Filter your results
- 57
- 5
- 53
- 6
- 3
- 62
- 9
- 8
- 5
- 2
- 2
- 5
- 5
- 6
- 5
- 7
- 9
- 5
- 3
- 62
- 4
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers
hal-01059143v1
|
||
|
Goal-Oriented Access Control Model for Ambient Assisted Living5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.160-173, ⟨10.1007/978-3-642-14282-6_13⟩
Conference papers
hal-01061072v1
|
||
|
Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.208-223, ⟨10.1007/978-3-662-45501-2_15⟩
Conference papers
hal-01282000v1
|
||
|
Exploring Legal Business Process Paths7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.1-10, ⟨10.1007/978-3-662-45501-2_1⟩
Conference papers
hal-01282056v1
|
||
|
Incremental Analysis of Evolving Administrative Role Based Access Control Policies28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers
hal-01285032v1
|
||
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
Bridging User Context and Design Models to Build Adaptive User Interfaces5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.36-56, ⟨10.1007/978-3-662-44811-3_3⟩
Conference papers
hal-01405064v1
|
||
|
Privacy for Peer Profiling in Collective Adaptive SystemsJan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.237-252, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_16⟩
Book sections
hal-01431584v1
|
||
|
Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.254-270, ⟨10.1007/978-3-319-25897-3_17⟩
Conference papers
hal-01442256v1
|
||
|
Analyzing Attack Strategies Through Anti-goal Refinement8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.75-90, ⟨10.1007/978-3-319-25897-3_6⟩
Conference papers
hal-01442299v1
|
||
|
PERSONA - A Personalized Data Protection Framework7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.272-280, ⟨10.1007/978-3-642-38323-6_22⟩
Conference papers
hal-01468180v1
|
||
|
Enterprise InteroperabilitySpringer, LNBIP-144, 2013, Lecture Notes in Business Information Processing, 978-3-642-36795-3. ⟨10.1007/978-3-642-36796-0⟩
Books
hal-01474220v1
|
||
|
Data-Driven Process Discovery and AnalysisSpringer, LNBIP-162, 2013, Lecture Notes in Business Information Processing, 978-3-642-40918-9. ⟨10.1007/978-3-642-40919-6⟩
Books
hal-01474694v1
|
||
|
The Practice of Enterprise ModelingSpringer, LNBIP-165, 2013, Lecture Notes in Business Information Processing, 978-3-642-41640-8. ⟨10.1007/978-3-642-41641-5⟩
Books
hal-01474798v1
|
||
|
Flexible and Dynamic Consent-CapturingInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.119-131, ⟨10.1007/978-3-642-27585-2_10⟩
Conference papers
hal-01481499v1
|
||
|
Securing Data Provenance in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.145-160, ⟨10.1007/978-3-642-27585-2_12⟩
Conference papers
hal-01481501v1
|
||
|
Re-conceptualizing Enterprise Information SystemsSpringer, LNBIP-105, 2012, Lecture Notes in Business Information Processing, 978-3-642-28826-5. ⟨10.1007/978-3-642-28827-2⟩
Books
hal-01483877v1
|
||
|
An Approach to Select Cost-Effective Risk Countermeasures27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.266-273, ⟨10.1007/978-3-642-39256-6_18⟩
Conference papers
hal-01490710v1
|
||
|
Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.178-194
Conference papers
hal-01506766v1
|
||
|
Honesty by Typing15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.305-320, ⟨10.1007/978-3-642-38592-6_21⟩
Conference papers
hal-01515248v1
|
||
|
Privacy and Identity Management for LifeSpringer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books
hal-01517673v1
|
||
|
Security-by-Contract for the OSGi Platform27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.364-375, ⟨10.1007/978-3-642-30436-1_30⟩
Conference papers
hal-01518231v1
|
||
|
International Norms and Socio-technical Systems: Connecting Institutional and Technological Infrastructures in Governance Processes10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.56-65, ⟨10.1007/978-3-642-33332-3_6⟩
Conference papers
hal-01525094v1
|
||
|
P2P and Cloud: A Marriage of Convenience for Replica Management6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.60-71, ⟨10.1007/978-3-642-28583-7_6⟩
Conference papers
hal-01527531v1
|
||
|
On the Realizability of Contracts in Dishonest Systems14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.245-260, ⟨10.1007/978-3-642-30829-1_17⟩
Conference papers
hal-01529594v1
|
||
|
GCI 2012 Harnessing Collective Intelligence with Games11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.496-499, ⟨10.1007/978-3-642-33542-6_63⟩
Conference papers
hal-01556170v1
|
||
|
Event Handoff Unobservability in WSN1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers
hal-01581330v1
|
||
|
The Effect of Religious Identity on User Judgment of Website Quality13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.620-623, ⟨10.1007/978-3-642-23768-3_97⟩
Conference papers
hal-01597043v1
|
||
|
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.350-369, ⟨10.1007/978-3-642-25821-3_18⟩
Conference papers
hal-01597755v1
|
||
|
On the Uplink Performance of TCP in Multi-rate 802.11 WLANs10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.368-378, ⟨10.1007/978-3-642-20798-3_28⟩
Conference papers
hal-01597975v1
|