2008 | ||
---|---|---|
73 | Reind P. van de Riet: Mokum for Correctness by Design in Relation to MDA. UNISCON 2008: 352-364 | |
72 | Reind P. van de Riet: Introduction to the special issue on DKE 25 years. Data Knowl. Eng. 67(2): 219 (2008) | |
71 | Reind P. van de Riet: Thank you referees, authors and readers of DKE. Data Knowl. Eng. 67(2): 220-233 (2008) | |
70 | Reind P. van de Riet: Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace. Data Knowl. Eng. 67(2): 293-329 (2008) | |
2004 | ||
69 | Reind P. van de Riet: Editorial Introduction by the Editor for Europe. Data Knowl. Eng. 50(3): 247-260 (2004) | |
68 | Reind P. van de Riet: The future refereeing process in Cyberspace of the Data & Knowledge Engineering Journal: an attempt in guaranteeing security and privacy on three levels. Data Knowl. Eng. 50(3): 305-339 (2004) | |
2003 | ||
67 | Wouter Teepe, Reind P. van de Riet, Martin S. Olivier: WorkFlow Analyzed for Security and Privacy in Using Databases. Journal of Computer Security 11(3): 353-364 (2003) | |
2002 | ||
66 | Peter P. Chen, Reind P. van de Riet: Editorial introduction. Data Knowl. Eng. 41(2-3): 125-132 (2002) | |
65 | Reind P. van de Riet: Notes on a classification for DKE. Data Knowl. Eng. 41(2-3): 133-139 (2002) | |
64 | Reind P. van de Riet: Peter Chen honoured with the Stevens Award for advancing software development methods. Data Knowl. Eng. 41(2-3): 273-282 (2002) | |
63 | Ana M. Moreno-Capuchino, Reind P. van de Riet: Guest editorial: Special issue NLDB '01. Data Knowl. Eng. 42(3): 247-249 (2002) | |
62 | Bhavani M. Thuraisingham, Reind P. van de Riet: Data and applications security (Guest editorial). Data Knowl. Eng. 43(3): 235-236 (2002) | |
2001 | ||
61 | Ana María Moreno, Reind P. van de Riet: Applications of Natural Language to Information Systems, 6th International Workshop NLDB'01, June 28-29, 2001, Madrid, Spain, Proceedings GI 2001 | |
60 | Bhavani M. Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari: Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 Kluwer 2001 | |
59 | Frank K. H. A. Dehne, Ans A. G. Steuten, Reind P. van de Riet: WORDNET++: A lexicon for the COLOR-X-method. Data Knowl. Eng. 38(1): 3-29 (2001) | |
58 | Radu Serban, Reind P. van de Riet: Enforcing policies with private guardians. Electr. Notes Theor. Comput. Sci. 63: (2001) | |
2000 | ||
57 | Wouter Teepe, Reind P. van de Riet, Martin S. Olivier: WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282 | |
56 | Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold: Panel. DBSec 2000: 373 | |
55 | Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban: A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. DEXA 2000: 287-301 | |
54 | P. R. Griffioen, P. I. Elsas, Reind P. van de Riet: Analysing Enterprises: The Value Cycle Approach. DEXA 2000: 685-697 | |
53 | Ans A. G. Steuten, Frank K. H. A. Dehne, Reind P. van de Riet: WordNet++: A Lexicon Supporting the Color-X Method. NLDB 2000: 1-16 | |
52 | Ana M. Moreno-Capuchino, Natalia Juristo Juzgado, Reind P. van de Riet: Formal justification in object-oriented modelling: A linguistic approach. Data Knowl. Eng. 33(1): 25-47 (2000) | |
51 | Ans A. G. Steuten, Reind P. van de Riet, Jan L. G. Dietz: Linguistically based conceptual modeling of business communication. Data Knowl. Eng. 35(2): 121-136 (2000) | |
1999 | ||
50 | Ehud Gudes, Martin S. Olivier, Reind P. van de Riet: Modeling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security 7(4): (1999) | |
1998 | ||
49 | P. I. Elsas, P. M. Ott de Vries, Reind P. van de Riet: Computing Conspiracies. DEXA Workshop 1998: 256-266 | |
