Search Results - Weippl, E.
-
1
-
2
-
3
-
4
An approach to secure distribution of Web-based training courses
Conference Proceeding -
5
-
6
-
7
Reusable components for developing security-aware applications
Conference Proceeding -
8
-
9
An approach to role-based access control for digital content
Conference Proceeding -
10
-
11
Fortification of IT Security by Automatic Security Advisory Processing
Conference Proceeding -
12
-
13
-
14
-
15
-
16
-
17
Trees Cannot Lie: Using Data Structures for Forensics Purposes
Conference Proceeding -
18
-
19
-
20