Search - IFIP Open Digital Library Access content directly

Filter your results

62 results
Image document

Bridging User Context and Design Models to Build Adaptive User Interfaces

Mladjan Jovanovic , Dusan Starcevic , Zoran Jovanovic
5th International Conference on Human-Centred Software Engineering (HCSE), Sep 2014, Paderborn, Germany. pp.36-56, ⟨10.1007/978-3-662-44811-3_3⟩
Conference papers hal-01405064v1
Image document

Securing Data Provenance in the Cloud

Muhammad Rizwan Asghar , Mihaela Ion , Giovanni Russello , Bruno Crispo
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.145-160, ⟨10.1007/978-3-642-27585-2_12⟩
Conference papers hal-01481501v1
Image document

Event Handoff Unobservability in WSN

Stefano Ortolani , Mauro Conti , Bruno Crispo , Roberto Di Pietro
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers hal-01581330v1
Image document

Renegotiation and Recursion in Bitcoin Contracts

Massimo Bartoletti , Maurizio Murgia , Roberto Zunino
22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.261-278, ⟨10.1007/978-3-030-50029-0_17⟩
Conference papers hal-03273996v1
Image document

Security-by-Contract for the OSGi Platform

Olga Gadyatskaya , Fabio Massacci , Anton Philippov
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.364-375, ⟨10.1007/978-3-642-30436-1_30⟩
Conference papers hal-01518231v1
Image document

Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security

Luca Piras , Federico Calabrese , Paolo Giorgini
13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.366-376, ⟨10.1007/978-3-030-63479-7_25⟩
Conference papers hal-03434661v1
Image document

Incremental Analysis of Evolving Administrative Role Based Access Control Policies

Silvio Ranise , Anh Truong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers hal-01285032v1
Image document

Hybrid Heat Pump Systems as a Possible Solution for the Energy Transition Towards Sustainable Heating Systems for Buildings

Erica Roccatello , Alessandro Prada , Marco Baratieri
TRIZ Future conference, Sep 2021, Bolzano, Italy. pp.100-111, ⟨10.1007/978-3-030-86614-3_8⟩
Conference papers hal-04067817v1
Image document

Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations

Salvatore Manfredi , Silvio Ranise , Giada Sciarretta
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.201-220, ⟨10.1007/978-3-030-22479-0_11⟩
Conference papers hal-02384588v1
Image document

Experience Probes: Immersion and Reflection Between Reality and Virtuality

Max Willis , Antonella De Angeli , Massimo Zancanaro
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.253-262, ⟨10.1007/978-3-319-68059-0_16⟩
Conference papers hal-01679784v1
Image document

Viability of Magazines for Stimulating Social Interactions in Nursing Homes

Valentina Caforio , Marcos Baez , Fabio Casati
16th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2017, Bombay, India. pp.72-81, ⟨10.1007/978-3-319-67687-6_6⟩
Conference papers hal-01717198v1
Image document

Flexible and Dynamic Consent-Capturing

Muhammad Rizwan Asghar , Giovanni Russello
International Workshop on Open Problems in Network Security (iNetSec), Jun 2011, Lucerne, Switzerland. pp.119-131, ⟨10.1007/978-3-642-27585-2_10⟩
Conference papers hal-01481499v1
Image document

GCI 2012 Harnessing Collective Intelligence with Games

Markus Krause , Roberta Cuel , Maja Vukovic
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.496-499, ⟨10.1007/978-3-642-33542-6_63⟩
Conference papers hal-01556170v1
Image document

Assessing a Collaborative Application for Comic Strips Composition

Eleonora Mencarini , Gianluca Schiavo , Alessandro Cappelletti , Oliviero Stock , Massimo Zancanaro
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.73-80, ⟨10.1007/978-3-319-22668-2_6⟩
Conference papers hal-01599852v1

Privacy and Identity Management for Life

Jan Camenisch , Bruno Crispo , Simone Fischer-Hübner , Ronald Leenes , Giovanni Russello
Springer, AICT-375, 2012, IFIP Advances in Information and Communication Technology, 978-3-642-31667-8. ⟨10.1007/978-3-642-31668-5⟩
Books hal-01517673v1
Image document