48 | Reind P. van de Riet, Wouter Janssen, Peter de Gruijter: Security Moving from Database Systems to ERP Systems. DEXA Workshop 1998: 273-280 | |
47 | Martin S. Olivier, Reind P. van de Riet, Ehud Gudes: Specifying Application-Level Security in Workflow Systems. DEXA Workshop 1998: 346-351 | |
46 | Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn: Internet Security Incidents, a Survey within Dutch Organisations. WebNet 1998 | |
45 | Martin Caminada, Reind P. van de Riet, Arjen van Zanten, Leendert van Doorn: Internet security incidents, a survey within Dutch organizations. Computers & Security 17(5): 417-433 (1998) | |
44 | Peter P. Chen, Reind P. van de Riet: Introduction to the Special Issue Celebrating the 25th Volume of Data & Knowledge Engineering: DKE. Data Knowl. Eng. 25(1-2): 1-9 (1998) | |
43 | Reind P. van de Riet: Complex Objects: Theory and Practice from a Data- and Knowledge Engineering Perspective, as Seen in and from Yellostone Park. Data Knowl. Eng. 25(1-2): 217-238 (1998) | |
42 | J. F. M. Burg, Reind P. van de Riet: Enhancing CASE Environments by Using Linguistics. International Journal of Software Engineering and Knowledge Engineering 8(4): 435-448 (1998) | |
1997 | ||
41 | Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier: Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 | |
40 | Reind P. van de Riet: Research in the SIKS Research School: An Example of a Cooperation in Using Linguistic Tools for Requirements Specification in Cyberspace. GI Jahrestagung 1997: 505 | |
39 | Reind P. van de Riet, Hans F. M. Burg: Modelling Alter-egos in Cyberspace Using a Work Flow Management Tool: Who Takes Care of Security and Privacy? WebNet 1997 | |
38 | M. O. Froehlich, Reind P. van de Riet: Text Generation in Business Object Frameworks. WebNet 1997 | |
37 | J. F. M. Burg, Reind P. van de Riet: The Impact of Linguistics on Conceptual Models: Consistency and Understandability. Data Knowl. Eng. 21(2): 131-146 (1997) | |
36 | Bram van der Vos, Jon Atle Gulla, Reind P. van de Riet: Verification of Conceptual Models Based on Linguistic Knowledge. Data Knowl. Eng. 21(2): 147-163 (1997) | |
35 | Reind P. van de Riet, Andrea Junk, Ehud Gudes: Security in Cyberspace: A Knowledge-Base Approach. Data Knowl. Eng. 24(1): 69-96 (1997) | |
1996 | ||
34 | Reind P. van de Riet, Ehud Gudes: An Object-Oriented Database Architecture for Providing Securty in Cyberspace. DBSec 1996: 120-144 | |
33 | Reind P. van de Riet, J. F. M. Burg: Modelling alter egos in cyberspace: Who is responsible? WebNet 1996 | |
32 | Reind P. van de Riet, J. F. M. Burg: Linguistic Tools for Modelling Alter Egos in Cyperspace: Who is responsible? J. UCS 2(9): 623-636 (1996) | |
1995 | ||
31 | J. F. M. Burg, Reind P. van de Riet: COLOR-X: Linguistically-based Event Modeling: A General Approach to Dynamic Modeling CAiSE 1995: 26-39 | |
30 | Bram van der Vos, Jon Atle Gulla, Reind P. van de Riet: Verification of Conceptual Models based on Linguistic Knowledge. NLDB 1995: 0- | |
29 | J. F. M. Burg, Reind P. van de Riet: The Impact of Linguistics on Conceptual Models: Consistency and Understandability. NLDB 1995: 183-197 | |
28 | J. F. M. Burg, Reind P. van de Riet: COLOR-X Event Model: Integrated Specification of the Dynamics of Individual Objects. OOER 1995: 146-157 | |
1994 | ||
27 | Reind P. van de Riet, Jack Beukering: The Integration of Security and Integrity Constraints in MOKUM. DBSec 1994: 223-244 | |
1993 | ||
26 | Robert Croshere, Reind P. van de Riet, Alco Blom: An Animation Facility to Simulate an Information and Communication System CAiSE 1993: 547-568 | |
25 | J. F. M. Burg, Reind P. van de Riet, S. C. Chang: A Data Dictionary as a Lexicon: An Application of Linguistics in Information Systems. CIKM 1993: 114-123 | |
