Author of the publication

Verifying Security Policies Using Host Attributes.

, , , , , and . FORTE, volume 8461 of Lecture Notes in Computer Science, page 133-148. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CoSIP - a hybrid architecture for reliable and secure SIP services., , , and . Praxis der Informationsverarbeitung und Kommunikation, 30 (4): 206-212 (2007)Verifying Security Policies Using Host Attributes., , , , , and . FORTE, volume 8461 of Lecture Notes in Computer Science, page 133-148. Springer, (2014)Autonomous and robust components for security in network domains.. Technical University Munich, (2013)Verifying Security Policies using Host Attributes., , , , , and . CoRR, (2016)Trustworthy Configuration Management for Networked Devices using Distributed Ledgers., , , and . CoRR, (2018)Collaborative Incident Handling Based on the Blackboard-Pattern., , and . WISCS@CCS, page 25-34. ACM, (2016)Privacy Preserving Energy Management., , , , , and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 35-42. Springer, (2014)Enabling sustainable smart neighborhoods., , , and . SustainIT, page 1-6. IEEE, (2013)Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services., , , , and . ARES, page 317-324. IEEE Computer Society, (2014)On Using TPM for Secure Identities in Future Home Networks., , , , and . Future Internet, 3 (1): 1-13 (2011)