Skip to main content Skip to main navigation

Publikationen

Seite 4 von 14.

  1. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    On the Automated Correction of Security Protocols Susceptible to a Replay Attack

    In: J. Biskup (Hrsg.). Proceedings of the 12th European Symposium On Research In Computer Security. European Symposium on Computer Security (ESORICS-07), September 24 - August 26, Dresden, Germany, Lectures Notes in Computer Science (LNCS), Springer-Verlag, 2007.

  2. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging. Workshop on Verification and Debugging (V&D-2006), located at Associated with CAV 2006, August 21, Seattle, WA, USA, Pages 117-130, Vol. 174, No. 4, Electronic Notes in Theoretical Computer Science, 2007.

  3. Formal Security Policies for the Web

    In: S. Rajendram (Hrsg.). Proceedings of the 1st International Conference on Information Security and Computer Forensic. International Conference on Information Security and Computer Forensic (ISCF-2006), Chennai, India, Pages 259-268, Allied Publisher Pvt. Ltd. 12/2006.

  4. Fernando Godínez; Dieter Hutter; Raul Monroy

    On the Use of Word Networks to Mimicry Attack Detection

    In: Günter Müller (Hrsg.). Proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS-2006. International Conference on Emerging Trends in Information and Communication Security (ETRICS), Springer-Verlag, LNCS, 2006.

  5. Dieter Hutter; Melanie Volkamer

    Information Flow Control to Secure Dynamic Web Service Composition.

    In: Proceedings of the 3rd International Conference on Security in Pervasive Computing, SPC-2006. International Conference on Security in Pervasive Computing (SPC), York, Springer-Verlag, LNCS 3934, 2006.

  6. Dieter Hutter; Melanie Volkamer; Matthias Klusch; Andreas Gerber

    Provably Secure Execution of Composed Semantic Web Services

    In: Proccedings of the 1st International Workshop on Privacy and Security in Agent-based Collaborative Environments. International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE-2006), Privacy Considerations for Deployed Multi-Agent Systems, located at AAMAS 2006, May 9, Hakodate, Japan, AAMAS 2006, 2006.

  7. Dieter Hutter; Matthias Klusch; Melanie Volkamer

    Information Flow Analysis Based Security Checking of Health Service Composition Plans

    In: Proccedings of the 1st European Conference on eHealth (ECEH06). European Conference on eHealth (ECEH), Fribourg, Lecture Notes in Informatics, Gesellschaft für Informatik, 2006.

  8. Possibilistic Information Flow Control in MAKS and Action Refinement

    In: Günter Müller (Hrsg.). Proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS-2006. International Conference on Emerging Trends in Information and Communication Security (ETRICS), Springer-Verlag, LNCS, 2006.

  9. Dieter Hutter; Melanie Volkamer

    Information Flow Control for Distributed Usage Control

    In: Proceedings of the 4th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods. International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, Leeds, AXMEDIS conference proceedings, 2006.

  10. Juan Lopez-Pimentel; Raul Monroy; Dieter Hutter

    A method for patching interleaving-replay attacks in faulty security protocols

    In: R. Bloem (Hrsg.). Proceedings of First Workshop on Verification and Debugging at FloC2006. Federated Logic Conference (FloC), Electronic Notes in Theoretical Computer Science, 2006.