1992 | ||
24 | P. I. Elsas, Reind P. van de Riet, J. J. van Leeuwen: Knowledge-based Audit Support. DEXA 1992: 512-518 | |
23 | Paul Buitelaar, Reind P. van de Riet: The Use of a Lexicon to Interpret ER-Diagrams: A LIKE project. ER 1992: 162-177 | |
22 | Frank Dignum, Reind P. van de Riet: Addition and removal of information for a knowledge base with incomplete information. Data Knowl. Eng. 8: 293-307 (1992) | |
1991 | ||
21 | Frank Dignum, Reind P. van de Riet: Knowledge base modelling based on linguistics and founded in logic. Data Knowl. Eng. 7: 1-34 (1991) | |
1990 | ||
20 | Reind P. van de Riet: Introduction to the Special Issue on Deductive and Object-Oriented Databases. Data Knowl. Eng. 5: 255-261 (1990) | |
1989 | ||
19 | Reind P. van de Riet: MOKUM: An Object-Oriented Active Knowledge Base System. Data Knowl. Eng. 4(1): 21-42 (1989) | |
1988 | ||
18 | Roel Wieringa, Reind P. van de Riet: Algebraic Specification of Object Dynamics in Knowledge Base Domains. DS-3 1988: 411-436 | |
1987 | ||
17 | Frank Dignum, T. Kemme, W. Kreuzen, Hans Weigand, Reind P. van de Riet: Constraint Modelling Using a Conceptual Prototyping Language. Data Knowl. Eng. 2: 213-254 (1987) | |
16 | Wiebren de Jonge, Andrew S. Tanenbaum, Reind P. van de Riet: Two Access Methods Using Compact Binary Trees. IEEE Trans. Software Eng. 13(7): 799-810 (1987) | |
1986 | ||
15 | Reind P. van de Riet: Making Expert Systems Explicit - Response. IFIP Congress 1986: 545-548 | |
1984 | ||
14 | Shamkant B. Navathe, Reind P. van de Riet: Databases for Expert Systems. VLDB 1984: 257 | |
1983 | ||
13 | George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet: Answering Queries Without Revealing Secrets. ACM Trans. Database Syst. 8(1): 41-59 (1983) | |
12 | Reind P. van de Riet, Martin L. Kersten, Wiebren de Jonge, Anthony I. Wasserman: Privacy and security in information systems using programming language features. Inf. Syst. 8(2): 95-103 (1983) | |
1981 | ||
11 | Martin L. Kersten, Reind P. van de Riet, Wiebren de Jonge: Privacy and Security in Distributed Database Systems. DDSS 1981: 229-241 | |
10 | Reind P. van de Riet, Martin L. Kersten: A Module Definition Facility for Access Control in Communicating Data Base Systems. DDSS 1981: 255-272 | |
9 | Reind P. van de Riet, Anthony I. Wasserman, Martin L. Kersten, Wiebren de Jonge: High-Level Programming Features for Improving the Efficiency of a Relational Database System. ACM Trans. Database Syst. 6(3): 464-485 (1981) | |
1980 | ||
8 | Reind P. van de Riet, Martin L. Kersten, Anthony I. Wasserman: A Module Definition Facility for Access Control in Distributed Data Base Systems. IEEE Symposium on Security and Privacy 1980: 59-66 | |
1979 | ||
7 | Reind P. van de Riet: Performance Evaluation of the BASIS System. Performance 1979: 105-122 | |
6 | Reind P. van de Riet, R. Wiggers: Practice and Experience with BASIS: an Interactive Programming System for Introductory Courses in Informatics. Softw., Pract. Exper. 9(6): 463-476 (1979) | |
1977 | ||
5 | Reind P. van de Riet: BASIS - An Interactive System for the Introductory Course in Informatics. IFIP Congress 1977: 347-351 | |
1974 | ||
4 | Reind P. van de Riet: About ABC ALGOL: A Language for Formula Manipulation Systems. IFIP Congress 1974: 222-225 | |
1963 | ||
3 | Reind P. van de Riet: Certification of algorithm 73: incomplete elliptic integrals. Commun. ACM 6(4): 167 (1963) | |
2 | Reind P. van de Riet: Algorithm 186: complex arithmetic. Commun. ACM 6(7): 386-387 (1963) | |
1 | Reind P. van de Riet: Algorithm 187: differences and derivatives. Commun. ACM 6(7): 387 (1963) |