-
2
-
-
84875384473
-
A secure log architecture to support remote auditing
-
(April 2013)
-
Accorsi, R. 2013. A secure log architecture to support remote auditing. MATH COMPUT MODEL, 57, 7-8 (April 2013). 1578-1591. DOI=http://dx.doi.org/10.1016/j.mcm.2012.06.035.
-
(2013)
Math Comput Model
, vol.57
, Issue.7-8
, pp. 1578-1591
-
-
Accorsi, R.1
-
3
-
-
84856536487
-
Automated certification for compliant cloud-based business processes
-
(June 2011)
-
Accorsi, R., Lowis, L., and Sato, Y. 2011. Automated Certification for Compliant Cloud-based Business Processes. BISE, 3, 3 (June 2011), 145-154. DOI=http://dx.doi.org/10.1007/s12599-011-0155-7.
-
(2011)
BISE
, vol.3
, Issue.3
, pp. 145-154
-
-
Accorsi, R.1
Lowis, L.2
Sato, Y.3
-
4
-
-
57849117582
-
Compliance monitor for early warning risk determination
-
(October 2008)
-
Accorsi, R., Sato, Y., and Kai, S. 2008. Compliance Monitor for Early Warning Risk Determination. WIRTSCHAFTSINFORMATIK, 50, 5 (October 2008), 375-382. DOI=http://dx.doi.org/10.1007/s11576-008-0079-0.
-
(2008)
WIRTSCHAFTSINFORMATIK
, vol.50
, Issue.5
, pp. 375-382
-
-
Accorsi, R.1
Sato, Y.2
Kai, S.3
-
5
-
-
84905110394
-
Mobile trusted computing
-
(August 2014)
-
Asokan, N., Ekberg, J.-E., Kostiainen, K., Rajan, A., Rozas, C., Sadeghi, A.-R., Schulz, S., and Wachsmann, C. 2014. Mobile Trusted Computing. PROC IEEE, 102, 8 (August 2014), 1189-1206. DOI=http://dx.doi.org/10.1109/JPROC.2014.2332007.
-
(2014)
PROC IEEE
, vol.102
, Issue.8
, pp. 1189-1206
-
-
Asokan, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Rajan, A.4
Rozas, C.5
Sadeghi, A.-R.6
Schulz, S.7
Wachsmann, C.8
-
6
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
(January 2004)
-
Avizienis, A., Laprie, J.-C., Randell, B., and Landwehr, C. 2004. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE T DEPEND SECURE, 1, 1 (January 2004), 11-33. DOI=http://dx.doi.org/10.1109/TDSC.2004.2.
-
(2004)
IEEE T Depend Secure
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
7
-
-
74049125197
-
Anonymous credentials on a standard Java card
-
(Chicago, IL, USA, November 9-13, 2009). CCS'09. ACM
-
th ACM conf. on Computer and Communications Security (Chicago, IL, USA, November 9-13, 2009). CCS'09. ACM, 600-610. DOI=http://dx.doi.org/10.1145/1653662.1653734.
-
(2009)
th ACM Conf. on Computer and Communications Security
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Groß, T.3
Shoup, V.4
-
8
-
-
84867136631
-
Poisoning attacks against support vector machines
-
(Edinburgh, Scotland, June 26-July 1, 2012). ICML 2012. Omnipress
-
th Int. Conf. on Machine Learning, (Edinburgh, Scotland, June 26-July 1, 2012). ICML 2012. Omnipress, 1807-1814.
-
(2012)
th Int. Conf. on Machine Learning
, pp. 1807-1814
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
9
-
-
0029700344
-
Decentralized trust management
-
(Oakland, CA, USA, May 6-8, 1996). IEEE SSP 1996. IEEE
-
Blaze, M., Feigenbaum, J., and Lacy, J.O. 1996. Decentralized Trust Management. In Proc. of IEEE Symp. on Security and Privacy (Oakland, CA, USA, May 6-8, 1996). IEEE SSP 1996. IEEE, 164-173. DOI=http://dx.doi.org/10.1109/SECPRI.1996.502679.
