2008 | ||
---|---|---|
8 | Matthias Merz: Enabling declarative security through the use of Java Data Objects. Sci. Comput. Program. 70(2-3): 208-220 (2008) | |
2007 | ||
7 | Thorsten Schäfer, Ivica Aracic, Matthias Merz, Mira Mezini, Klaus Ostermann: Clustering for Generating Framework Top-Level Views. WCRE 2007: 239-248 | |
2006 | ||
6 | Matthias Merz, Markus Aleksy: Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications. DEXA 2006: 449-458 | |
5 | Matthias Merz: The management of users, roles, and permissions in JDOSecure. PPPJ 2006: 85-93 | |
4 | Matthias Merz: JDOSecure: A Security Architecture for the Java Data Objects-Specification. SEDE 2006: 134-140 | |
3 | Matthias Merz: Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects. SEKE 2006: 404-409 | |
2004 | ||
2 | Heinz Kredel, Matthias Merz: The design of the IPACS distributed software architecture. ISICT 2004: 14-19 | |
2003 | ||
1 | Axel Korthaus, Matthias Merz: A Critical Analysis of JDO in the Context of J2EE. Software Engineering Research and Practice 2003: 34-42 |
1 | Markus Aleksy | [6] |
2 | Ivica Aracic | [7] |
3 | Axel Korthaus | [1] |
4 | Heinz Kredel | [2] |
5 | Mira Mezini | [7] |
6 | Klaus Ostermann | [7] |
7 | Thorsten Schäfer | [7] |