The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wolfgang Eßmayr: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Probst, Wolfgang Eßmayr, Edgar Weippl
    Reusable Components for Developing Security-Aware Application. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:239-248 [Conf]
  2. Edgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker
    Towards authentication using mobile devices. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:91-105 [Conf]
  3. Oscar Mangisengi, Johannes Huber, Christian Hawel, Wolfgang Eßmayr
    A Framework for Supporting Interoperability of Data Warehouse Islands Using XML. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2001, pp:328-338 [Conf]
  4. Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, A. Min Tjoa
    Using Role-Templates for Handling Recurring Role Structures. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:191-204 [Conf]
  5. Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa
    Access Controls by Object-Oriented Concepts. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:325-340 [Conf]
  6. Christine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland Wagner, Edgar Weippl
    CoSMo: An Approach Towards Conceptual Security Modeling. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:557-566 [Conf]
  7. Edgar Weippl, Wolfgang Eßmayr
    Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. [Citation Graph (0, 0)][DBLP]
    DEXA, 2000, pp:939-948 [Conf]
  8. Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa
    Enterprise-Wide Security Administration. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:267-272 [Conf]
  9. Oscar Mangisengi, Wolfgang Eßmayr
    P2P Knowledge Management: an Investigation of the Technical Architecture and Main Processes. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:787-791 [Conf]
  10. Knud Steiner, Wolfgang Eßmayr, Roland Wagner
    Topic Maps - An Enabling Technology for Knowledge Management. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:472-476 [Conf]
  11. Edgar Weippl, Jörn Altmann, Wolfgang Eßmayr
    Mobile Database Agents for Building Data Warehouses. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2000, pp:477-481 [Conf]
  12. Felix Kossak, Wolfgang Eßmayr, Werner Winiwarter
    Applicability of HCI research to e government applications. [Citation Graph (0, 0)][DBLP]
    ECIS, 2001, pp:- [Conf]
  13. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa
    Authorization and Access Control in IRO-DB. [Citation Graph (0, 11)][DBLP]
    ICDE, 1996, pp:40-47 [Conf]
  14. Oscar Mangisengi, Wolfgang Eßmayr, Johannes Huber, Edgar Weippl
    XML-Based OLAP Query Processing in a Federated Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2003, pp:71-78 [Conf]
  15. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa
    The security architecture of IRO-DB. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:249-258 [Conf]
  16. Wolfgang Eßmayr, Edgar Weippl
    Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:79-88 [Conf]
  17. Wolfgang Eßmayr, Stefan Probst, Edgar Weippl
    Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:127-156 [Journal]
  18. Edgar Weippl, Wolfgang Eßmayr, Ludwig Klug
    A New Approach To Secure Federated Information Bases Using Agent Technology. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2003, v:14, n:1, pp:48-68 [Journal]
  19. Edgar Weippl, Wolfgang Eßmayr
    Personal Trusted Devices for Web Services: Revisiting Multilevel Security. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:2, pp:151-157 [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002