dblp.uni-trier.dewww.uni-trier.de

Wolfgang Eßmayr

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2004
19EEWolfgang Eßmayr, Stefan Probst, Edgar Weippl: Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. Electronic Commerce Research 4(1-2): 127-156 (2004)
2003
18EEOscar Mangisengi, Wolfgang Eßmayr: P2P Knowledge Management: an Investigation of the Technical Architecture and Main Processes. DEXA Workshops 2003: 787-791
17 Oscar Mangisengi, Wolfgang Eßmayr, Johannes Huber, Edgar Weippl: XML-Based OLAP Query Processing in a Federated Data Warehouses. ICEIS (1) 2003: 71-78
16 Edgar Weippl, Wolfgang Eßmayr, Ludwig Klug: A New Approach To Secure Federated Information Bases Using Agent Technology. J. Database Manag. 14(1): 48-68 (2003)
15 Edgar Weippl, Wolfgang Eßmayr: Personal Trusted Devices for Web Services: Revisiting Multilevel Security. MONET 8(2): 151-157 (2003)
2002
14EEStefan Probst, Wolfgang Eßmayr, Edgar Weippl: Reusable Components for Developing Security-Aware Application. ACSAC 2002: 239-248
13 Edgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker: Towards authentication using mobile devices. Communications and Multimedia Security 2002: 91-105
12EEChristine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland Wagner, Edgar Weippl: CoSMo: An Approach Towards Conceptual Security Modeling. DEXA 2002: 557-566
2001
11 Knud Steiner, Wolfgang Eßmayr, Roland Wagner: Topic Maps - An Enabling Technology for Knowledge Management. DEXA Workshop 2001: 472-476
10EEOscar Mangisengi, Johannes Huber, Christian Hawel, Wolfgang Eßmayr: A Framework for Supporting Interoperability of Data Warehouse Islands Using XML. DaWaK 2001: 328-338
9EEFelix Kossak, Wolfgang Eßmayr, Werner Winiwarter: Applicability of HCI research to e government applications. ECIS 2001
2000
8EEEdgar Weippl, Wolfgang Eßmayr: Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. DEXA 2000: 939-948
7EEEdgar Weippl, Jörn Altmann, Wolfgang Eßmayr: Mobile Database Agents for Building Data Warehouses. DEXA Workshop 2000: 477-481
6 Wolfgang Eßmayr, Edgar Weippl: Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. SEC 2000: 79-88
1998
5 Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, A. Min Tjoa: Using Role-Templates for Handling Recurring Role Structures. DBSec 1998: 191-204
4 Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa: Enterprise-Wide Security Administration. DEXA Workshop 1998: 267-272
1997
3 Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa: Access Controls by Object-Oriented Concepts. DBSec 1997: 325-340
1996
2EEWolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa: Authorization and Access Control in IRO-DB. ICDE 1996: 40-47
1 Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa: The security architecture of IRO-DB. SEC 1996: 249-258

Coauthor Index

1Jörn Altmann [7]
2Christine Artelsmair [12]
3F. Gruber [13]
4Christian Hawel [10]
5Johannes Huber [10] [17]
6Elisabeth Kapsammer [4] [5]
7Fritz Kastner [1] [2]
8Ludwig Klug [16]
9Felix Kossak [9]
10Peter Lang [12]
11Oscar Mangisengi [10] [17] [18]
12Günther Pernul [1] [2] [3] [4]
13Stefan Preishuber [2]
14Stefan Probst [14] [19]
15Knud Steiner [11]
16W. Stockner [13]
17A Min Tjoa (A. Min Tjoa) [1] [2] [3] [4] [5]
18T. Trenker [13]
19Roland Wagner [4] [5] [11] [12]
20Edgar R. Weippl (Edgar Weippl) [6] [7] [8] [12] [13] [14] [15] [16] [17] [19]
21Werner Winiwarter [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)