|
Search the dblp DataBase
Wolfgang Eßmayr:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stefan Probst, Wolfgang Eßmayr, Edgar Weippl
Reusable Components for Developing Security-Aware Application. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:239-248 [Conf]
- Edgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker
Towards authentication using mobile devices. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2002, pp:91-105 [Conf]
- Oscar Mangisengi, Johannes Huber, Christian Hawel, Wolfgang Eßmayr
A Framework for Supporting Interoperability of Data Warehouse Islands Using XML. [Citation Graph (0, 0)][DBLP] DaWaK, 2001, pp:328-338 [Conf]
- Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, A. Min Tjoa
Using Role-Templates for Handling Recurring Role Structures. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:191-204 [Conf]
- Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa
Access Controls by Object-Oriented Concepts. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:325-340 [Conf]
- Christine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland Wagner, Edgar Weippl
CoSMo: An Approach Towards Conceptual Security Modeling. [Citation Graph (0, 0)][DBLP] DEXA, 2002, pp:557-566 [Conf]
- Edgar Weippl, Wolfgang Eßmayr
Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. [Citation Graph (0, 0)][DBLP] DEXA, 2000, pp:939-948 [Conf]
- Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa
Enterprise-Wide Security Administration. [Citation Graph (0, 0)][DBLP] DEXA Workshop, 1998, pp:267-272 [Conf]
- Oscar Mangisengi, Wolfgang Eßmayr
P2P Knowledge Management: an Investigation of the Technical Architecture and Main Processes. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:787-791 [Conf]
- Knud Steiner, Wolfgang Eßmayr, Roland Wagner
Topic Maps - An Enabling Technology for Knowledge Management. [Citation Graph (0, 0)][DBLP] DEXA Workshop, 2001, pp:472-476 [Conf]
- Edgar Weippl, Jörn Altmann, Wolfgang Eßmayr
Mobile Database Agents for Building Data Warehouses. [Citation Graph (0, 0)][DBLP] DEXA Workshop, 2000, pp:477-481 [Conf]
- Felix Kossak, Wolfgang Eßmayr, Werner Winiwarter
Applicability of HCI research to e government applications. [Citation Graph (0, 0)][DBLP] ECIS, 2001, pp:- [Conf]
- Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa
Authorization and Access Control in IRO-DB. [Citation Graph (0, 11)][DBLP] ICDE, 1996, pp:40-47 [Conf]
- Oscar Mangisengi, Wolfgang Eßmayr, Johannes Huber, Edgar Weippl
XML-Based OLAP Query Processing in a Federated Data Warehouses. [Citation Graph (0, 0)][DBLP] ICEIS (1), 2003, pp:71-78 [Conf]
- Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa
The security architecture of IRO-DB. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:249-258 [Conf]
- Wolfgang Eßmayr, Edgar Weippl
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:79-88 [Conf]
- Wolfgang Eßmayr, Stefan Probst, Edgar Weippl
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research, 2004, v:4, n:1-2, pp:127-156 [Journal]
- Edgar Weippl, Wolfgang Eßmayr, Ludwig Klug
A New Approach To Secure Federated Information Bases Using Agent Technology. [Citation Graph (0, 0)][DBLP] J. Database Manag., 2003, v:14, n:1, pp:48-68 [Journal]
- Edgar Weippl, Wolfgang Eßmayr
Personal Trusted Devices for Web Services: Revisiting Multilevel Security. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:151-157 [Journal]
Search in 0.002secs, Finished in 0.002secs
|