Startseite UB

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 29.

Article

Schläger, Christian and Nowey, Thomas (2007) On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Activities. International journal of computer systems science & engineering 22 (5). Fulltext not available.

Schläger, Christian and Nowey, Thomas (2007) On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments. International Journal of Computer Systems Science and Engineering.
[img]
Preview

Federrath, Hannes and Nowey, Thomas and Plößl, Klaus and Wendolsky, Rolf (2005) Informationssicherheit in Forschung und universitärer Ausbildung in Regensburg. Schriftenreihe "Informationstechnologie in Bayern" des Bayerischen Wirtschaftsministeriums, pp. 36-38. Fulltext not available.

Book Section

Herrmann, Dominik and Scheuer, Florian and Feustel, Philipp and Nowey, Thomas and Federrath, Hannes (2009) A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. In: Fischer-Hübner, Simone and Lambrinoudakis, Costas and Pernul, Günther, (eds.) Trust, privacy and security in digital business: 6th international conference, TrustBus 2009, Linz, Austria, September 3 - 4, 2009; proceedings. Lecture Notes in Computer Science, 5695. Springer, Berlin, Heidelberg, pp. 32-41. ISBN 978-3-642-03747-4; 3-642-03747-X.
[img]
Preview

Böhme, Rainer and Nowey, Thomas (2008) Economic Security Metrics. In: Eusgeld, Irene and Freiling, Felix and Reussner, Ralf, (eds.) Dependability Metrics. Lecture Notes in Computer Science, 4909. Springer, Berlin, pp. 182-193. ISBN 978-3-540-68946-1. Fulltext not available.

Mink, Martin and Nowey, Thomas (2008) Human Factors. In: Eusgeld, Irene and Freiling, Felix and Reussner, Ralf, (eds.) Dependability Metrics. Lecture Notes in Computer Science, 4909. Springer, Berlin, pp. 194-201. ISBN 978-3-540-68946-1. Fulltext not available.

Schläger, Christian and Nowey, Thomas and Montenegro, Jose A. (2006) A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c eCommerce. In: Proceedings of The First International Conference on Availability, Reliability and Security (ARES'06). IEEE Computer Society, Los Alamitos, Calif.. ISBN 0-7695-2567-9.
[img]
Preview

Schläger, Christian and Nowey, Thomas and Montenegro, Jose A. (2006) A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. In: Proc. First International Conference on Availability, Reliability and Security (ARES 2006). IEEE Computer Society Conference Publishing Services, Los Alamitos, pp. 709-716.
[img]
Preview

Dimler, Simone and Federrath, Hannes and Nowey, Thomas and Plößl, Klaus (2006) Awareness für IT-Sicherheit und Datenschutz in der Hochschulausbildung – Eine empirische Untersuchung. In: Dittmann, Jana, (ed.) SICHERHEIT 2006. Lecture Notes in Informatics (LNI) – Proceedings, 77. Köllen Druck+Verlag, Bonn, pp. 18-21. ISBN 3-88579-171-4.
[img]
Preview

Sitzberger, Sabrina and Nowey, Thomas (2006) Lernen vom Business Engineering - Ansätze für ein systematisches, modellgestütztes Vorgehensmodell zum Sicherheitsmanagement. In: Lehner, Franz and Nösekabel, Holger and Kleinschmidt, Peter, (eds.) Multikonferenz Wirtschaftsinformatik 2006. Tagungsband 2. Gito, Berlin, pp. 155-165.
[img]
Preview

Federrath, Hannes and Nowey, Thomas and Plößl, Klaus (2006) Rechnersicherheit. In: Kongehl, Gerhard and Greß, Sebastian and Weck, Gerhard and Federrath, Hannes, (eds.) Handbuch Datenschutz-Management. WRS Verlag, München/Planegg. ISBN 3-8092-1705-0. Fulltext not available.

Schläger, Christian and Nowey, Thomas (2006) Towards a Risk Management Perspective on AAIs. In: Fischer-Hübner, Simone and Furnell, Steven and Lambrinoudakis, Costas, (eds.) Trust and Privacy in Digital Business: Session 2: Security and Risk Management. TrustBus 2006, Krakau, Polen, 04.-08.September 2006. Lecture Notes in Computer Science, 4083. Springer, Heidelberg, pp. 41-50. ISBN 978-3-540-37750-4.
[img]
Preview

Plößl, Klaus and Nowey, Thomas and Mletzko, Christian (2006) Towards a Security Architecture for Vehicular Ad Hoc Networks. In: Proc. First International Conference on Availability, Reliability and Security (ARES'06). IEEE Computer Society Conference Publishing Services, Los Alamitos, pp. 374-381.
[img]
Preview