-
(1996)
Proc. of IEEE Symp. on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.O.3
-
10
-
-
50349096588
-
Digital ecosystems: Evolving service-oriented architectures
-
2006 (Madonna di Campiglio, Italy, December 11-13, 2006), IEEE
-
st Bio-Inspired Models of Network, Information and Computing Systems, 2006 (Madonna di Campiglio, Italy, December 11-13, 2006), IEEE, 1-6. DOI=http://dx.doi.org/10.1109/BIMNICS.2006.361817.
-
(2009)
st Bio-Inspired Models of Network, Information and Computing Systems
, pp. 1-6
-
-
Briscoe, G.1
De Wilde, P.2
-
13
-
-
79960570447
-
Why and where: A characterization of data provenance
-
(London, UK, January 4-6, 2001). ICDT 2001. Springer
-
th Int. Conf. Database Theory (London, UK, January 4-6, 2001). ICDT 2001. Springer, 316-330. DOI=http://dx.doi.org/10.1007/3-540-44503-X-20.
-
(2001)
th Int. Conf. Database Theory
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
14
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
(Innsbruck, Austria, May 6-10, 2011). EUROCRYPT 2001. Springer
-
Camenisch, J. and Lysyanskaya, A. 2001. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In Proc. of Int. Conf. on the Theory and Application of Cryptographic Techniques Advances in Cryptology (Innsbruck, Austria, May 6-10, 2011). EUROCRYPT 2001. Springer, 93-118. DOI=http://dx.doi.org/10.1007/3-540-44987-6-7.
-
(2001)
Proc. of Int. Conf. on the Theory and Application of Cryptographic Techniques Advances in Cryptology
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
(Santa Barbara, CA, USA, August 18-22, 2002). CRYPTO 2002. Springer
-
nd Annual Int. Cryptology Conf. Advances in Cryptology (Santa Barbara, CA, USA, August 18-22, 2002). CRYPTO 2002. Springer, 61-76. DOI=http://dx.doi.org/10.1007/3-540-45708-9-5.
-
(2002)
nd Annual Int. Cryptology Conf. Advances in Cryptology
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D. 1985. Security Without Identification: Transaction Systems to Make Big Brother Obsolete. COMMUN ACM, 28, 10, 1030-1044. DOI=http://dx.doi.org/10.1145/4372.4373.
-
(1985)
Commun ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
17
-
-
51749086409
-
Hyperproperties
-
(Pittsburgh, PA, USA, June 23-25, 2008). CSF '08. IEEE
-
st IEEE Computer Security Foundations Symp. (Pittsburgh, PA, USA, June 23-25, 2008). CSF '08. IEEE, 51-64. DOI=http://dx.doi.org/10.1109/CSF.2008.7.
-
(2008)
st IEEE Computer Security Foundations Symp
, pp. 51-64
-
-
Clarkson, M.R.1
Schneider, F.B.2
-
18
-
-
84985929597
-
-
(request for a preliminary ruling from the Audiencia Nacional - Spain) - Google Spain SL, Google Inc. v Agencia Espanola de Proteccion de Datos (AEPD), Mario Costeja Gonzalez (Case C-131/12)
-
Court of Justice of the European Union. 2014. Judgment of the Court (Grand Chamber) of 13 May 2014 (request for a preliminary ruling from the Audiencia Nacional - Spain) - Google Spain SL, Google Inc. v Agencia Espanola de Proteccion de Datos (AEPD), Mario Costeja Gonzalez (Case C-131/12).
-
(2014)
Judgment of the Court (Grand Chamber) of 13 May 2014
-
-
-
19
-
-
84904546940
-
Secure provision of patient-centered health information technology services in public networks - Leveraging security and privacy features provided by the German nationwide health information technology infrastructure
-
(June 2014)
-
Dehling, T. and Sunyaev, A. 2014. Secure provision of patient-centered health information technology services in public networks - leveraging security and privacy features provided by the German nationwide health information technology infrastructure. ELECTRONIC MARKETS, 24, 2 (June 2014), 89-99. DOI=http://dx.doi.org/10.1007/s12525-013-0150-6.
