The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Edgar Weippl: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Neubauer, Christian Stummer, Edgar Weippl
    Workshop-based Multiobjective Security Safeguard Selection. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:366-373 [Conf]
  2. Thomas Neubauer, Edgar Weippl, Stefan Biffl
    Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:723-731 [Conf]
  3. Stefan Probst, Wolfgang Eßmayr, Edgar Weippl
    Reusable Components for Developing Security-Aware Application. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:239-248 [Conf]
  4. Edgar Weippl
    An Approach to Secure Distribution of Web-Based Training Courses. [Citation Graph (0, 0)][DBLP]
    ACSC, 2001, pp:199-205 [Conf]
  5. Edgar Weippl
    Building secure knowledge bases: combining Java agents and DBagents. [Citation Graph (0, 0)][DBLP]
    Agents, 2001, pp:212-213 [Conf]
  6. Edgar Weippl
    Visualizing Content Based Relations in Texts. [Citation Graph (0, 0)][DBLP]
    AUIC, 2001, pp:34-41 [Conf]
  7. Edgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker
    Towards authentication using mobile devices. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:91-105 [Conf]
  8. Christine Artelsmair, Wolfgang Eßmayr, Peter Lang, Roland Wagner, Edgar Weippl
    CoSMo: An Approach Towards Conceptual Security Modeling. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:557-566 [Conf]
  9. Edgar Weippl, Wolfgang Eßmayr
    Fine Grained Replication in Distributed Databases: A Taxonomy and Practical Considerations. [Citation Graph (0, 0)][DBLP]
    DEXA, 2000, pp:939-948 [Conf]
  10. Edgar Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A. Min Tjoa
    Semantic Storage: A Report on Performance and Flexibility. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:586-595 [Conf]
  11. Ismail Khalil Ibrahim, Wieland Schwinger, Edgar Weippl, Josef Altmann, Werner Winiwarter
    Agent Solutions for E-Business Transactions. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:84-86 [Conf]
  12. Edgar Weippl, Jörn Altmann, Wolfgang Eßmayr
    Mobile Database Agents for Building Data Warehouses. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2000, pp:477-481 [Conf]
  13. Edgar Weippl, Hans Lohninger
    Knowledge Landscapes: A VR Interface for Web-Based Training Knowledge Bases. [Citation Graph (0, 0)][DBLP]
    EJC, 2000, pp:271-274 [Conf]
  14. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar Weippl
    Security Ontologies: Improving Quantitative Risk Analysis. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:156- [Conf]
  15. Eva Gahleitner, Wernher Behrendt, Jürgen Palkoska, Edgar Weippl
    On cooperatively creating dynamic ontologies. [Citation Graph (0, 0)][DBLP]
    Hypertext, 2005, pp:208-210 [Conf]
  16. Oscar Mangisengi, Wolfgang Eßmayr, Johannes Huber, Edgar Weippl
    XML-Based OLAP Query Processing in a Federated Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2003, pp:71-78 [Conf]
  17. Rudolf Ramler, Klaus Wolfmaier, Edgar Weippl
    From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach. [Citation Graph (0, 0)][DBLP]
    ICWE, 2004, pp:287-299 [Conf]
  18. Reinhard Kronsteiner, Edgar Weippl, Ismail Khalil Ibrahim, Gabriele Kotsis
    Can P2P Deliver What Web Repositories Promised: Global Sharing of E-Learning Content? [Citation Graph (0, 0)][DBLP]
    iiWAS, 2003, pp:- [Conf]
  19. Edgar Weippl
    Security in E-Learning. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2003, pp:- [Conf]
  20. Edgar Weippl
    Security in E-Learning. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  21. Edgar Weippl
    Do we Really Need Access Control? [Citation Graph (0, 0)][DBLP]
    iiWAS, 2006, pp:493-502 [Conf]
  22. Bronson Trevor, Edgar Weippl, Werner Winiwarter
    A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content. [Citation Graph (0, 0)][DBLP]
    INAP, 2001, pp:316-330 [Conf]
  23. Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwarter
    Content-based Management of Document Access Control. [Citation Graph (0, 0)][DBLP]
    INAP, 2001, pp:78-86 [Conf]
  24. Edgar Weippl
    An Approach to Role-Based Access Control for Digital Content. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:290-294 [Conf]
  25. Edgar Weippl
    Coimbra: secure Web access to multimedia content. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia Workshops, 2000, pp:145-148 [Conf]
  26. Edgar Weippl, Alexander Schatten, Shuaib Karim, A. Min Tjoa
    SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management. [Citation Graph (0, 0)][DBLP]
    PAKM, 2004, pp:365-377 [Conf]
  27. Stefan Fenz, Edgar Weippl
    Ontology based IT-security planning. [Citation Graph (0, 0)][DBLP]
    PRDC, 2006, pp:389-390 [Conf]
  28. Wolfgang Eßmayr, Edgar Weippl
    Identity Mapping: An Approach to Unravel Enterprise Security Management Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:79-88 [Conf]
  29. Wolfgang Eßmayr, Stefan Probst, Edgar Weippl
    Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:127-156 [Journal]
  30. Edgar Weippl, Andreas Holzinger, A. Min Tjoa
    Security aspects of ubiquitous computing in healthcare. [Citation Graph (0, 0)][DBLP]
    Elektrotechnik und Informationstechnik, 2006, v:123, n:4, pp:156-161 [Journal]
  31. Edgar Weippl, Wolfgang Eßmayr, Ludwig Klug
    A New Approach To Secure Federated Information Bases Using Agent Technology. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2003, v:14, n:1, pp:48-68 [Journal]
  32. Edgar Weippl, Wolfgang Eßmayr
    Personal Trusted Devices for Web Services: Revisiting Multilevel Security. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:2, pp:151-157 [Journal]
  33. Khalid Latif, Edgar Weippl, A. Min Tjoa
    Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. [Citation Graph (0, 0)][DBLP]
    IRI, 2007, pp:170-176 [Conf]

  34. Tor HTTP Usage and Information Leakage. [Citation Graph (, )][DBLP]


  35. A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). [Citation Graph (, )][DBLP]


  36. A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects. [Citation Graph (, )][DBLP]


  37. An event-based empirical process analysis framework. [Citation Graph (, )][DBLP]


  38. Formal threat descriptions for enhancing governmental risk assessment. [Citation Graph (, )][DBLP]


  39. Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-Case. [Citation Graph (, )][DBLP]


Search in 0.000secs, Finished in 0.278secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002