|
Search the dblp DataBase
Stefan Fenz:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar R. Weippl
Security Issues for the Use of Semantic Web in E-Commerce. [Citation Graph (0, 0)][DBLP] BIS, 2007, pp:1-13 [Conf]
- Edgar Weippl, Markus D. Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A. Min Tjoa
Semantic Storage: A Report on Performance and Flexibility. [Citation Graph (0, 0)][DBLP] DEXA, 2005, pp:586-595 [Conf]
- Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar Weippl
Security Ontologies: Improving Quantitative Risk Analysis. [Citation Graph (0, 0)][DBLP] HICSS, 2007, pp:156- [Conf]
- Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl
Security Ontology: Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:249-259 [Conf]
- Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, A. Min Tjoa, Edgar R. Weippl
Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP] PAKM, 2006, pp:37-48 [Conf]
- Stefan Fenz, Edgar Weippl
Ontology based IT-security planning. [Citation Graph (0, 0)][DBLP] PRDC, 2006, pp:389-390 [Conf]
- Edgar R. Weippl, Markus D. Klemen, Stefan Fenz, Andreas Ekelhart, A. Min Tjoa
The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps. [Citation Graph (0, 0)][DBLP] ODBIS, 2006, pp:135-151 [Conf]
CASSIS - Computer-based Academy for Security and Safety in Information Systems. [Citation Graph (, )][DBLP]
Fortification of IT Security by Automatic Security Advisory Processing. [Citation Graph (, )][DBLP]
Ontological Mapping of Information Security Best-Practice Guidelines. [Citation Graph (, )][DBLP]
Business Process-Based Resource Importance Determination. [Citation Graph (, )][DBLP]
Formalizing information security knowledge. [Citation Graph (, )][DBLP]
Pseudonymization for improving the Privacy in E-Health Applications. [Citation Graph (, )][DBLP]
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management. [Citation Graph (, )][DBLP]
AURUM: A Framework for Information Security Risk Management. [Citation Graph (, )][DBLP]
Security aspects in Semantic Web Services Filtering. [Citation Graph (, )][DBLP]
Automated Risk and Utility Management. [Citation Graph (, )][DBLP]
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. [Citation Graph (, )][DBLP]
Ontology-based generation of IT-security metrics. [Citation Graph (, )][DBLP]
Ontological Mapping of Common Criteria's Security Assurance Requirements. [Citation Graph (, )][DBLP]
Interactive Selection of ISO 27001 Controls under Multiple Objectives. [Citation Graph (, )][DBLP]
Formal threat descriptions for enhancing governmental risk assessment. [Citation Graph (, )][DBLP]
Ontology-Based Decision Support for Information Security Risk Management. [Citation Graph (, )][DBLP]
Ontology-Based Generation of Bayesian Networks. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|