Edgar R. Weippl

According to our database1, Edgar R. Weippl authored at least 236 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges.
J. Internet Serv. Inf. Secur., 2019

ETHDKG: Distributed Key Generation with Ethereum Smart Contracts.
IACR Cryptology ePrint Archive, 2019

Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptology ePrint Archive, 2019

ISaFe - Injecting Security Features into Constrained Embedded Firmware.
ERCIM News, 2019

AutoHoney(I)IoT - Automated Device Independent Honeypot Generation of IoT and Industrial IoT Devices.
ERCIM News, 2019

From Hack to Elaborate Technique - A Survey on Binary Rewriting.
ACM Comput. Surv., 2019

Special Issue on Security and Privacy in Smart Cyber-physical Systems.
Computers & Security, 2019

Measuring Cookies and Web Privacy in a Post-GDPR World.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Echoes of the Past: Recovering Blockchain Metrics from Merged Mining.
Proceedings of the Financial Cryptography and Data Security, 2019

Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

Towards Data Anonymization in Data Mining via Meta-heuristic Approaches.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

2018
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains.
IACR Cryptology ePrint Archive, 2018

(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice.
IACR Cryptology ePrint Archive, 2018

Echoes of the Past: Recovering Blockchain Metrics From Merged Mining.
IACR Cryptology ePrint Archive, 2018

Agreement with Satoshi - On the Formalization of Nakamoto Consensus.
IACR Cryptology ePrint Archive, 2018

HydRand: Practical Continuous Distributed Randomness.
IACR Cryptology ePrint Archive, 2018

Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques.
IACR Cryptology ePrint Archive, 2018

Digital Twins - Introduction to the Special Theme.
ERCIM News, 2018

Botnets causing blackouts: how coordinated load attacks can destabilize the power grid.
Elektrotechnik und Informationstechnik, 2018

Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152).
Dagstuhl Reports, 2018

On Security Research Towards Future Mobile Network Generations.
IEEE Communications Surveys and Tutorials, 2018

Security Challenges in Cyber-Physical Production Systems.
Proceedings of the Software Quality: Methods and Tools for Better Software and Systems, 2018

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper).
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

USBlock: Blocking USB-Based Keypress Injection Attacks.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Structural Limitations of B+-Tree forensics.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI.
Proceedings of the Machine Learning and Knowledge Extraction, 2018

A Framework for Monitoring Net Neutrality.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2017

Securing the Internet, One HTTP 200 OK at a Time.
;login:, 2017

Merged Mining: Curse of Cure?
IACR Cryptology ePrint Archive, 2017

A Holistic Approach to Smart Contract Security.
ERCIM News, 2017

u'smile - Secure Mobile Environments.
ERCIM News, 2017

Forensics using Internal Database Structures.
ERCIM News, 2017

Trend Analysis of Underground Marketplaces.
ERCIM News, 2017

Bitcoin - Cryptocurrencies and Alternative Applications.
ERCIM News, 2017

On Security Research towards Future Mobile Network Generations.
CoRR, 2017

Network-Based Secret Communication in Clouds: A Survey.
IEEE Communications Surveys and Tutorials, 2017

Security assurance assessment methodology for hybrid clouds.
Computers & Security, 2017

"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS.
Proceedings of the 26th USENIX Security Symposium, 2017

Poster: Design of an Anomaly-based Threat Detection & Explication System.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Research methods and examples of empirical research in information security.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

A Performance Assessment of Network Address Shuffling in IoT Systems.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017

Merged Mining: Curse or Cure?
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Lightweight Address Hopping for Defending the IPv6 IoT.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Effectiveness of file-based deduplication in digital forensics.
Security and Communication Networks, 2016

Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners.
IJSSE, 2016

A Framework for Security Transparency in Cloud Computing.
Future Internet, 2016

Cybersecurity - Introduction to the Special Theme.
ERCIM News, 2016

Detection of Data Leaks in Collaborative Data Driven Research.
ERCIM News, 2016

Trust for the "Doctor in the Loop".
ERCIM News, 2016

The role and security of firewalls in cyber-physical cloud computing.
EURASIP J. Information Security, 2016

Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

A tamper-proof audit and control system for the doctor in the loop.
Brain Informatics, 2016

Cryptographic Currencies Crash Course (C4): Tutorial.
Proceedings of the 25th International Conference on World Wide Web, 2016

Browser History Stealing with Captive Wi-Fi Portals.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Pin it! Improving Android network security at runtime.
Proceedings of the 2016 IFIP Networking Conference, 2016

Empirical Research and Research Ethics in Information Security.
Proceedings of the Information Systems Security and Privacy, 2016

Ethics in Security Research.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
Proceedings of the Financial Cryptography and Data Security, 2016

The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor.
Proceedings of the Computer Security - ESORICS 2016, 2016

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Secure cyber-physical production systems: Solid steps towards realization.
Proceedings of the 1st International Workshop on Cyber-Physical Production Systems, 2016

Condensed Cryptographic Currencies Crash Course (C5).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Notary-Assisted Certificate Pinning for Improved Security of Android Apps.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

Hand Dynamics for Behavioral User Authentication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Advanced social engineering attacks.
J. Inf. Sec. Appl., 2015

Security and privacy of smartphone messaging applications.
Int. J. Pervasive Computing and Communications, 2015

CyPhySec: Defending Cyber-Physical Systems.
ERCIM News, 2015

Error-Correcting Codes as Source for Decoding Ambiguity.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Privacy is Not an Option: Attacking the IPv6 Privacy Extension.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

WordPress security: an analysis based on publicly available exploits.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding.
Proceedings of the Advances in Digital Forensics XI, 2015

Security tests for mobile applications - Why using TLS/SSL is not enough.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Proceedings of the Financial Cryptography and Data Security, 2015

Witnesses for the Doctor in the Loop.
Proceedings of the Brain Informatics and Health - 8th International Conference, 2015

Smart Privacy Visor: Bridging the Privacy Gap.
Proceedings of the Business Information Systems Workshops, 2015

On Reconnaissance with IPv6: A Pattern-Based Scanning Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Gradually Improving the Forensic Process.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

The Role and Security of Firewalls in IaaS Cloud Computing.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Network Security Challenges in Android Applications.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Protection through isolation: Virtues and pitfalls.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Protecting Anonymity in Data-Driven Biomedical Science.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

Genie in a Model? Why Model Driven Security will not secure your Web Application.
JoWUA, 2014

An empirical study on the implementation and evaluation of a goal-driven software development risk management model.
Information & Software Technology, 2014

An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata.
Electronic Markets, 2014

Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations.
Digital Investigation, 2014

Enter Sandbox: Android Sandbox Comparison.
CoRR, 2014

Covert Computation - Hiding code in code through compile-time obfuscation.
Computers & Security, 2014

Securing Cloud and Mobility.
Computers & Security, 2014

IPv6 Security: Attacks and Countermeasures in a Nutshell.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Advanced Persistent Threats & Social Engineering.
Proceedings of the SECRYPT 2014, 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Empirical Research in Information Security.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Automated Analysis of Underground Marketplaces.
Proceedings of the Advances in Digital Forensics X, 2014

Towards Fully Automated Digital Alibis with Social Interaction.
Proceedings of the Advances in Digital Forensics X, 2014

Using Model Driven Security Approaches in Web Application Development.
Proceedings of the Information and Communication Technology, 2014

QR Code Security: A Survey of Attacks and Challenges for Usable Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

E-voting Authentication with QR-codes.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

QR Inception: Barcode-in-Barcode Attacks.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

IMSI-catch me if you can: IMSI-catcher-catchers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

AES-SEC: Improving Software Obfuscation through Hardware-Assistance.
Proceedings of the Ninth International Conference on Availability, 2014

Towards a Hardware Trojan Detection Cycle.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Hardware Malware
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 9781627052528, 2013

Information Security.
J. UCS, 2013

Frontiers in Security and Dependability.
JoWUA, 2013

InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs.
Inf. Sec. Techn. Report, 2013

Using the structure of B+-trees for enhancing logging mechanisms of databases.
IJWIS, 2013

Data Confidentiality using Fragmentation in Cloud Computing.
Int. J. Pervasive Computing and Communications, 2013

