Genie in a Model? Why Model Driven Security will not secure your Web Application. Hochreiner, C., Frühwirt, P., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. R. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5(3):44–62, 2014. Paper doi bibtex @article{DBLP:journals/jowua/HochreinerFMKSW14,
author = {Christoph Hochreiner and
Peter Fr{\"{u}}hwirt and
Zhendong Ma and
Peter Kieseberg and
Sebastian Schrittwieser and
Edgar R. Weippl},
title = {Genie in a Model? Why Model Driven Security will not secure your Web
Application},
journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
volume = {5},
number = {3},
pages = {44--62},
year = {2014},
url = {https://doi.org/10.22667/JOWUA.2014.09.31.044},
doi = {10.22667/JOWUA.2014.09.31.044},
timestamp = {Sun, 17 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"9tak72Kfm4MEiyrtq","bibbaseid":"hochreiner-frhwirt-ma-kieseberg-schrittwieser-weippl-genieinamodelwhymodeldrivensecuritywillnotsecureyourwebapplication-2014","downloads":0,"creationDate":"2017-03-20T08:02:14.726Z","title":"Genie in a Model? Why Model Driven Security will not secure your Web Application","author_short":["Hochreiner, C.","Frühwirt, P.","Ma, Z.","Kieseberg, P.","Schrittwieser, S.","Weippl, E. R."],"year":2014,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/w/Weippl:Edgar_R=","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Christoph"],"propositions":[],"lastnames":["Hochreiner"],"suffixes":[]},{"firstnames":["Peter"],"propositions":[],"lastnames":["Frühwirt"],"suffixes":[]},{"firstnames":["Zhendong"],"propositions":[],"lastnames":["Ma"],"suffixes":[]},{"firstnames":["Peter"],"propositions":[],"lastnames":["Kieseberg"],"suffixes":[]},{"firstnames":["Sebastian"],"propositions":[],"lastnames":["Schrittwieser"],"suffixes":[]},{"firstnames":["Edgar","R."],"propositions":[],"lastnames":["Weippl"],"suffixes":[]}],"title":"Genie in a Model? Why Model Driven Security will not secure your Web Application","journal":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.","volume":"5","number":"3","pages":"44–62","year":"2014","url":"https://doi.org/10.22667/JOWUA.2014.09.31.044","doi":"10.22667/JOWUA.2014.09.31.044","timestamp":"Sun, 17 May 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/jowua/HochreinerFMKSW14,\n author = {Christoph Hochreiner and\n Peter Fr{\\\"{u}}hwirt and\n Zhendong Ma and\n Peter Kieseberg and\n Sebastian Schrittwieser and\n Edgar R. Weippl},\n title = {Genie in a Model? Why Model Driven Security will not secure your Web\n Application},\n journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},\n volume = {5},\n number = {3},\n pages = {44--62},\n year = {2014},\n url = {https://doi.org/10.22667/JOWUA.2014.09.31.044},\n doi = {10.22667/JOWUA.2014.09.31.044},\n timestamp = {Sun, 17 May 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Hochreiner, C.","Frühwirt, P.","Ma, Z.","Kieseberg, P.","Schrittwieser, S.","Weippl, E. R."],"key":"DBLP:journals/jowua/HochreinerFMKSW14","id":"DBLP:journals/jowua/HochreinerFMKSW14","bibbaseid":"hochreiner-frhwirt-ma-kieseberg-schrittwieser-weippl-genieinamodelwhymodeldrivensecuritywillnotsecureyourwebapplication-2014","role":"author","urls":{"Paper":"https://doi.org/10.22667/JOWUA.2014.09.31.044"},"metadata":{"authorlinks":{}}},"search_terms":["genie","model","model","driven","security","secure","web","application","hochreiner","frühwirt","ma","kieseberg","schrittwieser","weippl"],"keywords":[],"authorIDs":["PbrP9YFAtA9NxijbL"],"dataSources":["A3zRESQ88WfwMCJn3"]}