-
(2014)
Electronic Markets
, vol.24
, Issue.2
, pp. 89-99
-
-
Dehling, T.1
Sunyaev, A.2
-
22
-
-
0020720357
-
On the security of public key protocols
-
(March 1983)
-
Dolev, D. and Yao, A.C. 1983. On the Security of Public Key Protocols. IEEE T INFORM THEORY, 29, 2 (March 1983), 198-208. DOI=http://dx.doi.org/10.1109/TIT.1983.1056650.
-
(1983)
IEEE T Inform Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
23
-
-
84904549775
-
Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009 amending directives 2002/21/EC on a common regulatory framework for electronic communications networks and services
-
European Commission. 2009. Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009 amending Directives 2002/21/EC on a common regulatory framework for electronic communications networks and services. Official Journal of the European Communities, L 337, 37-69.
-
(2009)
Official Journal of the European Communities
, vol.L 337
, pp. 37-69
-
-
-
25
-
-
84919783003
-
REGULATION (EU) no 575/2013 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on prudential requirements for credit institutions and investment forms and amending regulation (EU) no 648/2012
-
L 176
-
European Commission. 2013. REGULATION (EU) No 575/2013 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on prudential requirements for credit institutions and investment forms and amending Regulation (EU) No 648/2012. Official Journal of the European Union, L 176/1-337.
-
(2013)
Official Journal of the European Union
, pp. 1-337
-
-
-
26
-
-
84954115676
-
DIRECTIVE 2013/36/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on access to the activity of credit institutions and the prudential supervision of credit institutions and investment firms, amending directive 2002/87/EC and repealing directives 2006/48/EC and 2006/49/EC
-
L 176
-
European Commission. 2013. DIRECTIVE 2013/36/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 June 2013 on access to the activity of credit institutions and the prudential supervision of credit institutions and investment firms, amending Directive 2002/87/EC and repealing Directives 2006/48/EC and 2006/49/EC. Official Journal of the European Union, L 176/338-436.
-
(2013)
Official Journal of the European Union
, pp. 338-436
-
-
-
28
-
-
33749049616
-
An optimization model for the management of security risks in banking companies
-
(Munich, Germany, July 19-22, 2005). CEC'05. IEEE
-
th IEEE Int. Conf. on E-Commerce Technology (Munich, Germany, July 19-22, 2005). CEC'05. IEEE, 266-273. DOI=http://dx.doi.org/10.1109/ICECT.2005.21.
-
(2005)
th IEEE Int. Conf. on E-Commerce Technology
, pp. 266-273
-
-
Faisst, U.1
Prokein, O.2
-
29
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
(April 1985)
-
Fischer, M.J., Lynch, N.A., and Paterson, M.S. 1985. Impossibility of distributed consensus with one faulty process. J ACM, 32, 2 (April 1985), 374-382. DOI=http://dx.doi.org/10.1145/3149.214121.
-
(1985)
J ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
30
-
-
84873963501
-
Non-interactive key exchange
-
(Nara, Japan, February 26-March 1, 2013). PKC 2013. Springer
-
th Int. Conf. on Practice and Theory in Public-Key Cryptography (Nara, Japan, February 26-March 1, 2013). PKC 2013. Springer, 254-271. DOI=http://dx.doi.org/10.1007/978-3-642-36362-7-17.
-
(2013)
th Int. Conf. on Practice and Theory in Public-Key Cryptography
, pp. 254-271
-
-
Freire, E.1
Hofheinz, D.2
Kiltz, E.3
Paterson, K.4
-
31
-
-
84896894168
-
Big data in large scale intelligent smart city installation
-
(Vienna, Austria, December 2-4, 2013). iiWAS '13. ACM
-
Girtelschmid, S., Steinbauer, M., Kumar, V., Fensel, A., and Kotsis, G. 2013. Big Data in Large Scale Intelligent Smart City Installation. In Proc. of Int. Conf. on Information Integration and Web-based Applications & Services (Vienna, Austria, December 2-4, 2013). iiWAS '13. ACM, 428-432. DOI=http://dx.doi.org/10.1145/2539150.2539224.