Nowey, Thomas and Federrath, Hannes and Klein, C. and Plössl, Klaus (2005) Ansätze zur Evaluierung von Sicherheitsinvestitionen. In: Federrath, Hannes, (ed.) Sicherheit 2005: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit"; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2005); Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. GI-Edition / Proceedings, 62. Ges. für Informatik, Bonn, pp. 15-26. ISBN 3-88579-391-1.
[img]
Preview

Plössl, Klaus and Federrath, Hannes and Nowey, Thomas (2005) Protection Mechanisms Against Phishing Attacks. In: Hutchison, David, (ed.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 3592. Springer, Berlin, pp. 20-29. ISBN 978-3-540-28224-2.
[img]
Preview

Plössl, Klaus and Federrath, Hannes and Nowey, Thomas (2005) Schutzmöglichkeiten gegen Phishing. In: Federrath, Hannes, (ed.) Sicherheit 2005: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit"; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2005); Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. GI-Edition / Proceedings, 62. Ges. für Informatik, Bonn, pp. 161-164. ISBN 3-88579-391-1.
[img]
Preview

Monograph

Breitschaft, Markus and Krabichler, Thomas and Nowey, Thomas and Stahl, Ernst and Wittmann, Georg (2007) Goverment-to-Business in Deutschland. Working Paper.
[img]
Preview

Breitschaft, Markus and Krabichler, Thomas and Nowey, Thomas and Stahl, Ernst and Wittmann, Georg (2004) Goverment-to-Business in Deutschland. Working Paper.
[img]
Preview

Conference or Workshop Item

Herrmann, Dominik and Scheuer, Florian and Feustel, Philipp and Nowey, Thomas and Federrath, Hannes (2009) A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. In: 6th International Conference on Trust, Privacy and Security in Digital Businesses (TrustBus 2009), 3.- 4. September 2009, Linz.
[img]
Preview

Nowey, Thomas and Federrath, Hannes (2007) Collection of Quantitative Data on Security Incidents. In: The Second International Conference on Availability, Reliability and Security (ARES 2007), 10. - 13. April 2007, Wien.
[img]
Preview

Nowey, Thomas (2007) Collection of Quantitative Data on Security Incidents. In: ARES 2007, 11. April 2007, Wien. Fulltext not available.

Nowey, Thomas (2007) Kosten-Nutzen-Quantifizierung von Investitionen in IT-Sicherheit. In: Doctoral Consortium, WI 2007, 26. Februar 2007, Karlsruhe. Fulltext not available.

Nowey, Thomas (2007) Kosten-Nutzen-Quantifizierung von Investitionen in IT-Sicherheit als Grundlage eines ökonomisch fundierten Sicherheitsmangements. In: Doctoral Consortium der WI 2007, 26.2. - 27.2.2007, Karlsruhe.
[img]
Preview

Federrath, Hannes and Nowey, Thomas (2007) Wieviel darf IT-Sicherheit kosten? In: Veranstaltung "(IT)-Sicherheit am Strand" der IT Security Cluster Initiative Ostbayern, 12. Juli 2007, Regensburg.
[img]
Preview

Nowey, Thomas (2006) Lernen vom Business Engineering: Ansätze für ein systematisches, modellgestütztes Vorgehensmodell zum Sicherheitsmanagement. In: Multikonferenz Wirtschaftsinformatik 2006, 20. Februar 2006, Passau. Fulltext not available.

Schläger, Christian and Nowey, Thomas (2006) Towards a Risk Management Perspective on AAIs. In: 3rd International Conference on Trust, Privacy & Security in Digital Business (TrustBus '06), 04. - 08. September 2006, Krakau, Polen. Fulltext not available.

Nowey, Thomas (2005) Protection Mechanisms against Phishing Attacks. In: 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus '05), 22. - 26. August 2005, Copenhagen, Denmark. Fulltext not available.

Nowey, Thomas (2005) Ansätze zur Evaluierung von Sicherheitsinvestitionen. In: Sicherheit 2005, 07. April 2005, Regensburg. Fulltext not available.

Nowey, Thomas (2005) Security Metrics - Business Perspective. In: GI-Dagstuhl-Forschungsseminar on Dependability Metrics, 31. Oktober 2005, Dagstuhl. Fulltext not available.

This list was generated on Fri Nov 28 09:38:13 2014 CET.
  1. University

University Library

Publication Server

Contact person
Gernot Deinzer

Telefon 0941 943-2759
Contact