Search - IFIP Open Digital Library Access content directly

Filter your results

62 results
Structure: Internal structure identifier : 300856
Image document

How to Kill Epsilons with a Dagger

Filippo Bonchi , Stefan Milius , Alexandra Silva , Fabio Zanasi
12th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2014, Grenoble, France. pp.53-74, ⟨10.1007/978-3-662-44124-4_4⟩
Conference papers hal-01408752v1
Image document

Capturing Design Rationales in Enterprise Architecture: A Case Study

Georgios Plataniotis , Sybren De Kinderen , Henderik A. Proper
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.133-147, ⟨10.1007/978-3-662-45501-2_10⟩
Conference papers hal-01282061v1
Image document

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers

Wouter Lueks , Gergely Alpár , Jaap- Henk Hoepman , Pim Vullers
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.463-478, ⟨10.1007/978-3-319-18467-8_31⟩
Conference papers hal-01345136v1
Image document

Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies

Marit Hansen , Jaap-Henk Hoepman , Meiko Jensen , Stefan Schiffner
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.97-110, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_7⟩
Book sections hal-01619747v1
Image document

A Security Analysis of OpenID

Bart Delft , Martijn Oostdijk
Second IFIP WG 11.6 Working Conference on Policies and Reseach Management (IDMAN), Nov 2010, Oslo, Norway. pp.73-84, ⟨10.1007/978-3-642-17303-5_6⟩
Conference papers hal-01054399v1
Image document

Convexity, Duality and Effects

Bart Jacobs
6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.1-19, ⟨10.1007/978-3-642-15240-5_1⟩
Conference papers hal-01054454v1
Image document

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

Lejla Batina , Jaap-Henk Hoepman , Bart Jacobs , Wojciech Mostowski , Pim Vullers
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.209-222, ⟨10.1007/978-3-642-12510-2_15⟩
Conference papers hal-01056105v1
Image document

Entropy and Attack Models in Information Flow

Mário S. Alvim , Miguel E. Andrés , Catuscia Palamidessi
6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.53-54, ⟨10.1007/978-3-642-15240-5_4⟩
Conference papers hal-00548212v1
Image document

Active Learning of Extended Finite State Machines

Frits Vaandrager
24th International Conference on Testing Software and Systems (ICTSS), Nov 2012, Aalborg, Denmark. pp.5-7, ⟨10.1007/978-3-642-34691-0_2⟩
Conference papers hal-01482424v1
Image document

Challenges of Identifying Communities with Shared Semantics in Enterprise Modeling

Dirk van Der Linden , Stijn Hoppenbrouwers
5th Working Conference on the Practice of Enterprise Modeling (PoEM), Nov 2012, Rostock, Germany. pp.160-171, ⟨10.1007/978-3-642-34549-4_12⟩
Conference papers hal-01484401v1
Image document

GDPR and the Concept of Risk:

Katerina Demetzou
Eleni Kosta; Jo Pierson; Daniel Slamanig; Simone Fischer-Hübner; Stephan Krenn. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers, AICT-547, Springer International Publishing, pp.137-154, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-16743-1. ⟨10.1007/978-3-030-16744-8_10⟩
Book sections hal-02271667v1
Image document

Privacy as Enabler of Innovation

Daniel Bachlechner , Marc Van Lieshout , Tjerk Timan
14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.3-16, ⟨10.1007/978-3-030-42504-3_1⟩
Conference papers hal-03378973v1
Image document

Quality of Service in the Long Tail: Narratives and the Exploitation of Soft Metadata

Auke Van Breemen
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.22-31, ⟨10.1007/978-3-642-55355-4_3⟩
Conference papers hal-01350907v1
Image document

Strong Completeness for Iteration-Free Coalgebraic Dynamic Logics

Helle Hvid Hansen , Clemens Kupke , Raul Andres Leal
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.281-295, ⟨10.1007/978-3-662-44602-7_22⟩
Conference papers hal-01402072v1
Image document

Efficient Selective Disclosure on Smart Cards Using Idemix

Pim Vullers , Gergely Alpár
3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.53-67, ⟨10.1007/978-3-642-37282-7_5⟩
Conference papers hal-01470503v1
Image document

Grounded System Dynamics: A Procedure for Underpinning System Dynamics with a Domain Modeling Method

F. Tulinayo , P. Bommel , H. Proper
4th Practice of Enterprise Modeling (PoEM), Nov 2011, Oslo, Norway. pp.112-125, ⟨10.1007/978-3-642-24849-8_9⟩
Conference papers hal-01572392v1
Image document