Mobile Computing - Introduction to the Special Theme.
ERCIM News, 2013

Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing.
Proceedings of the IEEE International Conference on Systems, 2013

Social engineering attacks on the knowledge worker.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Quantifying Windows File Slack Size and Stability.
Proceedings of the Advances in Digital Forensics IX, 2013

Appinspect: large-scale evaluation of social networking apps.
Proceedings of the Conference on Online Social Networks, 2013

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Cloudoscopy: services discovery and topology mapping.
Proceedings of the CCSW'13, 2013

SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Fake identities in social media: A case study on the sustainability of the Facebook business model.
JoSSR, 2012

Self-monitoring in social networks.
IJIIDS, 2012

Enterprise Security for the Executive.
Computers & Security, 2012

Low Tech Hacking.
Computers & Security, 2012

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts.
Computers & Security, 2012

Thor's Microsoft Security Bible.
Computers & Security, 2012

Coding for Penetration Testers.
Computers & Security, 2012

Android forensics.
Computers & Security, 2012

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure.
Computers & Security, 2012

Towards a Unified Penetration Testing Taxonomy.
Proceedings of the 2012 International Conference on Privacy, 2012

Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

INMOTOS: extending the ROPE-methodology.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

Is security an afterthought when designing apps?
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

Digital forensics for enterprise rights management systems.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

Data Visualization for Social Network Forensics.
Proceedings of the Advances in Digital Forensics VIII, 2012

InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Guest Editorial: Advances in Applied Security.
JoWUA, 2011

Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam.
IEEE Internet Computing, 2011

A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems.
IJSSE, 2011

Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
Proceedings of the 20th USENIX Security Symposium, 2011

IT Governance, Risk & Compliance (GRC) Status Quo and Integration: An Explorative Industry Case Study.
Proceedings of the World Congress on Services, 2011

An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Using the structure of B+-trees for enhancing logging mechanisms of databases.
Proceedings of the iiWAS'2011, 2011

Governance, Risk & Compliance (GRC) Software - An Exploratory Study of Software Vendor and Market Research Perspectives.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Trees Cannot Lie: Using Data Structures for Forensics Purposes.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Social snapshots: digital forensics for online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Guest Editorial Foreword to the Special Issue on Availability, Reliability, and Security.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems.
IxD&A, 2010

Exploiting Ontology for Software License Agreements.
Int. J. Software and Informatics, 2010

Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten.
Elektrotechnik und Informationstechnik, 2010

Social Networking Sites Security: Quo Vadis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010


A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects.
Proceedings of the Knowledge Science, 2010

Use of Wiki Systems in Archaeology - Privacy, Security and Data Protection as Key Problems.
Proceedings of the ICE-B 2010 - Proceedings of the International Conference on e-Business, Athens, Greece, July 26, 2010

Implementation of Affective States and Learning Styles Tactics in Web-Based Learning Management Systems.
Proceedings of the ICALT 2010, 2010

Questioning the Need for Separate IT Risk Management Frameworks.
Proceedings of the Informatik 2010: Service Science - Neue Perspektiven für die Informatik, Beiträge der 40. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Band 2, 27.09., 2010

An event-based empirical process analysis framework.
Proceedings of the International Symposium on Empirical Software Engineering and Measurement, 2010

A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC).
Proceedings of the Communications and Multimedia Security, 2010

Tor HTTP Usage and Information Leakage.
Proceedings of the Communications and Multimedia Security, 2010

Exploiting social networking sites for spam.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cheap and automated socio-technical attacks based on social networking sites.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

Integrating IT Governance, Risk, and Compliance Management Processes.
Proceedings of the Databases and Information Systems VI, 2010

InnoDB Database Forensics.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-Case.
Proceedings of the Intelligent Information and Database Systems, 2010

2009
Automation of post-exploitation.
IJWIS, 2009

Blending the Sketched Use Case Scenario with License Agreements Using Semantics.
Proceedings of the Knowledge Science, 2009

An approach for identifying affective states through behavioral patterns in web-based learning management systems.
Proceedings of the iiWAS'2009, 2009

Can end-to-end verifiable e-voting be explained easily?
Proceedings of the iiWAS'2009, 2009

