Günter Karjoth - Academia.edu (original) (raw)

Papers by Günter Karjoth

Research paper thumbnail of An interactive system for the analysis of communicating processes

Research paper thumbnail of A Compilation of Algebraic Processes Based on Extended-Action Derivation

Formal Techniques for (Networked and) Distributed Systems, Nov 5, 1990

Research paper thumbnail of Dynamic Enforcement of Abstract Separation of Duty Constraints

Lecture Notes in Computer Science, 2009

Research paper thumbnail of Obstruction-free authorization enforcement: Aligning security and business objectives

Journal of Computer Security, Jul 11, 2014

Research paper thumbnail of A Behavioural Description Language for the Formal Treatment of Protocols in Distributed Systems

Research paper thumbnail of Proceedings of the 2nd ACM workshop on Quality of protection

Computer and Communications Security, Oct 30, 2006

Research paper thumbnail of Computer security - ESORICS 2002 : 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002 : proceedings

Springer eBooks, 2002

Computational Probabilistic Non-interference.- Bit-Slice Auction Circuit.- Confidentiality Polici... more Computational Probabilistic Non-interference.- Bit-Slice Auction Circuit.- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.- Cardinality-Based Inference Control in Sum-Only Data Cubes.- Outbound Authentication for Programmable Secure Coprocessors.- Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense.- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations.- Authentication for Distributed Web Caches.- Analysing a Stream Authentication Protocol Using Model Checking.- Equal To The Task?.- TINMAN: A Resource Bound Security Checking System for Mobile Code.- Confidentiality-Preserving Refinement is Compositional - Sometimes.- Formal Security Analysis with Interacting State Machines.- Decidability of Safety in Graph-Based Models for Access Control.- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.- Learning Fingerprints for a Database Intrusion Detection System.

Research paper thumbnail of Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006

Computer and Communications Security, 2006

Research paper thumbnail of Proceedings of the 7th European Symposium on Research in Computer Security

Research paper thumbnail of The Authorization Model of Tivoli Policy Director

Research paper thumbnail of Das "pers"onliche" Internet, journal = digma textendash Zeitschrift f"ur Datenrecht und Information

Research paper thumbnail of Soziale Netzwerke als Risiko f"ur Unternehmen, journal = digma Zeitschrift f"ur Datenrecht und Info

Research paper thumbnail of Einwilligung und ihre technische Umsetzung

Research paper thumbnail of International Journal of Distributed Sensor Networks

International Journal of Distributed Sensor Networks, 2008

Research paper thumbnail of Unternehmensweites Datenschutzmanagement

Research paper thumbnail of Routing on longest-matching prefixes (vol 4, pg 86, 1996)

Research paper thumbnail of Access control in data processing system

Research paper thumbnail of Task Assignment in a Workflow System

Research paper thumbnail of Agents Mobiles et les Cauchemars des OpÉrateurs de TÉlÉcommunication

Research paper thumbnail of Implementing process algebra specifications by state machines