Publikationsliste
2025
Buchaufsätze
Free Facts: An Alternative to Inefficient Axioms in Dafny
Bordis, T.; Leino, K. R. M.
2025. Formal Methods : 26th International Symposium, FM 2024, Milan, Italy, September 9–13, 2024, Proceedings, Part I. Ed.: A. Platzer, K.Y Rozier, M. Pradella, M. Rossi, 151 – 169, Springer Nature Switzerland. doi:10.1007/978-3-031-71162-6_8
Bordis, T.; Leino, K. R. M.
2025. Formal Methods : 26th International Symposium, FM 2024, Milan, Italy, September 9–13, 2024, Proceedings, Part I. Ed.: A. Platzer, K.Y Rozier, M. Pradella, M. Rossi, 151 – 169, Springer Nature Switzerland. doi:10.1007/978-3-031-71162-6_8
Proceedingsbeiträge
Formal Foundations of Consistency in Model-Driven Development
Pascual, R.; Beckert, B.; Ulbrich, M.; Kirsten, M.; Pfeifer, W.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification : 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part III. Ed.: T. Margaria, 178–200, Springer Nature Switzerland. doi:10.1007/978-3-031-75380-0_11
Pascual, R.; Beckert, B.; Ulbrich, M.; Kirsten, M.; Pfeifer, W.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Specification and Verification : 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part III. Ed.: T. Margaria, 178–200, Springer Nature Switzerland. doi:10.1007/978-3-031-75380-0_11
The VerifyThis Collaborative Long-Term Challenge Series
Ahrendt, W.; Ernst, G.; Herber, P.; Huisman, M.; Monti, R. E.; Ulbrich, M.; Weigl, A.
2025. TOOLympics Challenge 2023 – Updates, Results, Successes of the Formal-Methods Competitions. Ed.: D. Beyer, 160–170, Springer Nature Switzerland. doi:10.1007/978-3-031-67695-6_6
Ahrendt, W.; Ernst, G.; Herber, P.; Huisman, M.; Monti, R. E.; Ulbrich, M.; Weigl, A.
2025. TOOLympics Challenge 2023 – Updates, Results, Successes of the Formal-Methods Competitions. Ed.: D. Beyer, 160–170, Springer Nature Switzerland. doi:10.1007/978-3-031-67695-6_6
Towards AI-Assisted Correctness-by-Construction Software Development
Kodetzki, M.; Bordis, T.; Kirsten, M.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 222–241, Springer Nature Switzerland. doi:10.1007/978-3-031-75387-9_14
Kodetzki, M.; Bordis, T.; Kirsten, M.; Schaefer, I.
2025. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies – 12th International Symposium, ISoLA 2024, Crete, Greece, October 27–31, 2024, Proceedings, Part IV. Ed.: T. Margaria, 222–241, Springer Nature Switzerland. doi:10.1007/978-3-031-75387-9_14
The Java Verification Tool KeY: A Tutorial
Beckert, B.; Bubel, R.; Drodt, D.; Hähnle, R.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.; Weigl, A.
2025. Formal Methods : 26th International Symposium, FM 2024, Milan, Italy, September 9–13, 2024, Proceedings, Part II, 597 – 623, Springer Nature Switzerland. doi:10.1007/978-3-031-71177-0_32
Beckert, B.; Bubel, R.; Drodt, D.; Hähnle, R.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.; Weigl, A.
2025. Formal Methods : 26th International Symposium, FM 2024, Milan, Italy, September 9–13, 2024, Proceedings, Part II, 597 – 623, Springer Nature Switzerland. doi:10.1007/978-3-031-71177-0_32
Model-Based Testing of Quantum Computations
Lochau, M.; Schaefer, I.
2025. Tests and Proofs : 18th International Conference, TAP 2024, Milan, Italy, September 9–10, 2024, Proceedings, Ed.: M. Huisman, F. Howar, 127 – 147, Springer Nature Switzerland. doi:10.1007/978-3-031-72044-4_7
Lochau, M.; Schaefer, I.
2025. Tests and Proofs : 18th International Conference, TAP 2024, Milan, Italy, September 9–10, 2024, Proceedings, Ed.: M. Huisman, F. Howar, 127 – 147, Springer Nature Switzerland. doi:10.1007/978-3-031-72044-4_7
Zeitschriftenaufsätze
Retriever: A View-Based Approach to Reverse Engineering Software Architecture Models
Kirschner, Y. R.; Gstür, M.; Sağlam, T.; Weber, S.; Koziolek, A.
2025. Journal of Systems and Software, 220, Art.-Nr.: 112277. doi:10.1016/j.jss.2024.112277
Kirschner, Y. R.; Gstür, M.; Sağlam, T.; Weber, S.; Koziolek, A.
2025. Journal of Systems and Software, 220, Art.-Nr.: 112277. doi:10.1016/j.jss.2024.112277
Towards Precision-Aware Safe Neural-Controlled Cyber-Physical Systems
Thevendhriya, H.; Ghosh, S.; Lohar, D.
2025. IEEE embedded systems letters. doi:10.1109/LES.2024.3444004
Thevendhriya, H.; Ghosh, S.; Lohar, D.
2025. IEEE embedded systems letters. doi:10.1109/LES.2024.3444004
2024
Buchaufsätze
How Do Asynchronous Communication Models Impact the Composability of Information Flow Security?
Gerlach, L.; Gerking, C.
2024. Formal Aspects of Component Software – 20th International Conference, FACS 2024, Milan, Italy, September 9–10, 2024, Proceedings. Ed.: D. Marmsoler, 127 – 145, Springer Nature Switzerland. doi:10.1007/978-3-031-71261-6_8
Gerlach, L.; Gerking, C.
2024. Formal Aspects of Component Software – 20th International Conference, FACS 2024, Milan, Italy, September 9–10, 2024, Proceedings. Ed.: D. Marmsoler, 127 – 145, Springer Nature Switzerland. doi:10.1007/978-3-031-71261-6_8
Explainability Engineering Challenges: Connecting Explainability Levels to Run-Time Explainability
Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Explainable Artificial Intelligence – Second World Conference, xAI 2024, Valletta, Malta, July 17–19, 2024, Proceedings, Part IV. Ed.: L. Longo, 205 – 218, Springer Nature Switzerland. doi:10.1007/978-3-031-63803-9_11
Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Explainable Artificial Intelligence – Second World Conference, xAI 2024, Valletta, Malta, July 17–19, 2024, Proceedings, Part IV. Ed.: L. Longo, 205 – 218, Springer Nature Switzerland. doi:10.1007/978-3-031-63803-9_11
Panini — Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. Computer Security – ESORICS 2023 – 28th European Symposium on Research in Computer Security : The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II. Ed.: G. Tsudik, 193 – 211, Springer, Cham. doi:10.1007/978-3-031-51476-0_10
Coijanovic, C.; Weis, C.; Strufe, T.
2024. Computer Security – ESORICS 2023 – 28th European Symposium on Research in Computer Security : The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II. Ed.: G. Tsudik, 193 – 211, Springer, Cham. doi:10.1007/978-3-031-51476-0_10
On the Correlation Complexity of MPC with Cheater Identification
Brandt, N.; Maier, S.; Müller, T.; Müller-Quade, J.
2024. Financial Cryptography and Data Security – 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I. Ed.: F. Baldimtsi, 129 – 146, Springer Nature Switzerland. doi:10.1007/978-3-031-47754-6_8
Brandt, N.; Maier, S.; Müller, T.; Müller-Quade, J.
2024. Financial Cryptography and Data Security – 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I. Ed.: F. Baldimtsi, 129 – 146, Springer Nature Switzerland. doi:10.1007/978-3-031-47754-6_8
Scalable and Precise Refinement Types for Imperative Languages
Lanzinger, F.; Bachmeier, J.; Ulbrich, M.; Dietl, W.
2024. iFM 2023 – 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, 377–383, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_20
Lanzinger, F.; Bachmeier, J.; Ulbrich, M.; Dietl, W.
2024. iFM 2023 – 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, 377–383, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_20
Dissertationen
Frameworks and Protocols for Composable Multi-Party Computation. Dissertation
Mechler, J.
2024, September 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174597
Mechler, J.
2024, September 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174597
Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments. Dissertation
Wagner, P. G.
2024, Juli 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172286
Wagner, P. G.
2024, Juli 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172286
When Awareness Fades and There Is No Support, the Phisher Has an Easy Game. Dissertation
Berens, B. M.
2024, Juli 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172096
Berens, B. M.
2024, Juli 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172096
Context-based Access Control and Attack Modelling and Analysis. Dissertation
Walter, M.
2024. doi:10.5445/KSP/1000170265
Walter, M.
2024. doi:10.5445/KSP/1000170265
Aktives Dialogmanagement für eine natürlichsprachliche Benutzerschnittstelle. Dissertation
Wachtel, A.
2024, April 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000169813
Wachtel, A.
2024, April 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000169813
A Reference Structure for Modular Model-based Analyses. Dissertation
Koch, S. G.
2024. doi:10.5445/KSP/1000167848
Koch, S. G.
2024. doi:10.5445/KSP/1000167848
Context-based Access Control and Attack Modelling and Analysis. Dissertation
Walter, M.
2024, Januar 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166069
Walter, M.
2024, Januar 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166069
Masterarbeiten
Performance Modeling of Distributed Computing. Masterarbeit
Zhyla, V.
2024, Mai 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000175096
Zhyla, V.
2024, Mai 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000175096
Bridging the Gap: A Development Approach for Seamless Educator-Developer Collaboration in E-Learning. Masterarbeit
Augustin, D.
2024, August 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174446
Augustin, D.
2024, August 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174446
Preventing Refactoring Attacks on Software Plagiarism Detection through Graph-Based Structural Normalization. Masterarbeit
Maisch, R. M.
2024, Juni 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172813
Maisch, R. M.
2024, Juni 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172813
Elicitation and Classification of Security Requirements for EVerest. Masterarbeit
Marettek, D. M.
2024, Mai 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000171735
Marettek, D. M.
2024, Mai 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000171735
Modelling and Analysing Zero-Trust-Architectures Regarding Performance and Security. Masterarbeit
Cholakov, E.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000171583
Cholakov, E.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000171583
Bachelorarbeiten
Transferring proof obligations from program verification in KeY to Isabelle/HOL. Bachelorarbeit
Buchholz, N.
2024, Mai 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000176239
Buchholz, N.
2024, Mai 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000176239
Analyzing Scientific Workflow Management Systems. Bachelorarbeit
Scheerer, D.
2024, Mai 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000175483
Scheerer, D.
2024, Mai 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000175483
Analyzing Efficiency of High-Performance Applications. Bachelorarbeit
Vo, D. L.
2024, Mai 16. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000175183
Vo, D. L.
2024, Mai 16. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000175183
Implementing a System Generation Aware Unified Conceptual Model. Bachelorarbeit
Rak, L.
2024, Mai 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174678
Rak, L.
2024, Mai 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174678
Survey on Randomness Homomorphic Commitment Schemes. Bachelorarbeit
Wülker, S.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000173331
Wülker, S.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000173331
Camera-based Anomaly Detection with Generative World Models. Bachelorarbeit
Ollick, N.
2024, März 31. doi:10.5445/IR/1000170314
Ollick, N.
2024, März 31. doi:10.5445/IR/1000170314
Mensch-ausführbare Kryptographie. Bachelorarbeit
Dürr, C.
2024. Karlsruher Institut für Technologie (KIT)
Dürr, C.
2024. Karlsruher Institut für Technologie (KIT)
Studienarbeiten
Retrieval-Augmented Large Language Models. Studienarbeit
Tewes, S.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000170392
Tewes, S.
2024. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000170392
Proceedingsbeiträge
Towards Deep Reactions in Multi-Level, Multi-View Modeling
Weber, T.; Ojha, M.; Sadeghi, M.; König, L.; Armbruster, M.; Lange, A.; Burger, E.; Atkinson, C.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz Austria, 22nd - 27th September 2024, 760–769, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688208
Weber, T.; Ojha, M.; Sadeghi, M.; König, L.; Armbruster, M.; Lange, A.; Burger, E.; Atkinson, C.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz Austria, 22nd - 27th September 2024, 760–769, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688208
Towards Integrating Low-Code in View-based Development
Hermann, A.-K.; König, L.; Burger, E.; Reussner, R.
2024. MODELS Companion ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering. Ed.: M. Wimmer, 866–875, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688333
Hermann, A.-K.; König, L.; Burger, E.; Reussner, R.
2024. MODELS Companion ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering. Ed.: M. Wimmer, 866–875, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688333
SoK: Mechanisms Used in Practice for Verifiable Internet Voting
Moser, F.; Kirsten, M.; Dörre, F.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)
Moser, F.; Kirsten, M.; Dörre, F.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)
Managing Variability of Cyber-Physical Production Systems: Towards Consistency Management
Fadhlillah, H. S.; Greiner, S.; Feichtinger, K.; Rabiser, R.; Zoitl, A.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, September 22-27, 2024, at the JKU Linz., 945–949, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688216
Fadhlillah, H. S.; Greiner, S.; Feichtinger, K.; Rabiser, R.; Zoitl, A.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, September 22-27, 2024, at the JKU Linz., 945–949, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688216
Towards Formalizing and Relating Different Notions of Consistency in Cyber-Physical Systems Engineering
Feichtinger, K.; Kegel, K.; Pascual, R.; Aßmann, U.; Beckert, B.; Reussner, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz/Wien, 22nd - 27th September 2024, 915–919, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688565
Feichtinger, K.; Kegel, K.; Pascual, R.; Aßmann, U.; Beckert, B.; Reussner, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, Linz/Wien, 22nd - 27th September 2024, 915–919, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688565
A Delta-Oracle for Fast Model Merge Conflict Estimation using Sketch-Based Critical Pair Analysis
Kegel, K.; Domanowski, A.; Feichtinger, K.; Pascual, R.; Aßmann, U.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 22.-27.09.2024, Linz, 1046–1055, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688341
Kegel, K.; Domanowski, A.; Feichtinger, K.; Pascual, R.; Aßmann, U.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 22.-27.09.2024, Linz, 1046–1055, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688341
ARC³N: A Collaborative Uncertainty Catalog to Address the Awareness Problem of Model-Based Confidentiality Analysis
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 640–644, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688556
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 640–644, Association for Computing Machinery (ACM). doi:10.1145/3652620.3688556
LLM-based Control Code Generation using Image Recognition
Koziolek, H.; Koziolek, A.
2024. LLM4Code ’24: Proceedings of the 1st International Workshop on Large Language Models for Code (LLM4 Code), Lissabon, 20th April 2024, 38–45, Association for Computing Machinery (ACM). doi:10.1145/3643795.3648385
Koziolek, H.; Koziolek, A.
2024. LLM4Code ’24: Proceedings of the 1st International Workshop on Large Language Models for Code (LLM4 Code), Lissabon, 20th April 2024, 38–45, Association for Computing Machinery (ACM). doi:10.1145/3643795.3648385
Model Everything but with Intellectual Property Protection - The Deltachain Approach
Weber, T.; Weber, S.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 49–56, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674086
Weber, T.; Weber, S.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems, 49–56, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674086
Formally Verifying an Efficient Sorter
Beckert, B.; Sanders, P.; Ulbrich, M.; Wiesler, J.; Witt, S.
2024. Tools and Algorithms for the Construction and Analysis of Systems – 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6–11, 2024, Proceedings, Part I. Ed.: B. Finkbeiner, 268–287, Springer Nature Switzerland. doi:10.1007/978-3-031-57246-3_15
Beckert, B.; Sanders, P.; Ulbrich, M.; Wiesler, J.; Witt, S.
2024. Tools and Algorithms for the Construction and Analysis of Systems – 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6–11, 2024, Proceedings, Part I. Ed.: B. Finkbeiner, 268–287, Springer Nature Switzerland. doi:10.1007/978-3-031-57246-3_15
Bounding Rounding Errors in the Simulation of Quantum Circuits
Klamroth, J.; Beckert, B.
2024. 2024 IEEE International Conference on Quantum Software (QSW), 99–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/QSW62656.2024.00024
Klamroth, J.; Beckert, B.
2024. 2024 IEEE International Conference on Quantum Software (QSW), 99–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/QSW62656.2024.00024
On Rounding Errors in the Simulation of Quantum Circuits
Klamroth, J.; Beckert, B.
2024. Service-Oriented Computing – ICSOC 2023 Workshops – AI-PA, ASOCA, SAPD, SQS, SSCOPE, WESOACS and Satellite Events, Rome, Italy, November 28-December 1, 2023, Revised Selected Papers. Ed.: F. Monti, 137–149, Springer Nature Singapore. doi:10.1007/978-981-97-0989-2_11
Klamroth, J.; Beckert, B.
2024. Service-Oriented Computing – ICSOC 2023 Workshops – AI-PA, ASOCA, SAPD, SQS, SSCOPE, WESOACS and Satellite Events, Rome, Italy, November 28-December 1, 2023, Revised Selected Papers. Ed.: F. Monti, 137–149, Springer Nature Singapore. doi:10.1007/978-981-97-0989-2_11
Usability and Understanding of Individual Verifiability in the 2023 GI-Election
Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik e.V. doi:10.18420/muc2024-mci-ws17-151
Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik e.V. doi:10.18420/muc2024-mci-ws17-151
Recommendations for Implementing Independent Individual Verifiability in Internet Voting
Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)
Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)
Towards Combining the Cognitive Abilities of Large Language Models with the Rigor of Deductive Progam Verification
Beckert, B.; Klamroth, J.; Pfeifer, W.; Röper, P.; Teuber, S.
2024. Proceedings of the 12th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA’24), Crete, Greece, 27th-31st October 2024, Springer
Beckert, B.; Klamroth, J.; Pfeifer, W.; Röper, P.; Teuber, S.
2024. Proceedings of the 12th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA’24), Crete, Greece, 27th-31st October 2024, Springer
Provably Safe Neural Network Controllers via Differential Dynamic Logic
Teuber, S.; Mitsch, S.; Platzer, A.
2024. Advances in Neural Information Processing Systems
Teuber, S.; Mitsch, S.; Platzer, A.
2024. Advances in Neural Information Processing Systems
Consistency in Cross-Generational Engineering of Cyber-Physical Systems
Albers, A.; Schaefer, I.; Gesmann, L.; Ochs, P.; Fischer, M.; Pett, T.; Schwarz, S. E.
2024. DS 133: Proceedings of the 35th Symposium Design for X (DFX2024). Ed.: D. Krause, 085–094, The Design Society. doi:10.35199/dfx2024.09
Albers, A.; Schaefer, I.; Gesmann, L.; Ochs, P.; Fischer, M.; Pett, T.; Schwarz, S. E.
2024. DS 133: Proceedings of the 35th Symposium Design for X (DFX2024). Ed.: D. Krause, 085–094, The Design Society. doi:10.35199/dfx2024.09
ReP2P Matrix: Decentralized Relays to Improve Reliability and Performance of Peer-to-Peer Matrix
Schichtholz, B. D.; Bless, R.; Jacob, F.; Hartenstein, H.; Zitterbart, M.
2024. Proceedings of the ACM Conext-2024 Workshop on the Decentralization of the Internet (DIN ’24), Los Angeles, CA, USA, December 9–12, 2024, Association for Computing Machinery (ACM). doi:10.1145/3694809.3700741
Schichtholz, B. D.; Bless, R.; Jacob, F.; Hartenstein, H.; Zitterbart, M.
2024. Proceedings of the ACM Conext-2024 Workshop on the Decentralization of the Internet (DIN ’24), Los Angeles, CA, USA, December 9–12, 2024, Association for Computing Machinery (ACM). doi:10.1145/3694809.3700741
The Influence of Granularity of Transactions on Performance in Vitruvius
Weber, T.; Jutz, B.; Zacouris, Z.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)
Weber, T.; Jutz, B.; Zacouris, Z.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)
Scalability of Consistency Preservation with Vitruvius
Jutz, B.; Weber, T.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)
Jutz, B.; Weber, T.
2024. Softwaretechnik-Trends, Gesellschaft für Informatik (GI)
Semantics Enhancing Model Transformation for Automated Constraint Validation of Palladio Software Architecture to MontiArc Models
Weber, S.; Henß, J.; Taghavi, B.; Weber, T.; Stüber, S.; Marin, A.; Rumpe, B.; Heinrich, R.
2024. Software Architecture. ECSA 2024 Tracks and Workshops – Luxembourg City, Luxembourg, September 3–6, 2024, Proceedings. Ed.: A. Ampatzoglou, J. Pérez, B. Buhnova, V. Lenarduzzi, C. C. Venters, U. Zdun, K. Drira, L. Rebelo, D. Di Pompeo, M. Tucci, E. Y. Nakagawa, E. Navarro, 30 – 38, Springer Nature Switzerland. doi:10.1007/978-3-031-71246-3_4
Weber, S.; Henß, J.; Taghavi, B.; Weber, T.; Stüber, S.; Marin, A.; Rumpe, B.; Heinrich, R.
2024. Software Architecture. ECSA 2024 Tracks and Workshops – Luxembourg City, Luxembourg, September 3–6, 2024, Proceedings. Ed.: A. Ampatzoglou, J. Pérez, B. Buhnova, V. Lenarduzzi, C. C. Venters, U. Zdun, K. Drira, L. Rebelo, D. Di Pompeo, M. Tucci, E. Y. Nakagawa, E. Navarro, 30 – 38, Springer Nature Switzerland. doi:10.1007/978-3-031-71246-3_4
Automated Reverse Engineering for MoM-Based Microservices (ARE4MOM) Using Static Analysis
Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture (ICSA), Hyderabad, 4th-8th June 2024, 12–22, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA59870.2024.00010
Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture (ICSA), Hyderabad, 4th-8th June 2024, 12–22, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA59870.2024.00010
Evaluating Drill-Down DDoS Destination Detection
Krack, T.; Kopmann, S.; Zitterbart, M.
2024. 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 08-10 October 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN60385.2024.10639629
Krack, T.; Kopmann, S.; Zitterbart, M.
2024. 2024 IEEE 49th Conference on Local Computer Networks (LCN), Normandy, France, 08-10 October 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN60385.2024.10639629
Modeling Languages for Automotive Digital Twins : A Survey Among the German Automotive Industry
Pfeiffer, J.; Fuchß, D.; Kühn, T.; Liebhart, R.; Neumann, D.; Neimöck, C.; Seiler, C.; Koziolek, A.; Wortmann, A.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. Ed.: A. Egyed, 92–103, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674100
Pfeiffer, J.; Fuchß, D.; Kühn, T.; Liebhart, R.; Neumann, D.; Neimöck, C.; Seiler, C.; Koziolek, A.; Wortmann, A.
