Ver­öf­fent­li­chun­gen

A Se­cu­ri­ty Mo­de­ling Ap­proach for Web-Ser­vice-ba­sed Busi­ness Pro­ces­ses

2009 - Meiko Jen­sen, Sven Feja

Pro­cee­dings of the 7th IEEE Work­shop on Mo­del-Ba­sed De­ve­lop­ment for Com­pu­ter-Ba­sed Sys­tems (MBD 2009), held as part of the 16th An­nual IEEE In­ter­na­tio­nal Con­fe­rence and Work­shop on the En­gi­nee­ring of Com­pu­ter Based Sys­tems (ECBS 2009), San Fran­cis­co, USA

Ana­ly­sis of Si­gna­tu­re Wrap­ping At­tacks and Coun­ter­me­a­su­res

2009 - Jörg Schwenk, Se­bas­ti­an Gajek, Lijun Liao, Meiko Jen­sen,

Pro­cee­dings of the 7th IEEE In­ter­na­tio­nal Con­fe­rence on Web Ser­vices (ICWS), Los An­ge­les, USA, 2009.

Dy­na­mic Thres­hold Crypto­sys­tem wi­thout Group Ma­na­ger

2009 - An­dre­as Noack, M.​Sc. Ste­fan Spitz

In­ter­na­tio­nal Jour­nal of Net­work Pro­to­cols and Al­go­rith­ms (ISSN: 1943-3581) [Jour­nal]

Ef­fi­ci­ent Au­then­ti­ca­ted Wire­less Roa­ming via Tun­nels

2009 - An­dre­as Noack,

Third In­ter­na­tio­nal Work­shop on Ad­van­ced Ar­chi­tec­tu­res and Al­go­rith­ms for In­ter­net DE­li­very and Ap­p­li­ca­ti­ons, Las Pal­mas de Gran Ca­na­ria, Spain; 25 No­vem­ber 2009

Ef­fi­ci­ent Au­then­ti­ca­ted Wire­less Roa­ming via Tun­nels

2009 - An­dre­as Noack,

Tech­ni­cal Re­port. Full paper with se­cu­ri­ty proof. [PDF]

Ex­ten­ding the Si­mi­la­ri­ty-Ba­sed XML Mul­ti­cast Ap­proach with Di­gi­tal Si­gna­tu­res

2009 - Jörg Schwenk, Meiko Jen­sen, An­to­nia Az­zi­ni, Ste­fa­nia Mar­ra­ra

Pro­cee­dings of the ACM Work­shop on Se­cu­re Web Ser­vices (SWS), Chi­ca­go, Il­li­nois, U.S.A.

Ge­ne­ra­ting WS-Se­cu­ri­ty­Po­li­cy Do­cu­ments via Se­cu­ri­ty Model Trans­for­ma­ti­on

2009 - Meiko Jen­sen,

Pro­cee­dings of the Young Re­se­ar­chers Work­shop on Mo­de­ling and Ma­nage­ment of Busi­ness Pro­ces­ses (YRW-MBP 2009), held as part of SABRE 2009, Leip­zig, Ger­ma­ny

Group Key Agree­ment for Wire­less Mesh Net­works

2009 - Jörg Schwenk, An­dre­as Noack,

The 5th LCN Work­shop on Se­cu­ri­ty in Com­mu­ni­ca­ti­ons Net­works (SICK 2009) Zü­rich, Swit­z­er­land; 20-23 Oc­to­ber 2009

On Tech­ni­cal Se­cu­ri­ty Is­su­es in Cloud Com­pu­ting

2009 - Jörg Schwenk, Meiko Jen­sen, Nils Grusch­ka, Luigi Lo Ia­co­no

Pro­cee­dings of the IEEE In­ter­na­tio­nal Con­fe­rence on Cloud Com­pu­ting (CLOUD-II 2009), Ban­ga­lo­re, India
Seite: