Almut Herzog

According to our database1, Almut Herzog authored at least 10 papers between 2000 and 2007.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
Usable Security Policies for Runtime Environments.
PhD thesis, 2007

Usable set-up of runtime security policies.
Inf. Manag. Comput. Secur., 2007

An Ontology of Information Security.
Int. J. Inf. Secur. Priv., 2007

Usability and Security of Personal Firewalls.
Proceedings of the New Approaches for Security, 2007

Privacy in the Semantic Web: What Policy Languages Have to Offer.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

User help techniques for usable security.
Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology, 2007

2006
A Usability Study of Security Policy Management.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
Performance of the Java security manager.
Comput. Secur., 2005

An Evaluation of Java Application Containers according to Security Requirements.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

2000
Towards Secure e-Services.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000


  Loading...