Edgar Weippl
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
46 | EE | Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl: Fortification of IT Security by Automatic Security Advisory Processing. AINA 2008: 575-582 |
45 | EE | Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar R. Weippl: XML security - A comparative literature review. Journal of Systems and Software 81(10): 1715-1724 (2008) |
2007 | ||
44 | EE | Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar R. Weippl: Security Issues for the Use of Semantic Web in E-Commerce. BIS 2007: 1-13 |
43 | EE | Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar Weippl: Security Ontologies: Improving Quantitative Risk Analysis. HICSS 2007: 156 |
42 | EE | Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar Weippl: Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43 |
41 | EE | Khalid Latif, Edgar Weippl, A. Min Tjoa: Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. IRI 2007: 170-176 |
40 | EE | Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar R. Weippl: Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. PRDC 2007: 381-388 |
39 | EE | Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl: Ontological Mapping of Common Criteria's Security Assurance Requirements. SEC 2007: 85-95 |
38 | Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, Monika Kaczmarek, A. Min Tjoa, Edgar R. Weippl, Dominik Zyskowski: Security aspects in Semantic Web Services Filtering. iiWAS 2007: 21-31 | |
37 | Bernhard Riedl, Gernot Goluch, Stefan Pöchlinger, Edgar R. Weippl: A Comparative Literature Review on RFID Security and Privacy. iiWAS 2007: 213-222 | |
36 | EE | Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus D. Klemen, Edgar R. Weippl: Architectural approach for handling semi-structured data in a user-centred working environment. IJWIS 3(3): 198-211 (2007) |
2006 | ||
35 | EE | Thomas Neubauer, Christian Stummer, Edgar Weippl: Workshop-based Multiobjective Security Safeguard Selection. ARES 2006: 366-373 |
34 | EE | Thomas Neubauer, Edgar Weippl, Stefan Biffl: Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ARES 2006: 723-731 |
33 | EE | Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl: Security Ontology: Simulating Threats to Corporate Assets. ICISS 2006: 249-259 |
32 | EE | Edgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A. Min Tjoa: The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. ODBIS 2006: 135-151 |
31 | EE | Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, A. Min Tjoa, Edgar R. Weippl: Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. PAKM 2006: 37-48 |
30 | EE | Stefan Fenz, Edgar Weippl: Ontology based IT-security planning. PRDC 2006: 389-390 |
29 | Edgar Weippl: Do we Really Need Access Control? iiWAS 2006: 493-502 | |
28 | Edgar Weippl, Andreas Holzinger, A. Min Tjoa: Security aspects of ubiquitous computing in healthcare. Elektrotechnik und Informationstechnik 123(4): 156-161 (2006) | |
2005 | ||
27 | EE | Edgar R. Weippl, A. Min Tjoa: Privacy in E-learning: How to implement anonymity. AICCSA 2005: 840-846 |
26 | EE | Edgar Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A. Min Tjoa: Semantic Storage: A Report on Performance and Flexibility. DEXA 2005: 586-595 |
25 | EE | Eva Gahleitner, Wernher Behrendt, Jürgen Palkoska, Edgar Weippl: On cooperatively creating dynamic ontologies. Hypertext 2005: 208-210 |
2004 | ||
24 | EE | Rudolf Ramler, Klaus Wolfmaier, Edgar Weippl: From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach. ICWE 2004: 287-299 |
23 | EE | Edgar Weippl, Alexander Schatten, Shuaib Karim, A. Min Tjoa: SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management. PAKM 2004: 365-377 |
22 | Edgar Weippl: Security in E-Learning. iiWAS 2004 | |
21 | EE | Wolfgang Eßmayr, Stefan Probst, Edgar Weippl: Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. Electronic Commerce Research 4(1-2): 127-156 (2004) |
2003 | ||
20 | Oscar Mangisengi, Wolfgang Eßmayr, Johannes Huber, Edgar Weippl: XML-Based OLAP Query Processing in a Federated Data Warehouses. ICEIS (1) 2003: 71-78 | |
19 | Reinhard Kronsteiner, Edgar Weippl, Ismail Khalil Ibrahim, Gabriele Kotsis: Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content? iiWAS 2003 | |
18 | Edgar Weippl: Security in E-Learning. iiWAS 2003 | |
17 | Edgar Weippl, Wolfgang Eßmayr, Ludwig Klug: A New Approach To Secure Federated Information Bases Using Agent Technology. J. Database Manag. 14(1): 48-68 (2003) | |
16 | Edgar Weippl, Wolfgang Eßmayr: Personal Trusted Devices for Web Services: Revisiting Multilevel Security. MONET 8(2): 151-157 (2003) | |
2002 | ||
15 | EE | Stefan Probst, Wolfgang Eßmayr, Edgar Weippl: Reusable Components for Developing Security-Aware Application. ACSAC 2002: 239-248 |
14 | Edgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker: Towards authentication using mobile devices. Communications and Multimedia Security 2002: 91-105 | |
13 | EE | Christine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland Wagner, Edgar Weippl: CoSMo: An Approach Towards Conceptual Security Modeling. DEXA 2002: 557-566 |
2001 | ||
12 | EE | Edgar Weippl: An Approach to Secure Distribution of Web-Based Training Courses. ACSC 2001: 199-205 |
11 | EE | Edgar Weippl: Visualizing Content Based Relations in Texts. AUIC 2001: 34-41 |
10 | EE | Edgar Weippl: Building secure knowledge bases: combining Java agents and DBagents. Agents 2001: 212-213 |
9 | Ismail Khalil Ibrahim, Wieland Schwinger, Edgar Weippl, Josef Altmann, Werner Winiwarter: Agent Solutions for E-Business Transactions. DEXA Workshop 2001: 84-86 | |
8 | EE | Bronson Trevor, Edgar Weippl, Werner Winiwarter: A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content. INAP 2001: 316-330 |
7 | EE | Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwarter: Content-based Management of Document Access Control. INAP 2001: 78-86 |
6 | EE | Edgar Weippl: An Approach to Role-Based Access Control for Digital Content. ITCC 2001: 290-294 |
2000 | ||
5 | EE | Edgar Weippl: Coimbra: secure Web access to multimedia content. ACM Multimedia Workshops 2000: 145-148 |
4 | EE | Edgar Weippl, Wolfgang Eßmayr: Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. DEXA 2000: 939-948 |
3 | EE | Edgar Weippl, Jörn Altmann, Wolfgang Eßmayr: Mobile Database Agents for Building Data Warehouses. DEXA Workshop 2000: 477-481 |
2 | Edgar Weippl, Hans Lohninger: Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases. EJC 2000: 271-274 | |
1 | Wolfgang Eßmayr, Edgar Weippl: Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. SEC 2000: 79-88 |