The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gernot Goluch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Edgar Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A. Min Tjoa
    Semantic Storage: A Report on Performance and Flexibility. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:586-595 [Conf]

  2. A secure architecture for the pseudonymization of medical data. [Citation Graph (, )][DBLP]


  3. CASSIS - Computer-based Academy for Security and Safety in Information Systems. [Citation Graph (, )][DBLP]


  4. A research agenda for Autonomous Business Process Management. [Citation Graph (, )][DBLP]


  5. Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support. [Citation Graph (, )][DBLP]


  6. A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management. [Citation Graph (, )][DBLP]


  7. Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. [Citation Graph (, )][DBLP]


  8. A Comparative Literature Review on RFID Security and Privacy. [Citation Graph (, )][DBLP]


  9. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. [Citation Graph (, )][DBLP]


  10. Ontological Mapping of Common Criteria's Security Assurance Requirements. [Citation Graph (, )][DBLP]


  11. A process model for RFID based Business Process Analysis. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002