Skip to main content Skip to main navigation


Seite 3 von 14.

  1. Thomas Bauereiß; Stefan Gohmann; Dieter Hutter; Alexander Kläser

    Selective LDAP Multi-Master Replication

    In: Proceedings Open Identity Summit 2013. Open Identity Summit (OID-2013), September 9-11, Kloster Banz, Germany, Lecture Notes in Informatics (LNI), …

  2. Serge Autexier; Dominik Dietrich; Dieter Hutter; Christoph Lüth; Christian Maeder

    SmartTies - Management of Safety-Critical Developments

    In: Margaria Tiziana; Bernhard Steffen (Hrsg.). Proc. 5th International Symposium On Leveraging Applications of Formal Methods, Verification and …

  3. Alan Bundy; Dieter Hutter; Cliff B. Jones; J Strother Moore

    AI meets Formal Software Development (Dagstuhl Seminar 12271)

    In: Dagstuhl Reports, Vol. 2, No. 7, Pages 1-29, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 7/2012.

  4. Structure Formation to Modularize Ontologies

    In: Thomas Schneider; Dirk Walther (Hrsg.). Proceedings of the 6th International Workshop on Modular Ontologies. International Workshop on Modular …

  5. Achim Brucker; Dieter Hutter

    Information Flow in Disaster Management Systems

    In: M. Takizawa; A M. Tjoa (Hrsg.). Proceedings of the 5th International Conference on Availability, Reliability and Security 2010. International …

  6. Semantic Management of Heterogeneous Documents

    In: Proceedings of the Mexican International Conference on Artificial Intelligence. Mexican International Conference on Artificial Intelligence …

  7. Dieter Hutter; Raul Monroy

    On the Automated Correction of Protocols with Improper Message Encoding

    In: Luca Vigano; Pierpaolo Degano (Hrsg.). Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the …

  8. Dieter Hutter; Heiko Mantel; Ina Schäfer; Axel Schairer

    Security of Multi-Agent Systems: A Case Study on Comparison Shopping

    In: Journal of Applied Logic, Vol. 5, No. 2, Pages 303-332, Elsevier B.V. 6/2007.

  9. Preserving Privacy in the Web by Using Information Flow Control

    In: Rafael Accorsi; Michael Kreutzer; Andreas Schmidt (Hrsg.). Long-Term and Dynamical Aspects of Information Security. ISBN 978-1600219122, Nova …

  10. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security …