Automation of Post-exploitation - (Focused on MS-Windows Targets).
Proceedings of the Security Technology, 2009

Improving Storage Concepts for Semantic Models and Ontologies.
Proceedings of the Database Technologies: Concepts, 2009

Database Security and Statistical Database Security.
Proceedings of the Database Technologies: Concepts, 2009

Improving Storage Concepts for Semantic Models and Ontologies.
Proceedings of the Semantic Web for Knowledge and Data Management, 2009

2008
XML security - A comparative literature review.
Journal of Systems and Software, 2008

Fortification of IT Security by Automatic Security Advisory Processing.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Architectural approach for handling semi-structured data in a user-centred working environment.
IJWIS, 2007

Ontological Mapping of Common Criteria's Security Assurance Requirements.
Proceedings of the New Approaches for Security, 2007

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

A Comparative Literature Review on RFID Security and Privacy.
Proceedings of the iiWAS'2007, 2007

Security aspects in Semantic Web Services Filtering.
Proceedings of the iiWAS'2007, 2007

Formal threat descriptions for enhancing governmental risk assessment.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Security Ontologies: Improving Quantitative Risk Analysis.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Security Issues for the Use of Semantic Web in E-Commerce.
Proceedings of the Business Information Systems, 10th International Conference, 2007

2006
Security aspects of ubiquitous computing in healthcare.
Elektrotechnik und Informationstechnik, 2006

Ontology based IT-security planning.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets.
Proceedings of the Practical Aspects of Knowledge Management, 6th International Conference, 2006

The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps.
Proceedings of the Ontologies-Based Databases and Information Systems, 2006

Do we Really Need Access Control?
Proceedings of the iiWAS'2006, 2006

Security Ontology: Simulating Threats to Corporate Assets.
Proceedings of the Information Systems Security, Second International Conference, 2006

Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.
Proceedings of the The First International Conference on Availability, 2006

Workshop-based Multiobjective Security Safeguard Selection.
Proceedings of the The First International Conference on Availability, 2006

2005
Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing.
IJDWM, 2005

Privacy in e-learning: anonymity, pseudonyms and authenticated usage.
Interact. Techn. Smart Edu., 2005

Security in e-learning.
eLearn Magazine, 2005

On cooperatively creating dynamic ontologies.
Proceedings of the HYPERTEXT 2005, 2005

Semantic Storage: A Report on Performance and Flexibility.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005

Privacy in E-learning: How to implement anonymity.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms.
Electronic Commerce Research, 2004

SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004

Security in E-Learning.
Proceedings of the iiWAS'2004, 2004

From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach.
Proceedings of the Web Engineering - 4th International Conference, 2004

2003
Personal Trusted Devices for Web Services: Revisiting Multilevel Security.
MONET, 2003

A New Approach To Secure Federated Information Bases Using Agent Technology.
J. Database Manag., 2003

Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content?
Proceedings of the iiWAS'2003, 2003

XML-Based OLAP Query Processing in a Federated Data Warehouses.
Proceedings of the ICEIS 2003, 2003

2002
CoSMo: An Approach Towards Conceptual Security Modeling.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

Towards authentication using mobile devices.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Reusable Components for Developing Security-Aware Application.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
An Approach to Role-Based Access Control for Digital Content.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Content-based Management of Document Access Control.
Proceedings of the 14th International Conference on Applications of Prolog, 2001

A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content.
Proceedings of the 14th International Conference on Applications of Prolog, 2001

Agent Solutions for E-Business Transactions.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

Visualizing Content Based Relations in Texts.
Proceedings of the 2nd Australasian User Interface Conference (AUIC 2001), 29 January, 2001

Building secure knowledge bases: combining Java agents and DBagents.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

An Approach to Secure Distribution of Web-Based Training Courses.
Proceedings of the 24th Australasian Computer Science Conference (ACSC 2001), 29 January, 2001

2000
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Coimbra: secure Web access to multimedia content.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases.
Proceedings of the Information Modelling and Knowledge Bases XII: Tenth European-Japanese Conference on Information Modelling and Knowledge Bases, 2000

Mobile Database Agents for Building Data Warehouses.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000


  Loading...