2024. MODELS ’24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems. Ed.: A. Egyed, 92–103, Association for Computing Machinery (ACM). doi:10.1145/3640310.3674100
Inconsistencies in Production Workflows and How to Model Them
Kuder, N. D.; Weber, T.; Schneider, J.; Weber, S.; Völk, T. A.; Albers, A.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 84 – 86, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00021
Kuder, N. D.; Weber, T.; Schneider, J.; Weber, S.; Völk, T. A.; Albers, A.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 84 – 86, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00021
MoCoRe - A Generic Model-Driven Composition and Rule-Based Refinement Framework
Gstür, M.; Kirschner, Y. R.; Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 273 – 280, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00039
Gstür, M.; Kirschner, Y. R.; Singh, S.; Koziolek, A.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th - 8th June 2024, 273 – 280, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00039
Towards a Single Source of Truth with a Freely Shareable Deltachain
Weber, T.; Weber, S.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th -8th June 2024, 92 – 94, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00023
Weber, T.; Weber, S.
2024. 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, 4th -8th June 2024, 92 – 94, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C63560.2024.00023
Supporting value-aware software engineering through traceability and value tactics
Wohlrab, R.; Herrmann, M.; Lazik, C.; Wyrich, M.; Nunes, I.; Schneider, K.; Gren, L.; Heinrich, R.
2024. International Conference on Product-Focused Software Process Improvement (PROFES), Springer
Wohlrab, R.; Herrmann, M.; Lazik, C.; Wyrich, M.; Nunes, I.; Schneider, K.; Gren, L.; Heinrich, R.
2024. International Conference on Product-Focused Software Process Improvement (PROFES), Springer
Context aware Security Patterns
Taspolatoglu, E.; Heinrich, R.
2024. International Conference on System Reliability and Safety, Paper ID: S11059, Institute of Electrical and Electronics Engineers (IEEE)
Taspolatoglu, E.; Heinrich, R.
2024. International Conference on System Reliability and Safety, Paper ID: S11059, Institute of Electrical and Electronics Engineers (IEEE)
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners
Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM). doi:10.1145/3664476.3664499
Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM). doi:10.1145/3664476.3664499
Short Paper: Unpredictable Transaction Arrangement for MEV Mitigation in Ethereum
Droll, J.; Stengele, O.; Hartenstein, H.
2024. 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 625–629, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC59979.2024.10634470
Droll, J.; Stengele, O.; Hartenstein, H.
2024. 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 625–629, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC59979.2024.10634470
Variability modeling of products, processes, and resources in cyber-physical production systems engineering
Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. SPLC ’24 : 28th ACM International Systems and Software Product Line Conference. Volume B. Ed.: M. Cordy, 219, Association for Computing Machinery (ACM). doi:10.1145/3646548.3676547
Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. SPLC ’24 : 28th ACM International Systems and Software Product Line Conference. Volume B. Ed.: M. Cordy, 219, Association for Computing Machinery (ACM). doi:10.1145/3646548.3676547
Seventh International Workshop on Languages for Modelling Variability (MODEVAR@SPLC 2024)
Feichtinger, K.; Galasso-Carbonnel, J.
2024. SPLC ’24 : Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 224, Association for Computing Machinery (ACM). doi:10.1145/3646548.3677006
Feichtinger, K.; Galasso-Carbonnel, J.
2024. SPLC ’24 : Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 224, Association for Computing Machinery (ACM). doi:10.1145/3646548.3677006
CESAR: Control Envelope Synthesis via Angelic Refinements
Kabra, A.; Laurent, J.; Mitsch, S.; Platzer, A.
2024. Tools and Algorithms for the Construction and Analysis of Systems. Proceedings., Part 1. Ed.: B. Finkbeiner, 144–164, Springer Nature Switzerland. doi:10.1007/978-3-031-57246-3_9
Kabra, A.; Laurent, J.; Mitsch, S.; Platzer, A.
2024. Tools and Algorithms for the Construction and Analysis of Systems. Proceedings., Part 1. Ed.: B. Finkbeiner, 144–164, Springer Nature Switzerland. doi:10.1007/978-3-031-57246-3_9
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17
Consistency Management for Security Annotations for Continuous Verification
Reiche, F.; Weber, T.; Becker, S.; Weber, S.; Heinrich, R.; Burger, E.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)
Reiche, F.; Weber, T.; Becker, S.; Weber, S.; Heinrich, R.; Burger, E.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)
A Collaborative Uncertainty Collection to Address the Awareness Problem of Model-Based Confidentiality Analysis
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)
Hahner, S.; Niehues, N.; Boltz, N.; Fuksa, M.; Heinrich, R.
2024. ACM / IEEE 27th International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)
MulTi-Wise Sampling: Trading Uniform T-Wise Feature Interaction Coverage for Smaller Samples
Pett, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2024. SPLC ’24: Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 47–53, Association for Computing Machinery (ACM). doi:10.1145/3646548.3672589
Pett, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2024. SPLC ’24: Proceedings of the 28th ACM International Systems and Software Product Line Conference - Volume B. Ed.: M. Cordy, 47–53, Association for Computing Machinery (ACM). doi:10.1145/3646548.3672589
Quantum Solution for Configuration Selection and Prioritization
Ammermann, J.; Brenneisen, F. J.; Bittner, T.; Schaefer, I.
2024. Proceedings of the 5th ACM/IEEE International Workshop on Quantum Software Engineering, 21–28, Association for Computing Machinery (ACM). doi:10.1145/3643667.3648221
Ammermann, J.; Brenneisen, F. J.; Bittner, T.; Schaefer, I.
2024. Proceedings of the 5th ACM/IEEE International Workshop on Quantum Software Engineering, 21–28, Association for Computing Machinery (ACM). doi:10.1145/3643667.3648221
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9
An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security
Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium : Istanbul, Turkey, September 18–22, 2023, Revised Selected Papers. Ed.: B. Tekinerdoğan, 342–358, Springer. doi:10.1007/978-3-031-66326-0_21
Boltz, N.; Hahner, S.; Gerking, C.; Heinrich, R.
2024. Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium : Istanbul, Turkey, September 18–22, 2023, Revised Selected Papers. Ed.: B. Tekinerdoğan, 342–358, Springer. doi:10.1007/978-3-031-66326-0_21
Uniform Substitution for Differential Refinement Logic
Prebet, E.; Platzer, A.
2024. Automated Reasoning. IJCAR 2024. Part 2. Ed.: C. Benzmüller, 196–215, Springer Nature Switzerland. doi:10.1007/978-3-031-63501-4_11
Prebet, E.; Platzer, A.
2024. Automated Reasoning. IJCAR 2024. Part 2. Ed.: C. Benzmüller, 196–215, Springer Nature Switzerland. doi:10.1007/978-3-031-63501-4_11
Complete Game Logic with Sabotage
Abou El Wafa, N.; Platzer, A.
2024. Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 1–15, Association for Computing Machinery (ACM). doi:10.1145/3661814.3662121
Abou El Wafa, N.; Platzer, A.
2024. Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 1–15, Association for Computing Machinery (ACM). doi:10.1145/3661814.3662121
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree
Dai, T.; Jiang, Y.; Li, Y.; Mei, F.
2024. 2024 IEEE Security and Privacy Workshops (SPW), 95 – 103, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SPW63631.2024.00015
Dai, T.; Jiang, Y.; Li, Y.; Mei, F.
2024. 2024 IEEE Security and Privacy Workshops (SPW), 95 – 103, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SPW63631.2024.00015
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing
Jiang, Y.; Mei, F.; Dai, T.; Li, Y.
2024. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 274 – 288, Association for Computing Machinery (ACM). doi:10.1145/3634737.3657024
Jiang, Y.; Mei, F.; Dai, T.; Li, Y.
2024. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 274 – 288, Association for Computing Machinery (ACM). doi:10.1145/3634737.3657024
Who Controls Your Power Grid? On the Impact of Misdirected Distributed Energy Resources on Grid Stability
Goerke, N.; Märtz, A.; Baumgart, I.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 46–54, Association for Computing Machinery (ACM). doi:10.1145/3632775.3661943
Goerke, N.; Märtz, A.; Baumgart, I.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 46–54, Association for Computing Machinery (ACM). doi:10.1145/3632775.3661943
Identification of Inconsistencies in Agile CPS Engineering with Formula Student
Albers, A.; Koziolek, A.; Völk, T. A.; Klippert, M.; Pfaff, F.; Stolpmann, R.; Schwarz, S. E.
2024. Proceedings of The XXXV ISPIM Innovation Conference
Albers, A.; Koziolek, A.; Völk, T. A.; Klippert, M.; Pfaff, F.; Stolpmann, R.; Schwarz, S. E.
2024. Proceedings of The XXXV ISPIM Innovation Conference
DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2024. Proceedings of the 19th International Conference on Availability, Reliability and Security, Art.-Nr.: 159, Association for Computing Machinery (ACM). doi:10.1145/3664476.3670442
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2024. Proceedings of the 19th International Conference on Availability, Reliability and Security, Art.-Nr.: 159, Association for Computing Machinery (ACM). doi:10.1145/3664476.3670442
Meaningful Highlighting - Improving Educational IDEs to Enhance Code Comprehension for Programming Novices
Vielsack, A.
2024. ITiCSE 2024: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 2, Mailand, 08th-10th July 2024, 846 – 847, Association for Computing Machinery (ACM). doi:10.1145/3649405.3659480
Vielsack, A.
2024. ITiCSE 2024: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 2, Mailand, 08th-10th July 2024, 846 – 847, Association for Computing Machinery (ACM). doi:10.1145/3649405.3659480
First Steps Towards Game and Activity Inference on Encrypted VR Datastreams
Yang, Y.; Hanisch, S.; Ma, M.; Roos, S.; Strufe, T.; Nguyen, G. T.
2024. 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Perth, 4th-7th June 2024, 105 – 110, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WoWMoM60985.2024.00030
Yang, Y.; Hanisch, S.; Ma, M.; Roos, S.; Strufe, T.; Nguyen, G. T.
2024. 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Perth, 4th-7th June 2024, 105 – 110, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WoWMoM60985.2024.00030
Software Resource Disaggregation for HPC with Serverless Computing
Copik, M.; Chrapek, M.; Schmid, L.; Calotoiu, A.; Hoefler, T.
2024. 2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS), San Francisco, 27th-31st May 2024, 139 – 156, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IPDPS57955.2024.00021
Copik, M.; Chrapek, M.; Schmid, L.; Calotoiu, A.; Hoefler, T.
2024. 2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS), San Francisco, 27th-31st May 2024, 139 – 156, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IPDPS57955.2024.00021
Semantics Enhancing Model Transformation for Automated Constraint Validation of Palladio Software Architecture to MontiArc Models
Weber, S.; Henß, J.; Taghavi, B.; Weber, T.; Stüber, S.; Marin, A.; Rumpe, B.; Heinrich, R.
2024. IEEE European Conference on Software Architecture (ECSA)
Weber, S.; Henß, J.; Taghavi, B.; Weber, T.; Stüber, S.; Marin, A.; Rumpe, B.; Heinrich, R.
2024. IEEE European Conference on Software Architecture (ECSA)
Improving Resilience of Future Mobile Network Generations Implementing Zero Trust Paradigm
Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. NOMS 2024-2024 IEEE Network Operations and Management Symposium, 06th-10th May 2024, Seoul, Korea, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NOMS59830.2024.10574898
Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. NOMS 2024-2024 IEEE Network Operations and Management Symposium, 06th-10th May 2024, Seoul, Korea, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NOMS59830.2024.10574898
Demo: Towards Rapid Prototyping Network-Slicing Solutions in Software-Defined Networks
Windisch, F.; Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. IEEE/IFIP Network Operations and Management Symposium, 3 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NOMS59830.2024.10575679
Windisch, F.; Abedi, K.; Nguyen, G. T.; Strufe, T.
2024. IEEE/IFIP Network Operations and Management Symposium, 3 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NOMS59830.2024.10575679
Combining a Functional Simulation with Multi-level Timing Simulation for Software Architecture Models to Improve Extensibility
Weber, S.; Weber, T.; Heinrich, R.; Henß, J.
2024. IEEE International Conference on Software Architecture (ICSA 2024)
Weber, S.; Weber, T.; Heinrich, R.; Henß, J.
2024. IEEE International Conference on Software Architecture (ICSA 2024)
Architecture-based Issue Propagation Analysis
Speth, S.; Krieger, N.; Heinrich, R.; Becker, S.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 121–137, Springer. doi:10.1007/978-3-031-70797-1_8
Speth, S.; Krieger, N.; Heinrich, R.; Becker, S.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 121–137, Springer. doi:10.1007/978-3-031-70797-1_8
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, N.; Stöver, A.; Mayer, P.
2024. Proceedings of the Twentieth Symposium on Usable Privacy and Security, Advanced Computing Systems Association (USENIX)
Gerber, N.; Stöver, A.; Mayer, P.
2024. Proceedings of the Twentieth Symposium on Usable Privacy and Security, Advanced Computing Systems Association (USENIX)
Uncertainty Flow Diagrams: Towards a Systematic Representation of Uncertainty Propagation and Interaction in Adaptive Systems
Camara, J.; Hahner, S.; Perez-Palacin, D.; Vallecillo, A.; Acosta, M.; Bencomo, N.; Calinescu, R.; Gerasimou, S.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems; New York, 37 – 43, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644084
Camara, J.; Hahner, S.; Perez-Palacin, D.; Vallecillo, A.; Acosta, M.; Bencomo, N.; Calinescu, R.; Gerasimou, S.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems; New York, 37 – 43, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644084
RAMSES: An Artifact Exemplar for Engineering Self-Adaptive Microservice Applications
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Lissabon, 15th-16th April, 2024, 161 – 167, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644110
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Lissabon, 15th-16th April, 2024, 161 – 167, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644110
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots
Hemken, N.; Jacob, F.; Tërnava, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2024. SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, San Antonio, 15th-17th May 2024, 117–125, Association for Computing Machinery (ACM). doi:10.1145/3649158.3657034
Hemken, N.; Jacob, F.; Tërnava, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2024. SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, San Antonio, 15th-17th May 2024, 117–125, Association for Computing Machinery (ACM). doi:10.1145/3649158.3657034
Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security
Boltz, N.; Schmid, L.; Taghavi, B.; Gerking, C.; Heinrich, R.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 253–269, Springer. doi:10.1007/978-3-031-70797-1_17
Boltz, N.; Schmid, L.; Taghavi, B.; Gerking, C.; Heinrich, R.
2024. Software Architecture : 18th European Conference, ECSA 2024, Luxembourg City, Luxembourg, September 3–6, 2024 ; Proceedings. Ed.: M. Galster, 253–269, Springer. doi:10.1007/978-3-031-70797-1_17
Sustainable Software Engineering: Visions and Perspectives beyond Energy Efficiency
König, C.
2024. Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE ’24), 231 – 233, Association for Computing Machinery (ACM). doi:10.1145/3639478.3639782
König, C.
2024. Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE ’24), 231 – 233, Association for Computing Machinery (ACM). doi:10.1145/3639478.3639782
A Practical Notion of Liveness in Smart Contract Applications
Schiffl, J.; Beckert, B.
2024. 5th International Workshop on Formal Methods for Blockchains (FMBC 2024). Ed.: B. Bernardo, 8:1–8:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/oasics.fmbc.2024.8
Schiffl, J.; Beckert, B.
2024. 5th International Workshop on Formal Methods for Blockchains (FMBC 2024). Ed.: B. Bernardo, 8:1–8:13, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/oasics.fmbc.2024.8
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Hiroka, T.; Kitagawa, F.; Morimae, T.; Nishimaki, R.; Pal, T.; Yamakawa, T.
2024. Advances in Cryptology – EUROCRYPT 2024 – 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III. Ed.: M. Joye, 434 – 456, Springer Nature Switzerland. doi:10.1007/978-3-031-58734-4_15
Hiroka, T.; Kitagawa, F.; Morimae, T.; Nishimaki, R.; Pal, T.; Yamakawa, T.
2024. Advances in Cryptology – EUROCRYPT 2024 – 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III. Ed.: M. Joye, 434 – 456, Springer Nature Switzerland. doi:10.1007/978-3-031-58734-4_15
Combining Knowledge Graphs and Large Language Models to Ease Knowledge Access in Software Architecture Research
Kaplan, A.; Keim, J.; Schneider, M.; Koziolek, A.; Reussner, R.
2024. SemTech4STLD 2024 : Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data 2024 : Second International Workshop on Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data (SemTech4STLD) co-located with the Extended Semantic Web Conference 2024 (ESWC 2024). Ed.: R. Dessi, 76–82, CEUR-WS
Kaplan, A.; Keim, J.; Schneider, M.; Koziolek, A.; Reussner, R.
2024. SemTech4STLD 2024 : Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data 2024 : Second International Workshop on Semantic Technologies and Deep Learning Models for Scientific, Technical and Legal Data (SemTech4STLD) co-located with the Extended Semantic Web Conference 2024 (ESWC 2024). Ed.: R. Dessi, 76–82, CEUR-WS
Cost-Efficient Construction of Performance Models
Schmid, L.; Saglam, T.; Selzer, M.; Koziolek, A.
2024. 4th Workshop on Performance EngineeRing, Modelling, Analysis, and VisualizatiOn STrategy (PERMAVOST ’24), Pisa, 3rd-4th June 2024, Association for Computing Machinery (ACM). doi:10.1145/3660317.3660322
Schmid, L.; Saglam, T.; Selzer, M.; Koziolek, A.
2024. 4th Workshop on Performance EngineeRing, Modelling, Analysis, and VisualizatiOn STrategy (PERMAVOST ’24), Pisa, 3rd-4th June 2024, Association for Computing Machinery (ACM). doi:10.1145/3660317.3660322
Latency-aware RDMSim: Enabling the Investigation of Latency in Self-Adaptation for the Case of Remote Data Mirroring
Götz, S.; Bencomo, N.; Samin, H.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Ed. L. Baresi, 182–188, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644106
Götz, S.; Bencomo, N.; Samin, H.
2024. SEAMS ’24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Ed. L. Baresi, 182–188, Association for Computing Machinery (ACM). doi:10.1145/3643915.3644106
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM). doi:10.1145/3613904.3642843
Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM). doi:10.1145/3613904.3642843
Quantifying Software Correctness by Combining Architecture Modeling and Formal Program Analysis
Lanzinger, F.; Martin, C.; Reiche, F.; Teuber, S.; Heinrich, R.; Weigl, A.
2024. SAC ’24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 1702–1711, Association for Computing Machinery (ACM). doi:10.1145/3605098.3636008
Lanzinger, F.; Martin, C.; Reiche, F.; Teuber, S.; Heinrich, R.; Weigl, A.
2024. SAC ’24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. Ed.: J. Hong, 1702–1711, Association for Computing Machinery (ACM). doi:10.1145/3605098.3636008
Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality
Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February - 1st March 2024. doi:10.14722/usec.2024.23092
Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February - 1st March 2024. doi:10.14722/usec.2024.23092
Interoperability Assessment of IEC 61850 Devices in a Multivendor Digital Substation
Keppler, G.; Bonetti, A.; Canbolat, S.; Mumrez, A.; Hagenmeyer, V.; Elbez, G.
2024. 6th Global Power, Energy and Communication Conference (GPECOM2024), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/GPECOM61896.2024.10582663
Keppler, G.; Bonetti, A.; Canbolat, S.; Mumrez, A.; Hagenmeyer, V.; Elbez, G.
2024. 6th Global Power, Energy and Communication Conference (GPECOM2024), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/GPECOM61896.2024.10582663
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2024. Software Engineering 2024 (SE 2024). Ed.: R. Rabiser, 119–120, Gesellschaft für Informatik e.V. doi:10.18420/sw2024_37
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2024. Software Engineering 2024 (SE 2024). Ed.: R. Rabiser, 119–120, Gesellschaft für Informatik e.V. doi:10.18420/sw2024_37
Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids
Canbolat, S.; Fruböse, C.; Elbez, G.; Hagenmeyer, V.
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24)
Canbolat, S.; Fruböse, C.; Elbez, G.; Hagenmeyer, V.
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24)
Explainability Engineering Challenges: Connecting Explainability Levels to Run-time Explainability
Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Proceedings of 2nd World Conference on Explainable Artificial Intelligence Conference (XAI2024), Springer
Schwammberger, M.; Mirandola, R.; Wenninghoff, N.
2024. Proceedings of 2nd World Conference on Explainable Artificial Intelligence Conference (XAI2024), Springer
Explanation-driven Self-adaptation using Model-agnostic Interpretable Machine Learning
Negri, F. R.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024)
Negri, F. R.; Nicolosi, N.; Camilli, M.; Mirandola, R.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024)
RAMSES: An Exemplar for Engineering Self-Adaptive Microservice Applications
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024), Institute of Electrical and Electronics Engineers (IEEE)
Riccio, V.; Sorrentino, G.; Zamponi, E.; Camilli, M.; Mirandola, R.; Scandurra, P.
2024. IEEE/ACM proceedings of the 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS2024), Institute of Electrical and Electronics Engineers (IEEE)
Contract Automata: A Specification Language for Mode-Based Systems
Weigl, A.; Bachmeier, J.; Ulbrich, M.; Beckert, B.
2024. FormaliSE ’24: Proceedings of the 2024 IEEE/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE), 1–11, Association for Computing Machinery (ACM). doi:10.1145/3644033.3644381
Weigl, A.; Bachmeier, J.; Ulbrich, M.; Beckert, B.
2024. FormaliSE ’24: Proceedings of the 2024 IEEE/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE), 1–11, Association for Computing Machinery (ACM). doi:10.1145/3644033.3644381
Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 589–595, Association for Computing Machinery (ACM). doi:10.1145/3632775.3661984
Sanchez, G.; Elbez, G.; Hagenmeyer, V.
2024. e-Energy ’24: Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 589–595, Association for Computing Machinery (ACM). doi:10.1145/3632775.3661984
Hidden ∆-fairness: A Novel Notion for Fair Secure: Two-Party Computation
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. 36. Kryptotag, 2 S., Gesellschaft für Informatik (GI). doi:10.18420/cdm-2024-36-32
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
2024. 36. Kryptotag, 2 S., Gesellschaft für Informatik (GI). doi:10.18420/cdm-2024-36-32
Logical Clocks and Monotonicity for Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2024. PaPoC ’24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 37–43, Association for Computing Machinery (ACM). doi:10.1145/3642976.3653034
Jacob, F.; Hartenstein, H.
