Volgen
Mario Lischka
Mario Lischka
DZ BANK AG
Geverifieerd e-mailadres voor computer.org - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Graph-Based XACML Evaluation
S Pina Ros, M Lischka, F Gómez Mármol
712012
Role-based access control in ambient and remote space
HF Wedde, M Lischka
Proceedings of the ninth ACM symposium on Access control models and …, 2004
322004
Modular Authorization
HF Wedde, M Lischka
Proceedings of the sixth ACM Symposium on Access Control Models and …, 2001
242001
Deductive policies with XACML
M Lischka, Y Endo, M Sánchez Cuenca
Proceedings of the 2009 ACM workshop on Secure web services, 37-44, 2009
192009
Security and privacy enablers for future identity management systems
M Barisch, ET Garcia, M Lischka, R Marques, R Marx, A Matos, ...
2010 Future Network & Mobile Summit, 1-10, 2010
182010
Cooperative role-based administration
HF Wedde, M Lischka
Proceedings of the eighth ACM symposium on Access control models and …, 2003
182003
Modular authorization and administration
HF Wedde, M Lischka
ACM Transactions on Information and System Security (TISSEC) 7 (3), 363-391, 2004
172004
Privacy in smart metering ecosystems
P Ebinger, JL Hernández Ramos, P Kikiras, M Lischka, A Wiesmaier
International Workshop on Smart Grid Security, 120-131, 2012
152012
Personalization-based optimization of real-time service delivery in a multi-device environment
MQ Kuhnen, D Kraft, A Schulke, J Bauknecht, J Haussler, M Lischka
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
122009
Composing heterogenous access policies between organizations
HFWM Lischka, HF Wedde
Proceedings of the IADIS International Conference e-Society, Lisbon, 3-6, 2003
92003
Internet-of-Things architecture IoT-A project deliverable D1. 2—Initial architectural reference model for IoT
M Bauer, N Bui, P Giacomin, N Gruschka, S Haller, E Ho, R Kernchen, ...
European Commission, 2011
82011
Bridging IMS and Internet Identity
I Friese, J Högberg, FA Foll, G Gourmelen, M Lischka, J Brennan, P Weik, ...
2010 14th International Conference on Intelligence in Next Generation …, 2010
82010
Dynamic obligation specification and negotiation
M Lischka
2010 IEEE Network Operations and Management Symposium-NOMS 2010, 155-162, 2010
82010
New dimensions in distributed journalism through dragon slayer iii
HF Wedde, M Lischka
Proceedings of the Seventh Euromicro Workshop on Parallel and Distributed …, 1999
71999
Policy-based real-time decision-making for personalized service delivery
J Bauknecht, J Haussler, D Kraft, MQ Kuhnen, M Lischka, A Schulke
2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009
52009
Sicherheitsprobleme im Cloud Computing
S Groß, M Lischka, N Gruschka, A Miede, M Jensen, M Mosch, S Schulte, ...
PIK-Praxis der Informationsverarbeitung und Kommunikation 34 (3), 126-134, 2011
42011
An evolutionary meta hierarchical scheduler for the Linux operating system
HF Wedde, M Farooq, M Lischka
Genetic and Evolutionary Computation–GECCO 2004: Genetic and Evolutionary …, 2004
42004
Modular Authorization
FW HORST, M LISCHKA
Proceedings of the sixth ACM Symposium on Access Control Models and …, 2001
42001
Verteilte kompetenzbasierte Authentifizierung von Knoten im Dragon Slayer III System
M Lischka
Master’s thesis, Informatik III, Universitt, 1998
41998
method for access control within a network and a network
M Lischka
US Patent App. 13/142,085, 2011
32011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20