Anzahl der Einträge: 9.
Buchkapitel
Glas, Magdalena ,
Böhm, Fabian ,
Schönteich, Falko und
Pernul, Günther
(2023)
Cyber Range Exercises: Potentials and Open Challenges for Organizations.
In:
Furnell, Steven und
Clarke, Nathan, (eds.)
Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings.
IFIP Advances in Information and Communication Technology (IFIPAICT), 674.
Springer, Cham, S. 24-35.
ISBN 978-3-031-38532-2, 978-3-031-38530-8.
Volltext nicht vorhanden.
Glas, Magdalena ,
Vielberth, Manfred ,
Reittinger, Tobias ,
Böhm, Fabian und
Pernul, Günther
(2022)
Visual Programming in Cyber Range Training to Improve Skill Development.
In:
Clarke, Nathan und
Furnell, Steven, (eds.)
Human Aspects of Information Security and Assurance. HAISA 2022.
IFIP Advances in Information and Communication Technology, 658.
Springer, Cham, Switzerland, S. 3-13.
ISBN 978-3-031-12172-2.
Volltext nicht vorhanden.
Nitschke, Mirja ,
Roth, Christian ,
Hoyer, Christian und
Kesdogan, Dogan
(2022)
Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments.
In:
Furnell, Steven und
Mori, Paolo und
Weippl, Edgar und
Camp, Olivier, (eds.)
Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers.
Communications in Computer and Information Science (CCIS), 1545.
Springer, Cham.
ISBN 978-3-030-94900-6 (online), 978-3-030-94899-3 (print).
Volltext nicht vorhanden.
Fuchs, Ludwig und
Preis, Anton
(2008)
BusiROLE: A Model for Integrating Business Roles into Identity Management.
In:
Furnell, Steven, (ed.)
Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008.
Lecture Notes in Computer Science, 5185.
Springer, Berlin, S. 128-138.
ISBN 978-3-540-85734-1.
Fernandez, Eduardo B.,
Pernul, Günther und
Larrando-Petrie, Maria M.
(2008)
Patterns and Pattern Diagrams for Access Control.
In:
Furnell, Steven, (ed.)
Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008.
Lecture Notes in Computer Science, 5185.
Springer, Berlin, S. 38-47.
ISBN 978-3-540-85734-1.
Priebe, Torsten
(2008)
Authorization and Access Control.
In:
Furnell, Steven und
Katsikas, Sokratis K. und
Lopez, Javier und
Patel, Ahmed, (eds.)
Securing Information and Communication Systems: Principles, Technologies and Applications.
Artech House information security and privacy series; Artech House computer security series.
Artech House, Boston, S. 61-86.
ISBN 978-1-59693-228-9; 1-59693-228-7.
Volltext nicht vorhanden.
Pernul, Günther
(2008)
Data-Centric Applications.
In:
Furnell, Steven und
Katsikas, Sokratis K. und
Lopez, Javier und
Patel, Ahmed, (eds.)
Securing Information and Communication Systems: Principles, Technologies and Applications.
Artech House information security and privacy series; Artech House computer security series.
Artech House, Boston, S. 87-103.
ISBN 978-1-59693-228-9; 1-59693-228-7.
Volltext nicht vorhanden.
Schläger, Christian und
Nowey, Thomas
(2006)
Towards a Risk Management Perspective on AAIs.
In:
Fischer-Hübner, Simone und
Furnell, Steven und
Lambrinoudakis, Costas, (eds.)
Trust and Privacy in Digital Business: Session 2: Security and Risk Management. TrustBus 2006, Krakau, Polen, 04.-08.September 2006.
Lecture Notes in Computer Science, 4083.
Springer, Heidelberg, S. 41-50.
ISBN 978-3-540-37750-4.
Buch
Diese Liste wurde erzeugt am Fri Sep 27 00:08:20 2024 CEST.