Adrian Spalka
According to our database1,
Adrian Spalka
authored at least 26 papers
between 1994 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Proceedings of the ICISSP 2015, 2015
2011
Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
2005
Proceedings of the Web Information Systems Engineering, 2005
Multilateral security considerations for adaptive mobile applications.
Proceedings of the ICETE 2005, 2005
Proceedings of the Data and Applications Security XIX, 2005
2003
A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
2002
Trojan horse attacks on software for electronic signatures.
Informatica (Slovenia), 2002
Protecting Java Component Integrity Against Trojan Horse Programs.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Protecting the User from the Data: Security and Privacy Aspects of Public Web Access.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2002
2001
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Managing Classified Documents in a Relational Database.
Proceedings of the Database and Application Security XV, 2001
2000
Proceedings of the Data and Application Security, 2000
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
The Effect of Confidentiality on the Structure of Databases.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
1997
Netzwerk-Strukturierung -- Strukturierung eines multimedialen Netzwerks für Schulen.
LOG IN, 1997
1996
A study of the extensibility of logic-based databases with confidentiality-capabilities.
PhD thesis, 1996
Sicherheitsaspekte.
LOG IN, 1996
An Axiomatic Interpretation of Confidentiality Demands in Logic-Based Relational Databases.
Proceedings of the Logic in Databases, 1996
Security Threats and Security Policies for Networked Multimedia Information Systems in Medicine.
Proceedings of the Medizinische Informatik, Biometrie und Epidemiologie, 1996
The non-primitiveness of the simple-security property and its non-applicability to relational databases.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
1995
Einige grundlegende Betrachtungen über Geheimhaltung in Datenbanken.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995
1994
Proceedings of the 1994 Workshop on New Security Paradigms, 1994
Secure Logic Databases Allowed to Reveal Indefinite Information on Secrets.
Proceedings of the Database Security, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994