Search - IFIP Open Digital Library Access content directly

Filter your results

47 results
Structure: Internal structure identifier : 366875
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1
Image document

On Probabilistic Alternating Simulations

Chenyi Zhang , Jun Pang
6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.71-85, ⟨10.1007/978-3-642-15240-5_6⟩
Conference papers hal-01054443v1
Image document

Mining NetFlow Records for Critical Network Activities

Shaonan Wang , Radu State , Mohamed Ourdane , Thomas Engel
4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.135-146, ⟨10.1007/978-3-642-13986-4_20⟩
Conference papers hal-01056635v1
Image document

Differentially Private Neighborhood-Based Recommender Systems

Jun Wang , Qiang Tang
32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.459-473, ⟨10.1007/978-3-319-58469-0_31⟩
Conference papers hal-01649022v1
Image document

Cloud Computing Contracts

Shyam S. Wagle
Anja Lehmann; Diane Whitehouse; Simone Fischer-Hübner; Lothar Fritsch; Charles Raab. Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, AICT-498, Springer International Publishing, pp.182-198, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-55782-3. ⟨10.1007/978-3-319-55783-0_13⟩
Book sections hal-01629162v1
Image document

Enterprise Modelling in the Age of Digital Transformation

Bas van Gils , Henderik A. Proper
11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.257-273, ⟨10.1007/978-3-030-02302-7_16⟩
Conference papers hal-02156472v1
Image document

The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem

Christof Ferreira Torres , Rolando Trujillo-Rasua
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.19-34, ⟨10.1007/978-3-319-41483-6_2⟩
Conference papers hal-01633679v1
Image document

Logics for Security and Privacy

Leendert van Der Torre
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.1-7, ⟨10.1007/978-3-642-31540-4_1⟩
Conference papers hal-01534776v1
Image document

Detection of Fluid Level in Bores for Batch Size One Assembly Automation Using Convolutional Neural Network

Alexej Simeth , Jessica Plaßmann , Peter Plapper
IFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.86-93, ⟨10.1007/978-3-030-85906-0_10⟩
Conference papers hal-04022155v1
Image document

Enterprise Coherence with GEA – A 15 year Co-evolution of Practice and Theory

Henderik A. Proper , Roel Wagter , Joost Bekel
14th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2021, Riga, Latvia. pp.3-18, ⟨10.1007/978-3-030-91279-6_1⟩
Conference papers hal-04323846v1
Image document

On Domain Modelling and Requisite Variety

Henderik A. Proper , Giancarlo Guizzardi
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.186-196, ⟨10.1007/978-3-030-63479-7_13⟩
Conference papers hal-03434642v1
Image document

Capturing Design Rationales in Enterprise Architecture: A Case Study

Georgios Plataniotis , Sybren De Kinderen , Henderik A. Proper
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.133-147, ⟨10.1007/978-3-662-45501-2_10⟩
Conference papers hal-01282061v1
Image document

Modeling the German Legal Latitude Principles

Stephan Neumann , Anna Kahlert , Maria Henning , Philipp Richter , Hugo Jonker , et al.
5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers hal-01491259v1
Image document

On Robustness of Trust Systems

Tim Muller , Yang Liu , Sjouke Mauw , Jie Zhang
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.44-60, ⟨10.1007/978-3-662-43813-8_4⟩
Conference papers hal-01381678v1
Image document

On Beta Models with Trust Chains

Tim Muller , Patrick Schweitzer
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.49-65, ⟨10.1007/978-3-642-38323-6_4⟩
Conference papers hal-01468207v1
Image document

Towards Enterprise-Grade Tool Support for DEMO

Mark Mulder , Henderik A. Proper
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.90-105, ⟨10.1007/978-3-030-63479-7_7⟩
Conference papers hal-03434641v1
Image document

Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor

Asya Mitseva , Marharyta Aleksandrova , Thomas Engel , Andriy Panchenko
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.219-233, ⟨10.1007/978-3-030-58201-2_15⟩
Conference papers hal-03440868v1
Image document

Raya: A Tangible Exercise Buddy Reminding Oneself of the Commitment to Exercise

Daphne Menheere , Alynne De Haan , Steven Vos , Carine Lallemand
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.471-475, ⟨10.1007/978-3-030-85607-6_60⟩
Conference papers hal-04291185v1
Image document

CPMap: Design of Click-Points Map-Based Graphical Password Authentication

Weizhi Meng , Fei Fei , Lijun Jiang , Zhe Liu , Chunhua Su , et al.
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.18-32, ⟨10.1007/978-3-319-99828-2_2⟩
Conference papers hal-02023732v1
Image document

Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming

Rod Mccall , Lynne Baillie , Franziska Boehm , Mike Just
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.584-585, ⟨10.1007/978-3-642-33542-6_77⟩
Conference papers hal-01556150v1
Image document

Counteracting Active Attacks in Social Network Graphs

Sjouke Mauw , Rolando Trujillo-Rasua , Bochuan Xuan
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers hal-01633668v1
Image document

Validation and Verification in Domain-Specific Modeling Method Engineering

Qin Ma , Monika Kaczmarek-Hess , Sybren De Kinderen
14th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2021, Riga, Latvia. pp.119-133, ⟨10.1007/978-3-030-91279-6_9⟩
Conference papers hal-04323856v1
Image document

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis

Li Li , Alexandre Bartel , Tegawendé F. Bissyandé , Jacques Klein , Yves Le Traon
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.513-527, ⟨10.1007/978-3-319-18467-8_34⟩
Conference papers hal-01345142v1
Image document

The Impact of IPv6 on Video-to-Video and Mobile Video Communications

Latif Ladid , Ioannis P. Chochliouros
8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.322-331, ⟨10.1007/978-3-642-33412-2_33⟩
Conference papers hal-01523038v1
Image document

Building Lifecycle Management System for Enhanced Closed Loop Collaboration

Sylvain Kubler , Andrea Buda , Jérémy Robert , Kary Främling , Yves Le Traon
13th IFIP International Conference on Product Lifecycle Management (PLM), Jul 2016, Columbia, SC, United States. pp.423-432, ⟨10.1007/978-3-319-54660-5_38⟩
Conference papers hal-01699680v1
Image document

Pervasive Gaming as a Potential Solution to Traffic Congestion: New Challenges Regarding Ethics, Privacy and Trust

Vincent Koenig , Franziska Boehm , Rod Mccall
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.586-593, ⟨10.1007/978-3-642-33542-6_78⟩
Conference papers hal-01556169v1
Image document

Towards Meta Model Provenance: A Goal-Driven Approach to Document the Provenance of Meta Models

Sybren De Kinderen , Monika Kaczmarek-Hess , Qin Ma , Iván S. Razo-Zapata
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.49-64, ⟨10.1007/978-3-319-70241-4_4⟩
Conference papers hal-01765255v1
Image document

Towards Extending the Validation Possibilities of ADOxx with Alloy

Sybren De Kinderen , Qin Ma , Monika Kaczmarek-Hess
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.138-152, ⟨10.1007/978-3-030-63479-7_10⟩
Conference papers hal-03434656v1
Image document

Strategic Noninterference

Wojciech Jamroga , Masoud Tabatabaei
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.67-81, ⟨10.1007/978-3-319-18467-8_5⟩
Conference papers hal-01345096v1
Image document

Kill or Spare – Moral Decision-Making in Video Games

Elisabeth Holl , André Melzer
20th International Conference on Entertainment Computing (ICEC), Nov 2021, Coimbra, Portugal. pp.88-99, ⟨10.1007/978-3-030-89394-1_7⟩
Conference papers hal-04144381v1