-
(2013)
Proc. of Int. Conf. on Information Integration and Web-based Applications & Services
, pp. 428-432
-
-
Girtelschmid, S.1
Steinbauer, M.2
Kumar, V.3
Fensel, A.4
Kotsis, G.5
-
32
-
-
84904557205
-
On the design of a privacy aware authorization engine for collaborative environments
-
(June 2014)
-
Gogoulos, F.I., Antonakopoulou, A., Lioudakis, G.V., Mousas, A.S., Kaklamani, D.I., and Venieris, I.S. 2014. On the design of a privacy aware authorization engine for collaborative environments. ELECTRONIC MARKETS, 24, 2 (June 2014), 101-112. DOI=http://dx.doi.org/10.1007/s12525-014-0155-9.
-
(2014)
Electronic Markets
, vol.24
, Issue.2
, pp. 101-112
-
-
Gogoulos, F.I.1
Antonakopoulou, A.2
Lioudakis, G.V.3
Mousas, A.S.4
Kaklamani, D.I.5
Venieris, I.S.6
-
33
-
-
84885004565
-
Covert channel invisibility theorem
-
(St. Petersburg, Russia, September 13-15, 2007). MMM-ACNS 2007. Springer
-
th Int. Conf. on Mathematical Methods, Models, and Architectures for Computer Network Security (St. Petersburg, Russia, September 13-15, 2007). MMM-ACNS 2007. Springer, 187-196. DOI=http://dx.doi.org/10.1007/978-3-540-73986-9-16.
-
(2007)
th Int. Conf. on Mathematical Methods, Models, and Architectures for Computer Network Security
, pp. 187-196
-
-
Grusho, A.1
Grebnev, N.2
Timonina, E.3
-
34
-
-
84948675653
-
Insurability of electronic commerce risks
-
(Hawaii, USA, January 7-10, 2002). HICCS'02. IEEE
-
th Annual Hawaii International Conference on System Sciences 7(7) (Hawaii, USA, January 7-10, 2002). HICCS'02. IEEE, 185-193. DOI=http://dx.doi.org/10.1109/HICSS.2002.994177.
-
(2002)
th Annual Hawaii International Conference on System Sciences
, vol.7
, Issue.7
, pp. 185-193
-
-
Grzebiela, T.1
-
35
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
(January 2006)
-
Hamlen, K.W., Morrisett, G., and Schneider, F.B. 2006. Computability Classes for Enforcement Mechanisms. ACM T PROG LANG SYS, 28, 1 (January 2006), 175-205. DOI=http://dx.doi.org/10.1145/1111596.1111601.
-
(2006)
ACM T Prog Lang Sys
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
36
-
-
0034842250
-
Understanding the complexity of economic, ecological, and social systems
-
Holling, C.S. 2001. Understanding the Complexity of Economic, Ecological, and Social Systems. ECOSYSTEMS, 4, 5, 390-405. DOI=http://dx.doi.org/10.1007/s10021-001-0101-5.
-
(2001)
Ecosystems
, vol.4
, Issue.5
, pp. 390-405
-
-
Holling, C.S.1
-
37
-
-
80955143573
-
Adversarial machine learning
-
(Chicago, Illinois, USA, October 17-21, 2011). AISec'11. ACM
-
th ACM Workshop on Security and Artificial Intelligence (Chicago, Illinois, USA, October 17-21, 2011). AISec'11. ACM, 43-58. DOI=http://dx.doi.org/10.1145/2046684.2046692.
-
(2011)
th ACM Workshop on Security and Artificial Intelligence
, pp. 43-58
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubenstein, B.I.4
Tygar, J.5
-
38
-
-
84882996563
-
A user privacy protection technique for executing SQL over encrypted data in database outsourcing service
-
(Athens, Greece, April 25-26, 2013). I3E 2013. Springer
-
th IFIP WG 6.11 Conf. on e-Business, e-Services, and e-Society (Athens, Greece, April 25-26, 2013). I3E 2013. Springer, 25-37. DOI=http://dx.doi.org/10.1007/978-3-642-37437-1-3.
