dblp.uni-trier.dewww.uni-trier.de

Andreas Ekelhart

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
18EEStefan Fenz, Andreas Ekelhart: Formalizing information security knowledge. ASIACCS 2009: 183-194
17EEAndreas Ekelhart, Stefan Fenz, Thomas Neubauer: AURUM: A Framework for Information Security Risk Management. HICSS 2009: 1-10
16EEThomas Neubauer, Andreas Ekelhart: An evaluation of technologies for the pseudonymization of medical data. SAC 2009: 857-858
2008
15EEStefan Fenz, Andreas Ekelhart, Edgar R. Weippl: Fortification of IT Security by Automatic Security Advisory Processing. AINA 2008: 575-582
14EEGernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, Thomas Mück: Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. HICSS 2008: 377
13EEThomas Neubauer, Andreas Ekelhart, Stefan Fenz: Interactive Selection of ISO 27001 Controls under Multiple Objectives. SEC 2008: 477-492
12EEAndreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar R. Weippl: XML security - A comparative literature review. Journal of Systems and Software 81(10): 1715-1724 (2008)
2007
11EEGernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa: CASSIS - Computer-based Academy for Security and Safety in Information Systems. ARES 2007: 730-740
10EEAndreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar R. Weippl: Security Issues for the Use of Semantic Web in E-Commerce. BIS 2007: 1-13
9EEAndreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar Weippl: Security Ontologies: Improving Quantitative Risk Analysis. HICSS 2007: 156
8EEAndreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar Weippl: Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43
7EEStefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar R. Weippl: Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. PRDC 2007: 381-388
6EEAndreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl: Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95
5 Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, Monika Kaczmarek, A. Min Tjoa, Edgar R. Weippl, Dominik Zyskowski: Security aspects in Semantic Web Services Filtering. iiWAS 2007: 21-31
4EEAndreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus D. Klemen, Edgar R. Weippl: Architectural approach for handling semi-structured data in a user-centred working environment. IJWIS 3(3): 198-211 (2007)
2006
3EEAndreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl: Security Ontology: Simulating Threats to Corporate Assets. ICISS 2006: 249-259
2EEEdgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A. Min Tjoa: The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. ODBIS 2006: 135-151
1EEAndreas Ekelhart, Stefan Fenz, Markus D. Klemen, A. Min Tjoa, Edgar R. Weippl: Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. PAKM 2006: 37-48

Coauthor Index

1Witold Abramowicz [5]
2Stefan Fenz [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [17] [18]
3Gernot Goluch [4] [6] [7] [11] [12] [14]
4Stefan Jakoubi [11] [14]
5Monika Kaczmarek [5]
6Markus D. Klemen [1] [2] [3] [4] [9]
7Thomas Mück [14]
8Thomas Neubauer [8] [13] [16] [17]
9Bernhard Riedl [7] [11]
10Markus Steinkellner [12]
11A Min Tjoa (A. Min Tjoa) [1] [2] [5] [10]
12Simon Tjoa [11] [14]
13Edgar R. Weippl (Edgar Weippl) [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [15]
14Dominik Zyskowski [5]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)