2024. PaPoC ’24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data, 37–43, Association for Computing Machinery (ACM). doi:10.1145/3642976.3653034
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT
Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2024. Computer Security. ESORICS 2023 International Workshops – CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II. Ed.: S. Katsikas, 76 – 91, Springer Nature Switzerland. doi:10.1007/978-3-031-54129-2_5
Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2024. Computer Security. ESORICS 2023 International Workshops – CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II. Ed.: S. Katsikas, 76 – 91, Springer Nature Switzerland. doi:10.1007/978-3-031-54129-2_5
Requirements Classification for Traceability Link Recovery
Hey, T.; Keim, J.; Corallo, S.
2024. 2024 IEEE 32nd International Requirements Engineering Conference (RE’24), Institute of Electrical and Electronics Engineers (IEEE)
Hey, T.; Keim, J.; Corallo, S.
2024. 2024 IEEE 32nd International Requirements Engineering Conference (RE’24), Institute of Electrical and Electronics Engineers (IEEE)
An Information-Flow Perspective on Algorithmic Fairness
Teuber, S.; Beckert, B.
2024. Proceedings of the 38th AAAI Conference on Artificial Intelligence, 15337–15345. doi:10.1609/AAAI.V38I14.29458
Teuber, S.; Beckert, B.
2024. Proceedings of the 38th AAAI Conference on Artificial Intelligence, 15337–15345. doi:10.1609/AAAI.V38I14.29458
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12
Berger, R.; Dörre, F.; Koch, A.
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12
Co-Simulation of Hardware and Software in Palladio
Weber, S.; Henss, J.; Reussner, R.
2024. 13th Symposium on Software Performance 2023, Stuttgart, 7th-9th November 2022, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43641
Weber, S.; Henss, J.; Reussner, R.
2024. 13th Symposium on Software Performance 2023, Stuttgart, 7th-9th November 2022, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43641
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050
On the Challenges of Transforming UVL to IVML
Agarwal, P.; Feichtinger, K.; Schmid, K.; Eichelberger, H.; Rabiser, R.
2024. Proceedings of the 6th International Workshop on Languages for Modelling Variability (MODEVAR’24), arxiv
Agarwal, P.; Feichtinger, K.; Schmid, K.; Eichelberger, H.; Rabiser, R.
2024. Proceedings of the 6th International Workshop on Languages for Modelling Variability (MODEVAR’24), arxiv
A Two-Level Stochastic Model for the Lateral Movement of Vehicles Within Their Lane Under Homogeneous Traffic Conditions
Neis, N.; Beyerer, J.
2024. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, 24th-28th September 2023, 1896 – 1903, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10421975
Neis, N.; Beyerer, J.
2024. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, 24th-28th September 2023, 1896 – 1903, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10421975
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer
Architecture-based Propagation Analyses Regarding Security
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), 121–122, Gesellschaft für Informatik e.V. doi:10.18420/sw2024_38
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), 121–122, Gesellschaft für Informatik e.V. doi:10.18420/sw2024_38
Explaining Edits to Variability Annotations in Evolving Software Product Lines
Güthing, L.; Bittner, P. M.; Schaefer, I.; Thüm, T.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 93–102, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634725
Güthing, L.; Bittner, P. M.; Schaefer, I.; Thüm, T.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 93–102, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634725
Kfeature: Rendering the Kconfig System into Feature Models
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731
Grammars for Feature Models
Hönig, M. F.; Eichhorn, D.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 155–157, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634735
Hönig, M. F.; Eichhorn, D.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 155–157, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634735
Sampling Cardinality-Based Feature Models
Güthing, L.; Weiß, M.; Schaefer, I.; Lochau, M.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 46 – 55, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634719
Güthing, L.; Weiß, M.; Schaefer, I.; Lochau, M.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 46 – 55, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634719
Partial Proofs to Optimize Deductive Verification of Feature-Oriented Software Product Lines
Kodetzki, M.; Bordis, T.; Runge, T.; Schaefer, I.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems. Ed.: T.Kehrer, 17–26, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634714
Kodetzki, M.; Bordis, T.; Runge, T.; Schaefer, I.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems. Ed.: T.Kehrer, 17–26, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634714
On Configuration Sequences in Feature Models
Meixner, K.; Feichtinger, K.; Greiner, S.; Rabiser, R.
2024. Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems (VaMoS 2024), Bern, 7th-9th February 2024, 146–148, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634730
Meixner, K.; Feichtinger, K.; Greiner, S.; Rabiser, R.
2024. Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems (VaMoS 2024), Bern, 7th-9th February 2024, 146–148, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634730
Obfuscation-Resilient Software Plagiarism Detection with JPlag
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084
Detecting Automatic Software Plagiarism via Token Sequence Normalization
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer-Verlag
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer-Verlag
Verify This: Memcached—A Practical Long-Term Challenge for the Integration of Formal Methods
Ernst, G.; Weigl, A.
2024. 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, A. Wijs, 82 – 89, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_5
Ernst, G.; Weigl, A.
2024. 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, A. Wijs, 82 – 89, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_5
Recovering Trace Links Between Software Documentation And Code
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. ICSE ’24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. Ed.: A. Paiva, Art.-Nr.: 215, Association for Computing Machinery (ACM). doi:10.1145/3597503.3639130
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. ICSE ’24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. Ed.: A. Paiva, Art.-Nr.: 215, Association for Computing Machinery (ACM). doi:10.1145/3597503.3639130
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044
Composition in Differential Privacy for General Granularity Notions
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF61375.2024.00004
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF61375.2024.00004
SoK: Explainable Machine Learning in Adversarial Environments
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021
Zeitschriftenaufsätze
Exploitation of local adjacencies for parallel construction of a Reeb graph variant: cerebral vascular tree case
Lepaire, C.; Belhaouari, H.; Pascual, R.; Meseure, P.
2024. Journal of WSCG, 32 (1-2), 79–90. doi:10.24132/JWSCG.2024.9
Lepaire, C.; Belhaouari, H.; Pascual, R.; Meseure, P.
2024. Journal of WSCG, 32 (1-2), 79–90. doi:10.24132/JWSCG.2024.9
Embedding Arbitrary Boolean Circuits into Fungal Automata
Modanese, A.; Worsch, T.
2024. Algorithmica, 86 (7), 2069–2091. doi:10.1007/s00453-024-01222-7
Modanese, A.; Worsch, T.
2024. Algorithmica, 86 (7), 2069–2091. doi:10.1007/s00453-024-01222-7
Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts
Khaloopour, L.; Su, Y.; Raskob, F.; Meuser, T.; Bless, R.; Janzen, L.; Abedi, K.; Andjelkovic, M.; Chaari, H.; Chakraborty, P.; Kreutzer, M.; Hollick, M.; Strufe, T.; Franchi, N.; Jamali, V.
2024. IEEE Access, 12, 155666–155695. doi:10.1109/ACCESS.2024.3480275
Khaloopour, L.; Su, Y.; Raskob, F.; Meuser, T.; Bless, R.; Janzen, L.; Abedi, K.; Andjelkovic, M.; Chaari, H.; Chakraborty, P.; Kreutzer, M.; Hollick, M.; Strufe, T.; Franchi, N.; Jamali, V.
2024. IEEE Access, 12, 155666–155695. doi:10.1109/ACCESS.2024.3480275
An overview of proposals towards the privacy-preserving publication of trajectory data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2024. International Journal of Information Security, 23 (6), 3711–3747. doi:10.1007/s10207-024-00894-0
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2024. International Journal of Information Security, 23 (6), 3711–3747. doi:10.1007/s10207-024-00894-0
A Variance-Based Drift Metric for Inconsistency Estimation in Model Variant Sets
Kegel, K.; Götz, S.; Marx, R.; Aßmann, U.
2024. The Journal of Object Technology, 23 (3), 1–14. doi:10.5381/jot.2024.23.3.a2
Kegel, K.; Götz, S.; Marx, R.; Aßmann, U.
2024. The Journal of Object Technology, 23 (3), 1–14. doi:10.5381/jot.2024.23.3.a2
Efficient Validation of SHACL Shapes with Reasoning
Ke, J.; Zacouris, Z.; Acosta, M.
2024. Proceedings of the VLDB Endowment, 17 (11), 3589–3601. doi:10.14778/3681954.3682023
Ke, J.; Zacouris, Z.; Acosta, M.
2024. Proceedings of the VLDB Endowment, 17 (11), 3589–3601. doi:10.14778/3681954.3682023
On the influence of conventional and automated market makers on market quality in cryptoeconomic systems
Kirste, D.; Poddey, A.; Kannengießer, N.; Sunyaev, A.
2024. Electronic Markets, 34 (1), Art.-Nr.: 42. doi:10.1007/s12525-024-00723-1
Kirste, D.; Poddey, A.; Kannengießer, N.; Sunyaev, A.
2024. Electronic Markets, 34 (1), Art.-Nr.: 42. doi:10.1007/s12525-024-00723-1
HybCBDC: A Design for Central Bank Digital Currency Systems Enabling Digital Cash
Lamberty, R.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2024. IEEE Access, 12, 137712–137728. doi:10.1109/ACCESS.2024.3458451
Lamberty, R.; Kirste, D.; Kannengießer, N.; Sunyaev, A.
2024. IEEE Access, 12, 137712–137728. doi:10.1109/ACCESS.2024.3458451
Structuring different manifestations of misinformation for better policy development using a decision tree‐based approach
Hägle, O.; Escher, S.; Heil, R.; Jahnel, J.
2024. Policy & Internet. doi:10.1002/poi3.420
Hägle, O.; Escher, S.; Heil, R.; Jahnel, J.
2024. Policy & Internet. doi:10.1002/poi3.420
Quantifying and combining uncertainty for improving the behavior of Digital Twin Systems
Deantoni, J.; Muñoz, P.; Gomes, C.; Verbrugge, C.; Mittal, R.; Heinrich, R.; Bellis, S.; Vallecillo, A.
2024. Automatisierungstechnik
Deantoni, J.; Muñoz, P.; Gomes, C.; Verbrugge, C.; Mittal, R.; Heinrich, R.; Bellis, S.; Vallecillo, A.
2024. Automatisierungstechnik
Compact FE for unbounded attribute-weighted sums for logspace from SXDH
Datta, P.; Pal, T.; Takashima, K.
2024. Designs, Codes, and Cryptography, 92 (10), 3155–3235. doi:10.1007/s10623-024-01432-8
Datta, P.; Pal, T.; Takashima, K.
2024. Designs, Codes, and Cryptography, 92 (10), 3155–3235. doi:10.1007/s10623-024-01432-8
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research
Chaurasia, A. K.; Fallahi, M.; Strufe, T.; Terhörst, P.; Cabarcos, P. A.
2024. Journal of Information Security and Applications, 85, Article no: 103832. doi:10.1016/j.jisa.2024.103832
Chaurasia, A. K.; Fallahi, M.; Strufe, T.; Terhörst, P.; Cabarcos, P. A.
2024. Journal of Information Security and Applications, 85, Article no: 103832. doi:10.1016/j.jisa.2024.103832
Temporal analysis of topic modeling output by machine learning techniques
Azizi, F.; Vahdat-Nejad, H.; Hajiabadi, H.
2024. International Journal of Data Science and Analytics. doi:10.1007/s41060-024-00583-0
Azizi, F.; Vahdat-Nejad, H.; Hajiabadi, H.
2024. International Journal of Data Science and Analytics. doi:10.1007/s41060-024-00583-0
Requirements for modelling tools for teaching
Kienzle, J.; Zschaler, S.; Barnett, W.; Sağlam, T.; Bucchiarone, A.; Abrahão, S.; Syriani, E.; Kolovos, D.; Lethbridge, T.; Mustafiz, S.; Meacham, S.
2024. Software and Systems Modeling, 23 (5), 1055–1073. doi:10.1007/s10270-024-01192-y
Kienzle, J.; Zschaler, S.; Barnett, W.; Sağlam, T.; Bucchiarone, A.; Abrahão, S.; Syriani, E.; Kolovos, D.; Lethbridge, T.; Mustafiz, S.; Meacham, S.
2024. Software and Systems Modeling, 23 (5), 1055–1073. doi:10.1007/s10270-024-01192-y
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx
Scherer, P.; Weis, C.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 755–783. doi:10.56553/popets-2024-0140
Scherer, P.; Weis, C.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 755–783. doi:10.56553/popets-2024-0140
Fantômas: Understanding Face Anonymization Reversibility
Todt, J.; Hanisch, S.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 24–43. doi:10.56553/popets-2024-0105
Todt, J.; Hanisch, S.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (4), 24–43. doi:10.56553/popets-2024-0105
Die Reform des australischen Privacy Act
Ebert, A.
2024. Zeitschrift für Datenschutz (ZD), 14 (4), 181–240
Ebert, A.
2024. Zeitschrift für Datenschutz (ZD), 14 (4), 181–240
Effektive Datenschutzaufsicht für effektiven Grundrechtsschutz – aber bitte nicht sofort und nicht gegen den Staat? : Zur Unionsrechtswidrigkeit des Ausschlusses der Anordnung der sofortigen Vollziehbarkeit gem. § 20 VII BDSG
Winau, M.; Kemmler, K. J.
2024. Neue Zeitschrift für Verwaltungsrecht, 42 (13), 945–1040
Winau, M.; Kemmler, K. J.
2024. Neue Zeitschrift für Verwaltungsrecht, 42 (13), 945–1040
Human factors in model-driven engineering: future research goals and initiatives for MDE
Liebel, G.; Klünder, J.; Hebig, R.; Lazik, C.; Nunes, I.; Graßl, I.; Steghöfer, J.-P.; Exelmans, J.; Oertel, J.; Marquardt, K.; Juhnke, K.; Schneider, K.; Gren, L.; Happe, L.; Herrmann, M.; Wyrich, M.; Tichy, M.; Goulão, M.; Wohlrab, R.; Kalantari, R.; Heinrich, R.; Greiner, S.; Rukmono, S. A.; Chakraborty, S.; Abrahão, S.; Amaral, V.
2024. Software and Systems Modeling, 23 (4), 801–819. doi:10.1007/s10270-024-01188-8
Liebel, G.; Klünder, J.; Hebig, R.; Lazik, C.; Nunes, I.; Graßl, I.; Steghöfer, J.-P.; Exelmans, J.; Oertel, J.; Marquardt, K.; Juhnke, K.; Schneider, K.; Gren, L.; Happe, L.; Herrmann, M.; Wyrich, M.; Tichy, M.; Goulão, M.; Wohlrab, R.; Kalantari, R.; Heinrich, R.; Greiner, S.; Rukmono, S. A.; Chakraborty, S.; Abrahão, S.; Amaral, V.
2024. Software and Systems Modeling, 23 (4), 801–819. doi:10.1007/s10270-024-01188-8
A Framework for Provably Secure Onion Routing against a Global Adversary
Scherer, P.; Weis, C.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (2), 141–159. doi:10.56553/popets-2024-0045
Scherer, P.; Weis, C.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (2), 141–159. doi:10.56553/popets-2024-0045
Scalable Reachset-Conformant Identification of Linear Systems
Lützow, L.; Althoff, M.
2024. IEEE Control Systems Letters, 8, 520–525. doi:10.1109/LCSYS.2024.3397058
Lützow, L.; Althoff, M.
2024. IEEE Control Systems Letters, 8, 520–525. doi:10.1109/LCSYS.2024.3397058
Post-Quantum Ready Key Agreement for Aviation
Tiepelt, M.; Martin, C.; Maeurer, N.
2024. IACR Communications in Cryptology, 1 (1), 17. doi:10.62056/aebn2isfg
Tiepelt, M.; Martin, C.; Maeurer, N.
2024. IACR Communications in Cryptology, 1 (1), 17. doi:10.62056/aebn2isfg
A conceptual and architectural characterization of antifragile systems
Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2024. Journal of Systems and Software, 213, Art.-Nr.: 112051. doi:10.1016/j.jss.2024.112051
Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2024. Journal of Systems and Software, 213, Art.-Nr.: 112051. doi:10.1016/j.jss.2024.112051
A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction
Bengler, K.; Damm, W.; Luedtke, A.; Jochem, R.; Austel, B.; Biebl, B.; Fränzle, M.; Hagemann, W.; Held, M.; Hess, D.; Ihme, K.; Kacianka, S.; Kerscher, A. J.; Forrest, L.; Lehnhoff, S.; Pretschner, A.; Rakow, A.; Sonntag, D.; Sztipanovits, J.; Schwammberger, M.; Schweda, M.; Unni, A.; Veith, E.
2024. ACM Transactions on Cyber-Physical Systems, 8 (1), Art.-Nr.: 3. doi:10.1145/3622880
Bengler, K.; Damm, W.; Luedtke, A.; Jochem, R.; Austel, B.; Biebl, B.; Fränzle, M.; Hagemann, W.; Held, M.; Hess, D.; Ihme, K.; Kacianka, S.; Kerscher, A. J.; Forrest, L.; Lehnhoff, S.; Pretschner, A.; Rakow, A.; Sonntag, D.; Sztipanovits, J.; Schwammberger, M.; Schweda, M.; Unni, A.; Veith, E.
2024. ACM Transactions on Cyber-Physical Systems, 8 (1), Art.-Nr.: 3. doi:10.1145/3622880
A Reference Architecture of Human Cyber-Physical Systems – Part I: Fundamental Concepts
Damm, W.; Hess, D.; Schweda, M.; Sztipanovits, J.; Bengler, K.; Biebl, B.; Fränzle, M.; Hagemann, W.; Held, M.; Ihme, K.; Kacianka, S.; Kerscher, A. J.; Lehnhoff, S.; Luedtke, A.; Pretschner, A.; Rakow, A.; Rieger, J.; Sonntag, D.; Schwammberger, M.; Austel, B.; Unni, A.; Veith, E.
2024. ACM Transactions on Cyber-Physical Systems, 8 (1), Art.-Nr.: 2. doi:10.1145/3622879
Damm, W.; Hess, D.; Schweda, M.; Sztipanovits, J.; Bengler, K.; Biebl, B.; Fränzle, M.; Hagemann, W.; Held, M.; Ihme, K.; Kacianka, S.; Kerscher, A. J.; Lehnhoff, S.; Luedtke, A.; Pretschner, A.; Rakow, A.; Rieger, J.; Sonntag, D.; Schwammberger, M.; Austel, B.; Unni, A.; Veith, E.
2024. ACM Transactions on Cyber-Physical Systems, 8 (1), Art.-Nr.: 2. doi:10.1145/3622879
Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
Dutta, S.; Pal, T.; Dutta, R.
2024. Theoretical Computer Science, 995, Art.-Nr.: 114502. doi:10.1016/j.tcs.2024.114502
Dutta, S.; Pal, T.; Dutta, R.
2024. Theoretical Computer Science, 995, Art.-Nr.: 114502. doi:10.1016/j.tcs.2024.114502
Variability Modeling of Products, Processes, and Resources in Cyber-Physical Production Systems Engineering
Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. Journal of Systems and Software, 211, 112007. doi:10.1016/j.jss.2024.112007
Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. Journal of Systems and Software, 211, 112007. doi:10.1016/j.jss.2024.112007
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video
Berens, B. M.; Mossano, M.; Volkamer, M.
2024. Computers & Security, 137, Art.-Nr.: 103620. doi:10.1016/j.cose.2023.103620
Berens, B. M.; Mossano, M.; Volkamer, M.
2024. Computers & Security, 137, Art.-Nr.: 103620. doi:10.1016/j.cose.2023.103620
A data-driven active learning approach to reusing ML solutions in scientific applications
Hajiabadi, H.; Gerking, C.; Hilbert, L.; Koziolek, A.
2024. Journal of Systems and Software, 211, Article no: 111986. doi:10.1016/j.jss.2024.111986
Hajiabadi, H.; Gerking, C.; Hilbert, L.; Koziolek, A.
2024. Journal of Systems and Software, 211, Article no: 111986. doi:10.1016/j.jss.2024.111986
DGRI-Jahrestagung 2023: KI, Cybersicherheit/Cyberresilienz, Datenökonomie
Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11
Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11
Monitoring tools for DevOps and microservices: A systematic grey literature review
Giamattei, L.; Guerriero, A.; Pietrantuono, R.; Russo, S.; Malavolta, I.; Islam, T.; Dînga, M.; Koziolek, A.; Singh, S.; Armbruster, M.; Gutierrez-Martinez, J. M.; Caro-Alvaro, S.; Rodriguez, D.; Weber, S.; Henss, J.; Vogelin, E. F.; Panojo, F. S.
2024. Journal of Systems and Software, 208, Art.-Nr.: 111906. doi:10.1016/j.jss.2023.111906
Giamattei, L.; Guerriero, A.; Pietrantuono, R.; Russo, S.; Malavolta, I.; Islam, T.; Dînga, M.; Koziolek, A.; Singh, S.; Armbruster, M.; Gutierrez-Martinez, J. M.; Caro-Alvaro, S.; Rodriguez, D.; Weber, S.; Henss, J.; Vogelin, E. F.; Panojo, F. S.
2024. Journal of Systems and Software, 208, Art.-Nr.: 111906. doi:10.1016/j.jss.2023.111906
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure
Adavoudi Jolfaei, A.; Rupp, A.; Schiffner, S.; Engel, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 232–257. doi:10.56553/popets-2024-0014
Adavoudi Jolfaei, A.; Rupp, A.; Schiffner, S.; Engel, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 232–257. doi:10.56553/popets-2024-0014
Cookie disclaimers: Dark patterns and lack of transparency
Berens, B. M.; Bohlender, M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2024. Computers & Security, 136, Art.-Nr.: 103507. doi:10.1016/j.cose.2023.103507
Berens, B. M.; Bohlender, M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2024. Computers & Security, 136, Art.-Nr.: 103507. doi:10.1016/j.cose.2023.103507
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data
Hanisch, S.; Todt, J.; Patino, J.; Evans, N.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 116–132. doi:10.56553/popets-2024-0008
Hanisch, S.; Todt, J.; Patino, J.; Evans, N.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 116–132. doi:10.56553/popets-2024-0008
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users’ Privacy
Demir, N.; Urban, T.; Pohlmann, N.; Wressnegger, C.
2024. Proceedings on Privacy Enhancing Technologies, 2024
Demir, N.; Urban, T.; Pohlmann, N.; Wressnegger, C.