-
(2013)
th IFIP WG 6.11 Conf. on E-Business, E-Services, and E-Society
, pp. 25-37
-
-
Hue, T.B.P.1
Thuc, D.N.2
Thuy, T.B.D.3
Echizen, I.4
Wohlgemuth, S.5
-
40
-
-
84949501863
-
Usability meets security - The identity-manager as your personal security assistant for the internet
-
(New Orleans, LA, USA, December 11-15, 2000). ACSAC'00. IEEE
-
th Annual Computer Security Applications Conf. (New Orleans, LA, USA, December 11-15, 2000). ACSAC'00. IEEE, 344-353. DOI=http://dx.doi.org/10.1109/ACSAC.2000.898889.
-
(2000)
th Annual Computer Security Applications Conf
, pp. 344-353
-
-
Jendricke, U.1
Gerd Tom Markotten, D.2
-
41
-
-
84856552582
-
Secure and sustainable benchmarking in clouds
-
(June 2011)
-
Kerschbaum, F. 2011. Secure and Sustainable Benchmarking in Clouds. BISE, 3, 3 (June 2011), 135-143. DOI=http://dx.doi.org/10.1007/s12599-011-0153-9.
-
(2011)
BISE
, vol.3
, Issue.3
, pp. 135-143
-
-
Kerschbaum, F.1
-
42
-
-
84904502063
-
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
-
(June 2014)
-
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., and Weippl, E. 2014. An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. ELECTRONIC MARKETS, 24, 2 (June 2014), 113-124. DOI=http://dx.doi.org/10.1007/s12525-014-0154-x.
-
(2014)
Electronic Markets
, vol.24
, Issue.2
, pp. 113-124
-
-
Kieseberg, P.1
Schrittwieser, S.2
Mulazzani, M.3
Echizen, I.4
Weippl, E.5
-
43
-
-
57849097281
-
Towards systematic achievement of compliance in service-oriented architectures: The MASTER approach
-
(October 2008)
-
Lotz, V., Pigout, E., Fischer, P.M., Kossmann, D., Massacci, F., and Pretschner, A. Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. WIRTSCHAFTSINFORMATIK, 50, 5 (October 2008), 383-391. DOI=http://dx.doi.org/10.1007/s11576-008-0086-1.
-
WIRTSCHAFTSINFORMATIK
, vol.50
, Issue.5
, pp. 383-391
-
-
Lotz, V.1
Pigout, E.2
Fischer, P.M.3
Kossmann, D.4
Massacci, F.5
Pretschner, A.6
-
44
-
-
33646061645
-
Modeling public key infrastructures in the real world
-
(Canterbury, UK, June 30-July 1, 2005). EuroPKI 2005. Springer
-
nd European PKI Workshop: Research and Applications (Canterbury, UK, June 30-July 1, 2005). EuroPKI 2005. Springer, 118-134. DOI=http://dx.doi.org/10.1007/11533733-8.
-
(2005)
nd European PKI Workshop: Research and Applications
, pp. 118-134
-
-
Marchesini, J.1
Smith, S.2
-
45
-
-
84883702184
-
The new German ID card
-
(Berlin, Germany, October 5-7, 2010). ISSE 2010. Vieweg+Teubner
-
Margraf, M. 2011. The New German ID Card. In Proc. of Information Security Solutions Europe 2010 Securing Electronic Business Processes (Berlin, Germany, October 5-7, 2010). ISSE 2010. Vieweg+Teubner, 367-373. DOI=http://dx.doi.org/10.1007/978-3-8348-9788-6-35.
-
(2011)
Proc. of Information Security Solutions Europe 2010 Securing Electronic Business Processes
, pp. 367-373
-
-
Margraf, M.1
-
46
-
-
84947294004
-
Modeling a public-key infrastructure
-
(Rome, Italy, September 25-27, 1996). ESORICS 96. Springer
-
th European Symposium on Research in Computer Science (Rome, Italy, September 25-27, 1996). ESORICS 96. Springer, 325-350. DOI=http://dx.doi.org/10.1007/3-540-61770-1-45.
