423 - 428.
  • C. Altenschmidt, J. Biskup: Explicit representation of constrained schema mappings for mediated data integration, Proc. 2nd Workshop on Databases in Networked Information Systems, DNIS 2002, Aizu, Japan, 2002, Lecture Notes in Computer Science 2544, Springer, Berlin etc., pp. 103 - 132.
  • J. Biskup, T. Leineweber: State-dependent security decisions for distributed object-systems, Database and Application Security XV (ed.: M.S. Olivier, D.L.Spooner), Kluwer, Boston etc., 2002, pp. 105 - 118; see also longer version in a technical report from 2001.
  • J. Biskup, R. Menzel, An abstract database machine for cost driven design of object-oriented database schemas, Proc. Advances in Databases and Information Systems, ADBIS 01, Sept. 2001, Lecture Notes in Computer Science 2151, Springer, Berlin etc., 2001, pp. 366 - 380. (Abstract)
  • J. Biskup, R. Menzel: An Abstract Database Machine for Cost Driven Design of Object-Oriented Database Schemas (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2001)
  • J. Biskup, P. Bonatti: Controlled Query Evaluation for Known Policies by Combinding Lying and Refusal (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2001)
  • J. Biskup, T. Polle, Decomposition of object-oriented database schemas, Annals of Mathematics and Artificial Intelligence 33,2-4 (2001), pp. 119 - 155. (Abstract)
  • J. Biskup, P. Bonatti, Lying versus refusal for known potential secrets, Data & Knowledge Engineering 38 (2001), pp. 199 - 222.
  • J. Biskup and U. Flegel: On Pseudonymization of Audit Data for Intrusion Detection . In Hannes Federrath, editor, Designing Privacy Enhancing Technologies , number 2009 in Lecture Notes in Computer Science , pages 161-180, Berkeley, California, July 2000, Springer Verlag , Heidelberg, 2001, ISBN 3-540-41724-9;see also longer version in preproceedings.
  • R. van de Riet (moderator), V. Atluri, J. Biskup, S. Osborn, A. Rosenthal, R. Serban, G. Wiederhold, Panel 2 of IFIP WG 11.3 Conference on Database Security, Schoorl, Aug. 2000, Data and Application Security - Developments and Directions (ed.: B. Thuraisingham, R. van de Riet, K.R. Dittrich, Z. Tari), Kluwer, Boston etc., 2001, pp. 367 - 371.
  • C. Altenschmidt, J. Biskup, Y. Karabulut, Security architecture of the Multimedia Mediator, Data and Application Security - Developments and Directions (ed.: B. Thuraisingham, R. van de Riet, K.R. Dittrich, Z. Tari), Kluwer, Boston etc., 2001, pp. 77 - 87.
  • J. Biskup, T. Leineweber: State-Dependent Security Decisions for Distributed Object-Systems (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2001)
  • J. Biskup, B. Sprick Towards unifying semantic constraints and security constraints in distributed information systems (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2001)
  • J. Biskup and U. Flegel: Threshold-based Identity Recovery for Privay Enhanced Applications . In Sushil Jajodia and Pierangela Samarati, editors, Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS 2000) , pages 71-79, Athens, Greece, November 2000, ACM Press , ISBN 1-58113203-4.
  • J. Biskup and U. Flegel: Transaction-Based Pseudonyms in Audit-Data for Privacy Respecting Intrusion Detection . In Hervé Debar, Ludovic Mé and S. Felix Wu, editors, Proceedings of the Third International Symposium on Recent Advances in Intrusion Detection (RAID 2000) , number 1907 in Lecture Notes in Computer Science , pages 28-48, Toulouse, France, October 2000, Springer Verlag , ISBN 3-540-41085-6.
  • J. Biskup, D. W. Embley: Mediated Information Gain; in Proceedings of the International Database Engineering and Applications Symposium (IDEAS 2000), September 2000, Yokohama, Japan, IEEE Computer Science Press, 2000, pp. 360-370.
  • C. Altenschmidt, J. Biskup, Y. Karabulut: Security Architecture of the Multimedia Mediator ; in Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, August 2000, Schoorl, Holland, pages 77-87.
