The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andreas Ekelhart: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar R. Weippl
    Security Issues for the Use of Semantic Web in E-Commerce. [Citation Graph (0, 0)][DBLP]
    BIS, 2007, pp:1-13 [Conf]
  2. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar Weippl
    Security Ontologies: Improving Quantitative Risk Analysis. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:156- [Conf]
  3. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl
    Security Ontology: Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:249-259 [Conf]
  4. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, A. Min Tjoa, Edgar R. Weippl
    Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP]
    PAKM, 2006, pp:37-48 [Conf]
  5. Edgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A. Min Tjoa
    The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. [Citation Graph (0, 0)][DBLP]
    ODBIS, 2006, pp:135-151 [Conf]

  6. CASSIS - Computer-based Academy for Security and Safety in Information Systems. [Citation Graph (, )][DBLP]


  7. Fortification of IT Security by Automatic Security Advisory Processing. [Citation Graph (, )][DBLP]


  8. Business Process-Based Resource Importance Determination. [Citation Graph (, )][DBLP]


  9. Formalizing information security knowledge. [Citation Graph (, )][DBLP]


  10. Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. [Citation Graph (, )][DBLP]


  11. AURUM: A Framework for Information Security Risk Management. [Citation Graph (, )][DBLP]


  12. Security aspects in Semantic Web Services Filtering. [Citation Graph (, )][DBLP]


  13. Automated Risk and Utility Management. [Citation Graph (, )][DBLP]


  14. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. [Citation Graph (, )][DBLP]


  15. An evaluation of technologies for the pseudonymization of medical data. [Citation Graph (, )][DBLP]


  16. Ontological Mapping of Common Criteria's Security Assurance Requirements. [Citation Graph (, )][DBLP]


  17. Interactive Selection of ISO 27001 Controls under Multiple Objectives. [Citation Graph (, )][DBLP]


  18. Formal threat descriptions for enhancing governmental risk assessment. [Citation Graph (, )][DBLP]


  19. Ontology-Based Decision Support for Information Security Risk Management. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002