-
(1996)
th European Symposium on Research in Computer Science
, pp. 325-350
-
-
Maurer, U.1
-
47
-
-
48249085695
-
Investing in the IT that makes a competitive difference
-
(July 2008)
-
McAfee, A. and Brynjolfsson, E. 2008. Investing in the IT That Makes a Competitive Difference. HARVARD BUS REV (July 2008).
-
(2008)
Harvard Bus Rev
-
-
McAfee, A.1
Brynjolfsson, E.2
-
48
-
-
70349244709
-
Secure aggregation in a publish-subscribe system
-
(Alexandria, VA, USA, October 27-31, 2008). WPES '08. ACM
-
th ACM Workshop on Privacy in the Electronic Society (Alexandria, VA, USA, October 27-31, 2008). WPES '08. ACM, 95-104. DOI=http://dx.doi.org/10.1145/1456403.1456419.
-
(2008)
th ACM Workshop on Privacy in the Electronic Society
, pp. 95-104
-
-
Minami, M.1
Lee, A.2
Winslett, M.3
Borisov, N.4
-
50
-
-
84893355082
-
Why are business processes not secure?
-
Springer
-
th Birthday. Springer, 240-254. DOI=http://dx.doi.org/10.1007/978-3-642-42001-6-17.
-
(2014)
th Birthday
, pp. 240-254
-
-
Müller, G.1
Accorsi, R.2
-
52
-
-
0000291018
-
The bargaining problem
-
(April 1950)
-
Nash, J. 1950. The Bargaining Problem. ECONOMETRICA, 18, 2 (April 1950), 155-162. DOI=http://dx.doi.org/10.2307/1907266.
-
(1950)
Econometrica
, vol.18
, Issue.2
, pp. 155-162
-
-
Nash, J.1
-
53
-
-
84971147730
-
Non-cooperative games
-
(September 1951)
-
Nash, J. 1951. Non-Cooperative Games. ANN MATH, 54, 2 (September 1951), 286-295. DOI=http://dx.doi.org/10.2307/1969529.
-
(1951)
Ann Math
, vol.54
, Issue.2
, pp. 286-295
-
-
Nash, J.1
-
54
-
-
0001058478
-
Two-person cooperative games
-
(January 1953)
-
Nash, J. 1953. Two-Person Cooperative Games. ECONOMETRICA, 21, 1 (January 1953), 128-140. DOI=http://dx.doi.org/10.2307/1906951.
-
(1953)
Econometrica
, vol.21
, Issue.1
, pp. 128-140
-
-
Nash, J.1
-
56
-
-
84946125131
-
Service-oriented computing: Concepts, characteristics and directions
-
(Roma, Italy, December 10-12, 2003). WISE'03. IEEE
-
th Int. Conf. on Web Information Systems Engineering (Roma, Italy, December 10-12, 2003). WISE'03. IEEE, 3-12. DOI=http://dx.doi.org/10.1109/WISE.2003.1254461.
-
(2003)
th Int. Conf. on Web Information Systems Engineering
, pp. 3-12
-
-
Papazoglou, M.P.1
-
58
-
-
84976810569
-
Reaching agreement in the presence of faults
-
(April 1980)
-
Pease, M., Shostak, R., and Lamport, L. 1980. Reaching Agreement in the Presence of Faults. J ACM, 27, 2 (April 1980), 228-234. DOI=http://dx.doi.org/10.1145/322186.322188.
-
(1980)
J ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
59
-
-
85008202321
-
Unconditional byzantine agreement for any number of faulty processes
-
(Cachan, France, February 13-15, 1992). STACS '92. Springer
-
th Annual Symp. on Theoretical Aspects of Computer Science (Cachan, France, February 13-15, 1992). STACS '92. Springer, 339-350. DOI=http://dx.doi.org/10.1007/3-540-55210-3-195.