  • J. Biskup and U. Flegel: On Pseudonymization of Audit Data for Intrusion Detection. In Hannes Federrath, editor, Preproceedings of the Workshop on Design Issues in Anonymity and Unobservability , pages 147-164, Berkeley, California, July 2000, TR-00-011, International Computer Science Institute, 1947 Center St., Suite 600, Berkeley, California 94704-1198, USA.
  • J. Biskup, T. Polle: Constraints in Object-Oriented Databases (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2000)
  • J. Biskup, T. Polle: Decomposition of Database Classes under Path Functional Dependencies and Onto Constraints; in K.-D. Schewe, B. Thalheim, editors, FoIKS 2000, pages 31-49, number 1762 in Lecture Notes in Computer Science, 2000, © Springer-Verlag, Berlin, Heidelberg.
  • J. Biskup, T. Polle: Decomposition of Object-Oriented Database Schemas (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 2000)
  • J. Biskup: For Unknown Secrecies Refusal is Better than Lying; in Data & Knowledge Engineering 33 (2000), Elsevier Science, Amsterdam, 2000, 1-23; see also an earlier version from preproceedings.
  • J. Biskup: For Unknown Secrecies Refusal is Better than Lying; in V. Atluri and J. Hale, editors, Research Advances in Database and Information Systems Security, pages 127-141, Kluwer Academic Publishers, Boston etc., 2000; see also version from preproceedings.
  • L. Golubchik, V.S. Subrahmanian, S. Marcus, J. Biskup: Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers; in IEEE Transactions on Knowledge and Data Engineering, Vol. 12, No. 1, Jan/Feb 2000, 60-77.
  • J. Biskup: For Unknown Secrecies Refusal is Better than Lying; in Preproceedings of the IFIP TC11 WG11.3 13th Annual Working Conference on Database Security, Seattle, Washington, USA, July 1999; see also the journal version
  • J. Biskup, R. Menzel, T. Polle: Ein Kostenmodell für abstrakte objektorientierte Datenbankschemas; in Proceedings of the 11. Workshop "Grundlagen von Datenbanken", pages 72-76, Luisenthal/Thüringen, Germany, May 1999. Friedrich-Schiller-Universität Jena.
  • C. Altenschmidt, J. Biskup: Entwurf und Realisierung eines Multimedia-Mediators (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 1999)
  • J. Biskup, D.W. Embley: Extracting Information from Heterogeneous Information Sources Using Ontologically Specified Target Views (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 1999)
  • J. Biskup, U. Flegel and Y. Karabulut: Secure Mediation: Requirements and Design . In Sushil Jajodia, editor, Database Security XII - Status and Prospects , pages 127-140, Chalkidiki, Greece, July 1998. Kluwer Academic Publishers , 1999, ISBN 0-7923-8488-1; see also longer version in preproceedings.
  • J. Biskup:Selbstbestimmte technische Durchsetzung informationeller Zusicherungen; in Angewandte Mathematik, insbesondere Informatik Beispiele erfolgreicher Wege zwischen Mathematik und Informatik, Patrick Horster (Hrsg.), pages 35-57, Vieweg, Braunschweig-Wiesbaden, 1999.
  • J. Biskup: Technical enforcement of informational assurances; in S. Jajodia, editor, Database Security XXII: Status and Prospects, pages 17-40. Kluwer, Boston etc., 1999; see also a longer version from preproceedings.
  • J. Biskup, U. Flegel and Y.Karabulut: Towards Secure Mediation . In Alexander Böhm, Dirk Fox, Rüdiger Grimm and Detlef Schoder, editors, Sicherheit und Electronic Commerce - Konzepte, Modelle, technische Möglichkeiten , DuD-Fachbeiträge , pages 93-106, Essen, Germany, October 1998, Vieweg-Verlag , ISBN 3-528-03139-5.
