default search action
Daniel Hofer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
A systematic literature review of authorization and access control requirements and current state of the art for different database models. Int. J. Web Inf. Syst. 20(1): 1-23 (2024) - [c16]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Comparison of Access Control Approaches for Graph-Structured Data. SECRYPT 2024: 576-583 - [i3]Mario Lins, René Mayrhofer, Michael Roland, Daniel Hofer, Martin Schwaighofer:
On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ. CoRR abs/2404.08987 (2024) - [i2]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Comparison of Access Control Approaches for Graph-Structured Data. CoRR abs/2405.20762 (2024) - 2023
- [c15]Daniel Hofer, Aya Mohamed, Dagmar Auer, Stefan Nadschläger, Josef Küng:
Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control. DEXA (1) 2023: 431-436 - [c14]Daniel Hofer, Aya Mohamed, Stefan Nadschläger, Dagmar Auer:
An Intermediate Representation for Rewriting Cypher Queries. DEXA Workshops 2023: 86-90 - [c13]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement. SECRYPT 2023: 442-449 - [i1]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement. CoRR abs/2306.12819 (2023) - 2022
- [j3]Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
A systematic literature review for authorization and access control: definitions, strategies and models. Int. J. Web Inf. Syst. 18(2/3): 156-180 (2022) - [c12]Daniel Hofer, Stefan Nadschläger, Aya Mohamed, Josef Küng:
Extending Authorization Capabilities of Object Relational/Graph Mappers by Request Manipulation. DEXA (2) 2022: 71-83 - [c11]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Authorization and Access Control for Different Database Models: Requirements and Current State of the Art. FDSE (CCIS Volume) 2022: 225-239 - [c10]Daniel Hofer, Aya Mohamed, Josef Küng:
Modifying Neo4j's Object Graph Mapper Queries for Access Control. iiWAS 2022: 421-426 - 2021
- [j2]Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed, Josef Küng:
A study on time models in graph databases for security log analysis. Int. J. Web Inf. Syst. 17(5): 427-448 (2021) - [j1]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Extended Authorization Policy for Graph-Structured Data. SN Comput. Sci. 2(5): 351 (2021) - [c9]Stefan Nadschläger, Markus Jäger, Daniel Hofer, Josef Küng:
Placeholder Constraint Evaluation in Simulation Graphs. DEXA Workshops 2021: 65-69 - [c8]Stefan Nadschläger, Daniel Hofer, Josef Küng, Markus Jäger:
Data Structures for a Generic Software System using the Composite Design Pattern. EuroPLoP 2021: 1:1-1:7 - [c7]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Authorization Strategies and Classification of Access Control Models. FDSE 2021: 155-174 - [c6]Daniel Hofer, Pranav Krishna Prasad, Markus Schneider:
Comparison of Anomaly Detection and Solution Strategies for Household Service Robotics using Knowledge Graphs. IICAIET 2021: 1-6 - [c5]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Extended XACML Language and Architecture for Access Control in Graph-structured Data. iiWAS 2021: 367-374 - [c4]Daniel Hofer, Karin Anna Hummel:
Poster: Energy Management in Off-grid Homes by Forecasting. IOT 2021: 207-210 - 2020
- [c3]Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng:
Authorization Policy Extension for Graph Databases. FDSE 2020: 47-66 - [c2]Daniel Hofer, Markus Jäger, Aya Mohamed, Josef Küng:
On Applying Graph Database Time Models for Security Log Analysis. FDSE 2020: 87-107 - [c1]Daniel Hofer, Wolfgang Ertel:
Evaluating Person Re-identification Performance on GAN-enhanced Datasets. ROBOVIS 2020: 77-81
Coauthor Index
aka: Aya Khaled Youssef Sayed Mohamed
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint