Search - IFIP Open Digital Library Access content directly

Filter your results

51 results
Structure: Internal structure identifier : 302599
Image document

The Importance of Trust in Computer Security

Christian Damsgaard Jensen
8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.1-12, ⟨10.1007/978-3-662-43813-8_1⟩
Conference papers hal-01381672v1
Image document

Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

Kent Fagerland Simonsen , Lars Michael Kristensen
4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.104-118, ⟨10.1007/978-3-662-43352-2_9⟩
Conference papers hal-01287735v1
Image document

Challenges in Prototyping a Problem-Solving Practice

Christina Villefrance Møller
7th European Lean Educator Conference (ELEC), Oct 2021, Trondheim, Norway. pp.381-390, ⟨10.1007/978-3-030-92934-3_40⟩
Conference papers hal-03771941v1
Image document

Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces

Fan Yang , Tomoyuki Aotani , Hidehiko Masuhara , Flemming Nielson , Hanne Riis Nielson
13th Conference on Coordination Models and Languages (COORDINATION), Jun 2011, Reykjavik, Iceland. pp.202-218, ⟨10.1007/978-3-642-21464-6_14⟩
Conference papers hal-01582991v1
Image document

Integrating Attributes into Role-Based Access Control

Qasim Mahmood Rajpoot , Christian Damsgaard Jensen , Ram Krishnan
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers hal-01745833v1
Image document

Information Security and Privacy – Challenges and Outlook

Steven Furnell , Paul Haskell-Dowland , Manish Agrawal , Richard Baskerville , Anirban Basu , et al.
Advancing Research in Information and Communication Technology, AICT-600, pp.383-401, 2021, ⟨10.1007/978-3-030-81701-5_16⟩
Book sections hal-03325978v1
Image document

Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling

Weizhi Meng , Man Ho Au
11th IFIP International Conference on Trust Management (TM), Jun 2017, Gothenburg, Sweden. pp.152-159, ⟨10.1007/978-3-319-59171-1_12⟩
Conference papers hal-01651152v1
Image document

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications

Weizhi Meng , Wenjuan Li , Lijun Jiang , Jianying Zhou
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.180-193, ⟨10.1007/978-3-030-22312-0_13⟩
Conference papers hal-03744302v1
Image document

Replica-Based High-Performance Tuple Space Computing

Marina Andrić , Rocco De Nicola , Alberto Lluch Lafuente
17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.3-18, ⟨10.1007/978-3-319-19282-6_1⟩
Conference papers hal-01774936v1
Image document

Klaim-DB: A Modeling Language for Distributed Database Applications

Xi Wu , Ximeng Li , Alberto Lluch Lafuente , Flemming Nielson , Hanne Riis Nielson
17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.197-212, ⟨10.1007/978-3-319-19282-6_13⟩
Conference papers hal-01774934v1

Trust Management XIII

Weizhi Meng , Piotr Cofta , Christian Damsgaard Jensen , Tyrone Grandison
Springer International Publishing, AICT-563, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-33715-5. ⟨10.1007/978-3-030-33716-2⟩
Books hal-03182601v1
Image document

UNI•C – A True Internet Pioneer, the Danish Computing Centre for Research and Education

Dorte Olesen
4th History of Nordic Computing (HiNC4), Aug 2014, Copenhagen, Denmark. pp.116-124, ⟨10.1007/978-3-319-17145-6_13⟩
Conference papers hal-01301400v1
Image document

CodeTrust

Christian Damsgaard Jensen , Michael Bøndergaard Nielsen
12th IFIP International Conference on Trust Management (TM), Jul 2018, Toronto, ON, Canada. pp.58-74, ⟨10.1007/978-3-319-95276-5_5⟩
Conference papers hal-01855988v1
Image document

CPMap: Design of Click-Points Map-Based Graphical Password Authentication

Weizhi Meng , Fei Fei , Lijun Jiang , Zhe Liu , Chunhua Su , et al.
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.18-32, ⟨10.1007/978-3-319-99828-2_2⟩
Conference papers hal-02023732v1
Image document

Information Security Theory and Practice

Maryline Laurent , Thanassis Giannetsos
Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books hal-03173895v1
Image document