2024. Proceedings on Privacy Enhancing Technologies, 2024
Early Attack Detection for Securing GOOSE Network Traffic
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2024. IEEE Transactions on Smart Grid, 15 (1), 899–910. doi:10.1109/TSG.2023.3272749
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2024. IEEE Transactions on Smart Grid, 15 (1), 899–910. doi:10.1109/TSG.2023.3272749
2023
Buchaufsätze
Engineering of Trust Analysis-Driven Digital Twins for a Medical Device
Bersani, M. M.; Braghin, C.; Gargantini, A.; Mirandola, R.; Riccobene, E.; Scandurra, P.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 467–482, Springer International Publishing. doi:10.1007/978-3-031-36889-9_31
Bersani, M. M.; Braghin, C.; Gargantini, A.; Mirandola, R.; Riccobene, E.; Scandurra, P.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 467–482, Springer International Publishing. doi:10.1007/978-3-031-36889-9_31
Architecting Explainable Service Robots
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.; Scandurra, P.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 153–169, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_11
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.; Scandurra, P.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 153–169, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_11
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010
Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010
Exact and Efficient Bayesian Inference for Privacy Risk Quantification
Rønneberg, R. C.; Pardo, R.; Wąsowski, A.
2023. Software Engineering and Formal Methods – 21st International Conference, SEFM 2023, Eindhoven, The Netherlands, November 6-10, 2023, Proceedings. Ed.: C. Ferreira, 263 – 281, Springer Nature Switzerland. doi:10.1007/978-3-031-47115-5_15
Rønneberg, R. C.; Pardo, R.; Wąsowski, A.
2023. Software Engineering and Formal Methods – 21st International Conference, SEFM 2023, Eindhoven, The Netherlands, November 6-10, 2023, Proceedings. Ed.: C. Ferreira, 263 – 281, Springer Nature Switzerland. doi:10.1007/978-3-031-47115-5_15
§ 20: Digitalisierung, Informationsgesellschaft, Massendaten
Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller
Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller
Neue alte Entwicklungen für das Verwaltungsrecht: Von Kooperation und Dreiecksverhältnissen zur Konfliktbefriedung und Vertrauensbildung im Wirtschaftsverwaltungs- und Gesundheitsrecht
Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer. doi:10.1007/978-3-662-66978-5_73
Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer. doi:10.1007/978-3-662-66978-5_73
Governance Foundations for the European Cybersecurity Community
Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland. doi:10.1007/978-3-031-36096-1_9
Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland. doi:10.1007/978-3-031-36096-1_9
Dienstleistungsroboter im Handel: Einsatzmöglichkeiten und verantwortungsbewusster Einsatz
Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Hrsg.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer. doi:10.1007/978-3-658-38433-3_21
Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Hrsg.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer. doi:10.1007/978-3-658-38433-3_21
Zu Risiken und Anonymisierungen von Verhaltensbiometrie
Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft. doi:10.5771/9783748938743-423
Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft. doi:10.5771/9783748938743-423
Dynamic Access Control in Industry 4.0 Systems
Heinrich, R.; Seifermann, S.; Walter, M.; Hahner, S.; Reussner, R.; Bureš, T.; Hnětynka, P.; Pacovský, J.
2023. Digital Transformation. Ed.: B. Vogel-Heuser, 143–170, Springer Vieweg. doi:10.1007/978-3-662-65004-2_6
Heinrich, R.; Seifermann, S.; Walter, M.; Hahner, S.; Reussner, R.; Bureš, T.; Hnětynka, P.; Pacovský, J.
2023. Digital Transformation. Ed.: B. Vogel-Heuser, 143–170, Springer Vieweg. doi:10.1007/978-3-662-65004-2_6
Habilitationsschriften
Architecture-based Evolution of Dependable Software-intensive Systems. Habilitation
Heinrich, R.
2023. KIT Scientific Publishing. doi:10.5445/KSP/1000157920
Heinrich, R.
2023. KIT Scientific Publishing. doi:10.5445/KSP/1000157920
Dissertationen
Better Web Measurements: Enhancing Security and Privacy Research. Dissertation
Demir, N.
2023, November 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000163503
Demir, N.
2023, November 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000163503
Correctness-by-Construction for Correct and Secure Software Systems. Dissertation
Runge, T.
2023. Technische Universität Braunschweig. doi:10.24355/dbbs.084-202306071046-0
Runge, T.
2023. Technische Universität Braunschweig. doi:10.24355/dbbs.084-202306071046-0
Evaluating Architectural Safeguards for Uncertain AI Black-Box Components. Dissertation
Scheerer, M.
2023. KIT Scientific Publishing. doi:10.5445/KSP/1000161585
Scheerer, M.
2023. KIT Scientific Publishing. doi:10.5445/KSP/1000161585
A Reference Structure for Modular Model-based Analyses. Dissertation
Koch, S. G.
2023, Juli 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000160784
Koch, S. G.
2023, Juli 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000160784
Ein generisches und hoch skalierbares Framework zur Automatisierung und Ausführung wissenschaftlicher Datenverarbeitungs- und Simulationsworkflows. Dissertation
Liu, J.
2023, Juli 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000160430
Liu, J.
2023, Juli 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000160430
Decentralizing Software Identity Management. Dissertation
Stengele, O.
2023, Juni 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159237
Stengele, O.
2023, Juni 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159237
Evaluating Architectural Safeguards for Uncertain AI Black-Box Components. Dissertation
Scheerer, M.
2023, Juni 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159170
Scheerer, M.
2023, Juni 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159170
Synergies between Numerical Methods for Kinetic Equations and Neural Networks. Dissertation
Schotthöfer, S.
2023, Juni 5. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000158838
Schotthöfer, S.
2023, Juni 5. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000158838
Cyber Threat Intelligence based Holistic Risk Quantification and Management. Dissertation
Kaiser, F. K.
2023, April 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157717
Kaiser, F. K.
2023, April 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157717
On Efficient Zero-Knowledge Arguments. Dissertation
Klooß, M.
2023, Februar 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118
Klooß, M.
2023, Februar 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118
Formal Methods for Trustworthy Voting Systems : From Trusted Components to Reliable Software. Dissertation
Kirsten, M.
2023, Januar 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000155115
Kirsten, M.
2023, Januar 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000155115
Architectural Alignment of Access Control Requirements Extracted from Business Processes. Dissertation
Pilipchuk, R.
2023. KIT Scientific Publishing. doi:10.5445/KSP/1000148100
Pilipchuk, R.
2023. KIT Scientific Publishing. doi:10.5445/KSP/1000148100
Masterarbeiten
Automated Post-Quantum Certificate Management for Industrial Internet of Things Infrastructures. Masterarbeit
Mirdha, K.
2023, Mai 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000169317
Mirdha, K.
2023, Mai 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000169317
Intelligent Match Merging to Prevent Obfuscation Attacks on Software Plagiarism Detectors. Masterarbeit
Niehues, N.
2023, Dezember 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167446
Niehues, N.
2023, Dezember 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167446
Continuous Integration of Performance Models for Lua-Based Sensor Applications. Masterarbeit
Burgey, L.
2023, April 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166032
Burgey, L.
2023, April 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166032
Towards Realising Post-Quantum Secure ElectionGuard. Masterarbeit
Ludwig, J.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165945
Ludwig, J.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165945
Combined Modeling of Software and Hardware with Versions and Variants. Masterarbeit
Ochs, P.
2023, August. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165923
Ochs, P.
2023, August. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165923
Künstliche Intelligenz und Musik: Konzeption und Umsetzung eines Online-Kurses für Einsteiger. Masterarbeit
Shang, Q.
2023, August 1. doi:10.5445/IR/1000165222
Shang, Q.
2023, August 1. doi:10.5445/IR/1000165222
Hierarchical Classification of Design Decisions using pre-trained Language Models. Masterarbeit
Speit, J.
2023, Februar 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157373
Speit, J.
2023, Februar 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157373
Automatisierte Gewinnung von Nachverfolgbarkeitsverbindungen zwischen Softwarearchitektur und Quelltext. Masterarbeit
Telge, T.
2023, März 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157372
Telge, T.
2023, März 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157372
Bachelorarbeiten
Software Plagiarism Detection on Intermediate Representation. Bachelorarbeit
Heneka, N. R.
2023, November 17. doi:10.5445/IR/1000168422
Heneka, N. R.
2023, November 17. doi:10.5445/IR/1000168422
Traceability Link Recovery und Inkonsistenzerkennung zwischen Modellen und informellen Diagrammen mithilfe struktureller Eigenschaften. Bachelorarbeit
Mathes, J. P.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167656
Mathes, J. P.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167656
Traceability Link Recovery for Relations in Natural Language Software Architecture Documentation and Software Architecture Models. Bachelorarbeit
Ye, J.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167655
Ye, J.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167655
Ein Ansatz zur Traceability Link Recovery für natürlichsprachliche Software-Dokumentation und Quelltext. Bachelorarbeit
Steinbuch, D.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167654
Steinbuch, D.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167654
Using Large Language Models To Analyze Software Architecture Documentation. Bachelorarbeit
Schöppner, R.
2023, September 29. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165891
Schöppner, R.
2023, September 29. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165891
Preventing Automatic Code Plagiarism Generation Through Token String Normalization. Bachelorarbeit
Brödel, M.
2023, April 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165371
Brödel, M.
2023, April 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165371
Token-based Plagiarism Detection for Statecharts. Bachelorarbeit
Strittmatter, J.
2023, April 5. doi:10.5445/IR/1000165276
Strittmatter, J.
2023, April 5. doi:10.5445/IR/1000165276
Entity Recognition in Software Documentation Using Trace Links to Informal Diagrams. Bachelorarbeit
Reinbold, F.
2023, Oktober 5. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165275
Reinbold, F.
2023, Oktober 5. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165275
A Translation Layer for Information Flow Verification Systems: Bridging Type Systems with Theorem Provers. Bachelorarbeit
Mühlenberend, F.
2023, September 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165079
Mühlenberend, F.
2023, September 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165079
Enabling the Collaborative Collection of Uncertainty Sources Regarding Confidentiality. Bachelorarbeit
Gehrig, G.
2023, November 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164576
Gehrig, G.
2023, November 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164576
An Overview of Fairness Notions in Multi-Party Computation. Bachelorarbeit
Strasser, T.
2023, September 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162986
Strasser, T.
2023, September 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162986
Verification of Red-Black Trees in KeY - A Case Study in Deductive Java Verification. Bachelorarbeit
Stuber, J.
2023, September 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162878
Stuber, J.
2023, September 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162878
Schnittstellenkonzept für Hardwaresimulationen zur Co-Simulation mit Software. Bachelorarbeit
Dahi, M. N.
2023. doi:10.5445/IR/1000162306
Dahi, M. N.
2023. doi:10.5445/IR/1000162306
The Kconfig Variability Framework as a Feature Model. Bachelorarbeit
Yaman, K. B.
2023, April 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162110
Yaman, K. B.
2023, April 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162110
Forschungsstand der Sicherheit von implantierbaren medizinischen Geräten. Bachelorarbeit
Palkowitsch-Amberger, M.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159670
Palkowitsch-Amberger, M.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159670
Optimizing Hash-Based Signatures in Java. Bachelorarbeit
Rausch, T.
2023, März 28. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157374
Rausch, T.
2023, März 28. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157374
Implementation von Feedbackmechanismen in Onlinekursen am Beispiel Masterstudy LMS. Bachelorarbeit
Kia, E.
2023, Januar 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154768
Kia, E.
2023, Januar 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154768
Proceedingsbeiträge
The Fast Rise of Cautious Vehicle-to-X: Towards Evaluating Misbehavior Detection in the Field
Wehmer, M.; Baumgart, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 24-28 September 2023, 3930–3936, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/itsc57777.2023.10422080
Wehmer, M.; Baumgart, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, Spain, 24-28 September 2023, 3930–3936, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/itsc57777.2023.10422080
Impact of Key Scrum Role Locations in Student Distributed Software Development Projects
Čavrak, I.; Bucaioni, A.; Mirandola, R.
2023. 2023 IEEE 35th International Conference on Software Engineering Education and Training (CSEE&T), 69–78, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSEET58097.2023.00018
Čavrak, I.; Bucaioni, A.; Mirandola, R.
2023. 2023 IEEE 35th International Conference on Software Engineering Education and Training (CSEE&T), 69–78, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSEET58097.2023.00018
A Conceptual Framework for Explainability Requirements in Software-Intensive Systems
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.; Scandurra, P.
2023. 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, 4th-5th September 2023, 309–315, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW57809.2023.00059
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.; Scandurra, P.
2023. 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, 4th-5th September 2023, 309–315, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW57809.2023.00059
Explainable Human-Machine Teaming using Model Checking and Interpretable Machine Learning
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.
2023. 2023 IEEE/ACM 11th International Conference on Formal Methods in Software Engineering (FormaliSE), 18–28, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/FormaliSE58978.2023.00010
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.
2023. 2023 IEEE/ACM 11th International Conference on Formal Methods in Software Engineering (FormaliSE), 18–28, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/FormaliSE58978.2023.00010
Towards Better Trust in Human-Machine Teaming through Explainable Dependability
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.; Scandurra, P.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), March 13 2023 to March 17 2023, L’Aquila, Italy, 86–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00029
Bersani, M. M.; Camilli, M.; Lestingi, L.; Mirandola, R.; Rossi, M.; Scandurra, P.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), March 13 2023 to March 17 2023, L’Aquila, Italy, 86–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00029
Modular Quality-of-Service Analysis of Software Design Models for Cyber-Physical Systems
Pinciroli, R.; Mirandola, R.; Trubiani, C.
2023. Advanced Information Systems Engineering : 35th International Conference, CAiSE 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings. Ed.: M. Indulska, 88–104, Springer Nature Switzerland. doi:10.1007/978-3-031-34560-9_6
Pinciroli, R.; Mirandola, R.; Trubiani, C.
2023. Advanced Information Systems Engineering : 35th International Conference, CAiSE 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings. Ed.: M. Indulska, 88–104, Springer Nature Switzerland. doi:10.1007/978-3-031-34560-9_6
Designing Automotive Case Studies for Architectural Security Analyses
Boltz, N.; Walter, M.; Gerking, C.
2023. 14th Symposium on Software Performance 2023 (SSP 2023), Karlsruhe, 6th-8th November 2023, 23–25
Boltz, N.; Walter, M.; Gerking, C.
2023. 14th Symposium on Software Performance 2023 (SSP 2023), Karlsruhe, 6th-8th November 2023, 23–25
SOTIF-Compliant Scenario Generation Using Semi-Concrete Scenarios and Parameter Sampling
Birkemeyer, L.; Fuchs, J.; Gambi, A.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 2139–2144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422637
Birkemeyer, L.; Fuchs, J.; Gambi, A.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 2139–2144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422637
Is Scenario Generation Ready for SOTIF? A Systematic Literature Review
Birkemeyer, L.; King, C.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 472–479, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422664
Birkemeyer, L.; King, C.; Schaefer, I.
2023. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), 472–479, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10422664
Can Quantum Computing Improve Uniform Random Sampling of Large Configuration Spaces?
Ammermann, J.; Bittner, T.; Eichhorn, D.; Schaefer, I.; Seidl, C.
2023. 2023 IEEE/ACM 4th International Workshop on Quantum Software Engineering (Q-SE), 34–41, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/q-se59154.2023.00012
Ammermann, J.; Bittner, T.; Eichhorn, D.; Schaefer, I.; Seidl, C.
2023. 2023 IEEE/ACM 4th International Workshop on Quantum Software Engineering (Q-SE), 34–41, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/q-se59154.2023.00012
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head
Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland. doi:10.1007/978-3-031-38554-4_19
Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland. doi:10.1007/978-3-031-38554-4_19
Brake or Drive: On the Relation Between Morality and Traffic Rules when Driving Autonomously
Rakow, A.; Schwammberger, M.
2023. Software Engineering 2023 Workshops, 104–115, Gesellschaft für Informatik e.V. doi:10.18420/se2023-ws-12
Rakow, A.; Schwammberger, M.
2023. Software Engineering 2023 Workshops, 104–115, Gesellschaft für Informatik e.V. doi:10.18420/se2023-ws-12
Multi-level Hardware Simulation in Palladio
Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43229
Weber, S.; Taghavi, B.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 32–34, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43229
A Survey of Analysis Composition Operators in the Context of Palladio
Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43245
Taghavi, B.; Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 8–10, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43245
Using a Hardware Simulation for Automatic Software Performance Model Parameterization
Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 44–45, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43669
Weber, S.
2023. 14th Symposium on Software Performance 2023, Karlsruhe, 6th-8th November 2023, Ed.: Andrea Herrmann, 44–45, Gesellschaft für Informatik (GI). doi:https://dl.gi.de/handle/20.500.12116/43669
palaestrAI: A Training Ground for Autonomous Agents
Veith, E. M. S. P.; Balduin, S.; Wenninghoff, N.; Wolgast, T.; Baumann, M.; Winkler, D.; Hammer, L.; Salman, A.; Schulz, M.; Raeiszadeh, A.; Logemann, T.; Wellßow, A.
2023. Modelling and Simulation 2023 - European Simulation and Modelling Conference 2023, ESM 2023, 199 – 204, EUROSIS-ETI
Veith, E. M. S. P.; Balduin, S.; Wenninghoff, N.; Wolgast, T.; Baumann, M.; Winkler, D.; Hammer, L.; Salman, A.; Schulz, M.; Raeiszadeh, A.; Logemann, T.; Wellßow, A.
2023. Modelling and Simulation 2023 - European Simulation and Modelling Conference 2023, ESM 2023, 199 – 204, EUROSIS-ETI
Collaborative Live Modelling by Language-Agnostic Versioning
Exelmans, J.; Teodorov, C.; Heinrich, R.; Egyed, A.; Vangheluwe, H.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st-6th October 2023, 364 – 374, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00067
Exelmans, J.; Teodorov, C.; Heinrich, R.; Egyed, A.; Vangheluwe, H.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st-6th October 2023, 364 – 374, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00067
How Students Plagiarize Modeling Assignments
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032
Identifying Performance Challenges in Consistency Preserving View-Based Environments
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI)
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI)
Co-Evolving Meta-Models and View Types in View-Based Development
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150
Consistency in the View-Based Development of Cyber-Physical Systems (Convide)
Reussner, R.; Schaefer, I.; Beckert, B.; Koziolek, A.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, Sweden, 01-06 October 2023, 83–84, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00026
Reussner, R.; Schaefer, I.; Beckert, B.; Koziolek, A.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, Sweden, 01-06 October 2023, 83–84, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00026
Load-and-Act: Increasing Page Coverage of Web Applications
Weidmann, N.; Barber, T.; Wressnegger, C.
2023. Information Security – 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings. Ed.: E. Athanasopoulos, 163–182, Springer Nature Switzerland. doi:10.1007/978-3-031-49187-0_9
Weidmann, N.; Barber, T.; Wressnegger, C.
2023. Information Security – 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings. Ed.: E. Athanasopoulos, 163–182, Springer Nature Switzerland. doi:10.1007/978-3-031-49187-0_9
Machine Unlearning of Features and Labels
Warnecke, A.; Pirch, L.; Wressnegger, C.; Rieck, K.
2023. Network and Distributed System Security (NDSS) Symposium 2023: 27 February - 3 March 2023, San Diego, CA, USA. doi:10.14722/ndss.2023.23087
Warnecke, A.; Pirch, L.; Wressnegger, C.; Rieck, K.
2023. Network and Distributed System Security (NDSS) Symposium 2023: 27 February - 3 March 2023, San Diego, CA, USA. doi:10.14722/ndss.2023.23087
Holistic Adversarially Robust Pruning
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023
Poster: Towards Practical Brainwave-based User Authentication
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399
Evaluating the Effectiveness of Neuroevolution for Automated GUI-Based Software Testing
Zimmermann, D.; Deubel, P.; Koziolek, A.
2023. 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), Luxembourg, Luxembourg, 11-15 September 2023, 119 – 126, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ASEW60602.2023.00021
Zimmermann, D.; Deubel, P.; Koziolek, A.
2023. 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), Luxembourg, Luxembourg, 11-15 September 2023, 119 – 126, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ASEW60602.2023.00021
GUI-Based Software Testing: An Automated Approach Using GPT-4 and Selenium WebDriver
Zimmermann, D.; Koziolek, A.
2023. 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), Luxembourg, Luxembourg, 11-15 September 2023, 171 – 174, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ASEW60602.2023.00028
Zimmermann, D.; Koziolek, A.
2023. 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), Luxembourg, Luxembourg, 11-15 September 2023, 171 – 174, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ASEW60602.2023.00028
Data-Free Backbone Fine-Tuning for Pruned Neural Networks
Holzbock, A.; Hegde, A.; Dietmayer, K.; Belagiannis, V.
2023. 2023 31st European Signal Processing Conference (EUSIPCO), Helsinki, Finland, 4-8 September 2023, 1255 – 1259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/EUSIPCO58844.2023.10290102
Holzbock, A.; Hegde, A.; Dietmayer, K.; Belagiannis, V.
2023. 2023 31st European Signal Processing Conference (EUSIPCO), Helsinki, Finland, 4-8 September 2023, 1255 – 1259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/EUSIPCO58844.2023.10290102
Composable Long-Term Security with Rewinding
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19
BAZAAR: Anonymous Resource Sharing
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957
Hybrid Testbed for Security Research in Software-Defined Networks
Windisch, F.; Abedi, K.; Doan, T.; Strufe, T.; Nguyen, G. T.
2023. 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany, 07-09 November 2023, 147–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NFV-SDN59219.2023.10329614
Windisch, F.; Abedi, K.; Doan, T.; Strufe, T.; Nguyen, G. T.
2023. 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany, 07-09 November 2023, 147–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NFV-SDN59219.2023.10329614
Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Hrsg.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) Proceedings. Co-located with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, Germany. Ed.: . Seufert, Universität Augsburg
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Hrsg.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) Proceedings. Co-located with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, Germany. Ed.: . Seufert, Universität Augsburg
Explanation-Aware Backdoors in a Nutshell
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI)
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI)
Poster: Fooling XAI with Explanation-Aware Backdoors
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379
A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US
Noah, N.; Mayer, P.; Das, S.
2023. CSCW ’23 Companion: Companion Publication of the 2023 Conference on Computer-Supported Cooperative Work and Social Computing, (CSCW ’23 Companion), Minneapolis, 14th-18th October 2023, 317 – 322, Association for Computing Machinery (ACM). doi:10.1145/3584931.3607007
Noah, N.; Mayer, P.; Das, S.
2023. CSCW ’23 Companion: Companion Publication of the 2023 Conference on Computer-Supported Cooperative Work and Social Computing, (CSCW ’23 Companion), Minneapolis, 14th-18th October 2023, 317 – 322, Association for Computing Machinery (ACM). doi:10.1145/3584931.3607007
Impact of Adaptive Packet Sampling on ML-based DDoS Detection
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150
Engineering Self-adaptive Microservice Applications: An Experience Report
Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland. doi:10.1007/978-3-031-48421-6_16
Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland. doi:10.1007/978-3-031-48421-6_16
A Toolchain for Simulation Component Specification and Identification
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7
ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101
Welcome to the Third International Workshop on Requirements Engineering for Explainable Systems (RE4ES)
Droste, J.; Klös, V.; Sadeghi, M.; Schwarnmberger, M.; Speith, T.
