Mario Lischka
Mario Lischka
Senior Researcher, AGT Group (R&D)
Verified email at computer.org - Homepage
Title
Cited by
Cited by
Year
Graph-Based XACML Evaluation
S Pina Ros, M Lischka, F Gómez Mármol
552012
Role-based access control in ambient and remote space
HF Wedde, M Lischka
Proceedings of the ninth ACM symposium on Access control models and …, 2004
322004
Modular authorization
HF Wedde, M Lischka
Proceedings of the sixth ACM symposium on Access Control models and …, 2001
232001
Deductive policies with XACML
M Lischka, Y Endo, M Sánchez Cuenca
Proceedings of the 2009 ACM workshop on Secure web services, 37-44, 2009
192009
Cooperative role-based administration
HF Wedde, M Lischka
Proceedings of the eighth ACM symposium on Access control models and …, 2003
182003
Security and privacy enablers for future identity management systems
M Barisch, ET Garcia, M Lischka, R Marques, R Marx, A Matos, ...
2010 Future Network & Mobile Summit, 1-10, 2010
162010
Modular authorization and administration
HF Wedde, M Lischka
ACM Transactions on Information and System Security (TISSEC) 7 (3), 363-391, 2004
162004
Privacy in smart metering ecosystems
P Ebinger, JLH Ramos, P Kikiras, M Lischka, A Wiesmaier
International Workshop on Smart Grid Security, 120-131, 2012
122012
Bridging the devices with the web cloud: A restful management architecture over xmpp
M Almeida, A Matos
International Conference on Mobile Multimedia Communications, 136-150, 2010
122010
Personalization-based optimization of real-time service delivery in a multi-device environment
MQ Kuhnen, D Kraft, A Schulke, J Bauknecht, J Haussler, M Lischka
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
122009
Dynamic obligation specification and negotiation
M Lischka
2010 IEEE Network Operations and Management Symposium-NOMS 2010, 155-162, 2010
82010
Composing heterogenous access policies between organizations
HFWM Lischka, HF Wedde
Proceedings of the IADIS International Conference e-Society, Lisbon, 3-6, 2003
82003
New dimensions in distributed journalism through dragon slayer iii
HF Wedde, M Lischka
Proceedings of the Seventh Euromicro Workshop on Parallel and Distributed …, 1999
71999
Bridging IMS and Internet Identity
I Friese, J Högberg, FA Foll, G Gourmelen, M Lischka, J Brennan, P Weik, ...
2010 14th International Conference on Intelligence in Next Generation …, 2010
62010
Policy-based real-time decision-making for personalized service delivery
J Bauknecht, J Haussler, D Kraft, MQ Kuhnen, M Lischka, A Schulke
2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009
52009
Internet-of-Things architecture: IoT-A
M Bauer, M Boussard, N Bui, F Carrez, P Giacomin, E Ho, C Jardak, ...
Project Deliverable D 1, 2011
42011
Modular Authorization
FW HORST, M LISCHKA
Proceedings of ACM SACMAT, 2001
42001
Verteilte kompetenzbasierte Authentifizierung von Knoten im Dragon Slayer III System
M Lischka
Master’s thesis, Informatik III, Universitt, 1998
41998
method for access control within a network and a network
M Lischka
US Patent App. 13/142,085, 2011
32011
Sicherheitsprobleme im Cloud Computing
S Groß, M Lischka, N Gruschka, A Miede, M Jensen, M Mosch, S Schulte, ...
PIK-Praxis der Informationsverarbeitung und Kommunikation 34 (3), 126-134, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20