A Theory of Automated Market Makers in DeFi

Massimo Bartoletti , James Hsin-Yu Chiang , Alberto Lluch-Lafuente
23th International Conference on Coordination Languages and Models (COORDINATION), Jun 2021, Valletta, Malta. pp.168-187, ⟨10.1007/978-3-030-78142-2_11⟩
Conference papers hal-03387829v1
Image document

Recursive Advice for Coordination

Michał Terepeta , Hanne Riis Nielson , Flemming Nielson
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.137-151, ⟨10.1007/978-3-642-30829-1_10⟩
Conference papers hal-01529587v1
Image document

The Stochastic Quality Calculus

Kebin Zeng , Flemming Nielson , Hanne Riis Nielson
16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.179-193, ⟨10.1007/978-3-662-43376-8_12⟩
Conference papers hal-01290076v1
Image document

Quality Criteria for Cyber Security MOOCs

Simone Fischer-Hübner , Matthias Beckerle , Alberto Lluch Lafuente , Antonio Ruiz Martínez , Karo Saharinen , et al.
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.46-60, ⟨10.1007/978-3-030-59291-2_4⟩
Conference papers hal-03380695v1

Trust Management IX

Christian Damsgaard Jensen , Stephen Marsh , Theo Dimitrakos , Yuko Murayama
Springer, AICT-454, 2015, Trust Management IX, 978-3-319-18490-6. ⟨10.1007/978-3-319-18491-3⟩
Books hal-01416235v1

Coordination Models and Languages

Hanne Nielson , Emilio Tuosto
Springer International Publishing, LNCS-11533, 2019, Lecture Notes in Computer Science, 978-3-030-22396-0. ⟨10.1007/978-3-030-22397-7⟩
Books hal-02365511v1
Image document

Exploring the Relationship Between Data Science and Circular Economy: An Enhanced CRISP-DM Process Model

Eivind Kristoffersen , Oluseun Omotola Aremu , Fenna Blomsma , Patrick Mikalef , Jingyue Li
18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.177-189, ⟨10.1007/978-3-030-29374-1_15⟩
Conference papers hal-02510135v1
Image document

Visual Product Architecture Modelling for Structuring Data in a PLM System

Hans Bruun , Niels Henrik Mortensen
9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.598-611, ⟨10.1007/978-3-642-35758-9_54⟩
Conference papers hal-01526158v1
Image document

A Fixpoint-Based Calculus for Graph-Shaped Computational Fields

Alberto Lluch Lafuente , Michele Loreti , Ugo Montanari
17th International Conference on Coordination Languages and Models (COORDINATION), Jun 2015, Grenoble, France. pp.101-116, ⟨10.1007/978-3-319-19282-6_7⟩
Conference papers hal-01774933v1
Image document

Building an Ontology of Product/Service-Systems: Using a Maritime Case Study to Elicit Classifications and Characteristics

Aris Pagoropoulos , Jakob Bejbro Andersen , Louise Laumann Kjær , Anja Maier , Tim C. Mcaloone
15th Working Conference on Virtual Enterprises (PROVE), Oct 2014, Amsterdam, Netherlands. pp.119-126, ⟨10.1007/978-3-662-44745-1_11⟩
Conference papers hal-01392097v1
Image document

Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?

Nicola Dragoni , Olga Gadyatskaya , Fabio Massacci
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers hal-01059143v1
Image document

Denial-of-Service Security Attack in the Continuous-Time World

Shuling Wang , Flemming Nielson , Hanne Riis Nielson
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.149-165, ⟨10.1007/978-3-662-43613-4_10⟩
Conference papers hal-01398014v1
Image document

CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts

Constantinos Pouyioukka , Thanassis Giannetsos , Weizhi Meng
13th IFIP International Conference on Trust Management (IFIPTM), Jul 2019, Copenhagen, Denmark. pp.147-161, ⟨10.1007/978-3-030-33716-2_12⟩
Conference papers hal-03182610v1
Image document

Enhanced 5G V2X Services using Sidelink Device-to-Device Communications

Nestor Bonjorn , Fotis Foukalas , Paul Pop
17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2018), Jun 2018, Capri Island, Italy. pp.116-122
Conference papers hal-01832538v1
Image document

Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness

Christian Damsgaard Jensen , Kristine Geneser , Ida C. Willemoes-Wissing
7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.177-192, ⟨10.1007/978-3-642-38323-6_13⟩
Conference papers hal-01468170v1