Search - IFIP Open Digital Library Access content directly

Filter your results

62 results
Structure: Internal structure identifier : 304024
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1
Image document

Experience Probes: Immersion and Reflection Between Reality and Virtuality

Max Willis , Antonella De Angeli , Massimo Zancanaro
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.253-262, ⟨10.1007/978-3-319-68059-0_16⟩
Conference papers hal-01679784v1
Image document

Modeling and Control of Low-Frequency Electromagnetic Fields in Multiply Connected Conductors

Fredi Tröltzsch , Alberto Valli
27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.505-516, ⟨10.1007/978-3-319-55795-3_48⟩
Conference papers hal-01626886v1
Image document

An Approach to Select Cost-Effective Risk Countermeasures

Le Sang Tran , Bjørnar Solhaug , Ketil Stølen
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.266-273, ⟨10.1007/978-3-642-39256-6_18⟩
Conference papers hal-01490710v1
Image document

ContracT – from Legal Contracts to Formal Specifications: Preliminary Results

Michele Soavi , Nicola Zeni , John Mylopoulos , Luisa Mich
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.124-137, ⟨10.1007/978-3-030-63479-7_9⟩
Conference papers hal-03434644v1
Image document

Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios

Daniel Santos , Silvio Ranise , Luca Compagna , Serena E. Ponta
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.85-100, ⟨10.1007/978-3-319-20810-7_6⟩
Conference papers hal-01745831v1
Image document

Hybrid Heat Pump Systems as a Possible Solution for the Energy Transition Towards Sustainable Heating Systems for Buildings

Erica Roccatello , Alessandro Prada , Marco Baratieri
TRIZ Future conference, Sep 2021, Bolzano, Italy. pp.100-111, ⟨10.1007/978-3-030-86614-3_8⟩
Conference papers hal-04067817v1
Image document

Modeling and Reasoning About Privacy-Consent Requirements

Marco Robol , Elda Paja , Mattia Salnitri , Paolo Giorgini
11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.238-254, ⟨10.1007/978-3-030-02302-7_15⟩
Conference papers hal-02156452v1
Image document

Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework

Marco Robol , Mattia Salnitri , Paolo Giorgini
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.236-250, ⟨10.1007/978-3-319-70241-4_16⟩
Conference papers hal-01765249v1
Image document

Incremental Analysis of Evolving Administrative Role Based Access Control Policies

Silvio Ranise , Anh Truong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers hal-01285032v1
Image document

Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security

Luca Piras , Federico Calabrese , Paolo Giorgini
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.366-376, ⟨10.1007/978-3-030-63479-7_25⟩
Conference papers hal-03434661v1
Image document

International Norms and Socio-technical Systems: Connecting Institutional and Technological Infrastructures in Governance Processes

Claudia Padovani , Elena Pavan
10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.56-65, ⟨10.1007/978-3-642-33332-3_6⟩
Conference papers hal-01525094v1
Image document

Investigating the Role of Institutional Frameworks in Food Waste Reduction at the Retailer Interface in the European Union

Yvonne Rachael Owasi , Marco Formentini
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.620-629, ⟨10.1007/978-3-030-85902-2_66⟩
Conference papers hal-04117665v1
Image document

Event Handoff Unobservability in WSN

Stefano Ortolani , Mauro Conti , Bruno Crispo , Roberto Di Pietro
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers hal-01581330v1
Image document

Entity-Centric Visualization of Open Data

Sajan Raj Ojha , Mladjan Jovanovic , Fausto Giunchiglia
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.149-166, ⟨10.1007/978-3-319-22698-9_11⟩
Conference papers hal-01609414v1
Image document

On Persuading an OvaHerero Community to Join the Wikipedia Community

Mark Mushiba , Peter Gallert , Heike Winschiers-Theophilus
10th International Conference on Culture, Technology, and Communication (CATAC), Jun 2016, London, United Kingdom. pp.1-18, ⟨10.1007/978-3-319-50109-3_1⟩
Conference papers hal-01619333v1
Image document

Assessing a Collaborative Application for Comic Strips Composition

Eleonora Mencarini , Gianluca Schiavo , Alessandro Cappelletti , Oliviero Stock , Massimo Zancanaro
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.73-80, ⟨10.1007/978-3-319-22668-2_6⟩
Conference papers hal-01599852v1
Image document

Goal-Oriented Access Control Model for Ambient Assisted Living

Fabio Massacci , Viet Hung Nguyen
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.160-173, ⟨10.1007/978-3-642-14282-6_13⟩
Conference papers hal-01061072v1
Image document

Optimal Security Configuration for Cyber Insurance

Fabio Martinelli , Ganbayar Uuganbayar , Artsiom Yautsiukhin
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.187-200, ⟨10.1007/978-3-319-99828-2_14⟩
Conference papers hal-02023729v1
Image document

Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations

Salvatore Manfredi , Silvio Ranise , Giada Sciarretta
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.201-220, ⟨10.1007/978-3-030-22479-0_11⟩
Conference papers hal-02384588v1
Image document

Analyzing Attack Strategies Through Anti-goal Refinement

Tong Li , Jennifer Horkoffi , Elda Pajai , Kristian Beckers , John Mylopoulos
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.75-90, ⟨10.1007/978-3-319-25897-3_6⟩
Conference papers hal-01442299v1
Image document

Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models

Tong Li , Jennifer Horkoff , John Mylopoulos
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.208-223, ⟨10.1007/978-3-662-45501-2_15⟩
Conference papers hal-01282000v1
Image document

GCI 2012 Harnessing Collective Intelligence with Games

Markus Krause , Roberta Cuel , Maja Vukovic
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.496-499, ⟨10.1007/978-3-642-33542-6_63⟩
Conference papers hal-01556170v1
Image document

On the Uplink Performance of TCP in Multi-rate 802.11 WLANs

Naeem Khademi , Michael Welzl , Renato Lo Cigno
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.368-378, ⟨10.1007/978-3-642-20798-3_28⟩
Conference papers hal-01597975v1
Image document

P2P and Cloud: A Marriage of Convenience for Replica Management

Hanna Kavalionak , Alberto Montresor
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.60-71, ⟨10.1007/978-3-642-28583-7_6⟩
Conference papers hal-01527531v1
Image document

Bridging User Context and Design Models to Build Adaptive User Interfaces

Mladjan Jovanovic , Dusan Starcevic , Zoran Jovanovic
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.36-56, ⟨10.1007/978-3-662-44811-3_3⟩
Conference papers hal-01405064v1
Image document

Ontology-Based Obfuscation and Anonymisation for Privacy

Leonardo H. Iwaya , Fausto Giunchiglia , Leonardo A. Martucci , Alethia Hume , Simone Fischer-Hübner , et al.
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.343-358, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_23⟩
Book sections hal-01619736v1
Image document

Stimulating Conversations in Residential Care Through Technology-Mediated Reminiscence

Francisco Ibarra , Marcos Baez , Francesca Fiore , Fabio Casati
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.62-71, ⟨10.1007/978-3-319-67687-6_5⟩
Conference papers hal-01717204v1
Image document

Privacy for Peer Profiling in Collective Adaptive Systems

Mark Hartswood , Marina Jirotka , Ronald Chenu-Abente , Alethia Hume , Fausto Giunchiglia , et al.
Jan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.237-252, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_16⟩
Book sections hal-01431584v1
Image document

xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement

Gabriela Gheorghe , Stephan Neuhaus , Bruno Crispo
4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.63-78, ⟨10.1007/978-3-642-13446-3_5⟩
Conference papers hal-01061319v1