| 2004 |
| 19 | EE | Wolfgang Eßmayr,
Stefan Probst,
Edgar Weippl:
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms.
Electronic Commerce Research 4(1-2): 127-156 (2004) |
| 2003 |
| 18 | EE | Oscar Mangisengi,
Wolfgang Eßmayr:
P2P Knowledge Management: an Investigation of the Technical Architecture and Main Processes.
DEXA Workshops 2003: 787-791 |
| 17 | | Oscar Mangisengi,
Wolfgang Eßmayr,
Johannes Huber,
Edgar Weippl:
XML-Based OLAP Query Processing in a Federated Data Warehouses.
ICEIS (1) 2003: 71-78 |
| 16 | | Edgar Weippl,
Wolfgang Eßmayr,
Ludwig Klug:
A New Approach To Secure Federated Information Bases Using Agent Technology.
J. Database Manag. 14(1): 48-68 (2003) |
| 15 | | Edgar Weippl,
Wolfgang Eßmayr:
Personal Trusted Devices for Web Services: Revisiting Multilevel Security.
MONET 8(2): 151-157 (2003) |
| 2002 |
| 14 | EE | Stefan Probst,
Wolfgang Eßmayr,
Edgar Weippl:
Reusable Components for Developing Security-Aware Application.
ACSAC 2002: 239-248 |
| 13 | | Edgar Weippl,
Wolfgang Eßmayr,
F. Gruber,
W. Stockner,
T. Trenker:
Towards authentication using mobile devices.
Communications and Multimedia Security 2002: 91-105 |
| 12 | EE | Christine Artelsmair,
Wolfgang Eßmayr,
Peter Lang,
Roland Wagner,
Edgar Weippl:
CoSMo: An Approach Towards Conceptual Security Modeling.
DEXA 2002: 557-566 |
| 2001 |
| 11 | | Knud Steiner,
Wolfgang Eßmayr,
Roland Wagner:
Topic Maps - An Enabling Technology for Knowledge Management.
DEXA Workshop 2001: 472-476 |
| 10 | EE | Oscar Mangisengi,
Johannes Huber,
Christian Hawel,
Wolfgang Eßmayr:
A Framework for Supporting Interoperability of Data Warehouse Islands Using XML.
DaWaK 2001: 328-338 |
| 9 | EE | Felix Kossak,
Wolfgang Eßmayr,
Werner Winiwarter:
Applicability of HCI research to e government applications.
ECIS 2001 |
| 2000 |
| 8 | EE | Edgar Weippl,
Wolfgang Eßmayr:
Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations.
DEXA 2000: 939-948 |
| 7 | EE | Edgar Weippl,
Jörn Altmann,
Wolfgang Eßmayr:
Mobile Database Agents for Building Data Warehouses.
DEXA Workshop 2000: 477-481 |
| 6 | | Wolfgang Eßmayr,
Edgar Weippl:
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.
SEC 2000: 79-88 |
| 1998 |
| 5 | | Wolfgang Eßmayr,
Elisabeth Kapsammer,
Roland Wagner,
A. Min Tjoa:
Using Role-Templates for Handling Recurring Role Structures.
DBSec 1998: 191-204 |
| 4 | | Wolfgang Eßmayr,
Elisabeth Kapsammer,
Roland Wagner,
Günther Pernul,
A. Min Tjoa:
Enterprise-Wide Security Administration.
DEXA Workshop 1998: 267-272 |
| 1997 |
| 3 | | Wolfgang Eßmayr,
Günther Pernul,
A. Min Tjoa:
Access Controls by Object-Oriented Concepts.
DBSec 1997: 325-340 |
| 1996 |
| 2 | EE | Wolfgang Eßmayr,
Fritz Kastner,
Günther Pernul,
Stefan Preishuber,
A. Min Tjoa:
Authorization and Access Control in IRO-DB.
ICDE 1996: 40-47 |
| 1 | | Wolfgang Eßmayr,
Fritz Kastner,
Günther Pernul,
A. Min Tjoa:
The security architecture of IRO-DB.
SEC 1996: 249-258 |