6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Maria Semmelrock-Picej et al.<br />
Fuchs, L. and Pernul, G. (2007) “Supporting Compliant and Secure User Handling – A Structured Approach for<br />
In-House Identity Management”, The Second International <strong>Conference</strong> on Availability, Reliability and<br />
Security (ARES 2007), IEEE Society, Los Alamitos, pp 374–384.<br />
Jackson, G. (2010) “Identity and Access Management”, [online], The University of Chicago, Overview paper,<br />
www.internet2.edu/pubs/200703-ISMW.pdf.<br />
Josang, A., Ismail, R. and Boyd, D. (2007) “A survey of trust and reputation systems for online service provision”,<br />
Decision Support Systems, Vol 43, No. 2, pp 618-644.<br />
Klein, R., Rai, A. and Straub, D.W. (2007) “Competitive and cooperative positioning in supply chain logistics<br />
relationship”, Decision Sciences, Vol 38, No. 4, pp 611-646.<br />
Lipnack, J. and Stamps, J. (1994) The age of the Network – Organizing principles for the 21 st Century, John<br />
Wiley & Sons.<br />
Lipnack, J. and Stamps, J. (1997) Virtual Teams – Reaching across space, time and organizations with<br />
technology, John Wiley & Sons.<br />
Matsuo, Y. and Yamamoto, H. (2009) “Community gravity: Measuring bidirectional effects by trust and rating on<br />
online social network”, International World Wide Web <strong>Conference</strong> (WWW), pp 751-760.<br />
Mohrman, S. A., Finegold, D. and Mohrman, A. M. (2003) “An empirical model of the organization knowledge<br />
system in new product development firms”, Journal of Engineering Technology Management, Vol 20, No. 1,<br />
pp 7-38.<br />
Mori, J., Sugiyaman, T. and Matsuo, Y. (2005) “Real-world oriented information sharing using social networks”,<br />
Group, pp 81-85.<br />
Mui, L., Mohtashemi, M. and Halberstadt, A. (2002) “A computational model of trust and reputation for e-<br />
Business”, Hawaii International <strong>Conference</strong>s on Systems Sciences (HICSS), p.188.<br />
Obiltschnig, A. (2007) Role-based Provisioning - Ein praktischer Ansatz im Identity Manage-ment, Institute for<br />
Applied Computer Science, Faculty for Technical Sciences, University of Klagenfurt, Klagenfurt.<br />
Schmelmer M. (2008) “Infineon setzt bei IT auf Einsparungen”, [online],<br />
www.cio.de/strategien/methoden/850789/index.html.<br />
Semmelrock-Picej, M.Th. and Possegger, A. (2010) “Ausgewählte Sicherheitsrelevante Aspekte der<br />
eCollaboration”, D-A-CH Security 2010, pp 314-325.<br />
Skyrme, D. (2007) „Insights“, [online], www.skyrme.com/insights/.<br />
Zack, M.M. (1999) “Managing codified knowledge”, Sloan Management Review, Vol 40, No. 4, pp 45-58.<br />
Ziener, K. (2010) Grenzüberschreitende Wirtschaftskooperationen und Interreg III A Projekte, Klagenfurt 2010.<br />
251