  • C. Altenschmidt, J. Biskup, J. Freitag: Type Embedding for Integrating Heterogeneous Information Sources (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 1999)
  • C. Altenschmidt, J. Biskup, J. Freitag, B. Sprick: Weakly constraining multimedia types based on a type embedding ordering; in Proc. 4th Int. Workshop on Multimedia Information Systems, pages 121-129, number 1508 in Lecture Notes in Computer Science, Springer, Berlin, September 1998
  • J. Biskup, U. Flegel and Y. Karabulut: Secure Mediation: Requirements and Design . In Preproceedings of the 12th Annual IFIP WG 11.3 Working Conference on Database Security , Chalkidiki, Greece, July 1998.
  • J. Biskup: Technical Enforcement of Informational Assurances; in Preproceedings of the 12th Annual IFIP WG 11.3 Working Conference on Database Security, July 1998, Chalkidiki, Greece.
  • J. Biskup: Achievements of Relational Database Schema Design Theory Revisited; In Bernhard Thalheim and Leonid Libkin, editors, Semantics in Databases,pages 29-54, number 1358 in Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1998.
  • A. Knoll, C. Altenschmidt, J. Biskup, H.-M. Blüthgen, I. Glöckner, S. Hartrumpf, H. Helbig, C. Henning, R. Lüling, B. Monien, T. Noll, N. Sensen: An Integrated Approach to Semantic Evaluation and Content-Based Retrieval of Multimedia Documents; in Proc. 2nd European Conference on Research and Advanced Technology for Digital Libraries, pages 409-428, Heraklion, Greece, 1998
  • J. Biskup: Klein oder groß? - lebendig! Zur Herausforderung des universitären "Überflickens"; In Tilman Borsche, Christian Strub, Hans-Friedrich Bartig und Johannes Köhler (Herausgeber), Begriff und Wirklichkeit der kleinen Universität, Positionen und Reflexionen - Ein Kolloquium des Instituts für Philosophie der Universität Hildesheim, Universität Hildesheim, 1998.
  • J. Biskup, J. Freitag, Y. Karabulut, B. Sprick: A Mediator for Multimedia Systems; In Proc. 3rd Workshop on Multimedia Information Systems, Como, Italy, 1997.
  • J. Biskup, A. Kluck: A New Approach to Inferences of Semantic Constraints; In Proc. First East-European Symposium on Advances in Databases and Information Systems (ADBIS '97), St.-Petersburg.
  • J. Biskup, J. Freitag, Y. Karabulut, B. Sprick: Query Evaluation in an Object-Oriented Multimedia Mediator; In Proc. Intern. Conf. on Object-Oriented Information Systems (OOIS '97), Brisbane.
  • J. Biskup, R. Menzel, T. Polle, Y. Sagiv: A Case Study on Object-Oriented Database Schema Design; Proc. 2nd Intern. Baltic Workshop on Databases and Information Systems, Institute of Cybernetics, Tallinn, 1996, 37-52.
  • J. Biskup, G. Bleumer: Cryptographic protection of health information: cost and benefit; International Journal of Bio-Medical Computing 43 (1996) 61-67.
  • J. Biskup, R. Menzel, T. Polle, Y. Sagiv: Decomposition of Relationships through Pivoting; Proc. 15th International Conference on Conceptual Modeling, LNCS 1157, Springer-Verlag, Berlin 1996, 28-41.
  • J. Biskup, R. Menzel, T. Polle: Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas; Proc. 2nd International Workshop on Advances in Databases and Information Systems (ADBIS '95), Springer-Verlag, Berlin 1996, 109-136.
  • J. Biskup: Database schema design theory: achievements and challenges; Proc. 6th Int. Conference on Information Systems and Data Management, CISMOD '95, Bombay, November 1995, LNCS 1006, Springer-Verlag, 1995, 14-44.
  • J. Biskup, R. Menzel, T. Polle, Y. Sagiv: A case study on object-oriented database schema design; Hildesheimer Informatik-Berichte 27/95 (Sept. 1995), Institut für Informatik, Universität Hildesheim. (Technischer Bericht, Fachbereich Informatik, Universität Dortmund, 1995)
  • J. Biskup, G. Bleumer: Cryptographic Protection of Health Information: Cost and Benefit; IMIA, International Medical Information Association (WG4), Preproceedings, Data Protection and Security Working Conference, Helsinki, 30.9.-3.10.95, 60-67.
