2009 |
21 | EE | Stefan Fenz,
Andreas Ekelhart:
Formalizing information security knowledge.
ASIACCS 2009: 183-194 |
20 | EE | Stefan Fenz,
Thomas Pruckner,
Arman Manutscheri:
Ontological Mapping of Information Security Best-Practice Guidelines.
BIS 2009: 49-60 |
19 | EE | Andreas Ekelhart,
Stefan Fenz,
Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management.
HICSS 2009: 1-10 |
2008 |
18 | EE | Stefan Fenz,
Andreas Ekelhart,
Edgar R. Weippl:
Fortification of IT Security by Automatic Security Advisory Processing.
AINA 2008: 575-582 |
17 | EE | Bernhard Riedl,
Veronika Grascher,
Stefan Fenz,
Thomas Neubauer:
Pseudonymization for improving the Privacy in E-Health Applications.
HICSS 2008: 255 |
16 | EE | Gernot Goluch,
Andreas Ekelhart,
Stefan Fenz,
Stefan Jakoubi,
Simon Tjoa,
Thomas Mück:
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.
HICSS 2008: 377 |
15 | EE | Thomas Neubauer,
Andreas Ekelhart,
Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives.
SEC 2008: 477-492 |
14 | EE | Andreas Ekelhart,
Stefan Fenz,
Gernot Goluch,
Markus Steinkellner,
Edgar R. Weippl:
XML security - A comparative literature review.
Journal of Systems and Software 81(10): 1715-1724 (2008) |
2007 |
13 | EE | Gernot Goluch,
Andreas Ekelhart,
Stefan Fenz,
Stefan Jakoubi,
Bernhard Riedl,
Simon Tjoa:
CASSIS - Computer-based Academy for Security and Safety in Information Systems.
ARES 2007: 730-740 |
12 | EE | Andreas Ekelhart,
Stefan Fenz,
A. Min Tjoa,
Edgar R. Weippl:
Security Issues for the Use of Semantic Web in E-Commerce.
BIS 2007: 1-13 |
11 | EE | Andreas Ekelhart,
Stefan Fenz,
Markus D. Klemen,
Edgar Weippl:
Security Ontologies: Improving Quantitative Risk Analysis.
HICSS 2007: 156 |
10 | EE | Andreas Ekelhart,
Stefan Fenz,
Thomas Neubauer,
Edgar Weippl:
Formal threat descriptions for enhancing governmental risk assessment.
ICEGOV 2007: 40-43 |
9 | EE | Stefan Fenz,
Gernot Goluch,
Andreas Ekelhart,
Bernhard Riedl,
Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
PRDC 2007: 381-388 |
8 | EE | Andreas Ekelhart,
Stefan Fenz,
Gernot Goluch,
Edgar R. Weippl:
Ontological Mapping of Common Criteria's Security Assurance Requirements.
SEC 2007: 85-95 |
7 | | Witold Abramowicz,
Andreas Ekelhart,
Stefan Fenz,
Monika Kaczmarek,
A. Min Tjoa,
Edgar R. Weippl,
Dominik Zyskowski:
Security aspects in Semantic Web Services Filtering.
iiWAS 2007: 21-31 |
6 | EE | Andreas Ekelhart,
Stefan Fenz,
Gernot Goluch,
Markus D. Klemen,
Edgar R. Weippl:
Architectural approach for handling semi-structured data in a user-centred working environment.
IJWIS 3(3): 198-211 (2007) |
2006 |
5 | EE | Andreas Ekelhart,
Stefan Fenz,
Markus D. Klemen,
Edgar R. Weippl:
Security Ontology: Simulating Threats to Corporate Assets.
ICISS 2006: 249-259 |
4 | EE | Edgar R. Weippl,
Markus D. Klemen,
Stefan Fenz,
Andreas Ekelhart,
A. Min Tjoa:
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps.
ODBIS 2006: 135-151 |
3 | EE | Andreas Ekelhart,
Stefan Fenz,
Markus D. Klemen,
A. Min Tjoa,
Edgar R. Weippl:
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets.
PAKM 2006: 37-48 |
2 | EE | Stefan Fenz,
Edgar Weippl:
Ontology based IT-security planning.
PRDC 2006: 389-390 |
2005 |
1 | EE | Edgar Weippl,
Markus D. Klemen,
Manfred Linnert,
Stefan Fenz,
Gernot Goluch,
A. Min Tjoa:
Semantic Storage: A Report on Performance and Flexibility.
DEXA 2005: 586-595 |