Filter your results
- 57
- 5
- 53
- 6
- 3
- 62
- 9
- 8
- 5
- 2
- 2
- 5
- 5
- 6
- 5
- 7
- 9
- 5
- 3
- 62
- 4
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
62 results
|
Bridging User Context and Design Models to Build Adaptive User Interfaces5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.36-56, ⟨10.1007/978-3-662-44811-3_3⟩
Conference papers
hal-01405064v1
|
||
|
Securing Data Provenance in the CloudInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.145-160, ⟨10.1007/978-3-642-27585-2_12⟩
Conference papers
hal-01481501v1
|
||
|
Event Handoff Unobservability in WSN1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers
hal-01581330v1
|
||
|
Renegotiation and Recursion in Bitcoin Contracts22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.261-278, ⟨10.1007/978-3-030-50029-0_17⟩
Conference papers
hal-03273996v1
|
||
|
Security-by-Contract for the OSGi Platform27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.364-375, ⟨10.1007/978-3-642-30436-1_30⟩
Conference papers
hal-01518231v1
|
||
|
Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.366-376, ⟨10.1007/978-3-030-63479-7_25⟩
Conference papers
hal-03434661v1
|
||
|
Incremental Analysis of Evolving Administrative Role Based Access Control Policies28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers
hal-01285032v1
|
||
|
Hybrid Heat Pump Systems as a Possible Solution for the Energy Transition Towards Sustainable Heating Systems for BuildingsTRIZ Future conference, Sep 2021, Bolzano, Italy. pp.100-111, ⟨10.1007/978-3-030-86614-3_8⟩
Conference papers
hal-04067817v1
|
||
|
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.201-220, ⟨10.1007/978-3-030-22479-0_11⟩
Conference papers
hal-02384588v1
|
||
|
Experience Probes: Immersion and Reflection Between Reality and Virtuality16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.253-262, ⟨10.1007/978-3-319-68059-0_16⟩
Conference papers
hal-01679784v1
|
||
|
Viability of Magazines for Stimulating Social Interactions in Nursing Homes16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.72-81, ⟨10.1007/978-3-319-67687-6_6⟩
Conference papers
hal-01717198v1
|
||
|
Flexible and Dynamic Consent-CapturingInternational Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.119-131, ⟨10.1007/978-3-642-27585-2_10⟩
Conference papers
hal-01481499v1
|
||
|
GCI 2012 Harnessing Collective Intelligence with Games11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.496-499, ⟨10.1007/978-3-642-33542-6_63⟩
Conference papers
hal-01556170v1
|
||
|
Assessing a Collaborative Application for Comic Strips Composition15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.73-80, ⟨10.1007/978-3-319-22668-2_6⟩
Conference papers
hal-01599852v1
|
||
|
Privacy and Identity Management for LifeSpringer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books
hal-01517673v1
|
||
|
Honesty by Typing15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.305-320, ⟨10.1007/978-3-642-38592-6_21⟩
Conference papers
hal-01515248v1
|
||
|
International Norms and Socio-technical Systems: Connecting Institutional and Technological Infrastructures in Governance Processes10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.56-65, ⟨10.1007/978-3-642-33332-3_6⟩
Conference papers
hal-01525094v1
|
||
|
Information Security Risk Management10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-319-70241-4_2⟩
Conference papers
hal-01765266v1
|
||
|
Modeling and Reasoning About Privacy-Consent Requirements11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.238-254, ⟨10.1007/978-3-030-02302-7_15⟩
Conference papers
hal-02156452v1
|
||
|
Enterprise InteroperabilitySpringer, LNBIP-076, 2011, Lecture Notes in Business Information Processing, ⟨10.1007/978-3-642-19680-5⟩
Books
hal-01572092v1
|
||
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
Data-Driven Process Discovery and AnalysisSpringer, LNBIP-162, 2013, Lecture Notes in Business Information Processing, 978-3-642-40918-9. ⟨10.1007/978-3-642-40919-6⟩
Books
hal-01474694v1
|
||
|
Modeling and Control of Low-Frequency Electromagnetic Fields in Multiply Connected Conductors27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.505-516, ⟨10.1007/978-3-319-55795-3_48⟩
Conference papers
hal-01626886v1
|
||
|
On the Realizability of Contracts in Dishonest Systems14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.245-260, ⟨10.1007/978-3-642-30829-1_17⟩
Conference papers
hal-01529594v1
|
||
|
Quality Criteria for Cyber Security MOOCs13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.46-60, ⟨10.1007/978-3-030-59291-2_4⟩
Conference papers
hal-03380695v1
|
||
|
The Practice of Enterprise ModelingSpringer, LNBIP-165, 2013, Lecture Notes in Business Information Processing, 978-3-642-41640-8. ⟨10.1007/978-3-642-41641-5⟩
Books
hal-01474798v1
|
||
|
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.325-337, ⟨10.1007/978-3-030-81242-3_19⟩
Conference papers
hal-03677036v1
|
||
|
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.85-100, ⟨10.1007/978-3-319-20810-7_6⟩
Conference papers
hal-01745831v1
|
||
|
Re-conceptualizing Enterprise Information SystemsSpringer, LNBIP-105, 2012, Lecture Notes in Business Information Processing, 978-3-642-28826-5. ⟨10.1007/978-3-642-28827-2⟩
Books
hal-01483877v1
|
||
|
P2P and Cloud: A Marriage of Convenience for Replica Management6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.60-71, ⟨10.1007/978-3-642-28583-7_6⟩
Conference papers
hal-01527531v1
|