2023. 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, Germany, 04-05 September 2023, 307 – 308, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW57809.2023.00058
Droste, J.; Klös, V.; Sadeghi, M.; Schwarnmberger, M.; Speith, T.
2023. 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, Germany, 04-05 September 2023, 307 – 308, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW57809.2023.00058
A Vision on What Explanations of Autonomous Systems are of Interest to Lawyers
Buiten, M. C.; Dennis, L. A.; Schwammberger, M.
2023. 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, Germany, 04-05 September 2023, 332 – 336, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW57809.2023.00062
Buiten, M. C.; Dennis, L. A.; Schwammberger, M.
2023. 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, Germany, 04-05 September 2023, 332 – 336, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW57809.2023.00062
Composable Oblivious Pseudo-random Functions via Garbled Circuits
Faller, S.; Ottenhues, A.; Ottenhues, J.
2023. Progress in Cryptology – LATINCRYPT 2023 – 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings. Ed.: A. Aly, 249 – 270, Springer Nature Switzerland. doi:10.1007/978-3-031-44469-2_13
Faller, S.; Ottenhues, A.; Ottenhues, J.
2023. Progress in Cryptology – LATINCRYPT 2023 – 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings. Ed.: A. Aly, 249 – 270, Springer Nature Switzerland. doi:10.1007/978-3-031-44469-2_13
Labeling NIDS Rules with MITRE ATT&CK Techniques using ChatGPT
Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2023. 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2023. 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
Quantum Computing for Feature Model Analysis – Potentials and Challenges
Eichhorn, D.; Pett, T.; Osborne, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, Ed.: P. Arcaini, 1 – 7, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608971
Eichhorn, D.; Pett, T.; Osborne, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, Ed.: P. Arcaini, 1 – 7, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608971
The ’Choc-Machine’ - an Introduction to Algorithmic Thinking using Finite State Machines
Vielsack, A.; Klein, M.; Niesenhaus, T.; Ulbrich, M.
2023. WiPSCE ’23: Proceedings of the 18th WiPSCE Conference on Primary and Secondary Computing Education Research, Ed.: S. Sentance, Art.-Nr.: 25, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609772
Vielsack, A.; Klein, M.; Niesenhaus, T.; Ulbrich, M.
2023. WiPSCE ’23: Proceedings of the 18th WiPSCE Conference on Primary and Secondary Computing Education Research, Ed.: S. Sentance, Art.-Nr.: 25, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609772
Are Formal Contracts a useful Digital Twin of Software Systems?
Schiffl, J.; Weigl, A.
2023. Proceedings of the Workshop on Applications of Formal Methods and Digital Twins co-located with 25th International Symposium on Formal Methods (FM 2023), Ed.: S. Hallerstede, CEUR-WS
Schiffl, J.; Weigl, A.
2023. Proceedings of the Workshop on Applications of Formal Methods and Digital Twins co-located with 25th International Symposium on Formal Methods (FM 2023), Ed.: S. Hallerstede, CEUR-WS
Universally Composable Auditable Surveillance
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14
SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813
Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358
Identifying Factors Studied for Voter Trust in E-Voting – Review of Literature
Erb, Y.; Duenas-Cid, D.; Volkamer, M.
2023. E-Vote-ID 2023
Erb, Y.; Duenas-Cid, D.; Volkamer, M.
2023. E-Vote-ID 2023
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9
Composable Long-Term Security with Rewinding
Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer-Verlag
Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer-Verlag
Static Capability-Based Security for Smart Contracts
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111
Continuous T-Wise Coverage
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980
True Variability Shining Through Taxonomy Mining
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989
A Query Language for Software Architecture Information
Ammermann, J.; Jordan, S.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture : 17th European Conference, ECSA 2023, Istanbul, Turkey, 18th – 22nd September 2023, 337 – 345, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_23
Ammermann, J.; Jordan, S.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture : 17th European Conference, ECSA 2023, Istanbul, Turkey, 18th – 22nd September 2023, 337 – 345, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_23
Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6
Automated Integration of Heteregeneous Architecture Information into a Unified Model
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6
Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43
Investigating the Role of Computing Education for Informed Usage Decision-Making
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314
Automated Reverse Engineering of the Technology-Induced Software System Structure
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3
Formally Verified Algorithmic Fairness using Information-Flow Tools (Extended Abstract)
Teuber, S.; Beckert, B.
2023. Proceedings of the 2nd European Workshop on Algorithmic Fairness, Ed.: J. Alvarez, Art.-Nr.: 21, CEUR-WS
Teuber, S.; Beckert, B.
2023. Proceedings of the 2nd European Workshop on Algorithmic Fairness, Ed.: J. Alvarez, Art.-Nr.: 21, CEUR-WS
A SAT-Benchmark Set from the Approximation of Trigonometric Functions for SAT-based Verification
Hiller, K.; Weigl, A.
2023. Proceedings of SAT Competition 2023 : Solver, Benchmark and Proof Checker Descriptions. Ed.: T. Balyo, 57–60, University of Helsinki
Hiller, K.; Weigl, A.
2023. Proceedings of SAT Competition 2023 : Solver, Benchmark and Proof Checker Descriptions. Ed.: T. Balyo, 57–60, University of Helsinki
Disguising Attacks with Explanation-Aware Backdoors
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308
On the Similarity of Web Measurements Under Different Experimental Setups
Demir, N.; Hörnemann, J.; Große-Kampmann, M.; Urban, T.; Holz, T.; Pohlmann, N.; Wressnegger, C.
2023. Proceedings of the 23nd ACM Internet Measurement Conference, 23nd ACM Internet Measurement Conference (2023) Montreal, Kanada, 24.10.2023–26.10.2023, 356 – 369, Association for Computing Machinery (ACM). doi:10.1145/3618257.3624795
Demir, N.; Hörnemann, J.; Große-Kampmann, M.; Urban, T.; Holz, T.; Pohlmann, N.; Wressnegger, C.
2023. Proceedings of the 23nd ACM Internet Measurement Conference, 23nd ACM Internet Measurement Conference (2023) Montreal, Kanada, 24.10.2023–26.10.2023, 356 – 369, Association for Computing Machinery (ACM). doi:10.1145/3618257.3624795
A Classification of Software-Architectural Uncertainty Regarding Confidentiality
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5
Automating GUI-based Software Testing with GPT-3
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022
Sender-binding Key Encapsulation
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26
Refinements of Hybrid Dynamical Systems Logic
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1
Exploring Effects of Online and Face-to-Face Teaching Formats on Students’ Interest and Engagement
Marquardt, K.; Happe, L.
2023. Proceedings of The 18th WiPSCE Conference on Primary and Secondary Computing Education Research (WiPSCE ’23), ACM, Association for Computing Machinery (ACM). doi:10.1145/3605468.3605499
Marquardt, K.; Happe, L.
2023. Proceedings of The 18th WiPSCE Conference on Primary and Secondary Computing Education Research (WiPSCE ’23), ACM, Association for Computing Machinery (ACM). doi:10.1145/3605468.3605499
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441
Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots
Hemken, N.; Jacob, F.; Peller-Konrad, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2023. Proceedings of the 28th ACM Symposium on Access Control Models and Technologies. Ed.: Silvio Ranise, 55–57, Association for Computing Machinery (ACM). doi:10.1145/3589608.3595078
Hemken, N.; Jacob, F.; Peller-Konrad, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2023. Proceedings of the 28th ACM Symposium on Access Control Models and Technologies. Ed.: Silvio Ranise, 55–57, Association for Computing Machinery (ACM). doi:10.1145/3589608.3595078
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367
Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028
Model-based Confidentiality Analysis under Uncertainty
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062
On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34
VarCorC: Developing Object-Oriented Software Product Lines Using Correctness-by-Construction
Bordis, T.; Kodetzki, M.; Runge, T.; Schaefer, I.
2023. Software Engineering and Formal Methods. SEFM 2022 Collocated Workshops – AI4EA, F-IDE, CoSim-CPS, CIFMA, Berlin, Germany, September 26–30, 2022, Revised Selected Papers. Ed.: P. Masci, 156–163, Springer International Publishing. doi:10.1007/978-3-031-26236-4_13
Bordis, T.; Kodetzki, M.; Runge, T.; Schaefer, I.
2023. Software Engineering and Formal Methods. SEFM 2022 Collocated Workshops – AI4EA, F-IDE, CoSim-CPS, CIFMA, Berlin, Germany, September 26–30, 2022, Revised Selected Papers. Ed.: P. Masci, 156–163, Springer International Publishing. doi:10.1007/978-3-031-26236-4_13
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI)
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI)
SoK: Differentially Private Publication of Trajectory Data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065
Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393
Saving Bees with Computer Science: A Way to Spark Enthusiasm and Interest through Interdisciplinary Online Courses
Marquardt, K.; Happe, L.
2023. Proceedings of the 28th ACM Conference on Innovation and Technology in Computer Science Education. doi:10.1145/3587102.3588835
Marquardt, K.; Happe, L.
2023. Proceedings of the 28th ACM Conference on Innovation and Technology in Computer Science Education. doi:10.1145/3587102.3588835
Coverage-Driven Test Automation for Highly-Configurable Railway Systems
Eichhorn, D.; Pett, T.; Przigoda, N.; Kindsvater, J.; Seidl, C.; Schaefer, I.
2023. VaMoS ’23: Proceedings of the 17th International Working Conference on Variability Modelling of Software-Intensive, 23–30, Association for Computing Machinery (ACM). doi:10.1145/3571788.3571794
Eichhorn, D.; Pett, T.; Przigoda, N.; Kindsvater, J.; Seidl, C.; Schaefer, I.
2023. VaMoS ’23: Proceedings of the 17th International Working Conference on Variability Modelling of Software-Intensive, 23–30, Association for Computing Machinery (ACM). doi:10.1145/3571788.3571794
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405
RockStartIT: Authentic and Inclusive Interdisciplinary Software Engineering Courses
Happe, L.; Marquardt, K.
2023. Proceedings of the ACM/IEEE 45th International Conference on Software Engineering: Workshops Proceedings
Happe, L.; Marquardt, K.
2023. Proceedings of the ACM/IEEE 45th International Conference on Software Engineering: Workshops Proceedings
Promoting Long-Lasting Interest in Computer Science: An Analysis of High School Teachers’ Perspectives
Happe, L.; Steidlinger, I.; Wagner, I.; Marquardt, K.
2023. Proceedings of the 15th International Conference on Computer Supported Education, April 21-23, 2023, in Prague, Czech Republic. Ed.: J. Jovanovic. Vol.: 1, 337–344, SciTePress. doi:10.5220/0011986000003470
Happe, L.; Steidlinger, I.; Wagner, I.; Marquardt, K.
2023. Proceedings of the 15th International Conference on Computer Supported Education, April 21-23, 2023, in Prague, Czech Republic. Ed.: J. Jovanovic. Vol.: 1, 337–344, SciTePress. doi:10.5220/0011986000003470
A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672
Engaging Girls in Computer Science: Do Single-Gender Interdisciplinary Classes Help?
Marquardt, K.; Wagner, I.; Happe, L.
2023. ICSE ’23: Proceedings of the 45th International Conference on Software Engineering Association for Computing Machinery, New York, NY, United States, 128–140, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSE-SEET58685.2023.00019
Marquardt, K.; Wagner, I.; Happe, L.
2023. ICSE ’23: Proceedings of the 45th International Conference on Software Engineering Association for Computing Machinery, New York, NY, United States, 128–140, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSE-SEET58685.2023.00019
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI)
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI)
Understanding Person Identification through Gait
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011
"Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23
Bücher
General Data Protection Regulation. Article-by-Article Commentary
Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos
Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos
Die Zukunft der Gesundheitsberufe in Bildung und Migration
Spiecker gen. Döhmann, I.; Lehner, R.
2023. Lang
Spiecker gen. Döhmann, I.; Lehner, R.
2023. Lang
Zeitschriftenaufsätze
Special issue on Architecting Dependable Multi-paradigm Computing Systems
Scandurra, P.; Camilli, M.; Mirandola, R.; Kang, S.
2023. Computing, 105 (9), Article no: 1847. doi:10.1007/s00607-023-01202-9
Scandurra, P.; Camilli, M.; Mirandola, R.; Kang, S.
2023. Computing, 105 (9), Article no: 1847. doi:10.1007/s00607-023-01202-9
Architecting for a Sustainable Digital Society
Biffl, S.; Navarro, E.; Mirandola, R.; Weyns, D.
2023. Journal of Systems and Software, 200, Article no: 111668. doi:10.1016/j.jss.2023.111668
Biffl, S.; Navarro, E.; Mirandola, R.; Weyns, D.
2023. Journal of Systems and Software, 200, Article no: 111668. doi:10.1016/j.jss.2023.111668
Enforcing Resilience in Cyber-physical Systems via Equilibrium Verification at Runtime
Camilli, M.; Mirandola, R.; Scandurra, P.
2023. ACM Transactions on Autonomous and Adaptive Systems, 18 (3), 32 S. doi:10.1145/3584364
Camilli, M.; Mirandola, R.; Scandurra, P.
2023. ACM Transactions on Autonomous and Adaptive Systems, 18 (3), 32 S. doi:10.1145/3584364
Formally Verified Next-generation Airborne Collision Avoidance Games in ACAS X
Cleaveland, R.; Mitsch, S.; Platzer, A.
2023. ACM Transactions on Embedded Computing Systems, 22, Article no: 10. doi:10.1145/3544970
Cleaveland, R.; Mitsch, S.; Platzer, A.
2023. ACM Transactions on Embedded Computing Systems, 22, Article no: 10. doi:10.1145/3544970
Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E-Mails—Was bei Weiterleitungs-URLs in E-Mails aus Marketinggründen zu beachten ist
Veit, M.; Müllmann, D.; Volkamer, M.
2023. Computer und Recht, 39 (12), 810–816. doi:10.9785/cr-2023-391214
Veit, M.; Müllmann, D.; Volkamer, M.
2023. Computer und Recht, 39 (12), 810–816. doi:10.9785/cr-2023-391214
Towards a Research Agenda for Understanding and Managing Uncertainty in Self-Adaptive Systems
Weyns, D.; Calinescu, R.; Mirandola, R.; Tei, K.; Acosta, M.; Bencomo, N.; Bennaceur, A.; Boltz, N.; Bures, T.; Camara, J.; Diaconescu, A.; Engels, G.; Gerasimou, S.; Gerostathopoulos, I.; Getir Yaman, S.; Grassi, V.; Hahner, S.; Letier, E.; Litoiu, M.; Marsso, L.; Musil, A.; Musil, J.; Nunes Rodrigues, G.; Perez-Palacin, D.; Quin, F.; Scandurra, P.; Vallecillo, A.; Zisman, A.
2023. ACM SIGSOFT Software Engineering Notes, 48 (4), 20–36. doi:10.1145/3617946.3617951
Weyns, D.; Calinescu, R.; Mirandola, R.; Tei, K.; Acosta, M.; Bencomo, N.; Bennaceur, A.; Boltz, N.; Bures, T.; Camara, J.; Diaconescu, A.; Engels, G.; Gerasimou, S.; Gerostathopoulos, I.; Getir Yaman, S.; Grassi, V.; Hahner, S.; Letier, E.; Litoiu, M.; Marsso, L.; Musil, A.; Musil, J.; Nunes Rodrigues, G.; Perez-Palacin, D.; Quin, F.; Scandurra, P.; Vallecillo, A.; Zisman, A.
2023. ACM SIGSOFT Software Engineering Notes, 48 (4), 20–36. doi:10.1145/3617946.3617951
“Complete” Independence of the ICO and Strategic Priorities of the UK Government?
Winau, M.
2023. Computer law review international, 24 (6), 180–187. doi:10.9785/cri-2023-240605
Winau, M.
2023. Computer law review international, 24 (6), 180–187. doi:10.9785/cri-2023-240605
A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems
Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962. doi:10.1109/TITS.2023.3266828
Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962. doi:10.1109/TITS.2023.3266828
Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen
Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 39 (11), 767–776. doi:10.9785/cr-2023-391124
Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 39 (11), 767–776. doi:10.9785/cr-2023-391124
Geschlechtergerechtigkeit im Spannungsfeld von nachhaltiger und digitaler Transformation – eine interdisziplinäre Annäherung
Spiecker genannt Döhmann, I.; Ohde, F.; Blättel-Mink, B.; Draude, C.
2023. Gender, (2), 132–147. doi:10.3224/gender.v15i2.10
Spiecker genannt Döhmann, I.; Ohde, F.; Blättel-Mink, B.; Draude, C.
2023. Gender, (2), 132–147. doi:10.3224/gender.v15i2.10
Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht. Auswirkungen auf betroffene Personen
Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512. doi:10.1007/s11623-023-1807-8
Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512. doi:10.1007/s11623-023-1807-8
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Noti-fication Study Reveals Diverse Circumstances and Challenges
Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264. doi:10.56553/popets-2023-0051
Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264. doi:10.56553/popets-2023-0051
Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches
Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53. doi:10.1145/3589958
Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53. doi:10.1145/3589958
Formal Specification and Verification of JDK’s Identity Hash Map Implementation
De Boer, M.; De Gouw, S.; Klamroth, J.; Jung, C.; Ulbrich, M.; Weigl, A.
2023. Formal Aspects of Computing, 35 (3), 1–26. doi:10.1145/3594729
De Boer, M.; De Gouw, S.; Klamroth, J.; Jung, C.; Ulbrich, M.; Weigl, A.
2023. Formal Aspects of Computing, 35 (3), 1–26. doi:10.1145/3594729
Generating adaptation rule-specific neural networks
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2023. International Journal on Software Tools for Technology Transfer, 25, 733–746. doi:10.1007/s10009-023-00725-y
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2023. International Journal on Software Tools for Technology Transfer, 25, 733–746. doi:10.1007/s10009-023-00725-y
Termination and Expressiveness of Execution Strategies for Networks of Bidirectional Model Transformations
Klare, H.; Gleitze, J.
2023. Formal Aspects of Computing, 35 (3), 1–35. doi:10.1145/3543845
Klare, H.; Gleitze, J.
2023. Formal Aspects of Computing, 35 (3), 1–35. doi:10.1145/3543845
Lessons Learned on Machine Learning for Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. IEEE Security & Privacy, 21 (5), 72–77. doi:10.1109/MSEC.2023.3287207
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. IEEE Security & Privacy, 21 (5), 72–77. doi:10.1109/MSEC.2023.3287207
Roboter im Supermarkt - Eine Betrachtung haftungs- und datenschutzrechtlicher Probleme beim Einsatz von Robotern im Einzelhandel
Ebert, A.; Busch, P.; Spiecker genannt Döhmann, I.; Wendt, J.
2023. Zeitschrift für Product Compliance, (1), 16–29
Ebert, A.; Busch, P.; Spiecker genannt Döhmann, I.; Wendt, J.
2023. Zeitschrift für Product Compliance, (1), 16–29
The Future of Enterprise Information Systems
Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering, 65, 731–751. doi:10.1007/s12599-023-00839-2
Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering, 65, 731–751. doi:10.1007/s12599-023-00839-2
Explaining Cyber-Physical System Behavior with Digital Twins
Michael, J.; Schwammberger, M.; Wortmann, A.
2023. IEEE Software, 41 (1), 55–63. doi:10.1109/MS.2023.3319580
Michael, J.; Schwammberger, M.; Wortmann, A.
2023. IEEE Software, 41 (1), 55–63. doi:10.1109/MS.2023.3319580
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 2
Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105
Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105
Correctness-by-Construction: An Overview of the CorC Ecosystem
Bordis, T.; Runge, T.; Kittelmann, A.; Schaefer, I.
2023. Ada User Journal, 44 (1), 59 – 62
Bordis, T.; Runge, T.; Kittelmann, A.; Schaefer, I.
2023. Ada User Journal, 44 (1), 59 – 62
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models
Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864. doi:10.3390/s23187864
Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864. doi:10.3390/s23187864
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
Attema, T.; Fehr, S.; Klooß, M.
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36. doi:10.1007/s00145-023-09478-y
Attema, T.; Fehr, S.; Klooß, M.
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36. doi:10.1007/s00145-023-09478-y
Areas of Tension in the Application of AI and Data Protection Law
Winau, M.
2023. European Data Protection Law Review, 9 (2), 123 – 135. doi:10.21552/edpl/2023/2/7
Winau, M.
2023. European Data Protection Law Review, 9 (2), 123 – 135. doi:10.21552/edpl/2023/2/7
Evaluating Model Differencing for the Consistency Preservation of State-based Views
Wittler, J. W.; Saglam, T.; Kühn, T.
2023. The Journal of Object Technology, 22 (2), 2:1–14. doi:10.5381/jot.2023.22.2.a4
Wittler, J. W.; Saglam, T.; Kühn, T.
2023. The Journal of Object Technology, 22 (2), 2:1–14. doi:10.5381/jot.2023.22.2.a4
Weiterleitungs-URLs in E-Mails – Technische und rechtliche Aspekte
Müllmann, D.; Veit, M. F.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 275–282. doi:10.1007/s11623-023-1761-5
Müllmann, D.; Veit, M. F.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 275–282. doi:10.1007/s11623-023-1761-5
Flexible Correct-by-Construction Programming
Runge, T.; Bordis, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2023. Logical Methods in Computer Science, Volume 19, Issue 2 (2), 16:1 – 16:36. doi:10.46298/lmcs-19(2:16)2023
Runge, T.; Bordis, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2023. Logical Methods in Computer Science, Volume 19, Issue 2 (2), 16:1 – 16:36. doi:10.46298/lmcs-19(2:16)2023
Systems and software product lines of the future
ter Beek, M. H.; Schaefer, I.
2023. Journal of Systems and Software, 199, Art.-Nr.: 111622. doi:10.1016/j.jss.2023.111622
ter Beek, M. H.; Schaefer, I.
2023. Journal of Systems and Software, 199, Art.-Nr.: 111622. doi:10.1016/j.jss.2023.111622
Cryptographic protocol for privacy-preserving integration of HAZOPs in modular process plants
Chokparova, Z.; Becher, K.; Klose, A.; Strufe, T.; Urbas, L.
2023. Computers & Chemical Engineering, 176, Art.-Nr.: 108295. doi:10.1016/j.compchemeng.2023.108295
Chokparova, Z.; Becher, K.; Klose, A.; Strufe, T.; Urbas, L.