  • J. Biskup, R. Menzel, T. Polle: Transforming an Entity-Relationship Schema into Object-Oriented Database Schemas; Proc. 2nd International Workshop on Advances in Databases and Information Systems (ADBIS'95) 1, Moskau, Rußland, Juni 1995, 67-78.
  • J. Biskup, G. Bleumer: SECURE Talk: A Software Demonstrator for Confidential and Authentic Transfer of electronic documents in Local Area Networks; exhibition catalogue, Interhospital '95, 19. Hospital Congress, Hannover 25.-28.4.95, 33.
  • J. Biskup, G. Bleumer: SECURE Talk: Softwareprototyp zum vertraulichen und authentischen Transfer elektronischer Dokumente in lokalen Netzwerken; Ausstellungskatalog, Interhospital '95, 19. Hospital Congress, Hannover 25.-28.4.95, 33.
  • J. Biskup: Grundlagen von Informationssystemen; Vieweg, Braunschweig-Wiesbaden, xiii + 543 Seiten, 1995.
  • J. Biskup: Informatik: Gestalten von Formalismen; Vision 2000 - Kunst, Wissenschaft und gesellschaftliches Leben nach der Jahrtausendwende (S. Vietta, Hrsg.), Olms, Hildesheim etc., 1995, 151-171.
  • J. Biskup, G. Bleumer: Kryptographische Mechanismen; Technologie-Informationen Niedersächsischer Hochschulen 1 (1995) 2.
  • J. Biskup, P. Dublish, Y. Sagiv: Optimization of a subclass of conjunctive queries; Acta Informatica 32 (1995) 1-26.
  • J. Biskup, G. Bleumer, J. Brauckmann: Secure Talk: Datensicherheit ohne Ballast; Faltblatt, Universität Hildesheim, 1995.
  • J. Biskup, G. Bleumer, J. Brauckmann: Secure Talk: Security and Privacy at Your Fingertips; Faltblatt, Universität Hildesheim, 1995.
  • J. Biskup, M. Morgenstern, C. Landwehr (eds.): Proc. IFIP WG 11.3 Eighth Annual Working Conference on Database Security, Bad Salzdetfurth, 23.-26.8.1994; Hildesheimer Informatik-Berichte 20/94, August 1994.
  • J. Biskup, R. Menzel, T. Polle: Transforming an entity-relationship schema into object-oriented database schemas; Hildesheimer Informatik-Berichte 17/94, Juni 1994.
  • J. Biskup, Ch. Eckert: About the enforcement of state dependent security specifications; Database Security VII: Status and Prospects (T. F. Keefe, C. E. Landwehr, eds.), North Holland, 1994, 3-17.
  • J. Biskup, Ch. Eckert: Ein Mechanismus zur Durchsetzung von Sicherheitsspezifikationen; in: Kurzfassungen 6. Workshop "Grundlagen von Datenbanken", Bad Helmstedt 1994, Technischer Bericht 94-01, Otto-von-Guericke-Universität Magdeburg.
  • J. Biskup: Impacts of creating, implementing and using formal languages; Proc. IFIP 13th World Computer Congress, Hamburg 1994, Volume III: Linkage and Developing Countries (K. Duncan, K. Krueger, eds.), North-Holland 1994, 402-407.
  • J. Biskup, G. Bleumer: Reflections on security of database and datatransfer systems in health care; Proc. IFIP 13th World Computer Congress, Hamburg 1994, Volume II: Applications and Impacts (K. Brunnstein, E. Raubold, eds.), North-Holland 1994, 549-556.
  • J. Biskup, R. Menzel, T. Polle: Schematransformation für F-Logik; in: Kurzfassungen 6. Workshop "Grundlagen von Datenbanken", Bad Helmstedt 1994, Technischer Bericht 94-01, Otto-von-Guericke-Universität Magdeburg.
