2004 |
19 | EE | Wolfgang Eßmayr,
Stefan Probst,
Edgar Weippl:
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms.
Electronic Commerce Research 4(1-2): 127-156 (2004) |
2003 |
18 | EE | Oscar Mangisengi,
Wolfgang Eßmayr:
P2P Knowledge Management: an Investigation of the Technical Architecture and Main Processes.
DEXA Workshops 2003: 787-791 |
17 | | Oscar Mangisengi,
Wolfgang Eßmayr,
Johannes Huber,
Edgar Weippl:
XML-Based OLAP Query Processing in a Federated Data Warehouses.
ICEIS (1) 2003: 71-78 |
16 | | Edgar Weippl,
Wolfgang Eßmayr,
Ludwig Klug:
A New Approach To Secure Federated Information Bases Using Agent Technology.
J. Database Manag. 14(1): 48-68 (2003) |
15 | | Edgar Weippl,
Wolfgang Eßmayr:
Personal Trusted Devices for Web Services: Revisiting Multilevel Security.
MONET 8(2): 151-157 (2003) |
2002 |
14 | EE | Stefan Probst,
Wolfgang Eßmayr,
Edgar Weippl:
Reusable Components for Developing Security-Aware Application.
ACSAC 2002: 239-248 |
13 | | Edgar Weippl,
Wolfgang Eßmayr,
F. Gruber,
W. Stockner,
T. Trenker:
Towards authentication using mobile devices.
Communications and Multimedia Security 2002: 91-105 |
12 | EE | Christine Artelsmair,
Wolfgang Eßmayr,
Peter Lang,
Roland Wagner,
Edgar Weippl:
CoSMo: An Approach Towards Conceptual Security Modeling.
DEXA 2002: 557-566 |
2001 |
11 | | Knud Steiner,
Wolfgang Eßmayr,
Roland Wagner:
Topic Maps - An Enabling Technology for Knowledge Management.
DEXA Workshop 2001: 472-476 |
10 | EE | Oscar Mangisengi,
Johannes Huber,
Christian Hawel,
Wolfgang Eßmayr:
A Framework for Supporting Interoperability of Data Warehouse Islands Using XML.
DaWaK 2001: 328-338 |
9 | EE | Felix Kossak,
Wolfgang Eßmayr,
Werner Winiwarter:
Applicability of HCI research to e government applications.
ECIS 2001 |
2000 |
8 | EE | Edgar Weippl,
Wolfgang Eßmayr:
Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations.
DEXA 2000: 939-948 |
7 | EE | Edgar Weippl,
Jörn Altmann,
Wolfgang Eßmayr:
Mobile Database Agents for Building Data Warehouses.
DEXA Workshop 2000: 477-481 |
6 | | Wolfgang Eßmayr,
Edgar Weippl:
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
SEC 2000: 79-88 |
1998 |
5 | | Wolfgang Eßmayr,
Elisabeth Kapsammer,
Roland Wagner,
A. Min Tjoa:
Using Role-Templates for Handling Recurring Role Structures.
DBSec 1998: 191-204 |
4 | | Wolfgang Eßmayr,
Elisabeth Kapsammer,
Roland Wagner,
Günther Pernul,
A. Min Tjoa:
Enterprise-Wide Security Administration.
DEXA Workshop 1998: 267-272 |
1997 |
3 | | Wolfgang Eßmayr,
Günther Pernul,
A. Min Tjoa:
Access Controls by Object-Oriented Concepts.
DBSec 1997: 325-340 |
1996 |
2 | EE | Wolfgang Eßmayr,
Fritz Kastner,
Günther Pernul,
Stefan Preishuber,
A. Min Tjoa:
Authorization and Access Control in IRO-DB.
ICDE 1996: 40-47 |
1 | | Wolfgang Eßmayr,
Fritz Kastner,
Günther Pernul,
A. Min Tjoa:
The security architecture of IRO-DB.
SEC 1996: 249-258 |