The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefan Fenz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar R. Weippl
    Security Issues for the Use of Semantic Web in E-Commerce. [Citation Graph (0, 0)][DBLP]
    BIS, 2007, pp:1-13 [Conf]
  2. Edgar Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A. Min Tjoa
    Semantic Storage: A Report on Performance and Flexibility. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:586-595 [Conf]
  3. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar Weippl
    Security Ontologies: Improving Quantitative Risk Analysis. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:156- [Conf]
  4. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl
    Security Ontology: Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:249-259 [Conf]
  5. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, A. Min Tjoa, Edgar R. Weippl
    Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP]
    PAKM, 2006, pp:37-48 [Conf]
  6. Stefan Fenz, Edgar Weippl
    Ontology based IT-security planning. [Citation Graph (0, 0)][DBLP]
    PRDC, 2006, pp:389-390 [Conf]
  7. Edgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A. Min Tjoa
    The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. [Citation Graph (0, 0)][DBLP]
    ODBIS, 2006, pp:135-151 [Conf]

  8. CASSIS - Computer-based Academy for Security and Safety in Information Systems. [Citation Graph (, )][DBLP]


  9. Fortification of IT Security by Automatic Security Advisory Processing. [Citation Graph (, )][DBLP]


  10. Ontological Mapping of Information Security Best-Practice Guidelines. [Citation Graph (, )][DBLP]


  11. Business Process-Based Resource Importance Determination. [Citation Graph (, )][DBLP]


  12. Formalizing information security knowledge. [Citation Graph (, )][DBLP]


  13. Pseudonymization for improving the Privacy in E-Health Applications. [Citation Graph (, )][DBLP]


  14. Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. [Citation Graph (, )][DBLP]


  15. AURUM: A Framework for Information Security Risk Management. [Citation Graph (, )][DBLP]


  16. Security aspects in Semantic Web Services Filtering. [Citation Graph (, )][DBLP]


  17. Automated Risk and Utility Management. [Citation Graph (, )][DBLP]


  18. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. [Citation Graph (, )][DBLP]


  19. Ontology-based generation of IT-security metrics. [Citation Graph (, )][DBLP]


  20. Ontological Mapping of Common Criteria's Security Assurance Requirements. [Citation Graph (, )][DBLP]


  21. Interactive Selection of ISO 27001 Controls under Multiple Objectives. [Citation Graph (, )][DBLP]


  22. Formal threat descriptions for enhancing governmental risk assessment. [Citation Graph (, )][DBLP]


  23. Ontology-Based Decision Support for Information Security Risk Management. [Citation Graph (, )][DBLP]


  24. Ontology-Based Generation of Bayesian Networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002