2023. Computers & Chemical Engineering, 176, Art.-Nr.: 108295. doi:10.1016/j.compchemeng.2023.108295
Combining rule- and SMT-based reasoning for verifying floating-point Java programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2023. International Journal on Software Tools for Technology Transfer, 25 (2), 185–204. doi:10.1007/s10009-022-00691-x
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2023. International Journal on Software Tools for Technology Transfer, 25 (2), 185–204. doi:10.1007/s10009-022-00691-x
Methods, approaches and applications in software-driven manufacturing
Vogel-Heuser, B.; Kleinert, T.; Schaefer, I.
2023. at - Automatisierungstechnik, 71 (5), 327–329. doi:10.1515/auto-2023-0033
Vogel-Heuser, B.; Kleinert, T.; Schaefer, I.
2023. at - Automatisierungstechnik, 71 (5), 327–329. doi:10.1515/auto-2023-0033
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0
Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at - Automatisierungstechnik, 71 (6), 443–452. doi:10.1515/auto-2022-0135
Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at - Automatisierungstechnik, 71 (6), 443–452. doi:10.1515/auto-2022-0135
A model-based mutation framework for IEC61131-3 manufacturing systems [Modellbasiertes Mutation-Framework für IEC61131-3 Fertigungssysteme]
Rosiak, K.; Linsbauer, L.; Vogel-Heuser, B.; Schaefer, I.
2023. at - Automatisierungstechnik, 71 (5), 380–390. doi:10.1515/auto-2022-0125
Rosiak, K.; Linsbauer, L.; Vogel-Heuser, B.; Schaefer, I.
2023. at - Automatisierungstechnik, 71 (5), 380–390. doi:10.1515/auto-2022-0125
Cookie-Nutzung nach Inkrafttreten des TTDSG – Zur Datenschutzkonformität des Cookie-Einsatzes auf den meistgenutzten deutschen Websites
Bohlender, M.; Dietmann, H.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 283–288. doi:10.1007/s11623-023-1762-4
Bohlender, M.; Dietmann, H.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 283–288. doi:10.1007/s11623-023-1762-4
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
Caballero, J.; Gomez, G.; Matic, S.; Sánchez, G.; Sebastián, S.; Villacañas, A.
2023. Future Generation Computer Systems, 144, 74–89. doi:10.1016/j.future.2023.02.012
Caballero, J.; Gomez, G.; Matic, S.; Sánchez, G.; Sebastián, S.; Villacañas, A.
2023. Future Generation Computer Systems, 144, 74–89. doi:10.1016/j.future.2023.02.012
Standorte der deutschen Musikindustrie in globalen Netzwerken der Musikproduktion
Marquardt, K.; Mager, C.
2023. Standort, 47 (2), 106–112. doi:10.1007/s00548-023-00831-8
Marquardt, K.; Mager, C.
2023. Standort, 47 (2), 106–112. doi:10.1007/s00548-023-00831-8
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
Kaiser, F. K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R.
2023. IEEE transactions on dependable and secure computing, 1–17. doi:10.1109/TDSC.2022.3233703
Kaiser, F. K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R.
2023. IEEE transactions on dependable and secure computing, 1–17. doi:10.1109/TDSC.2022.3233703
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices
Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security, 26 (3), Art.-Nr.: 26. doi:10.1145/3579356
Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security, 26 (3), Art.-Nr.: 26. doi:10.1145/3579356
2022
Buchaufsätze
Panorama-Abbildungen im Internet unter der DSGVO: Google Street View und Co revisited
Spiecker genannt Döhmann, I.
2022. Gestaltung der Informationsrechtsordnung: Festschrift für Thomas Dreier. Hrsg.: V. Fischer/G. Nolte/M. Senftleben/L. Specht-Riemenschneider, 427–444, Verlag C.H.Beck
Spiecker genannt Döhmann, I.
2022. Gestaltung der Informationsrechtsordnung: Festschrift für Thomas Dreier. Hrsg.: V. Fischer/G. Nolte/M. Senftleben/L. Specht-Riemenschneider, 427–444, Verlag C.H.Beck
Artificial Intelligence and Data Protection
Spiecker genannt Döhmann, I.
2022. The Cambridge Handbook of Artificial Intelligence - Global Perspectives on Law and Ethics. Hrsg.: L. DiMatteo/Chr. Poncibo/M. Cannarsa, 132–145, Cambridge Univ. Press. doi:10.1017/9781009072168.015
Spiecker genannt Döhmann, I.
2022. The Cambridge Handbook of Artificial Intelligence - Global Perspectives on Law and Ethics. Hrsg.: L. DiMatteo/Chr. Poncibo/M. Cannarsa, 132–145, Cambridge Univ. Press. doi:10.1017/9781009072168.015
Data Protection: The more the merrier - a dynamic approach learning from prior misgovernance
Spiecker genannt Döhmann, I.
2022. The Law of Global Digitality. Hrsg.: M. Kettemann, 77–95, Taylor and Francis. doi:10.4324/9781003283881-6
Spiecker genannt Döhmann, I.
2022. The Law of Global Digitality. Hrsg.: M. Kettemann, 77–95, Taylor and Francis. doi:10.4324/9781003283881-6
§ 71: Grundrechte der Digitalisierung
Spiecker genannt Döhmann, I.
2022. Handbuch des Verwaltungsrechts, Band 3. Hrsg.: W. Kahl/M. Ludwigs, 535–564, C.F. Müller
Spiecker genannt Döhmann, I.
2022. Handbuch des Verwaltungsrechts, Band 3. Hrsg.: W. Kahl/M. Ludwigs, 535–564, C.F. Müller
§ 24: Europäisches Datenschutzverwaltungsrecht
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Verwaltungsrecht der Europäischen Union. Hrsg.: J.P. Terhechte, 997–1040, Nomos
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Verwaltungsrecht der Europäischen Union. Hrsg.: J.P. Terhechte, 997–1040, Nomos
Challenges in Data Protection in Business Transactions: An Overview Over Civil Law Approaches to Data Protection and Data Ownership
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Handbook Industry 4.0 – Law, Technology, Society, 159–178, Springer-Verlag. doi:10.1007/978-3-662-64448-5_9
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Handbook Industry 4.0 – Law, Technology, Society, 159–178, Springer-Verlag. doi:10.1007/978-3-662-64448-5_9
Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group
Re-CorC-ing KeY: Correct-by-Construction Software Development Based on KeY
Bordis, T.; Cleophas, L.; Kittelmann, A.; Runge, T.; Schaefer, I.; Watson, B. W.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 80–104, Springer International Publishing. doi:10.1007/978-3-031-08166-8_5
Bordis, T.; Cleophas, L.; Kittelmann, A.; Runge, T.; Schaefer, I.; Watson, B. W.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 80–104, Springer International Publishing. doi:10.1007/978-3-031-08166-8_5
The Karlsruhe Java Verification Suite
Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. doi:10.1007/978-3-031-08166-8_14
Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. doi:10.1007/978-3-031-08166-8_14
Die Regulierungsperspektive von KI/BigData in der Wissenschaft
Spiecker genannt Döhmann, I.
2022. Künstliche Intelligenz in der Forschung. Hrsg.: C.F. Gethmann, 147–172, Springer-Verlag. doi:10.1007/978-3-662-63449-3_6
Spiecker genannt Döhmann, I.
2022. Künstliche Intelligenz in der Forschung. Hrsg.: C.F. Gethmann, 147–172, Springer-Verlag. doi:10.1007/978-3-662-63449-3_6
Dissertationen
Sublinear-Time Cellular Automata and Connections to Complexity Theory. Dissertation
Casagrande Viapiana Modanese, A.
2022, November 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153071
Casagrande Viapiana Modanese, A.
2022, November 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153071
Self-learning Anomaly Detection in Industrial Production. Dissertation
Meshram, A.
2022, November 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152361
Meshram, A.
2022, November 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152361
On Security Notions for Multi-Party Computation. Dissertation
Maier, S.
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
Maier, S.
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Dissertation
Seifermann, S.
2022. doi:10.5445/KSP/1000151563
Seifermann, S.
2022. doi:10.5445/KSP/1000151563
Consistent View-Based Management of Variability in Space and Time. Dissertation
Ananieva, S.
2022. doi:10.5445/KSP/1000151349
Ananieva, S.
2022. doi:10.5445/KSP/1000151349
Consistent View-Based Management of Variability in Space and Time. Dissertation
Ananieva, S.
2022, Juli 26. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148819
Ananieva, S.
2022, Juli 26. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148819
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Dissertation
Seifermann, S.
2022, Juli 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148748
Seifermann, S.
2022, Juli 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148748
Formal Foundations for Anonymous Communication. Dissertation
Kuhn, C.
2022, April 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144491
Kuhn, C.
2022, April 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144491
QoS-Based Optimization of Runtime Management of Sensing Cloud Applications. Dissertation
Gotin, M.
2022. KIT Scientific Publishing. doi:10.5445/KSP/1000139936
Gotin, M.
2022. KIT Scientific Publishing. doi:10.5445/KSP/1000139936
Masterarbeiten
Oblivious Pseudo-Random Functions via Garbled Circuits. Masterarbeit
Faller, S. H.
2022, September 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000158426
Faller, S. H.
2022, September 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000158426
Ein Ansatz zu anwendungsorientierten Web Analytics für Learning Analytics im Bildungsbereich. Masterarbeit
Rink, P.
2022, November 16. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156283
Rink, P.
2022, November 16. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156283
LiquidRust: Refinement Types for Imperative Languages with Ownership. Masterarbeit
Csiky, C.
2022, Oktober 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152005
Csiky, C.
2022, Oktober 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152005
Universally Composable Verifiable Random Oracles. Masterarbeit
Scheurer, T.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151607
Scheurer, T.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151607
Property Types for Mutable Data Structures in Java. Masterarbeit
Bachmeier, J.
2022, August 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000150318
Bachmeier, J.
2022, August 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000150318
Überprüfung von Schutzzielen der Informationssicherheit durch Aufzeichnung und Wiedergabe virtueller Maschinen. Masterarbeit
Liebel, M.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149965
Liebel, M.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149965
Provably Quantum-Secure Message Authentication Code. Masterarbeit
Nguyen, J.
2022, März 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149514
Nguyen, J.
2022, März 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149514
Anomaly Detection in 3D Space for Autonomous Driving. Masterarbeit
Schilling, M.
2022, Juni 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148848
Schilling, M.
2022, Juni 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148848
Architectural Generation of Context-based Attack Paths. Masterarbeit
Schenkenberger, J.
2022, Mai 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148755
Schenkenberger, J.
2022, Mai 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148755
Dynamic Extraction of Multi-Round Knowledge Argument Systems. Masterarbeit
Fickel, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146729
Fickel, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146729
Architecture-based Uncertainty Impact Analysis for Confidentiality. Masterarbeit
Benkler, N.
2022, Februar 23. doi:10.5445/IR/1000144641
Benkler, N.
2022, Februar 23. doi:10.5445/IR/1000144641
Modelling and Enforcing Access Control Requirements for Smart Contracts. Masterarbeit
Töberg, J.-P.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144204
Töberg, J.-P.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144204
Bachelorarbeiten
Modellierung und Simulation von dynamischen Container-basierten Software-Architekturen in Palladio. Bachelorarbeit
Hagel, N.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172690
Hagel, N.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172690
Kopplung von Architekturanalysen und musterbasierten Quelltextanalysen für Sicherheitseigenschaften von Aufrufabhängigkeiten. Bachelorarbeit
Traub, L.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000161472
Traub, L.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000161472
Preventing Code Insertion Attacks on Token-Based Software Plagiarism Detectors. Bachelorarbeit
Krieg, P.
2022, Oktober 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154301
Krieg, P.
2022, Oktober 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154301
A Mobility Case Study Framework for Validating Uncertainty Impact Analyses regarding Confidentiality. Bachelorarbeit
Priss, D.
2022, Oktober 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153083
Priss, D.
2022, Oktober 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153083
Uncertainty-aware Confidentiality Analysis Using Architectural Variations. Bachelorarbeit
Bitschi, T.
2022, Oktober 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153079
Bitschi, T.
2022, Oktober 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153079
A Mobility Case Study for Validating Attack Propagation Analyses. Bachelorarbeit
Evli, Y. E.
2022, November. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152514
Evli, Y. E.
2022, November. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152514
Entity Linking für Softwarearchitektur Dokumentation. Bachelorarbeit
Klaus, P. D.
2022, Oktober 10. doi:10.5445/IR/1000152122
Klaus, P. D.
2022, Oktober 10. doi:10.5445/IR/1000152122
Coreference Resolution for Software Architecture Documentation. Bachelorarbeit
Dao, Q. N.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148262
Dao, Q. N.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148262
Assessing Word Similarity Metrics For Traceability Link Recovery. Bachelorarbeit
Werber, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148261
Werber, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148261
Konsistenzerhaltung von Feature-Modellen durch externe Sichten. Bachelorarbeit
Ateş, A.
2022, Februar 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143212
Ateş, A.
2022, Februar 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143212
Proceedingsbeiträge
Runtime Equilibrium Verification for Resilient Cyber-Physical Systems
Camilli, M.; Mirandola, R.; Scandurra, P.
2022. 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Washington, D.C., 27th September-1st October 2022, 71–80, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ACSOS52086.2021.00025
Camilli, M.; Mirandola, R.; Scandurra, P.
2022. 2021 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS), Washington, D.C., 27th September-1st October 2022, 71–80, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ACSOS52086.2021.00025
Towards Trust-preserving Continuous Co-evolution of Digital Twins
Bersani, M. M.; Braghin, C.; Cortellessa, V.; Gargantini, A.; Grassi, V.; Presti, F. L.; Mirandola, R.; Pierantonio, A.; Riccobene, E.; Scandurra, P.
2022. 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), Honolulu. 12th-15th March 2022, 96–99, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00024
Bersani, M. M.; Braghin, C.; Cortellessa, V.; Gargantini, A.; Grassi, V.; Presti, F. L.; Mirandola, R.; Pierantonio, A.; Riccobene, E.; Scandurra, P.
2022. 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), Honolulu. 12th-15th March 2022, 96–99, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00024
XSA: eXplainable Self-Adaptation
Camilli, M.; Mirandola, R.; Scandurra, P.
2022. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, Art.-Nr.: 189, Association for Computing Machinery (ACM). doi:10.1145/3551349.3559552
Camilli, M.; Mirandola, R.; Scandurra, P.
2022. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, Art.-Nr.: 189, Association for Computing Machinery (ACM). doi:10.1145/3551349.3559552
Taming model uncertainty in self-adaptive systems using bayesian model averaging
Camilli, M.; Mirandola, R.; Scandurra, P.
2022. SEAMS ’22: Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems Pittsburgh, 18th-23rd May 2022, 25–35, Association for Computing Machinery (ACM). doi:10.1145/3524844.3528056
Camilli, M.; Mirandola, R.; Scandurra, P.
2022. SEAMS ’22: Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems Pittsburgh, 18th-23rd May 2022, 25–35, Association for Computing Machinery (ACM). doi:10.1145/3524844.3528056
Preserving Consistency of Interrelated Models during View-Based Evolution of Variable Systems
Ananieva, S.; Kühn, T.; Reussner, R.
2022. Proceedings of the 21st ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 148–163, Association for Computing Machinery (ACM). doi:10.1145/3564719.3568685
Ananieva, S.; Kühn, T.; Reussner, R.
2022. Proceedings of the 21st ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 148–163, Association for Computing Machinery (ACM). doi:10.1145/3564719.3568685
Implicit Definitions with Differential Equations for KeYmaera X – (System Description)
Gallicchio, J.; Tan, Y. K.; Mitsch, S.; Platzer, A.
2022. Automated Reasoning – 11th International Joint Conference, IJCAR 2022, Haifa, Israel, August 8–10, 2022, Proceedings. Ed.: J. Blanchette, 723–733, Springer International Publishing. doi:10.1007/978-3-031-10769-6_42
Gallicchio, J.; Tan, Y. K.; Mitsch, S.; Platzer, A.
2022. Automated Reasoning – 11th International Joint Conference, IJCAR 2022, Haifa, Israel, August 8–10, 2022, Proceedings. Ed.: J. Blanchette, 723–733, Springer International Publishing. doi:10.1007/978-3-031-10769-6_42
Verifying Switched System Stability With Logic
Tan, Y. K.; Mitsch, S.; Platzer, A.
2022. HSCC ’22: Proceedings of the 25th ACM International Conference on Hybrid Systems: Computation and Control, 1–11, Association for Computing Machinery (ACM). doi:10.1145/3501710.3519541
Tan, Y. K.; Mitsch, S.; Platzer, A.
2022. HSCC ’22: Proceedings of the 25th ACM International Conference on Hybrid Systems: Computation and Control, 1–11, Association for Computing Machinery (ACM). doi:10.1145/3501710.3519541
Verification Strategies for Feature-Oriented Software Product Lines
Kuiter, E.; Knüppel, A.; Bordis, T.; Runge, T.; Schaefer, I.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems. Ed.: P. Arcaini, 1–9, Association for Computing Machinery (ACM). doi:10.1145/3510466.3511272
Kuiter, E.; Knüppel, A.; Bordis, T.; Runge, T.; Schaefer, I.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems. Ed.: P. Arcaini, 1–9, Association for Computing Machinery (ACM). doi:10.1145/3510466.3511272
Towards Formal Concepts for Explanation Timing and Justifications
Bairy, A.; Hagemann, W.; Rakow, A.; Schwammberger, M.
2022. 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW), 98–102, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW56159.2022.00025
Bairy, A.; Hagemann, W.; Rakow, A.; Schwammberger, M.
2022. 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW), 98–102, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW56159.2022.00025
Welcome to the Second International Workshop on Requirements Engineering for Explainable Systems (RE4ES)
Klos, V.; Sadeghi, M.; Schwammberger, M.
2022. 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW), 81–82, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW56159.2022.00021
Klos, V.; Sadeghi, M.; Schwammberger, M.
2022. 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW), 81–82, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW56159.2022.00021
From Specification Models to Explanation Models: An Extraction and Refinement Process for Timed Automata
Schwammberger, M.; Klös, V.
2022. M. Luckcuck & M. Farrell (Hrsg.), Proceedings of 4th International Workshop on Formal Methods for Autonomous Systems, FMAS@SEFM, Ed.: M. Luckcuck, 20–37, Open Publishing Association. doi:10.4204/EPTCS.371.2
Schwammberger, M.; Klös, V.
2022. M. Luckcuck & M. Farrell (Hrsg.), Proceedings of 4th International Workshop on Formal Methods for Autonomous Systems, FMAS@SEFM, Ed.: M. Luckcuck, 20–37, Open Publishing Association. doi:10.4204/EPTCS.371.2
Towards a Digital Highway Code using Formal Modelling and Verification of Timed Automata
Alves, G. V.; Schwammberger, M.
2022. M. Luckcuck & M. Farrell (Hrsg.), Proceedings of 4th International Workshop on Formal Methods for Autonomous Systems, FMAS@SEFM, Ed.: M. Luckcuck, 77–85, Open Publishing Association. doi:10.4204/EPTCS.371.6
Alves, G. V.; Schwammberger, M.
2022. M. Luckcuck & M. Farrell (Hrsg.), Proceedings of 4th International Workshop on Formal Methods for Autonomous Systems, FMAS@SEFM, Ed.: M. Luckcuck, 77–85, Open Publishing Association. doi:10.4204/EPTCS.371.6
Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482
Learning to Find Proofs and Theorems by Learning to Refine Search Strategies The Case of Loop Invariant Synthesis
Laurent, J.; Platzer, A.
2022. 36th Conference on Neural Information Processing Systems (NeurIPS 2022), Neural information processing systems foundation
Laurent, J.; Platzer, A.
2022. 36th Conference on Neural Information Processing Systems (NeurIPS 2022), Neural information processing systems foundation
Towards Understanding First-Party Cookie Tracking in the Field
Demir, N.; Theis, D.; Urban, T.; Pohlmann, N.; Pohlmann, N.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 19–34, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_01
Demir, N.; Theis, D.; Urban, T.; Pohlmann, N.; Pohlmann, N.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 19–34, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_01
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Model-Based Fault Classification for Automotive Software
Becker, M.; Meyer, R.; Runge, T.; Schaefer, I.; van der Wall, S.; Wolff, S.
2022. Programming Languages and Systems: 20th Asian Symposium, APLAS 2022, Auckland, New Zealand, December 5, 2022, Proceedings. Ed.: I. Sergey, 110–131, Springer Nature Switzerland. doi:10.1007/978-3-031-21037-2_6
Becker, M.; Meyer, R.; Runge, T.; Schaefer, I.; van der Wall, S.; Wolff, S.
2022. Programming Languages and Systems: 20th Asian Symposium, APLAS 2022, Auckland, New Zealand, December 5, 2022, Proceedings. Ed.: I. Sergey, 110–131, Springer Nature Switzerland. doi:10.1007/978-3-031-21037-2_6
Suppress with a Patch: Revisiting Universal Adversarial Patch Attacks against Object Detection
Pavlitskaya, S.; Hendl, J.; Kleim, S.; Muller, L. J.; Wylczoch, F.; Zollner, J. M.
2022. 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME55909.2022.9988313
Pavlitskaya, S.; Hendl, J.; Kleim, S.; Muller, L. J.; Wylczoch, F.; Zollner, J. M.
2022. 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME55909.2022.9988313
Handling Environmental Uncertainty in Design Time Access Control Analysis
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067
How to Protect the Public Opinion Against New Types of Bots?
