Author of the publication

A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes.

, , , and . STM, volume 6710 of Lecture Notes in Computer Science, page 68-83. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Security Analysis of Electronic Software Distribution Systems., , , and . SAFECOMP, volume 5219 of Lecture Notes in Computer Science, page 415-428. Springer, (2008)Zweckbindung in ämterübergreifenden Verwaltungsworkflows - Zugriffsschutz durch feingranulare Verschlüsselung auf XML-Basis., , and . Datenschutz und Datensicherheit, 31 (11): 810-815 (2007)Die datenschutz- und sicherheitskonforme Ausgestaltung von Location Based Services am Beispiel eines mobilen Touristenführers., , , and . MMS, volume P-104 of LNI, page 85-96. GI, (2007)System-specific risk rating of software vulnerabilities in industrial automation & control systems., , , and . ISSRE Workshops, page 327-332. IEEE, (2021)A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443., , , and . ISSRE Workshops, page 42-47. IEEE Computer Society, (2018)Pattern-based modeling of cyber-physical systems for analyzing security., , , , and . EuroPLoP, page 23:1-23:10. ACM, (2019)Choreographing Security and Performance Analysis for Web Services., , , and . EPEW/WS-FM, volume 3670 of Lecture Notes in Computer Science, page 200-214. Springer, (2005)A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes., , , and . STM, volume 6710 of Lecture Notes in Computer Science, page 68-83. Springer, (2010)Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures., , and . IJCAR, volume 3097 of Lecture Notes in Computer Science, page 137-151. Springer, (2004)The Common Fragment of CTL and LTL.. FOCS, page 643-652. IEEE Computer Society, (2000)