Honesty by Typing

Massimo Bartoletti , Alceste Scalas , Emilio Tuosto , Roberto Zunino
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.305-320, ⟨10.1007/978-3-642-38592-6_21⟩
Conference papers hal-01515248v1
Image document

International Norms and Socio-technical Systems: Connecting Institutional and Technological Infrastructures in Governance Processes

Claudia Padovani , Elena Pavan
10th International Conference on Human Choice and Computers (HCC), Sep 2012, Amsterdam, Netherlands. pp.56-65, ⟨10.1007/978-3-642-33332-3_6⟩
Conference papers hal-01525094v1
Image document

Information Security Risk Management

Salimeh Dashti , Paolo Giorgini , Elda Paja
10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.18-33, ⟨10.1007/978-3-319-70241-4_2⟩
Conference papers hal-01765266v1
Image document

Modeling and Reasoning About Privacy-Consent Requirements

Marco Robol , Elda Paja , Mattia Salnitri , Paolo Giorgini
11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.238-254, ⟨10.1007/978-3-030-02302-7_15⟩
Conference papers hal-02156452v1
Image document

Enterprise Interoperability

Will van Der Aalst , John Mylopoulos , Norman M. Sadeh , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-076, 2011, Lecture Notes in Business Information Processing, ⟨10.1007/978-3-642-19680-5⟩
Books hal-01572092v1
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1

Data-Driven Process Discovery and Analysis

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-162, 2013, Lecture Notes in Business Information Processing, 978-3-642-40918-9. ⟨10.1007/978-3-642-40919-6⟩
Books hal-01474694v1
Image document

Modeling and Control of Low-Frequency Electromagnetic Fields in Multiply Connected Conductors

Fredi Tröltzsch , Alberto Valli
27th IFIP Conference on System Modeling and Optimization (CSMO), Jun 2015, Sophia Antipolis, France. pp.505-516, ⟨10.1007/978-3-319-55795-3_48⟩
Conference papers hal-01626886v1
Image document

On the Realizability of Contracts in Dishonest Systems

Massimo Bartoletti , Emilio Tuosto , Roberto Zunino
14th International Conference on Coordination Models and Languages (COORDINATION), Jun 2012, Stockholm, Sweden. pp.245-260, ⟨10.1007/978-3-642-30829-1_17⟩
Conference papers hal-01529594v1
Image document

Quality Criteria for Cyber Security MOOCs

Simone Fischer-Hübner , Matthias Beckerle , Alberto Lluch Lafuente , Antonio Ruiz Martínez , Karo Saharinen , et al.
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.46-60, ⟨10.1007/978-3-030-59291-2_4⟩
Conference papers hal-03380695v1

The Practice of Enterprise Modeling

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-165, 2013, Lecture Notes in Business Information Processing, 978-3-642-41640-8. ⟨10.1007/978-3-642-41641-5⟩
Books hal-01474798v1
Image document

Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments

Salimeh Dashti , Amir Sharif , Roberto Carbone , Silvio Ranise
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.325-337, ⟨10.1007/978-3-030-81242-3_19⟩
Conference papers hal-03677036v1
Image document

Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios

Daniel Santos , Silvio Ranise , Luca Compagna , Serena E. Ponta
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.85-100, ⟨10.1007/978-3-319-20810-7_6⟩
Conference papers hal-01745831v1

Re-conceptualizing Enterprise Information Systems

Wil van Der Aalst , John Mylopoulos , Michael Rosemann , Michael J. Shaw , Clemens Szyperski , et al.
Springer, LNBIP-105, 2012, Lecture Notes in Business Information Processing, 978-3-642-28826-5. ⟨10.1007/978-3-642-28827-2⟩
Books hal-01483877v1
Image document

P2P and Cloud: A Marriage of Convenience for Replica Management

Hanna Kavalionak , Alberto Montresor
6th International Workshop on Self-Organizing Systems (IWSOS), Mar 2012, Delft, Netherlands. pp.60-71, ⟨10.1007/978-3-642-28583-7_6⟩
Conference papers hal-01527531v1