Mobile Identity Management

Jaap-Henk Hoepman
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.253-253, ⟨10.1007/978-3-642-24712-5_27⟩
Conference papers hal-01596192v1
Image document

Bisimilarity of Open Terms in Stream GSOS

Filippo Bonchi , Matias David Lee , Jurriaan Rot
7th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2017, Teheran, Iran. pp.35-50, ⟨10.1007/978-3-319-68972-2_3⟩
Conference papers hal-01760851v1
Image document

Practical Schemes for Privacy and Security Enhanced RFID

Jaap-Henk Hoepman , Rieks Joosten
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.138-153, ⟨10.1007/978-3-642-12368-9_10⟩
Conference papers hal-01059139v1
Image document

Enterprise Architecture Enhanced with Responsibility to Manage Access Rights - Case Study in an EU Institution

Michaël Petit , Christophe Feltus , François Vernadat
5th Working Conference on the Practice of Enterprise Modeling (PoEM), Nov 2012, Rostock, Germany. pp.132-147, ⟨10.1007/978-3-642-34549-4_10⟩
Conference papers hal-01484400v1
Image document

Safe Equivalences for Security Properties

Mário S. Alvim , Miguel E. Andrés , Catuscia Palamidessi , Peter van Rossum
6th IFIP International Conference on Theoretical Computer Science (TCS 2010), Sep 2010, Brisbane, Australia. pp.55-70, ⟨10.1007/978-3-642-15240-5_5⟩
Conference papers inria-00479674v2
Image document

Extending UPPAAL for the Modeling and Verification of Dynamic Real-Time Systems

Abdeldjalil Boudjadar , Frits Vaandrager , Jean-Paul Bodeveix , M Filali
5th International Conference on Fundamentals of Software Engineering (FSEN 2013), Apr 2013, Tehran, Iran. pp.111-132, ⟨10.1007/978-3-642-40213-5_8⟩
Conference papers hal-01231765v1
Image document

RAM: Rapid Alignment Method

Ruben A. Muijrers , Jasper Woudenberg , Lejla Batina
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.266-282, ⟨10.1007/978-3-642-27257-8_17⟩
Conference papers hal-01596293v1
Image document

Lawvere Categories as Composed PROPs

Filippo Bonchi , Pawel Sobocinski , Fabio Zanasi
13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.11-32, ⟨10.1007/978-3-319-40370-0_3⟩
Conference papers hal-01446031v1
Image document

(In)finite Trace Equivalence of Probabilistic Transition Systems

Alexandre Goy , Jurriaan Rot
14th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2018, Thessaloniki, Greece. pp.100-121, ⟨10.1007/978-3-030-00389-0_7⟩
Conference papers hal-02044641v1
Image document

Scheduler-Dependent Inter-cell Interference and Its Impact on LTE Uplink Performance at Flow Level

D. C. Dimitrova , G. Heijenk , J. Berg , S. Yankov
9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.285-296, ⟨10.1007/978-3-642-21560-5_24⟩
Conference papers hal-01583652v1
Image document

An Empirical Evaluation of Design Decision Concepts in Enterprise Architecture

Georgios Plataniotis , Sybren De Kinderen , Dirk van Der Linden , Danny Greefhorst , Henderik A. Proper
6th The Practice of Entrprise Modeling (PoEM), Nov 2013, Riga, Latvia. pp.24-38, ⟨10.1007/978-3-642-41641-5_3⟩
Conference papers hal-01474795v1
Image document

Artificial Intelligence Application for Crude Distillation Unit: An Overview

Václav Miklas , Michal Touš , Vítězslav Máša , Sin Yong Teng
IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KMES), Aug 2021, Montreal, QC, Canada. pp.156-168, ⟨10.1007/978-3-030-96592-1_12⟩
Conference papers hal-04120814v1
Image document

Branching Bisimulation Games

David De Frutos Escrig , Jeroen A. Keiren , Tim C. Willemse
36th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2016, Heraklion, Greece. pp.142-157, ⟨10.1007/978-3-319-39570-8_10⟩
Conference papers hal-01432915v1
Image document

n-Complete Test Suites for IOCO

Petra van Den Bos , Ramon Janssen , Joshua Moerman
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.91-107, ⟨10.1007/978-3-319-67549-7_6⟩
Conference papers hal-01678988v1