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758
Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260
Fiat-Shamir Transformation of Multi-round Interactive Proofs
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5
Anonymous Whistleblowing over Authenticated Channels
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24
Efficient Public Verification of Confidential Supply-Chain Transactions
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231
Uncertainty in coupled models of cyber-physical systems
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539
Token-based plagiarism detection for metamodels
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508
Towards a Usable and Sustainable Deductive Verification Tool
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16
Runtime Verification of Correct-by-Construction Driving Maneuvers
Kittelmann, A.; Runge, T.; Bordis, T.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 242–263, Springer International Publishing. doi:10.1007/978-3-031-19849-6_15
Kittelmann, A.; Runge, T.; Bordis, T.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 242–263, Springer International Publishing. doi:10.1007/978-3-031-19849-6_15
SpecifyThis – Bridging Gaps Between Program Specification Paradigms
Ahrendt, W.; Herber, P.; Huisman, M.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 3–6, Springer International Publishing. doi:10.1007/978-3-031-19849-6_1
Ahrendt, W.; Herber, P.; Huisman, M.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 3–6, Springer International Publishing. doi:10.1007/978-3-031-19849-6_1
X-by-Construction Meets Runtime Verification
ter Beek, M. H.; Cleophas, L.; Leucker, M.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 141–148, Springer International Publishing. doi:10.1007/978-3-031-19849-6_9
ter Beek, M. H.; Cleophas, L.; Leucker, M.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 141–148, Springer International Publishing. doi:10.1007/978-3-031-19849-6_9
An Efficient VCGen-Based Modular Verification of Relational Properties
Blatter, L.; Kosmatov, N.; Prevosto, V.; Le Gall, P.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 498–516, Springer International Publishing. doi:10.1007/978-3-031-19849-6_28
Blatter, L.; Kosmatov, N.; Prevosto, V.; Le Gall, P.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 498–516, Springer International Publishing. doi:10.1007/978-3-031-19849-6_28
Decentralizing Watchtowers for Payment Channels using IPFS
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015
La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028
Quantifying the variability mismatch between problem and solution space
Hentze, M.; Sundermann, C.; Thüm, T.; Schaefer, I.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, 322–333, Association for Computing Machinery (ACM). doi:10.1145/3550355.3552411
Hentze, M.; Sundermann, C.; Thüm, T.; Schaefer, I.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, 322–333, Association for Computing Machinery (ACM). doi:10.1145/3550355.3552411
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning in Scientific Applications
Hajiabadi, H.; Hilbert, L.; Koziolek, A.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) : Aug. 31th – Sept. 2nd, 2022, ExpoMeloneras, Maspalomas, Gran Canaria, Spain, 5–12, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00011
Hajiabadi, H.; Hilbert, L.; Koziolek, A.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) : Aug. 31th – Sept. 2nd, 2022, ExpoMeloneras, Maspalomas, Gran Canaria, Spain, 5–12, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00011
Sharp: Short Relaxed Range Proofs
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Modeling and Enforcing Access Control Policies for Smart Contracts
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013
Cyber threat intelligence enabled automated attack incident response
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254
Attuning Adaptation Rules via a Rule-Specific Neural Network
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14
A Specification Logic for Programs in the Probabilistic Guarded Command Language
Pardo, R.; Johnsen, E. B.; Schaefer, I.; Wąsowski, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 369–387, Springer International Publishing. doi:10.1007/978-3-031-17715-6_24
Pardo, R.; Johnsen, E. B.; Schaefer, I.; Wąsowski, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 369–387, Springer International Publishing. doi:10.1007/978-3-031-17715-6_24
Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2
Information Flow Control-by-Construction for an Object-Oriented Language
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44
Toward Accurate Online Multi-target Multi-camera Tracking in Real-time
Specker, A.; Beyerer, J.
2022. 30th European Signal Processing Conference (EUSIPCO), 533–537
Specker, A.; Beyerer, J.
2022. 30th European Signal Processing Conference (EUSIPCO), 533–537
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35
A Refactoring for Data Minimisation Using Formal Verification
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19
AutoArx: Digital Twins of Living Architectures
Jordan, S.; Linsbauer, L.; Schaefer, I.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 205–212, Springer International Publishing. doi:10.1007/978-3-031-16697-6_15
Jordan, S.; Linsbauer, L.; Schaefer, I.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 205–212, Springer International Publishing. doi:10.1007/978-3-031-16697-6_15
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6
Feasibility of Inconspicuous GAN-generated Adversarial Patches against Object Detection
Pavlitskaya, S.; Codău, B.-M.; Zöllner, J. M.
2022. Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022) Ed.: G. Pedroza, CEUR-WS.org
Pavlitskaya, S.; Codău, B.-M.; Zöllner, J. M.
2022. Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022) Ed.: G. Pedroza, CEUR-WS.org
Derivation of subset product lines in FeatureIDE
Linsbauer, L.; Westphal, P.; Bittner, P. M.; Krieter, S.; Thüm, T.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B, 38–41, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547033
Linsbauer, L.; Westphal, P.; Bittner, P. M.; Krieter, S.; Thüm, T.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B, 38–41, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547033
Towards an integrated approach for managing the variability and evolution of both software and hardware components
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059
Membership Inference Attack Against Principal Component Analysis
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19
ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos., 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos., 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14
Individual Verifiability with Return Codes: Manipulation Detection Efficacy
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881
Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security
Synchronizing software variants: A two-dimensional approach
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053
Architectural Optimization for Confidentiality Under Structural Uncertainty
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14
Design-time Performability Optimization of Runtime Adaptation Strategies
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471
Grasping the Concept of Decentralized Systems for Instant Messaging
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association
Feature-based Investigation of Simulation Structure and Behaviour
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120
A Comprehensive Study of k-Portfolios of Recent SAT Solvers
Bach, J.; Iser, M.; Böhm, K.
2022. 25th International Conference on Theory and Applications of Satisfiability Testing (SAT 2022). Hrsg.: Kuldeep S. Meel, 2:1–2:18, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.SAT.2022.2
Bach, J.; Iser, M.; Böhm, K.
2022. 25th International Conference on Theory and Applications of Satisfiability Testing (SAT 2022). Hrsg.: Kuldeep S. Meel, 2:1–2:18, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.SAT.2022.2
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association
Anonymizing Trajectory Data: Limitations and Opportunities
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484
Traits: Correctness-by-Construction for Free
Runge, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2022. Formal Techniques for Distributed Objects, Components, and Systems – 42nd IFIP WG 6.1 International Conference, FORTE 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 13–17, 2022, Proceedings. Ed.: M. Mousavi, 131–150, Springer International Publishing. doi:10.1007/978-3-031-08679-3_9
Runge, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2022. Formal Techniques for Distributed Objects, Components, and Systems – 42nd IFIP WG 6.1 International Conference, FORTE 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 13–17, 2022, Proceedings. Ed.: M. Mousavi, 131–150, Springer International Publishing. doi:10.1007/978-3-031-08679-3_9
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML)
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML)
Certified Verification of Relational Properties
Blatter, L.; Kosmatov, N.; Prevosto, V.; Le Gall, P.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 86–105, Springer International Publishing. doi:10.1007/978-3-031-07727-2_6
Blatter, L.; Kosmatov, N.; Prevosto, V.; Le Gall, P.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 86–105, Springer International Publishing. doi:10.1007/978-3-031-07727-2_6
Formal Specification and Verification of JDK’s Identity Hash Map Implementation
Boer, M. de; Gouw, S. de; Klamroth, J.; Jung, C.; Ulbrich, M.; Weigl, A.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 45–62, Springer International Publishing. doi:10.1007/978-3-031-07727-2_4
Boer, M. de; Gouw, S. de; Klamroth, J.; Jung, C.; Ulbrich, M.; Weigl, A.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 45–62, Springer International Publishing. doi:10.1007/978-3-031-07727-2_4
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association
Transparency for Bystanders in IoT regarding audiovisual Recordings
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
Performance-Detective: Automatic Deduction of Cheap and Accurate Performance Models
Schmid, L.; Copik, M.; Calotoiu, A.; Werle, D.; Reiter, A.; Selzer, M.; Koziolek, A.; Hoefler, T.
2022. ACM International Conference on Supercomputing (ICS ’22), Virtual Event, June 28-30, 2022, Association for Computing Machinery (ACM). doi:10.1145/3524059.3532391
Schmid, L.; Copik, M.; Calotoiu, A.; Werle, D.; Reiter, A.; Selzer, M.; Koziolek, A.; Hoefler, T.
2022. ACM International Conference on Supercomputing (ICS ’22), Virtual Event, June 28-30, 2022, Association for Computing Machinery (ACM). doi:10.1145/3524059.3532391
On CRDTs in Byzantine Environments : Conflict Freedom, Equivocation Tolerance, and the Matrix Replicated Data Type
Jacob, F.; Bayreuther, S.; Hartenstein, H.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_07
Jacob, F.; Bayreuther, S.; Hartenstein, H.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_07
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305
Inferring Interval-Valued Floating-Point Preconditions
Krämer, J.; Blatter, L.; Darulova, E.; Ulbrich, M.
2022. Tools and Algorithms for the Construction and Analysis of Systems – 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part I. Ed.: D. Fisman, 303–321, Springer International Publishing. doi:10.1007/978-3-030-99524-9_16
Krämer, J.; Blatter, L.; Darulova, E.; Ulbrich, M.
2022. Tools and Algorithms for the Construction and Analysis of Systems – 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part I. Ed.: D. Fisman, 303–321, Springer International Publishing. doi:10.1007/978-3-030-99524-9_16
PREUNN: Protocol Reverse Engineering using Neural Networks
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120
Enhancing Girls’ Feeling of Belonging to Computer Science : Possibilities of Interdisciplinary Online Courses to Increase Diversity of Learning
Marquardt, K.
2022. Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2022). Vol. 2, Association for Computing Machinery (ACM). doi:10.1145/3502717.3532108
Marquardt, K.
2022. Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2022). Vol. 2, Association for Computing Machinery (ACM). doi:10.1145/3502717.3532108
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075
Your website has been hijacked: Raising awareness for an invisible problem
Hennig, A.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Ed.: C. Wressnegger, 1–6, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_18
Hennig, A.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Ed.: C. Wressnegger, 1–6, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_18
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911
Bücher
The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday
Ahrendt, W.; Beckert, B.; Bubel, R.; Johnsen, E. B. (Hrsg.)
2022. Springer International Publishing. doi:10.1007/978-3-031-08166-8
Ahrendt, W.; Beckert, B.; Bubel, R.; Johnsen, E. B. (Hrsg.)
2022. Springer International Publishing. doi:10.1007/978-3-031-08166-8
Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers
Scandurra, P.; Galster, M.; Mirandola, R.; Weyns, D. (Hrsg.)
2022. Springer International Publishing. doi:10.1007/978-3-031-15116-3
Scandurra, P.; Galster, M.; Mirandola, R.; Weyns, D. (Hrsg.)
2022. Springer International Publishing. doi:10.1007/978-3-031-15116-3
The Law of Global Digitality
Kettemann, M. C.; Peukert, A.; Spiecker genannt Döhmann, I.
2022. Routledge. doi:10.4324/9781003283881
Kettemann, M. C.; Peukert, A.; Spiecker genannt Döhmann, I.
2022. Routledge. doi:10.4324/9781003283881
Demokratie und Öffentlichkeit im 21. Jahrhundert – zur Macht des Digitalen
Spiecker genannt Döhmann, I.; Westland, M.; Campos, R. (Hrsg.)
2022. Nomos Verlagsgesellschaft. doi:10.5771/9783748932741
Spiecker genannt Döhmann, I.; Westland, M.; Campos, R. (Hrsg.)
2022. Nomos Verlagsgesellschaft. doi:10.5771/9783748932741
Künstliche Intelligenz in der Forschung – Neue Möglichkeiten und Herausforderungen für die Wissenschaft
Gethmann, C. F.; Buxmann, P.; Distelrath, J.; Humm, B. G.; Lingner, S.; Nitsch, V.; Schmidt, J. C.; Spiecker genannt Döhmann, I.
2022. Springer-Verlag. doi:10.1007/978-3-662-63449-3
Gethmann, C. F.; Buxmann, P.; Distelrath, J.; Humm, B. G.; Lingner, S.; Nitsch, V.; Schmidt, J. C.; Spiecker genannt Döhmann, I.
2022. Springer-Verlag. doi:10.1007/978-3-662-63449-3
Zeitschriftenaufsätze
Event‐sourced, observable software architectures: An experience report
Alongi, F.; Bersani, M. M.; Ghielmetti, N.; Mirandola, R.; Tamburri, D. A.
2022. Software: Practice and Experience, 52 (10), 2127–2151. doi:10.1002/spe.3116
Alongi, F.; Bersani, M. M.; Ghielmetti, N.; Mirandola, R.; Tamburri, D. A.
2022. Software: Practice and Experience, 52 (10), 2127–2151. doi:10.1002/spe.3116
Quantitative verification with adaptive uncertainty reduction
Alasmari, N.; Calinescu, R.; Paterson, C.; Mirandola, R.
2022. Journal of Systems and Software, 188, Article no: 111275. doi:10.1016/j.jss.2022.111275
Alasmari, N.; Calinescu, R.; Paterson, C.; Mirandola, R.
2022. Journal of Systems and Software, 188, Article no: 111275. doi:10.1016/j.jss.2022.111275
Gewährleistung effektiven Grundrechtsschutzes auf Grundlage des Kommissionsentwurfs für eine KI-Verordnung?
Winau, M.
2022. Zeitschrift für das Recht der digitalen Wirtschaft (ZdiW), 3 (1), 14–19
Winau, M.
2022. Zeitschrift für das Recht der digitalen Wirtschaft (ZdiW), 3 (1), 14–19
Extra DSGVO nulla salus? - Zur weiteren Zulässigkeit nicht akkreditierter Datenschutzsiegel neben akkreditierten Gütesiegeln im Sinne der Art. 42 f. DSGVO
Müllmann, D.; Spiecker genannt Döhmann, I.
2022. Deutsches Verwaltungsblatt, 137 (4), 208–214
Müllmann, D.; Spiecker genannt Döhmann, I.
2022. Deutsches Verwaltungsblatt, 137 (4), 208–214
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 1
Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299
Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299
Grundlagen für ein gesetzliches IT-Sicherheitsrisikomanagement : Ansätze zur Vereinheitlichung von Rollenmodell, Risikomanagement und Definitionen für das IT-Sicherheitsrecht
Werner, C.; Brinker, N.; Raabe, O.
2022. Computer und Recht, 38 (12), 817–824. doi:10.9785/cr-2022-381219
Werner, C.; Brinker, N.; Raabe, O.
2022. Computer und Recht, 38 (12), 817–824. doi:10.9785/cr-2022-381219
Immutability and Encapsulation for Sound OO Information Flow Control
Runge, T.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. ACM Transactions on Programming Languages and Systems, 45 (1), Art.Nr. 3. doi:10.1145/3573270
Runge, T.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. ACM Transactions on Programming Languages and Systems, 45 (1), Art.Nr. 3. doi:10.1145/3573270
Privacy and Utility of Private Synthetic Data for Medical Data Analyses
Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320. doi:10.3390/app122312320
Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320. doi:10.3390/app122312320
On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification
Wunderlich, D.; Bernau, D.; Aldà, F.; Parra-Arnau, J.; Strufe, T.
2022. Applied Sciences, 12 (21), Art.-Nr.: 11177. doi:10.3390/app122111177
Wunderlich, D.; Bernau, D.; Aldà, F.; Parra-Arnau, J.; Strufe, T.
2022. Applied Sciences, 12 (21), Art.-Nr.: 11177. doi:10.3390/app122111177
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest
Reubold, J. L.; Escher, S.; Pflugmacher, J.; Strufe, T.
2022. Online Social Networks and Media, 31, Art.-Nr.: 100228. doi:10.1016/j.osnem.2022.100228
Reubold, J. L.; Escher, S.; Pflugmacher, J.; Strufe, T.
2022. Online Social Networks and Media, 31, Art.-Nr.: 100228. doi:10.1016/j.osnem.2022.100228
Scalability testing automation using multivariate characterization and detection of software performance antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, 193, Art.-Nr.: 111446. doi:10.1016/j.jss.2022.111446
Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, 193, Art.-Nr.: 111446. doi:10.1016/j.jss.2022.111446
Deep-learning microscopy image reconstruction with quality control reveals second-scale rearrangements in RNA polymerase II clusters
Hajiabadi, H.; Mamontova, I.; Prizak, R.; Pancholi, A.; Koziolek, A.; Hilbert, L.
2022. (K. E. Nelson, Hrsg.) PNAS Nexus, 1 (3), 1–12. doi:10.1093/pnasnexus/pgac065
Hajiabadi, H.; Mamontova, I.; Prizak, R.; Pancholi, A.; Koziolek, A.; Hilbert, L.
2022. (K. E. Nelson, Hrsg.) PNAS Nexus, 1 (3), 1–12. doi:10.1093/pnasnexus/pgac065
Decentralized Review and Attestation of Software Attribute Claims
Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access, 10, 66694–66710. doi:10.1109/ACCESS.2022.3185046
Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access, 10, 66694–66710. doi:10.1109/ACCESS.2022.3185046
Family-Based and Product-Based Development of Correct-by-Construction Software Product Lines
Bordis, T.; Runge, T.; Schultz, D.; Schaefer, I.
2022. Journal of Computer Languages, 70, Art.-Nr.: 101119. doi:10.1016/j.cola.2022.101119
Bordis, T.; Runge, T.; Schultz, D.; Schaefer, I.
2022. Journal of Computer Languages, 70, Art.-Nr.: 101119. doi:10.1016/j.cola.2022.101119
Agiles Produktionssystem mittels lernender Roboter bei ungewissen Produktzuständen am Beispiel der Anlasser-Demontage = Concept of an agile production system based on learning robots applied to disassembly
Lanza, G.; Asfour, T.; Beyerer, J.; Deml, B.; Fleischer, J.; Heizmann, M.; Furmans, K.; Hofmann, C.; Cebulla, A.; Dreher, C.; Kaiser, J.-P.; Klein, J.-F.; Leven, F.; Mangold, S.; Mitschke, N.; Stricker, N.; Pfrommer, J.; Wu, C.; Wurster, M.; Zaremski, M.
2022. at - Automatisierungstechnik, 70 (6), 504–516. doi:10.1515/auto-2021-0158
Lanza, G.; Asfour, T.; Beyerer, J.; Deml, B.; Fleischer, J.; Heizmann, M.; Furmans, K.; Hofmann, C.; Cebulla, A.; Dreher, C.; Kaiser, J.-P.; Klein, J.-F.; Leven, F.; Mangold, S.; Mitschke, N.; Stricker, N.; Pfrommer, J.; Wu, C.; Wurster, M.; Zaremski, M.
2022. at - Automatisierungstechnik, 70 (6), 504–516. doi:10.1515/auto-2021-0158
Manipulative Designs von Cookies – Manipulative Designs von Cookies Tricks, um die Einwilligung von Website-Besucherinnen und -Besuchern zum Sammeln und Auswerten von Nutzerdaten über Cookies zu erhalten
Lehr, F.; Dietmann, H.; Krisam, C.; Volkamer, M.
2022. Datenschutz und Datensicherheit - DuD, 46 (5), 296–300. doi:10.1007/s11623-022-1606-7
Lehr, F.; Dietmann, H.; Krisam, C.; Volkamer, M.
2022. Datenschutz und Datensicherheit - DuD, 46 (5), 296–300. doi:10.1007/s11623-022-1606-7
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
Private Function Evaluation with Cards
Koch, A.; Walzer, S.
2022. New Generation Computing, 40, 115–147. doi:10.1007/s00354-021-00149-9
Koch, A.; Walzer, S.
2022. New Generation Computing, 40, 115–147. doi:10.1007/s00354-021-00149-9
Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2022. The journal of systems and software, 184, Art.-Nr. 111138. doi:10.1016/j.jss.2021.111138
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2022. The journal of systems and software, 184, Art.-Nr. 111138. doi:10.1016/j.jss.2021.111138
Challenges and Common Solutions in Smart Contract Development
Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2022. IEEE transactions on software engineering, 48 (11), 4291–4318. doi:10.1109/TSE.2021.3116808
Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2022. IEEE transactions on software engineering, 48 (11), 4291–4318. doi:10.1109/TSE.2021.3116808
2021
Buchaufsätze
Living with Uncertainty in Model-Based Development
Bernardi, S.; Famelis, M.; Jézéquel, J.-M.; Mirandola, R.; Palacin, D. P.; Polack, F. A. C.; Trubiani, C.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 159–185, Springer International Publishing. doi:10.1007/978-3-030-81915-6_8
Bernardi, S.; Famelis, M.; Jézéquel, J.-M.; Mirandola, R.; Palacin, D. P.; Polack, F. A. C.; Trubiani, C.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 159–185, Springer International Publishing. doi:10.1007/978-3-030-81915-6_8
Foundations
Talcott, C.; Ananieva, S.; Bae, K.; Combemale, B.; Heinrich, R.; Hills, M.; Khakpour, N.; Reussner, R.; Rumpe, B.; Scandurra, P.; Vangheluwe, H.; Durán, F.; Zschaler, S.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 9–37, Springer International Publishing. doi:10.1007/978-3-030-81915-6_2
Talcott, C.; Ananieva, S.; Bae, K.; Combemale, B.; Heinrich, R.; Hills, M.; Khakpour, N.; Reussner, R.; Rumpe, B.; Scandurra, P.; Vangheluwe, H.; Durán, F.; Zschaler, S.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 9–37, Springer International Publishing. doi:10.1007/978-3-030-81915-6_2
Challenges in the Evolution of Palladio—Refactoring Design Smells in a Historically-Grown Approach to Software Architecture Analysis
Heinrich, R.; Henss, J.; Koch, S.; Reussner, R.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 235–257, Springer International Publishing. doi:10.1007/978-3-030-81915-6_11
Heinrich, R.; Henss, J.; Koch, S.; Reussner, R.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 235–257, Springer International Publishing. doi:10.1007/978-3-030-81915-6_11
Integration and Orchestration of Analysis Tools
Heinrich, R.; Bousse, E.; Koch, S.; Rensink, A.; Riccobene, E.; Ratiu, D.; Sirjani, M.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 71–95, Springer International Publishing. doi:10.1007/978-3-030-81915-6_5
Heinrich, R.; Bousse, E.; Koch, S.; Rensink, A.; Riccobene, E.; Ratiu, D.; Sirjani, M.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 71–95, Springer International Publishing. doi:10.1007/978-3-030-81915-6_5
Tactile computing: Essential building blocks for the Tactile Internet
Aßmann, U.; Baier, C.; Dubslaff, C.; Grzelak, D.; Hanisch, S.; Hartono, A. P. P.; Köpsell, S.; Lin, T.; Strufe, T.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 293–317, Academic Press. doi:10.1016/B978-0-12-821343-8.00025-3
Aßmann, U.; Baier, C.; Dubslaff, C.; Grzelak, D.; Hanisch, S.; Hartono, A. P. P.; Köpsell, S.; Lin, T.; Strufe, T.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 293–317, Academic Press. doi:10.1016/B978-0-12-821343-8.00025-3
Intelligent networks
Cabrera G., J. A.; Fitzek, F. H. P.; Hanisch, S.; Itting, S. A. W.; Zhang, J.; Zimmermann, S.; Strufe, T.; Simsek, M.; Fetzer, C. W.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 131–149, Academic Press. doi:10.1016/B978-0-12-821343-8.00017-4
Cabrera G., J. A.; Fitzek, F. H. P.; Hanisch, S.; Itting, S. A. W.; Zhang, J.; Zimmermann, S.; Strufe, T.; Simsek, M.; Fetzer, C. W.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 131–149, Academic Press. doi:10.1016/B978-0-12-821343-8.00017-4
Befugnisse des Staates nach dem Infektionsschutzgesetz
Bretthauer, S.