  • J. Biskup, R. Menzel, T. Polle: Transformation von Entity-Relationship Schemata in objektorientierte Datenbankschemata; in: Kurzfassungen 6. Workshop "Grundlagen von Datenbanken", Bad Helmstedt 1994, Technischer Bericht 94-01, Otto-von-Guericke-Universität Magdeburg.
  • J. Biskup, Ch. Eckert: About the Enforcement of State Dependent Security Specifications; Proceedings of the IFIP WG 11.3 Seventh Annual Working Conference on Database Security, Huntsville/Alabama (USA), September 1993, 2-17. Erscheint auch in Database Security VII: Status and Prospects, North Holland.
  • J. Biskup, Ch. Eckert: Über die Durchsetzung von zustandsabhängigen Sicherheitsspezifikationen; Tagung des Arbeitskreises der GI Datenbanken "Grundlagen von Informationssystemen", Universität Rostock, Fachbereich Informatik, Berichte 3-93, Juni 1993.
  • J. Biskup, H. Stiefeling: Evaluation of upper bounds and least nodes as database operations; Proc. FODO´93, 4th Int. Conference on Foundations of Data Organization and Algorithms, Chicago, USA, Okt. 1993, LNCS 730, Springer, 1993, 197-214.
  • J. Biskup, P. Dublish: Objects in relational database schemes with functional, inclusion and exclusion dependencies, RAIRO Theoretical Informatics and Applications 27 (1993), 183-219.
  • J. Biskup, Ch. Eckert: Sichere Delegation in Informationssystemen; Verläßliche Informationssysteme, Proceedings der GI-Fachtagung VIS '93; DuD Fachbeiträge 16, Vieweg, Wiesbaden 1993, 107-133.
  • J. Biskup: Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft"; Verläßliche Informationssysteme, Proceedings der GI-Fachtagung VIS '93, DuD Fachbeiträge 16, Vieweg, Wiesbaden 1993, 239-254.
  • J. Biskup, C. Eckert: Sichere Delegation in Informationssystemen; angenommen für die 3. GI-Fachtagung VIS '93 - Verläßliche Informationssysteme, 11.-13. Mai 1993, München.
  • J. Biskup, R. Hull (Eds.): Database Theory - ICDT '92, 4th International Conference, Berlin, Okt. 1992, Proceedings, Lecture Notes in Computer Science 646, Springer-Verlag, Berlin etc., 1992.
  • J. Biskup: Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft"; angenommen für die 3. GI-Fachtagung VIS '93 - Verläßliche Informationssysteme, 11.-13. Mai 1993, München.
  • J. Biskup, H. Stiefeling: Evaluation of upper bounds and least nodes as database operations; Hildesheimer Informatik-Berichte 11/92, 1992.
  • J. Biskup, P. Dublish: Objects in relational database schemes with functional, inclusion and exclusion dependencies; Proc. MFDBS '91, 3rd Symposium on Mathematical Fundamentals of Database Systems, Rostock, May 1991, LNCS 495, Springer, 1991, 276-290.
  • J. Biskup, H. H. Brüggemann: Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick ; Proc. GI-Fachtagung Verläßliche Informationssysteme (VIS'91), März 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 146-158.
  • J. Biskup: Sicherheit: Gewährleistung und Begrenzung des Informationsflusses; Entwicklungstendenzen bei Datenbank-Systemen; (G. Vossen, K.-U. Witt, Hrsg.) Oldenbourg, 1991, 363-388;
    Gekürzt in: Proc. GI-Fachtagung Verläßliche Informationssysteme (VIS'91), März 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 1-21.
  • J. Biskup: Medical database security; Proc. EC.AIM Working Conf. on Data Protection and Confidentiality in Health Informatics, Brüssel, März 1990, IOS Press, Amsterdam 1991, 214-230.
  • J. Biskup, J. Demetrovics, L. O. Libkin, I. B. Muchnik: On the relational database schemes having unique minimal keys; J. Information Processing and Cybernetics (EIK) 27 (1991) 217-225.
  • J. Biskup, B. Convent: Relational chase procedures interpreted as resolution with paramodulation; Fundamenta Informaticae 15 (1991) 123-138.

zurück