Search - IFIP Open Digital Library Access content directly

Filter your results

62 results
Structure: Internal structure identifier : 304024
Image document

Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?

Nicola Dragoni , Olga Gadyatskaya , Fabio Massacci
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers hal-01059143v1
Image document

Goal-Oriented Access Control Model for Ambient Assisted Living

Fabio Massacci , Viet Hung Nguyen
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.160-173, ⟨10.1007/978-3-642-14282-6_13⟩
Conference papers hal-01061072v1
Image document

Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models

Tong Li , Jennifer Horkoff , John Mylopoulos
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.208-223, ⟨10.1007/978-3-662-45501-2_15⟩
Conference papers hal-01282000v1
Image document

Exploring Legal Business Process Paths

Sepideh Ghanavati , Silvia Ingolfo , Alberto Siena
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.1-10, ⟨10.1007/978-3-662-45501-2_1⟩
Conference papers hal-01282056v1
Image document

Incremental Analysis of Evolving Administrative Role Based Access Control Policies

Silvio Ranise , Anh Truong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers hal-01285032v1
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1
Image document

Bridging User Context and Design Models to Build Adaptive User Interfaces

Mladjan Jovanovic , Dusan Starcevic , Zoran Jovanovic
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.36-56, ⟨10.1007/978-3-662-44811-3_3⟩
Conference papers hal-01405064v1
Image document

Privacy for Peer Profiling in Collective Adaptive Systems

Mark Hartswood , Marina Jirotka , Ronald Chenu-Abente , Alethia Hume , Fausto Giunchiglia , et al.
Jan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.237-252, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_16⟩
Book sections hal-01431584v1
Image document

Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach

Mohamad Gharib , Paolo Giorgini
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.254-270, ⟨10.1007/978-3-319-25897-3_17⟩
Conference papers hal-01442256v1
Image document

Analyzing Attack Strategies Through Anti-goal Refinement

Tong Li , Jennifer Horkoffi , Elda Pajai , Kristian Beckers , John Mylopoulos
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.75-90, ⟨10.1007/978-3-319-25897-3_6⟩
Conference papers hal-01442299v1
Image document

PERSONA - A Personalized Data Protection Framework

Marina Egea , Federica Paci , Marinella Petrocchi , Nicola Zannone
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.272-280, ⟨10.1007/978-3-642-38323-6_22⟩
Conference papers hal-01468180v1

Enterprise Interoperability

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-144, 2013, Lecture Notes in Business Information Processing, 978-3-642-36795-3. ⟨10.1007/978-3-642-36796-0⟩
Books hal-01474220v1

Data-Driven Process Discovery and Analysis

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-162, 2013, Lecture Notes in Business Information Processing, 978-3-642-40918-9. ⟨10.1007/978-3-642-40919-6⟩
Books hal-01474694v1

The Practice of Enterprise Modeling

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-165, 2013, Lecture Notes in Business Information Processing, 978-3-642-41640-8. ⟨10.1007/978-3-642-41641-5⟩
Books hal-01474798v1
Image document

Flexible and Dynamic Consent-Capturing

Muhammad Rizwan Asghar , Giovanni Russello
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.119-131, ⟨10.1007/978-3-642-27585-2_10⟩
Conference papers hal-01481499v1
Image document

Securing Data Provenance in the Cloud

Muhammad Rizwan Asghar , Mihaela Ion , Giovanni Russello , Bruno Crispo
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.145-160, ⟨10.1007/978-3-642-27585-2_12⟩
Conference papers hal-01481501v1

Re-conceptualizing Enterprise Information Systems

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-105, 2012, Lecture Notes in Business Information Processing, 978-3-642-28826-5. ⟨10.1007/978-3-642-28827-2⟩
Books hal-01483877v1
Image document

An Approach to Select Cost-Effective Risk Countermeasures

Le Sang Tran , Bjørnar Solhaug , Ketil Stølen
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.266-273, ⟨10.1007/978-3-642-39256-6_18⟩
Conference papers hal-01490710v1
Image document

Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods

Kristian Beckers , Stephan Fassbender , Maritta Heisel , Federica Paci
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.178-194
Conference papers hal-01506766v1
Image document

Honesty by Typing

Massimo Bartoletti , Alceste Scalas , Emilio Tuosto , Roberto Zunino
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.305-320, ⟨10.1007/978-3-642-38592-6_21⟩
Conference papers hal-01515248v1

Privacy and Identity Management for Life

Jan Camenisch , Bruno Crispo , Simone Fischer-Hübner , Ronald Leenes , Giovanni Russello
Springer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books hal-01517673v1
Image document

Security-by-Contract for the OSGi Platform

Olga Gadyatskaya , Fabio Massacci , Anton Philippov
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.364-375, ⟨10.1007/978-3-642-30436-1_30⟩
Conference papers hal-01518231v1
Image document

International Norms and Socio-technical Systems: Connecting Institutional and Technological Infrastructures in Governance Processes

Claudia Padovani , Elena Pavan
10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.56-65, ⟨10.1007/978-3-642-33332-3_6⟩
Conference papers hal-01525094v1
Image document

P2P and Cloud: A Marriage of Convenience for Replica Management

Hanna Kavalionak , Alberto Montresor
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.60-71, ⟨10.1007/978-3-642-28583-7_6⟩
Conference papers hal-01527531v1
Image document

On the Realizability of Contracts in Dishonest Systems

Massimo Bartoletti , Emilio Tuosto , Roberto Zunino
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.245-260, ⟨10.1007/978-3-642-30829-1_17⟩
Conference papers hal-01529594v1
Image document

GCI 2012 Harnessing Collective Intelligence with Games

Markus Krause , Roberta Cuel , Maja Vukovic
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.496-499, ⟨10.1007/978-3-642-33542-6_63⟩
Conference papers hal-01556170v1
Image document

Event Handoff Unobservability in WSN

Stefano Ortolani , Mauro Conti , Bruno Crispo , Roberto Di Pietro
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers hal-01581330v1
Image document

The Effect of Religious Identity on User Judgment of Website Quality

Ons Al-Shamaileh , Alistair Sutcliffe , Antonella De Angeli
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.620-623, ⟨10.1007/978-3-642-23768-3_97⟩
Conference papers hal-01597043v1
Image document

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement

Gabriela Gheorghe , Bruno Crispo , Roberto Carbone , Lieven Desmet , Wouter Joosen
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.350-369, ⟨10.1007/978-3-642-25821-3_18⟩
Conference papers hal-01597755v1
Image document

On the Uplink Performance of TCP in Multi-rate 802.11 WLANs

Naeem Khademi , Michael Welzl , Renato Lo Cigno
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.368-378, ⟨10.1007/978-3-642-20798-3_28⟩
Conference papers hal-01597975v1