-
(1992)
th Annual Symp. on Theoretical Aspects of Computer Science
, pp. 339-350
-
-
Pfitzmann, B.1
Waidner, M.2
-
60
-
-
33748543201
-
Distributed usage control
-
(September 2006)
-
Pretschner, A., Hilty, M., and Basin, D. 2006. Distributed usage control. COMMUN ACM, 49, 9 (September 2006). 39-44. DOI=http://dx.doi.org/10.1145/1151030.1151053.
-
(2006)
Commun ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
61
-
-
84939474509
-
-
Technical Report. Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network Society
-
Prime Minister of Japan and His Cabinet. 2013. Declaration to be the World's Most Advanced IT Nation. Technical Report. Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network Society.
-
(2013)
Declaration to be the World's Most Advanced IT Nation
-
-
-
62
-
-
1642344244
-
IT security and multilateral security
-
Addison-Wesley-Longman
-
Rannenberg, K., Pfitzmann, A., and Müller, G. 1999. IT Security and Multilateral Security. In Multilateral Security in Communications - Technology, Infrastructure, Economy. Addison-Wesley-Longman, 21-29.
-
(1999)
Multilateral Security in Communications - Technology, Infrastructure, Economy
, pp. 21-29
-
-
Rannenberg, K.1
Pfitzmann, A.2
Müller, G.3
-
63
-
-
33746637552
-
An algebra for enterprise privacy policies closed under composition and conjunction
-
(Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer
-
Raub, D. and Steinwandt, R. 2006. An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. In Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security (Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer, 130-144. DOI=http://dx.doi.org/10.1007/11766155-10.
-
(2006)
Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security
, pp. 130-144
-
-
Raub, D.1
Steinwandt, R.2
-
64
-
-
84904548576
-
Take care of your belongings today - Securing accessibility to complex electronic business processes
-
(June 2014)
-
Rechert, K., von Suchodoletz, D., Valizada, I., Latocha, J., Cardena, T.J., and Kulzhabayev, A. 2014. Take care of your belongings today - securing accessibility to complex electronic business processes. ELECTRONIC MARKETS, 24, 2 (June 2014), 125-134. DOI=http://dx.doi.org/10.1007/s12525-013-0151-5.
-
(2014)
Electronic Markets
, vol.24
, Issue.2
, pp. 125-134
-
-
Rechert, K.1
Von Suchodoletz, D.2
Valizada, I.3
Latocha, J.4
Cardena, T.J.5
Kulzhabayev, A.6
-
65
-
-
74049152260
-
Hey, you, get off my cloud: Exploring information leakage in third-party compute clouds
-
(Chicago, IL, USA; November 9-13, 2009). CCS'09. ACM
-
th ACM conf. on Computer and Communications Security (Chicago, IL, USA; November 9-13, 2009). CCS'09. ACM, 199-212. DOI=http://dx.doi.org/10.1145/1653662.1653687.
-
(2009)
th ACM Conf. on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, Y.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
66
-
-
57849129576
-
ExPDT: Ein policy-basierter ansatz zur automatisierung von compliance
-
(October 2008)
-
Sackmann, S. and Kähmer, M. 2008. ExPDT: Ein Policy-basierter Ansatz zur Automatisierung von Compliance. WIRTSCHAFTSINFORMATIK, 50, 5 (October 2008). 366-374. DOI=http://dx.doi.org/10.1007/s11576-008-0078-1.
-
(2008)
Wirtschaftsinformatik
, vol.50
, Issue.5
, pp. 366-374
-
-
Sackmann, S.1
Kähmer, M.2
-
67
-
-
0016081584
-
Protection and the control of information sharing in mutics
-
(July 1974)
-
Saltzer, J.H. 1974. Protection and the control of information sharing in mutics. COMMUN ACM 17, 7 (July 1974), 388-402. DOI=http://dx.doi.org/10.1145/361011.361067.
