Search - IFIP Open Digital Library Access content directly

Filter your results

62 results
Structure: Internal structure identifier : 304024
Image document

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement

Gabriela Gheorghe , Bruno Crispo , Roberto Carbone , Lieven Desmet , Wouter Joosen
12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.350-369, ⟨10.1007/978-3-642-25821-3_18⟩
Conference papers hal-01597755v1
Image document

A True Concurrent Model of Smart Contracts Executions

Massimo Bartoletti , Letterio Galletta , Maurizio Murgia
22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.243-260, ⟨10.1007/978-3-030-50029-0_16⟩
Conference papers hal-03273986v1
Image document

An Approach to Select Cost-Effective Risk Countermeasures

Le Sang Tran , Bjørnar Solhaug , Ketil Stølen
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.266-273, ⟨10.1007/978-3-642-39256-6_18⟩
Conference papers hal-01490710v1
Image document

The Effect of Religious Identity on User Judgment of Website Quality

Ons Al-Shamaileh , Alistair Sutcliffe , Antonella De Angeli
13th International Conference on Human-Computer Interaction (INTERACT), Sep 2011, Lisbon, Portugal. pp.620-623, ⟨10.1007/978-3-642-23768-3_97⟩
Conference papers hal-01597043v1
Image document

Investigating Italian Citizens’ Attitudes Towards Immuni, the Italian Contact Tracing App

Cristina Bosco , Martina Cvajner
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.34-42, ⟨10.1007/978-3-030-85616-8_3⟩
Conference papers hal-04196886v1
Image document

Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?

Nicola Dragoni , Olga Gadyatskaya , Fabio Massacci
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers hal-01059143v1
Image document

Following Wrong Suggestions: Self-blame in Human and Computer Scenarios

Andrea Beretta , Massimo Zancanaro , Bruno Lepri
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.542-550, ⟨10.1007/978-3-030-29387-1_31⟩
Conference papers hal-02553922v1
Image document

Strategic Enterprise Architectures

Evellin Cardoso , John Mylopoulos , Alejandro Mate , Juan Trujillo
9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.57-71, ⟨10.1007/978-3-319-48393-1_5⟩
Conference papers hal-01653508v1
Image document

Goal-Oriented Access Control Model for Ambient Assisted Living

Fabio Massacci , Viet Hung Nguyen
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.160-173, ⟨10.1007/978-3-642-14282-6_13⟩
Conference papers hal-01061072v1
Image document

On the Uplink Performance of TCP in Multi-rate 802.11 WLANs

Naeem Khademi , Michael Welzl , Renato Lo Cigno
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.368-378, ⟨10.1007/978-3-642-20798-3_28⟩
Conference papers hal-01597975v1
Image document

Entity-Centric Visualization of Open Data

Sajan Raj Ojha , Mladjan Jovanovic , Fausto Giunchiglia
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.149-166, ⟨10.1007/978-3-319-22698-9_11⟩
Conference papers hal-01609414v1
Image document

Ontology-Based Obfuscation and Anonymisation for Privacy

Leonardo H. Iwaya , Fausto Giunchiglia , Leonardo A. Martucci , Alethia Hume , Simone Fischer-Hübner , et al.
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.343-358, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_23⟩
Book sections hal-01619736v1
Image document

Privacy for Peer Profiling in Collective Adaptive Systems

Mark Hartswood , Marina Jirotka , Ronald Chenu-Abente , Alethia Hume , Fausto Giunchiglia , et al.
Jan Camenisch; Simone Fischer-Hübner; Marit Hansen. Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2, International Summer School, Patras, Greece, September 7–12, 2014, AICT-457, Springer, pp.237-252, 2015, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-319-18620-7. ⟨10.1007/978-3-319-18621-4_16⟩
Book sections hal-01431584v1
Image document

Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework

Marco Robol , Mattia Salnitri , Paolo Giorgini
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.236-250, ⟨10.1007/978-3-319-70241-4_16⟩
Conference papers hal-01765249v1
Image document

Information Security Risk Management

Salimeh Dashti , Paolo Giorgini , Elda Paja
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-319-70241-4_2⟩
Conference papers hal-01765266v1
Image document

Modeling and Reasoning About Privacy-Consent Requirements

Marco Robol , Elda Paja , Mattia Salnitri , Paolo Giorgini
11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.238-254, ⟨10.1007/978-3-030-02302-7_15⟩
Conference papers hal-02156452v1
Image document

Enterprise Interoperability

Will van Der Aalst , John Mylopoulos , Norman M. Sadeh , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-076, 2011, Lecture Notes in Business Information Processing, ⟨10.1007/978-3-642-19680-5⟩
Books hal-01572092v1
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1

Data-Driven Process Discovery and Analysis

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-162, 2013, Lecture Notes in Business Information Processing, 978-3-642-40918-9. ⟨10.1007/978-3-642-40919-6⟩
Books hal-01474694v1
Image document

Modeling and Control of Low-Frequency Electromagnetic Fields in Multiply Connected Conductors

Fredi Tröltzsch , Alberto Valli
27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.505-516, ⟨10.1007/978-3-319-55795-3_48⟩
Conference papers hal-01626886v1
Image document

On the Realizability of Contracts in Dishonest Systems

Massimo Bartoletti , Emilio Tuosto , Roberto Zunino
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.245-260, ⟨10.1007/978-3-642-30829-1_17⟩
Conference papers hal-01529594v1
Image document

Quality Criteria for Cyber Security MOOCs

Simone Fischer-Hübner , Matthias Beckerle , Alberto Lluch Lafuente , Antonio Ruiz Martínez , Karo Saharinen , et al.
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.46-60, ⟨10.1007/978-3-030-59291-2_4⟩
Conference papers hal-03380695v1

The Practice of Enterprise Modeling

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-165, 2013, Lecture Notes in Business Information Processing, 978-3-642-41640-8. ⟨10.1007/978-3-642-41641-5⟩
Books hal-01474798v1
Image document

Optimal Security Configuration for Cyber Insurance

Fabio Martinelli , Ganbayar Uuganbayar , Artsiom Yautsiukhin
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.187-200, ⟨10.1007/978-3-319-99828-2_14⟩
Conference papers hal-02023729v1
Image document

Analyzing Attack Strategies Through Anti-goal Refinement

Tong Li , Jennifer Horkoffi , Elda Pajai , Kristian Beckers , John Mylopoulos
8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.75-90, ⟨10.1007/978-3-319-25897-3_6⟩
Conference papers hal-01442299v1
Image document

Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods

Kristian Beckers , Stephan Fassbender , Maritta Heisel , Federica Paci
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.178-194
Conference papers hal-01506766v1
Image document

Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models

Tong Li , Jennifer Horkoff , John Mylopoulos
7th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2014, Manchester, United Kingdom. pp.208-223, ⟨10.1007/978-3-662-45501-2_15⟩
Conference papers hal-01282000v1
Image document

Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments

Salimeh Dashti , Amir Sharif , Roberto Carbone , Silvio Ranise
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.325-337, ⟨10.1007/978-3-030-81242-3_19⟩
Conference papers hal-03677036v1
Image document

Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios

Daniel Santos , Silvio Ranise , Luca Compagna , Serena E. Ponta
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.85-100, ⟨10.1007/978-3-319-20810-7_6⟩
Conference papers hal-01745831v1

Re-conceptualizing Enterprise Information Systems

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-105, 2012, Lecture Notes in Business Information Processing, 978-3-642-28826-5. ⟨10.1007/978-3-642-28827-2⟩
Books hal-01483877v1