Journal: Journal of Database Management

Volume 14, Issue 4

1 -- 13Alexander P. Pons, Hassan Aljifri. Data Protection Using Watermarking in E-Business
14 -- 32G. Shankaranarayan, Mostapha Ziad, Richard Y. Wang. Managing Data Quality in Dynamic Decision Environments: An Information Product Approach
33 -- 58Christophe Nicolle, Kokou Yétongnon, Jean-Claude Simon. XML Integration and Toolkit for B2B Applications
59 -- 80Akhilesh Bajaj, Sudha Ram. IAIS: A Methodology to Enable Inter-Agency Information Sharing In eGovernment

Volume 14, Issue 3

1 -- 20Ron Weber. Conceptual Modeling and Ontology: Possibilities and Pitfalls
21 -- 36Gove N. Allen, Salvatore T. March. Modeling Temporal Dynamics for Business Systems
37 -- 55Petri Selonen, Kai Koskimies, Markku Sakkinen. Transformation Between UML Diagrams
56 -- 73Scott J. Lloyd, Joan Peckham, Jian Li, Qing Yang. RORIB: An Economic and Efficient Solution for Real-Time Online Remote Info Backup

Volume 14, Issue 2

1 -- 13Richard Baskerville, Victor Portougal. A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection
14 -- 26Rick L. Wilson, Peter A. Rosen. Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases
27 -- 41Satyadeep Patnaik, Brajendra Panda. Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks
42 -- 51Randal Reid, Gurpreet Dhillon. Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications
52 -- 69Sutee Sujitparapitaya, Brian D. Janz, Mark L. Gillenson. The Contribution of IT Governance Solutions to the Implementation of Data Warehouse Practice

Volume 14, Issue 1

1 -- 26A. N. W. Dahanayake, Henk G. Sol, Zoran Stojanovic. Methodology Evaluation Framework for Component-Based System Development
27 -- 47Kyoung-Il Bae, Jung-Hyun Kim, Soon-Young Huh. Federated Process Framework in a Virtual Enterprise Using an Object-oriented Database and Extensible Markup Language
48 -- 68Edgar Weippl, Wolfgang Eßmayr, Ludwig Klug. A New Approach To Secure Federated Information Bases Using Agent Technology