-
(1974)
Commun ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.H.1
-
68
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
FOSAD 2000. Springer
-
Samarati, P. and de Capitani di Vimercati, S. 2000. Access Control: Policies, Models, and Mechanisms. In Foundations of Security Analysis and Design. FOSAD 2000. Springer, 134-196. DOI=http://dx.doi.org/10.1007/3-540-45608-2-3.
-
(2000)
Foundations of Security Analysis and Design
, pp. 134-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
70
-
-
84856298176
-
Isolation in cloud computing and privacy-enhancing technologies - Suitability of privacy-enhancing technologies for separating data usage in business processes
-
(June 2011)
-
Sonehara, N., Echizen, I., and Wohlgemuth, S. 2011. Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes. BISE, 3, 3 (June 2011), 155-162. DOI=http://dx.doi.org/10.1007/s12599-011-0160-x.
-
(2011)
BISE
, vol.3
, Issue.3
, pp. 155-162
-
-
Sonehara, N.1
Echizen, I.2
Wohlgemuth, S.3
-
71
-
-
77953248995
-
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
-
(June 2010)
-
Sterbenz, J.P.G., Hutchison, D., Cetinkaya, E.K., Jabbar, A., Rohrer, J.P., Schöller, M., and Smith, P. 2010. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, COMPUT NETW, 54, 8 (June 2010), 1245-1265. DOI=http://dx.doi.org/10.1016/j.comnet.2010.03.005.
-
(2010)
Comput Netw
, vol.54
, Issue.8
, pp. 1245-1265
-
-
Sterbenz, J.P.G.1
Hutchison, D.2
Cetinkaya, E.K.3
Jabbar, A.4
Rohrer, J.P.5
Schöller, M.6
Smith, P.7
-
73
-
-
84939516548
-
Resilience as a new enforcement model for IT security based on usage control
-
(San Jose, CA, USA, May 18-21, 2014), IEEE CS SPW. IEEE
-
th IEEE CS Security & Privacy Workshop on Data Usage Management (DUMA) (San Jose, CA, USA, May 18-21, 2014), IEEE CS SPW. IEEE, 31-38.
-
(2014)
th IEEE CS Security & Privacy Workshop on Data Usage Management (DUMA)
, pp. 31-38
-
-
Wohlgemuth, S.1
-
74
-
-
84928553106
-
Adaptive user-centered security
-
(Fribourg, Switzerland, September 8-12, 2014), CD-ARES 2014. SeCIHD 2014. Springer
-
th Int. Workshop on Security and Cognitive Informatics for Homeland Defense (Fribourg, Switzerland, September 8-12, 2014), CD-ARES 2014. SeCIHD 2014. Springer, 91-109. DOI=http://dx.doi.org/10.1007/978-3-319-10975-6-7.
-
(2014)
th Int. Workshop on Security and Cognitive Informatics for Homeland Defense
, pp. 91-109
-
-
Wohlgemuth, S.1
-
75
-
-
84885070285
-
Tagging disclosures of personal data to third parties to preserve privacy
-
(Brisbane, Australia, September 20-23, 2010). SEC 2010, Springer
-
th IFIP TC 11 Int. Information Security Conf. Security and Privacy - Silver Linings in the Cloud (Brisbane, Australia, September 20-23, 2010). SEC 2010, Springer, 241-252. DOI=http://dx.doi.org/10.1007/978-3-642-15257-3-22.
-
(2011)
th IFIP TC 11 Int. Information Security Conf. Security and Privacy - Silver Linings in the Cloud
, pp. 241-252
-
-
Wohlgemuth, S.1
Echizen, I.2
Sonehara, N.3
Müller, G.4
-
76
-
-
33746632946
-
Privacy with delegation of rights by identity management
-
(Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer
-
Wohlgemuth, S. and Müller, G. 2006. Privacy with Delegation of Rights by Identity Management. In Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security (Freiburg, Germany, June 6-9, 2006). ETRICS 2006. Springer, 175-190. DOI=http://dx.doi.org/10.1007/11766155-13.
-
(2006)
Proc. of the Int. Conf. on Emerging Trends in Information and Communication Security
, pp. 175-190
-
-
Wohlgemuth, S.1
Müller, G.2
|