The SCEAS System
Navigation Menu

Search the dblp DataBase


Claudia Eckert: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Wynn, Claudia Eckert, P. John Clarkson
    Planning Business Processes in Product Development Organizations. [Citation Graph (0, 0)][DBLP]
    CAiSE Workshops, 2003, pp:- [Conf]
  2. Patrick Röder, Omid Tafreschi, Claudia Eckert
    History-based access control for XML documents. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:386-388 [Conf]
  3. Kpatcha M. Bayarou, Sebastian Rohr, Claudia Eckert
    Interworking von UMTS und LAN: Eine sicherheitstechnische Betrachtung. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2004, pp:413-432 [Conf]
  4. Claudia Eckert
    Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net. [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2004, pp:433-450 [Conf]
  5. Timothy Jarratt, René Keller, Seena Nair, Claudia Eckert, P. John Clarkson
    Visualization Techniques for Product Change and Product Modelling in Complex Design. [Citation Graph (0, 0)][DBLP]
    Diagrams, 2004, pp:388-391 [Conf]
  6. Taufiq Rochaeli, Claudia Eckert
    Attack Goal Generation Using Description Logic-based Knowledge Representation. [Citation Graph (0, 0)][DBLP]
    Description Logics, 2005, pp:- [Conf]
  7. Thomas Stibor, Kpatcha M. Bayarou, Claudia Eckert
    An Investigation of R-Chunk Detector Generation on Higher Alphabets. [Citation Graph (0, 0)][DBLP]
    GECCO (1), 2004, pp:299-307 [Conf]
  8. Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, Claudia Eckert
    Is negative selection appropriate for anomaly detection? [Citation Graph (0, 0)][DBLP]
    GECCO, 2005, pp:321-328 [Conf]
  9. Markus Pizka, Claudia Eckert
    A Language-Based Approach to Construct Structured and Efficient. [Citation Graph (0, 0)][DBLP]
    HICSS (1), 1997, pp:130-139 [Conf]
  10. Thomas Stibor, Jonathan Timmis, Claudia Eckert
    A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2005, pp:262-275 [Conf]
  11. Thomas Stibor, Jonathan Timmis, Claudia Eckert
    On Permutation Masks in Hamming Negative Selection. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2006, pp:122-135 [Conf]
  12. Thomas Stibor, Jonathan Timmis, Claudia Eckert
    On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2006, pp:215-228 [Conf]
  13. Claudia Eckert, Martin Stacey
    CAD Systems and the Division of Labour in Knitwear Design. [Citation Graph (0, 0)][DBLP]
    Woman, Work and Computerization, 1994, pp:409-422 [Conf]
  14. P. John Clarkson, Andres Melo, Claudia Eckert
    Visualization of Routes in Design Process Planning. [Citation Graph (0, 0)][DBLP]
    IV, 2000, pp:155-164 [Conf]
  15. Markus Pizka, Claudia Eckert, Sascha Groh
    Evolving Software Tools for New Distributed Computing Environments. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:87-96 [Conf]
  16. Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
    Protected transmission of biometric user authentication data for oncard-matching. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:425-430 [Conf]
  17. Claudia Eckert
    On security models. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:485-486 [Conf]
  18. Claudia Eckert, Florian Erhard, Johannes Geiger
    GSFS - A New Group-Aware Cryptographic File System. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:221-230 [Conf]
  19. Claudia Eckert, D. Marek
    Developing secure applications: a systematic approach. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:267-279 [Conf]
  20. Claudia Eckert, A. Pircher
    Internet Anonymity: Problems and Solutions. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:35-50 [Conf]
  21. Claudia Eckert, Th. Stoesslein
    MVS-SAT: a security administration tool to support SMF protocol data evaluation. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:363-374 [Conf]
  22. Uwe Baumgarten, Claudia Eckert, Harald Görl
    Trust and confidence in open systems: does security harmonize with mobility? [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 2000, pp:133-138 [Conf]
  23. Claudia Eckert
