New Approaches for Security, Privacy and Trust in Complex ...google.de
books.google.de
Class , Family , Component Table 3. Updated storages at the reader and the tag. 90 Andreas Ekelhart , Stefan Fenz , Gernot Goluch , and Edgar Weippl.
New Approaches for Security, Privacy and Trust in Complex...
books.google.co.uk
... element stated above. Component o W. 10 o COM-ACM CAP2 COM-ACM AUT1 has. 90 Andreas Ekelhart, Stefan Fenz, Gernot Goluch, and Edgar Weippl.
Biologically Inspired Execution Framework for Vulnerable ...arXiv
arxiv.org
von S Safdar · · Zitiert von: 11 — [6] Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi,. Simon Tjoa, Thomas M¨uck , “Integration of an Ontological. Information Security Concept in ... von S Safdar · · Zitiert von: 11 — [6] Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi,. Simon Tjoa, Thomas M¨uck , “Integration of an Ontological. Information Security Concept in ...
And Thomas Muck - Colleagues - ACM Digital LibraryACM Digital Library
dl.acm.org
Andreas Ekelhart · Gernot Goluch · Stefan Jakoubi · Simon Tjoa · Stefan Fenz. Andreas Ekelhart · Gernot Goluch · Stefan Jakoubi · Simon Tjoa · Stefan Fenz.
Ontological Mapping of Common Criteria's Security ...IFIP Digital Library
dl.ifip.org
von A Ekelhart · Zitiert von: 46 — Andreas Ekelhart, Stefan Fenz, Gernot Goluch, and Edgar Weippl. Fig. 2. Class, Family ... Andreas Ekelhart, Stefan Fenz, Gernot Goluch, and Edgar Weippl. von A Ekelhart · Zitiert von: 46 — Andreas Ekelhart, Stefan Fenz, Gernot Goluch, and Edgar Weippl. Fig. 2. Class, Family ... Andreas Ekelhart, Stefan Fenz, Gernot Goluch, and Edgar Weippl.
Journal of Systems and Software | Selected papers from the 30th...
www.sciencedirect.com
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar Weippl. Pages : Download PDF. Article preview. select article Facilitating ...
Ontological Mapping of Common Criteria's Security ...Springer
link.springer.com
von A Ekclhart · · Zitiert von: 46 — Gernot Goluch & … ... Author information. Authors and Affiliations. Secure Business Austria, 1040, Vienna. Andreas Ekclhart, Stefan Fenz, Gernot Goluch & Edgar ... von A Ekclhart · · Zitiert von: 46 — Gernot Goluch & … ... Author information. Authors and Affiliations. Secure Business Austria, 1040, Vienna. Andreas Ekclhart, Stefan Fenz, Gernot Goluch & Edgar ...
CASSIS - Computer-based Academy for Security and ...ResearchGate
www.researchgate.net
... Gernot Goluch · Gernot Goluch. This person is not on ResearchGate, or hasn't ... Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl Gernot Goluch · Gernot Goluch. This person is not on ResearchGate, or hasn't ... Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl ...
International Journal of Web Information Systems: Vol. 3 Iss ...Emerald Insight
www.emerald.com
Architectural approach for handling semi‐structured data in a user‐centred working environment · Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus D. Architectural approach for handling semi‐structured data in a user‐centred working environment · Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus D.
CASSIS - Computer-based Academy for Security and …
www.sba-research.org
CASSIS - Computer-based Academy for Security and Safety in Information Systems Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard …
Alle Infos zum Namen "Gernot Goluch"
Andreas EkelhartUniversität Wien
informatik.univie.ac.at
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar Weippl. Journal of Systems and Software, 81(10). pp ISSN (2008). Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus Steinkellner, Edgar Weippl. Journal of Systems and Software, 81(10). pp ISSN (2008).
Architectural approach for handling semi-structured data in ...Emerald Insight
www.emerald.com
von A Ekelhart · — Andreas Ekelhart, Stefan Fenz, Gernot Goluch,. Markus D. Klemen and Edgar R. Weippl. Secure Business Austria, Vienna, Austria. Abstract. Purpose – Today the ... von A Ekelhart · — Andreas Ekelhart, Stefan Fenz, Gernot Goluch,. Markus D. Klemen and Edgar R. Weippl. Secure Business Austria, Vienna, Austria. Abstract. Purpose – Today the ...
Conference on Information Security 2007IFIP Digital Library
dl.ifip.org
Ontological Mapping of Common Criteria's Security Assurance Requirements. Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl Network ... Ontological Mapping of Common Criteria's Security Assurance Requirements. Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edgar R. Weippl Network ...
Simon TjoaFachhochschule St. Pölten
www.fhstp.ac.at
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, and. Thomas Mück. Integration of an ontological information security concept in ... Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Simon Tjoa, and. Thomas Mück. Integration of an ontological information security concept in ...
9 Publications: Five Selected Publications - SBA …
www.sba-research.org
9 Publications: Five Selected Publications [1] Sebastian Schrittwieser, ... [32] Stefan Fenz, Gernot Goluch, Andreas Ekelhart, and Edgar R. Weippl. Informa-
Architectural approach for handling semi‐structured data in a...
www.emerald.com
Architectural approach for handling semi‐structured data in a user‐centred working environment - Author: Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Markus...
Information Security Fortification by Ontological Mapping of the...
www.bernhard-riedl.com
Authors: Stefan Fenz: Gernot Goluch: Andreas Ekelhart: Bernhard Riedl: Edgar Weippl; Abstract: This paper introduces an ontology-based framework to improve ...
CiteSeerX — XML Security — A Comparative Literature Review
citeseerx.ist.psu.edu
by Andreas Ekelhart , Stefan Fenz , Gernot Goluch , Markus Steinkellner ... author = {Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus ...
DEXA 2005
www.dexa.org
Edgar R. Weippl, Markus Klemen, Manfred Linnert, Stefan Fenz, Gernot Goluch, A Min Tjoa; Austria. Towards truly extensible database systems Ralph Acker, Roland Pieringer
sortiert nach Relevanz / Datum