Christian Emig

According to our database1, Christian Emig authored at least 12 papers between 2005 and 2009.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Identity Management in Business Process Modelling: A Model-driven Approach.
Proceedings of the Business Services: Konzepte, 2009

An MDA-Based Environment for Generating Access Control Policies.
Proceedings of the Trust, 2009

Extending Role-Based Access Control for Business Usage.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Integration of a Security Product in Service-Oriented Architecture.
Proceedings of the Third International Conference on Emerging Security Information, 2009

2008
Zugriffskontrolle in dienstorientierten Architekturen.
PhD thesis, 2008

Zugriffskontrolle in dienstorientierten Architekturen: Absicherung von Webservices und Webservice-Kompositionen.
Günther Emig, Niederstetten, Germany, ISBN: 978-3-921249-33-8, 2008

2007
Semantic Integration of Identity Data Repositories.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007

Identity as a Service - Towards a Service-Oriented Identity Management Architecture.
Proceedings of the Dependable and Adaptable Networks and Services, 2007

An Access Control Metamodel for Web Service-Oriented Architecture.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

2006
SOA-Aware Authorization Control.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

Development of SOA-Based Software Systems - an Evolutionary Programming Approach.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
Programming in the Large based on the Business Process Modelling Notation.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005


  Loading...