Search - IFIP Open Digital Library Access content directly

Filter your results

62 results
Structure: Internal structure identifier : 304024

Re-conceptualizing Enterprise Information Systems

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-105, 2012, Lecture Notes in Business Information Processing, 978-3-642-28826-5. ⟨10.1007/978-3-642-28827-2⟩
Books hal-01483877v1

Data-Driven Process Discovery and Analysis

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-162, 2013, Lecture Notes in Business Information Processing, 978-3-642-40918-9. ⟨10.1007/978-3-642-40919-6⟩
Books hal-01474694v1
Image document

Enterprise Interoperability

Will van Der Aalst , John Mylopoulos , Norman M. Sadeh , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-076, 2011, Lecture Notes in Business Information Processing, ⟨10.1007/978-3-642-19680-5⟩
Books hal-01572092v1

The Practice of Enterprise Modeling

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-165, 2013, Lecture Notes in Business Information Processing, 978-3-642-41640-8. ⟨10.1007/978-3-642-41641-5⟩
Books hal-01474798v1

Enterprise Interoperability

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-144, 2013, Lecture Notes in Business Information Processing, 978-3-642-36795-3. ⟨10.1007/978-3-642-36796-0⟩
Books hal-01474220v1
Image document

The Effect of Religious Identity on User Judgment of Website Quality

Ons Al-Shamaileh , Alistair Sutcliffe , Antonella De Angeli
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.620-623, ⟨10.1007/978-3-642-23768-3_97⟩
Conference papers hal-01597043v1
Image document

Securing Data Provenance in the Cloud

Muhammad Rizwan Asghar , Mihaela Ion , Giovanni Russello , Bruno Crispo
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.145-160, ⟨10.1007/978-3-642-27585-2_12⟩
Conference papers hal-01481501v1
Image document

Flexible and Dynamic Consent-Capturing

Muhammad Rizwan Asghar , Giovanni Russello
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.119-131, ⟨10.1007/978-3-642-27585-2_10⟩
Conference papers hal-01481499v1
Image document

On the Realizability of Contracts in Dishonest Systems

Massimo Bartoletti , Emilio Tuosto , Roberto Zunino
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.245-260, ⟨10.1007/978-3-642-30829-1_17⟩
Conference papers hal-01529594v1
Image document

Renegotiation and Recursion in Bitcoin Contracts

Massimo Bartoletti , Maurizio Murgia , Roberto Zunino
22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.261-278, ⟨10.1007/978-3-030-50029-0_17⟩
Conference papers hal-03273996v1
Image document

Honesty by Typing

Massimo Bartoletti , Alceste Scalas , Emilio Tuosto , Roberto Zunino
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.305-320, ⟨10.1007/978-3-642-38592-6_21⟩
Conference papers hal-01515248v1
Image document

A True Concurrent Model of Smart Contracts Executions

Massimo Bartoletti , Letterio Galletta , Maurizio Murgia
22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.243-260, ⟨10.1007/978-3-030-50029-0_16⟩
Conference papers hal-03273986v1
Image document

Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods

Kristian Beckers , Stephan Fassbender , Maritta Heisel , Federica Paci
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.178-194
Conference papers hal-01506766v1
Image document

Following Wrong Suggestions: Self-blame in Human and Computer Scenarios

Andrea Beretta , Massimo Zancanaro , Bruno Lepri
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.542-550, ⟨10.1007/978-3-030-29387-1_31⟩
Conference papers hal-02553922v1
Image document

Investigating Italian Citizens’ Attitudes Towards Immuni, the Italian Contact Tracing App

Cristina Bosco , Martina Cvajner
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.34-42, ⟨10.1007/978-3-030-85616-8_3⟩
Conference papers hal-04196886v1
Image document

Viability of Magazines for Stimulating Social Interactions in Nursing Homes

Valentina Caforio , Marcos Baez , Fabio Casati
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.72-81, ⟨10.1007/978-3-319-67687-6_6⟩
Conference papers hal-01717198v1

Privacy and Identity Management for Life

Jan Camenisch , Bruno Crispo , Simone Fischer-Hübner , Ronald Leenes , Giovanni Russello
Springer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books hal-01517673v1
Image document

Real vs Simulated Foveated Rendering to Reduce Visual Discomfort in Virtual Reality

Ariel Caputo , Andrea Giachetti , Salwa Abkal , Chiara Marchesini , Massimo Zancanaro
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.177-185, ⟨10.1007/978-3-030-85607-6_12⟩
Conference papers hal-04291223v1
Image document

Strategic Enterprise Architectures

Evellin Cardoso , John Mylopoulos , Alejandro Mate , Juan Trujillo
9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.57-71, ⟨10.1007/978-3-319-48393-1_5⟩
Conference papers hal-01653508v1
Image document

Hamilton-Jacobi-Bellman Equation for a Time-Optimal Control Problem in the Space of Probability Measures

Giulia Cavagnari , Antonio Marigonda , Giandomenico Orlandi
27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.200-208, ⟨10.1007/978-3-319-55795-3_18⟩
Conference papers hal-01626919v1
Image document

Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments

Salimeh Dashti , Amir Sharif , Roberto Carbone , Silvio Ranise
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.325-337, ⟨10.1007/978-3-030-81242-3_19⟩
Conference papers hal-03677036v1
Image document

Information Security Risk Management

Salimeh Dashti , Paolo Giorgini , Elda Paja
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-319-70241-4_2⟩
Conference papers hal-01765266v1
Image document

SENSATION: An Authoring Tool to Support Event–State Paradigm in End-User Development

Giuseppe Desolda , Francesco Greco , Francisco Guarnieri , Nicole Mariz , Massimo Zancanaro
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.373-382, ⟨10.1007/978-3-030-85616-8_22⟩
Conference papers hal-04196890v1
Image document

Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?

Nicola Dragoni , Olga Gadyatskaya , Fabio Massacci
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers hal-01059143v1
Image document

PERSONA - A Personalized Data Protection Framework

Marina Egea , Federica Paci , Marinella Petrocchi , Nicola Zannone
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.272-280, ⟨10.1007/978-3-642-38323-6_22⟩
Conference papers hal-01468180v1
Image document

Quality Criteria for Cyber Security MOOCs

Simone Fischer-Hübner , Matthias Beckerle , Alberto Lluch Lafuente , Antonio Ruiz Martínez , Karo Saharinen , et al.
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.46-60, ⟨10.1007/978-3-030-59291-2_4⟩
Conference papers hal-03380695v1
Image document

Information Security and Privacy – Challenges and Outlook

Steven Furnell , Paul Haskell-Dowland , Manish Agrawal , Richard Baskerville , Anirban Basu , et al.
Advancing Research in Information and Communication Technology, AICT-600, pp.383-401, 2021, ⟨10.1007/978-3-030-81701-5_16⟩
Book sections hal-03325978v1
Image document

Security-by-Contract for the OSGi Platform

Olga Gadyatskaya , Fabio Massacci , Anton Philippov
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.364-375, ⟨10.1007/978-3-642-30436-1_30⟩
Conference papers hal-01518231v1
Image document

Exploring Legal Business Process Paths

Sepideh Ghanavati , Silvia Ingolfo , Alberto Siena
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.1-10, ⟨10.1007/978-3-662-45501-2_1⟩
Conference papers hal-01282056v1
Image document

Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach

Mohamad Gharib , Paolo Giorgini
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.254-270, ⟨10.1007/978-3-319-25897-3_17⟩
Conference papers hal-01442256v1