    Security Issues of Mobile Devices. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:163- [Conf]
  24. Claudia Eckert, Ian Kelly, Martin Stacey
    Interactive generative systems for conceptual design: An empirical perspective. [Citation Graph (0, 0)][DBLP]
    AI EDAM, 1999, v:13, n:4, pp:303-320 [Journal]
  25. Claudia Eckert
    The Communication Bottleneck in Knitwear Design: Analysis and Computing Solutions. [Citation Graph (0, 0)][DBLP]
    Computer Supported Cooperative Work, 2001, v:10, n:1, pp:29-74 [Journal]
  26. Claudia Eckert, Jean-François Boujut
    The Role of Objects in Design Co-Operation: Communication through Physical or Virtual Objects. [Citation Graph (0, 0)][DBLP]
    Computer Supported Cooperative Work, 2003, v:12, n:2, pp:145-151 [Journal]
  27. Martin Stacey, Claudia Eckert
    Against Ambiguity. [Citation Graph (0, 0)][DBLP]
    Computer Supported Cooperative Work, 2003, v:12, n:2, pp:153-183 [Journal]
  28. Claudia Eckert, Kpatcha M. Bayarou, Sebastian Rohr
    NGN, All-IP, B3G: Enabler für das Future Net?!: Überblick über Entwicklungen im Bereich zukünftiger Netze. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2004, v:27, n:1, pp:12-34 [Journal]
  29. Thomas Stibor, Claudia Eckert, Jonathan Timmis
    Artificial Immune Systems for IT-Security (Künstliche Immunsysteme für IT-Sicherheit). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2006, v:48, n:3, pp:168-173 [Journal]
  30. René Keller, Claudia Eckert, P. John Clarkson
    Matrices or node-link diagrams: which visual representation is better for visualising connectivity models? [Citation Graph (0, 0)][DBLP]
    Information Visualization, 2006, v:5, n:1, pp:62-76 [Journal]
  31. Claudia Eckert, Markus Pizka
    Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 1999, v:13, n:1, pp:33-55 [Journal]
  32. Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert
    An Approach to a Trustworthy System Architecture Using Virtualization. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:191-202 [Conf]
  33. Taufiq Rochaeli, Claudia Eckert
    Using patterns paradigm to refine workflow policies. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:760-764 [Conf]
  34. Patrick Röder, Omid Tafreschi, Claudia Eckert
    On Flexible Modeling of History-Based Access Control Policies for XML Documents. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:1090-1097 [Conf]
  35. Taufiq Rochaeli, Claudia Eckert
    Expertise Knowledge-Based Policy Refinement Process. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:61-65 [Conf]
  36. Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert
    Situation-Based Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:190-200 [Conf]

  37. STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  38. Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. [Citation Graph (, )][DBLP]

  39. Enhancing Control of Service Compositions in Service-Oriented Architectures. [Citation Graph (, )][DBLP]

  40. Improving the scalability of platform attestation. [Citation Graph (, )][DBLP]

  41. Model Checking of Restricted CTL* Formulas using ALCK. [Citation Graph (, )][DBLP]

  42. Grammatical Inference Algorithms in MATLAB. [Citation Graph (, )][DBLP]

  43. Distributed Attribute-Based Encryption. [Citation Graph (, )][DBLP]

  44. A Reputation System for Electronic Negotiations. [Citation Graph (, )][DBLP]

  45. An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. [Citation Graph (, )][DBLP]

  46. Measuring unlinkability revisited. [Citation Graph (, )][DBLP]

  47. 506 Ways to Track Your Lover. [Citation Graph (, )][DBLP]

  48. Defending against false-endorsement-based dos attacks in wireless sensor networks. [Citation Graph (, )][DBLP]

  49. An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs. [Citation Graph (, )][DBLP]

  50. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. [Citation Graph (, )][DBLP]

  51. Externalizing tacit overview knowledge: A model-based approach to supporting design teams. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002