Wolfgang Eßmayr

According to our database1, Wolfgang Eßmayr authored at least 20 papers between 1996 and 2004.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2004
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms.
Electron. Commer. Res., 2004

2003
Personal Trusted Devices for Web Services: Revisiting Multilevel Security.
Mob. Networks Appl., 2003

A New Approach To Secure Federated Information Bases Using Agent Technology.
J. Database Manag., 2003

XML-Based OLAP Query Processing in a Federated Data Warehouses.
Proceedings of the ICEIS 2003, 2003

P2P Knowledge Management: an Investigation of the Technical Architecture and Main Processes.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
CoSMo: An Approach Towards Conceptual Security Modeling.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

Towards authentication using mobile devices.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Reusable Components for Developing Security-Aware Application.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Applicability of HCI research to e government applications.
Proceedings of the 9th European Conference on Information Systems, 2001

Topic Maps - An Enabling Technology for Knowledge Management.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

A Framework for Supporting Interoperability of Data Warehouse Islands Using XML.
Proceedings of the Data Warehousing and Knowledge Discovery, 2001

2000
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Mobile Database Agents for Building Data Warehouses.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

1999
Meta-data for Enterprise Wide Security Administration.
Proceedings of the 3rd IEEE Metadata Conference 1999, MD 1999, Bethesda, 1999

1998
Enterprise-Wide Security Administration.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

Using Role-Templates for Handling Recurring Role Structures.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
Access Controls by Object-Oriented Concepts.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
The security architecture of IRO-DB.
Proceedings of the Information Systems Security, 1996

Authorization and Access Control in IRO-DB.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996


  Loading...