Search the dblp DataBase
Edgar Weippl :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Thomas Neubauer , Christian Stummer , Edgar Weippl Workshop-based Multiobjective Security Safeguard Selection. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:366-373 [Conf ] Thomas Neubauer , Edgar Weippl , Stefan Biffl Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:723-731 [Conf ] Stefan Probst , Wolfgang Eßmayr , Edgar Weippl Reusable Components for Developing Security-Aware Application. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:239-248 [Conf ] Edgar Weippl An Approach to Secure Distribution of Web-Based Training Courses. [Citation Graph (0, 0)][DBLP ] ACSC, 2001, pp:199-205 [Conf ] Edgar Weippl Building secure knowledge bases: combining Java agents and DBagents. [Citation Graph (0, 0)][DBLP ] Agents, 2001, pp:212-213 [Conf ] Edgar Weippl Visualizing Content Based Relations in Texts. [Citation Graph (0, 0)][DBLP ] AUIC, 2001, pp:34-41 [Conf ] Edgar Weippl , Wolfgang Eßmayr , F. Gruber , W. Stockner , T. Trenker Towards authentication using mobile devices. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:91-105 [Conf ] Christine Artelsmair , Wolfgang Eßmayr , Peter Lang , Roland Wagner , Edgar Weippl CoSMo: An Approach Towards Conceptual Security Modeling. [Citation Graph (0, 0)][DBLP ] DEXA, 2002, pp:557-566 [Conf ] Edgar Weippl , Wolfgang Eßmayr Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. [Citation Graph (0, 0)][DBLP ] DEXA, 2000, pp:939-948 [Conf ] Edgar Weippl , Markus D. Klemen , Manfred Linnert , Stefan Fenz , Gernot Goluch , A. Min Tjoa Semantic Storage: A Report on Performance and Flexibility. [Citation Graph (0, 0)][DBLP ] DEXA, 2005, pp:586-595 [Conf ] Ismail Khalil Ibrahim , Wieland Schwinger , Edgar Weippl , Josef Altmann , Werner Winiwarter Agent Solutions for E-Business Transactions. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 2001, pp:84-86 [Conf ] Edgar Weippl , Jörn Altmann , Wolfgang Eßmayr Mobile Database Agents for Building Data Warehouses. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 2000, pp:477-481 [Conf ] Edgar Weippl , Hans Lohninger Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases. [Citation Graph (0, 0)][DBLP ] EJC, 2000, pp:271-274 [Conf ] Andreas Ekelhart , Stefan Fenz , Markus D. Klemen , Edgar Weippl Security Ontologies: Improving Quantitative Risk Analysis. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:156- [Conf ] Eva Gahleitner , Wernher Behrendt , Jürgen Palkoska , Edgar Weippl On cooperatively creating dynamic ontologies. [Citation Graph (0, 0)][DBLP ] Hypertext, 2005, pp:208-210 [Conf ] Oscar Mangisengi , Wolfgang Eßmayr , Johannes Huber , Edgar Weippl XML-Based OLAP Query Processing in a Federated Data Warehouses. [Citation Graph (0, 0)][DBLP ] ICEIS (1), 2003, pp:71-78 [Conf ] Rudolf Ramler , Klaus Wolfmaier , Edgar Weippl From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach. [Citation Graph (0, 0)][DBLP ] ICWE, 2004, pp:287-299 [Conf ] Reinhard Kronsteiner , Edgar Weippl , Ismail Khalil Ibrahim , Gabriele Kotsis Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content? [Citation Graph (0, 0)][DBLP ] iiWAS, 2003, pp:- [Conf ] Edgar Weippl Security in E-Learning. [Citation Graph (0, 0)][DBLP ] iiWAS, 2003, pp:- [Conf ] Edgar Weippl Security in E-Learning. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Edgar Weippl Do we Really Need Access Control? [Citation Graph (0, 0)][DBLP ] iiWAS, 2006, pp:493-502 [Conf ] Bronson Trevor , Edgar Weippl , Werner Winiwarter A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content. [Citation Graph (0, 0)][DBLP ] INAP, 2001, pp:316-330 [Conf ] Edgar Weippl , Ismail Khalil Ibrahim , Werner Winiwarter Content-based Management of Document Access Control. [Citation Graph (0, 0)][DBLP ] INAP, 2001, pp:78-86 [Conf ] Edgar Weippl An Approach to Role-Based Access Control for Digital Content. [Citation Graph (0, 0)][DBLP ] ITCC, 2001, pp:290-294 [Conf ] Edgar Weippl Coimbra: secure Web access to multimedia content. [Citation Graph (0, 0)][DBLP ] ACM Multimedia Workshops, 2000, pp:145-148 [Conf ] Edgar Weippl , Alexander Schatten , Shuaib Karim , A. Min Tjoa SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management. [Citation Graph (0, 0)][DBLP ] PAKM, 2004, pp:365-377 [Conf ] Stefan Fenz , Edgar Weippl Ontology based IT-security planning. [Citation Graph (0, 0)][DBLP ] PRDC, 2006, pp:389-390 [Conf ] Wolfgang Eßmayr , Edgar Weippl Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:79-88 [Conf ] Wolfgang Eßmayr , Stefan Probst , Edgar Weippl Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2004, v:4, n:1-2, pp:127-156 [Journal ] Edgar Weippl , Andreas Holzinger , A. Min Tjoa Security aspects of ubiquitous computing in healthcare. [Citation Graph (0, 0)][DBLP ] Elektrotechnik und Informationstechnik, 2006, v:123, n:4, pp:156-161 [Journal ] Edgar Weippl , Wolfgang Eßmayr , Ludwig Klug A New Approach To Secure Federated Information Bases Using Agent Technology. [Citation Graph (0, 0)][DBLP ] J. Database Manag., 2003, v:14, n:1, pp:48-68 [Journal ] Edgar Weippl , Wolfgang Eßmayr Personal Trusted Devices for Web Services: Revisiting Multilevel Security. [Citation Graph (0, 0)][DBLP ] MONET, 2003, v:8, n:2, pp:151-157 [Journal ] Khalid Latif , Edgar Weippl , A. Min Tjoa Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. [Citation Graph (0, 0)][DBLP ] IRI, 2007, pp:170-176 [Conf ] Tor HTTP Usage and Information Leakage. [Citation Graph (, )][DBLP ] A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). [Citation Graph (, )][DBLP ] A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects. [Citation Graph (, )][DBLP ] An event-based empirical process analysis framework. [Citation Graph (, )][DBLP ] Formal threat descriptions for enhancing governmental risk assessment. [Citation Graph (, )][DBLP ] Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-Case. [Citation Graph (, )][DBLP ] Search in 0.000secs, Finished in 0.278secs