| 2008 | ||
|---|---|---|
| 8 | Matthias Merz: Enabling declarative security through the use of Java Data Objects. Sci. Comput. Program. 70(2-3): 208-220 (2008) | |
| 2007 | ||
| 7 | Thorsten Schäfer, Ivica Aracic, Matthias Merz, Mira Mezini, Klaus Ostermann: Clustering for Generating Framework Top-Level Views. WCRE 2007: 239-248 | |
| 2006 | ||
| 6 | Matthias Merz, Markus Aleksy: Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications. DEXA 2006: 449-458 | |
| 5 | Matthias Merz: The management of users, roles, and permissions in JDOSecure. PPPJ 2006: 85-93 | |
| 4 | Matthias Merz: JDOSecure: A Security Architecture for the Java Data Objects-Specification. SEDE 2006: 134-140 | |
| 3 | Matthias Merz: Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects. SEKE 2006: 404-409 | |
| 2004 | ||
| 2 | Heinz Kredel, Matthias Merz: The design of the IPACS distributed software architecture. ISICT 2004: 14-19 | |
| 2003 | ||
| 1 | Axel Korthaus, Matthias Merz: A Critical Analysis of JDO in the Context of J2EE. Software Engineering Research and Practice 2003: 34-42 | |
| 1 | Markus Aleksy | [6] |
| 2 | Ivica Aracic | [7] |
| 3 | Axel Korthaus | [1] |
| 4 | Heinz Kredel | [2] |
| 5 | Mira Mezini | [7] |
| 6 | Klaus Ostermann | [7] |
| 7 | Thorsten Schäfer | [7] |