2021. Religionsfreiheit in Seuchenzeiten. Hrsg.: S. Mückl, 61–83, Duncker & Humblot
Bretthauer, S.
2021. Religionsfreiheit in Seuchenzeiten. Hrsg.: S. Mückl, 61–83, Duncker & Humblot
§ 23: Informationsverwaltung
Spiecker gen. Döhmann, I.
2021. Handbuch des Verwaltungsrechts. Hrsg.: W. Kahl. Bd. 1, 891–938, C.F. Müller
Spiecker gen. Döhmann, I.
2021. Handbuch des Verwaltungsrechts. Hrsg.: W. Kahl. Bd. 1, 891–938, C.F. Müller
The legal framework for access to data from a data protection viewpoint - especially under GDPR
Spiecker gen. Döhmann, I.
2021. Data Access, Consumer Interests and Public Welfare, 175–208, Nomos Verlagsgesellschaft. doi:10.5771/9783748924999-175
Spiecker gen. Döhmann, I.
2021. Data Access, Consumer Interests and Public Welfare, 175–208, Nomos Verlagsgesellschaft. doi:10.5771/9783748924999-175
Governance im lernenden Gesundheitssystem : Anforderungen an eine gesamtheitliche Steuerung von Plattformen
Spiecker gen. Döhmann, I.
2021. Perspektive Gesundheit 2030. Hrsg.: J. Baas, 45–53, Medizinisch Wissenschaftliche Verlagsgesellschaft mbH & Co. KG (MWV)
Spiecker gen. Döhmann, I.
2021. Perspektive Gesundheit 2030. Hrsg.: J. Baas, 45–53, Medizinisch Wissenschaftliche Verlagsgesellschaft mbH & Co. KG (MWV)
Staatliche oder private Algorithmenregulierung?
Spiecker gen. Döhmann, I.
2021. Bitburger Gespräche : Jahrbuch 2020. Hrsg. von der Stiftung Gesellschaft für Rechtspolitik, Trier und dem Institut für Rechtspolitik an der Universität Trier, 37–57, Beck
Spiecker gen. Döhmann, I.
2021. Bitburger Gespräche : Jahrbuch 2020. Hrsg. von der Stiftung Gesellschaft für Rechtspolitik, Trier und dem Institut für Rechtspolitik an der Universität Trier, 37–57, Beck
Section II: Health protection and personal data protection in selected Member States, The impact of EU Regulation 2016/679 on the German health system
Spiecker gen. Döhmann, I.
2021. The protection of personal data concerning health at the European level: a comparative analysis. Ed.: G. Fares, 83–100, G. Giapichelli
Spiecker gen. Döhmann, I.
2021. The protection of personal data concerning health at the European level: a comparative analysis. Ed.: G. Fares, 83–100, G. Giapichelli
§ 4 HDSIG - Videoüberwachung öffentlich zugänglicher Räume
Spiecker gen. Döhmann, I.
2021. Hessisches Datenschutz- und Informationsfreiheitsgesetz. Hrsg.: A. Roßnagel, 107–117, Nomos Verlagsgesellschaft
Spiecker gen. Döhmann, I.
2021. Hessisches Datenschutz- und Informationsfreiheitsgesetz. Hrsg.: A. Roßnagel, 107–117, Nomos Verlagsgesellschaft
§ 24 Europäisches Datenschutzrecht
Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft
Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft
Dynamic Model Based Detection of Cyberattacks in Industrial Facilities
Reibelt, K.; Keller, H. B.; Hagenmeyer, V.; Matthes, J.
2021. 31st European Symposium on Computer Aided Process Engineering: ESCAPE-31. Ed.: M. Türkay, 1339–1344, Elsevier. doi:10.1016/B978-0-323-88506-5.50206-0
Reibelt, K.; Keller, H. B.; Hagenmeyer, V.; Matthes, J.
2021. 31st European Symposium on Computer Aided Process Engineering: ESCAPE-31. Ed.: M. Türkay, 1339–1344, Elsevier. doi:10.1016/B978-0-323-88506-5.50206-0
Human Factors in Security
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-32795-8_5
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-32795-8_5
Information Management
Spiecker gen. Döhmann, I.
2021. Oxford Handbook on Comparative Law. Ed.: P. Cane, Oxford Univ. Pr
Spiecker gen. Döhmann, I.
2021. Oxford Handbook on Comparative Law. Ed.: P. Cane, Oxford Univ. Pr
Dissertationen
Formal Specification and Verification for Automated Production Systems. Dissertation
Weigl, A. S.
2021, Dezember 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140942
Weigl, A. S.
2021, Dezember 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140942
Architectural Alignment of Access Control Requirements Extracted from Business Processes. Dissertation
Pilipchuk, R.
2021, Dezember 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140856
Pilipchuk, R.
2021, Dezember 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140856
On Foundations of Protecting Computations. Dissertation
Agrikola, T.
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Agrikola, T.
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Building Transformation Networks for Consistent Evolution of Interrelated Models. Dissertation
Klare, H.
2021, Juni 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133724
Klare, H.
2021, Juni 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133724
QoS-Based Optimization of Runtime Management of Sensing Cloud Applications. Dissertation
Gotin, M.
2021, Juni 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133328
Gotin, M.
2021, Juni 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133328
Masterarbeiten
Composable Definitions of Long-Term Security for Commitment Schemes and their Applications. Masterarbeit
Eilebrecht, S.
2021, Februar 28. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157596
Eilebrecht, S.
2021, Februar 28. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157596
Commit-Based Continuous Integration of Performance Models. Masterarbeit
Armbruster, M.
2021, September 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154588
Armbruster, M.
2021, September 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154588
Estimating the Cost of Superposition Attacks on Lightweight Cryptography on Fault-Tolerant Quantum Systems. Masterarbeit
Hägele, F.
2021, Dezember 23. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149513
Hägele, F.
2021, Dezember 23. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149513
Ein Rahmenwerk für Evaluierung von Interdisziplinären Lerneinheiten für den Informatikunterricht. Masterarbeit
Marquardt, K.
2021, Dezember 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143548
Marquardt, K.
2021, Dezember 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143548
Derivation of Change Sequences from State-Based File Differences for Delta-Based Model Consistency. Masterarbeit
Wittler, J. W.
2021, Juni 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000141972
Wittler, J. W.
2021, Juni 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000141972
Securing Process Execution by Verifying the Inner Process State Through Recording and Replaying on Different Platforms. Masterarbeit
Schäfer, M.
2021, Dezember 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000141188
Schäfer, M.
2021, Dezember 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000141188
Architectural Uncertainty Analysis for Access Control Scenarios in Industry 4.0. Masterarbeit
Boltz, N.
2021. doi:10.5445/IR/1000135847
Boltz, N.
2021. doi:10.5445/IR/1000135847
Verifiable Random Oracles. Masterarbeit
Diekhoff, K.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000135426
Diekhoff, K.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000135426
FortifiedIPS: Increasing the Security of Multi-Party Computation by Diverse Redundancy. Masterarbeit
Vogl, J.
2021, Februar 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131909
Vogl, J.
2021, Februar 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131909
Methodology for Evaluating a Domain-Specific Model Transformation Language. Masterarbeit
Gleitze, J.
2021. doi:10.5445/IR/1000131642
Gleitze, J.
2021. doi:10.5445/IR/1000131642
Bachelorarbeiten
Ein Datensatz handgezeichneter UML-Klassendiagramme für maschinelle Lernverfahren. Bachelorarbeit
Schumacher, P. N.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146736
Schumacher, P. N.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146736
Enabling the Information Transfer between Architecture and Source Code for Security Analysis. Bachelorarbeit
Häring, J.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000142571
Häring, J.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000142571
Analyse von Entwurfsentscheidungen in natürlichsprachiger Softwarearchitekturdokumentation. Bachelorarbeit
Sauer, B.
2021, Oktober 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139681
Sauer, B.
2021, Oktober 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139681
Komposition von Trace Link Recovery Ansätzen. Bachelorarbeit
Winter, I.
2021, Oktober 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139680
Winter, I.
2021, Oktober 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139680
Einfluss dynamischer Kontexterweiterungen auf die Schlussfolgerungsfähigkeiten neuronaler Sprachmodelle. Bachelorarbeit
Schmitt, S.
2021, August 23. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139679
Schmitt, S.
2021, August 23. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139679
Exploring the Robustness of the Natural Language Inference Capabilties of T5. Bachelorarbeit
Grötzinger, D.
2021, Juni 21. doi:10.5445/IR/1000139678
Grötzinger, D.
2021, Juni 21. doi:10.5445/IR/1000139678
Design Space Evaluation for Confidentiality under Architectural Uncertainty. Bachelorarbeit
Liu, O.
2021, September 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139590
Liu, O.
2021, September 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139590
On the Impossibility of Unconditionally Secure Quantum Bit Commitment. Bachelorarbeit
Haizmann, F.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000132586
Haizmann, F.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000132586
The Feasibility of Limiting Access to Fingerprintable Surfaces in Web Browsers. Bachelorarbeit
Gretenkort, J.
2021, März 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131038
Gretenkort, J.
2021, März 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131038
Proceedingsbeiträge
NaturalNets: Simplified Biological Neural Networks for Learning Complex Tasks
Zimmermann, D.; Jurgens, B.; Deubel, P.; Koziolek, A.
2021. 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Prag, 27th September 2021 - 1st October 2021, 4896–4902, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IROS51168.2021.9636471
Zimmermann, D.; Jurgens, B.; Deubel, P.; Koziolek, A.
2021. 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Prag, 27th September 2021 - 1st October 2021, 4896–4902, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IROS51168.2021.9636471
Integration of a formal specification approach into CPPS engineering workflow for machinery validation
Vogel-Heuser, B.; Huber, C.; Cha, S.; Beckert, B.
2021. 2021 IEEE 19th International Conference on Industrial Informatics (INDIN), 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN45523.2021.9557505
Vogel-Heuser, B.; Huber, C.; Cha, S.; Beckert, B.
2021. 2021 IEEE 19th International Conference on Industrial Informatics (INDIN), 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN45523.2021.9557505
The Tao way to anti-fragile software architectures: the case of mobile applications
Grassi, V.; Mirandola, R.
2021. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C), 86–89, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00021
Grassi, V.; Mirandola, R.
2021. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C), 86–89, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00021
Performance Modelling of Intelligent Transportation Systems: Experience Report
Pagliari, L.; D’Angelo, M.; Caporuscio, M.; Mirandola, R.; Trubiani, C.
2021. Companion of the ACM/SPEC International Conference on Performance Engineering, 19. - 23.4.2021, 155–160, Association for Computing Machinery (ACM). doi:10.1145/3447545.3451205
Pagliari, L.; D’Angelo, M.; Caporuscio, M.; Mirandola, R.; Trubiani, C.
2021. Companion of the ACM/SPEC International Conference on Performance Engineering, 19. - 23.4.2021, 155–160, Association for Computing Machinery (ACM). doi:10.1145/3447545.3451205
A Verified Decision Procedure for Univariate Real Arithmetic with the BKR Algorithm
Cordwell, K.; Tan, Y. K.; Platzer, A.
2021. 12th International Conference on Interactive Theorem Proving (ITP 2021), 1–14, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.ITP.2021.14
Cordwell, K.; Tan, Y. K.; Platzer, A.
2021. 12th International Conference on Interactive Theorem Proving (ITP 2021), 1–14, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.ITP.2021.14
Verified Quadratic Virtual Substitution for Real Arithmetic
Scharager, M.; Cordwell, K.; Mitsch, S.; Platzer, A.
2021. Formal Methods – 24th International Symposium, FM 2021, Virtual Event, November 20–26, 2021, Proceedings. Ed.: M. Huisman, 200–217, Springer International Publishing. doi:10.1007/978-3-030-90870-6_11
Scharager, M.; Cordwell, K.; Mitsch, S.; Platzer, A.
2021. Formal Methods – 24th International Symposium, FM 2021, Virtual Event, November 20–26, 2021, Proceedings. Ed.: M. Huisman, 200–217, Springer International Publishing. doi:10.1007/978-3-030-90870-6_11
Deductive Stability Proofs for Ordinary Differential Equations
Tan, Y. K.; Platzer, A.
2021. Tools and Algorithms for the Construction and Analysis of Systems – 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. Groote, 181–199, Springer International Publishing. doi:10.1007/978-3-030-72013-1_10
Tan, Y. K.; Platzer, A.
2021. Tools and Algorithms for the Construction and Analysis of Systems – 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. Groote, 181–199, Springer International Publishing. doi:10.1007/978-3-030-72013-1_10
Model-Driven Reverse Engineering of Technology-Induced Architecture for Quality Prediction
Kirschner, Y. R.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich., CEUR-WS.org
Kirschner, Y. R.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich., CEUR-WS.org
Who Controls Your Robot? An Evaluation of ROS Security Mechanisms
Goerke, N.; Timmermann, D.; Baumgart, I.
2021. 2021 7th International Conference on Automation, Robotics and Applications (ICARA), Prague, Czech Republic, 04-06 February 2021, 60–66, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICARA51699.2021.9376468
Goerke, N.; Timmermann, D.; Baumgart, I.
2021. 2021 7th International Conference on Automation, Robotics and Applications (ICARA), Prague, Czech Republic, 04-06 February 2021, 60–66, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICARA51699.2021.9376468
Tutorial: The Correctness-by-Construction Approach to Programming Using CorC
Schaefer, I.; Runge, T.; Cleophas, L.; Watson, B. W.
2021. 2021 IEEE Secure Development Conference (SecDev), 1–2, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SecDev51306.2021.00012
Schaefer, I.; Runge, T.; Cleophas, L.; Watson, B. W.
2021. 2021 IEEE Secure Development Conference (SecDev), 1–2, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SecDev51306.2021.00012
Teaching Correctness-by-Construction and Post-hoc Verification – The Online Experience
Runge, T.; Bordis, T.; Thüm, T.; Schaefer, I.
2021. Formal Methods Teaching: 4th International Workshop and Tutorial, FMTea 2021, Virtual Event, November 21, 2021, Proceedings. Ed.: J. Ferreira, 101–116, Springer International Publishing. doi:10.1007/978-3-030-91550-6_8
Runge, T.; Bordis, T.; Thüm, T.; Schaefer, I.
2021. Formal Methods Teaching: 4th International Workshop and Tutorial, FMTea 2021, Virtual Event, November 21, 2021, Proceedings. Ed.: J. Ferreira, 101–116, Springer International Publishing. doi:10.1007/978-3-030-91550-6_8
A Quest of Self-Explainability: When Causal Diagrams meet Autonomous Urban Traffic Manoeuvres
Schwammberger, M.
2021. T. Yue & M. Mirakhorli (Hrsg.), 29th IEEE International Requirements Engineering Conference Workshops, RE 2021 Workshops, Notre Dame, IN, USA, September 20-24, 2021, Ed.: T. Yue, 195–199, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW53955.2021.00035
Schwammberger, M.
2021. T. Yue & M. Mirakhorli (Hrsg.), 29th IEEE International Requirements Engineering Conference Workshops, RE 2021 Workshops, Notre Dame, IN, USA, September 20-24, 2021, Ed.: T. Yue, 195–199, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW53955.2021.00035
Extending Urban Multi-Lane Spatial Logic to Formalise Road Junction Rules
Schwammberger, M.; Vaz Alves, G.
2021. Proceedings Third Workshop on Formal Methods for Autonomous Systems, FMAS 2021, Virtual, 21st-22nd of October 2021, Ed.: M. Farrell, 1–19, Open Publishing Association. doi:10.4204/EPTCS.348.1
Schwammberger, M.; Vaz Alves, G.
2021. Proceedings Third Workshop on Formal Methods for Autonomous Systems, FMAS 2021, Virtual, 21st-22nd of October 2021, Ed.: M. Farrell, 1–19, Open Publishing Association. doi:10.4204/EPTCS.348.1
Datenschutz durch Technikgestaltung und unternehmerische Strategie in der Digitalwirtschaft : Verhaltenssteuernde Elemente der DSGVO im Licht einer spieltheoretischen Analyse am Beispiel von Art. 25 Abs. 1
Winau, M.; Kaiser, F. K.; Wiens, M.; Schultmann, F.; Spiecker genannt Döhmann, I.
2021. INFORMATIK 2021 : Computer Science and Sustainability: Proceedings, Berlin, 27.09.-01.10.2021, Gesellschaft für Informatik (GI)
Winau, M.; Kaiser, F. K.; Wiens, M.; Schultmann, F.; Spiecker genannt Döhmann, I.
2021. INFORMATIK 2021 : Computer Science and Sustainability: Proceedings, Berlin, 27.09.-01.10.2021, Gesellschaft für Informatik (GI)
Towards Managing and Organizing Research Activities
Kaplan, A.; Rapp, M.; Ananieva, S.; Hajiabad, H.; Kühn, R.; Mazkatli, M.; Schmid, L.; Singh, S.
2021. 8th ACM Celebration of Women in Computing: womENcourage 2021
Kaplan, A.; Rapp, M.; Ananieva, S.; Hajiabad, H.; Kühn, R.; Mazkatli, M.; Schmid, L.; Singh, S.
2021. 8th ACM Celebration of Women in Computing: womENcourage 2021
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054
Consistent management of variability in space and time
Ananieva, S.
2021. Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume B, 7–12, Association for Computing Machinery (ACM). doi:10.1145/3461002.3473067
Ananieva, S.
2021. Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume B, 7–12, Association for Computing Machinery (ACM). doi:10.1145/3461002.3473067
Preface to the 3rd Multi-Paradigm Modeling for Cyber-Physical Systems (MPM4CPS 2021)
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Gerking, C.; Schubert, D.
2021. A. Koziolek, I. Schaefer & C. Seidl (Hrsg.), Software Engineering 2021 : Fachtagung 22.-26. Februar 2020 Braunschweig/Virtuell / Anne Koziolek, Ina Schaefer, Christoph Seidl, 43–44, Gesellschaft für Informatik (GI). doi:10.18420/SE2021_10
Gerking, C.; Schubert, D.
2021. A. Koziolek, I. Schaefer & C. Seidl (Hrsg.), Software Engineering 2021 : Fachtagung 22.-26. Februar 2020 Braunschweig/Virtuell / Anne Koziolek, Ina Schaefer, Christoph Seidl, 43–44, Gesellschaft für Informatik (GI). doi:10.18420/SE2021_10
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064
Attack Forecast and Prediction
Kaiser, F.; Budig, T.; Goebel, E.; Fischer, T.; Muff, J.; Wiens, M.; Schultmann, F.
2021. C&ESAR 2021: Automation in Cybersecurity ; Proceedings of the 28th Computer & Electronics Security Application Rendezvous co-located with the 6th European Cyber Week (ECW 2021) ; Rennes, France, November 16-17, 2021. Ed.: G. Le Guernic, 77–97, CEUR-WS.org
Kaiser, F.; Budig, T.; Goebel, E.; Fischer, T.; Muff, J.; Wiens, M.; Schultmann, F.
2021. C&ESAR 2021: Automation in Cybersecurity ; Proceedings of the 28th Computer & Electronics Security Application Rendezvous co-located with the 6th European Cyber Week (ECW 2021) ; Rennes, France, November 16-17, 2021. Ed.: G. Le Guernic, 77–97, CEUR-WS.org
Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on Security
Demir, N.; Urban, T.; Wittek, K.; Pohlmann, N.
2021. Passive and active measurement : 22nd international conference, PAM 2021, virtual event, March 29 - April 1, 2021 : proceedings . Ed.: O. Hohlfeld, 76–92, Springer International Publishing. doi:10.1007/978-3-030-72582-2_5
Demir, N.; Urban, T.; Wittek, K.; Pohlmann, N.
2021. Passive and active measurement : 22nd international conference, PAM 2021, virtual event, March 29 - April 1, 2021 : proceedings . Ed.: O. Hohlfeld, 76–92, Springer International Publishing. doi:10.1007/978-3-030-72582-2_5
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer-Verlag. doi:10.1007/978-3-030-92075-3_23
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer-Verlag. doi:10.1007/978-3-030-92075-3_23
Upper Bound Computation of Information Leakages for Unbounded Recursion
Bechberger, J.; Weigl, A.
2021. Software Engineering and Formal Methods: 19th International Conference, SEFM 2021, Virtual Event, December 6–10, 2021, Proceedings. Ed.: R. Calinescu, 160–177, Springer-Verlag. doi:10.1007/978-3-030-92124-8_10
Bechberger, J.; Weigl, A.
2021. Software Engineering and Formal Methods: 19th International Conference, SEFM 2021, Virtual Event, December 6–10, 2021, Proceedings. Ed.: R. Calinescu, 160–177, Springer-Verlag. doi:10.1007/978-3-030-92124-8_10
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Mitigating Internal, Stealthy DoS Attacks in Microservice Networks
Osman, A.; Born, J.; Strufe, T.
2021. Stabilization, Safety, and Security of Distributed Systems : 23rd International Symposium, SSS 2021, Virtual Event, November 17–20, 2021, Proceedings. Ed.: C. Johnen, 500–504, Springer. doi:10.1007/978-3-030-91081-5_37
Osman, A.; Born, J.; Strufe, T.
2021. Stabilization, Safety, and Security of Distributed Systems : 23rd International Symposium, SSS 2021, Virtual Event, November 17–20, 2021, Proceedings. Ed.: C. Johnen, 500–504, Springer. doi:10.1007/978-3-030-91081-5_37
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Frontiers of transdisciplinary research in tactile Internet with Human-in-the-Loop
Fitzek, F. H. P.; Li, S.-C.; Speidel, S.; Strufe, T.; Seeling, P.
2021. 2021 17th International Symposium on Wireless Communication Systems (ISWCS): 6-9 September 2021, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISWCS49558.2021.9562223
Fitzek, F. H. P.; Li, S.-C.; Speidel, S.; Strufe, T.; Seeling, P.
2021. 2021 17th International Symposium on Wireless Communication Systems (ISWCS): 6-9 September 2021, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISWCS49558.2021.9562223
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Hrsg.), 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Hrsg.), 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13
Knowledge-based Sense Disambiguation of Multiword Expressions in Requirements Documents
Hey, T.; Keim, J.; Tichy, W. F.
2021. 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW), Notre Dame, IN, USA, 20-24 Sept. 2021, 70–76, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW53955.2021.00017
Hey, T.; Keim, J.; Tichy, W. F.
2021. 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW), Notre Dame, IN, USA, 20-24 Sept. 2021, 70–76, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW53955.2021.00017
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830
Sketches and Natural Language in Agile Modeling
Fuchß, D.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, Paper-ID: 94
Fuchß, D.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, Paper-ID: 94
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, RWTH Aachen
Hahner, S.
2021. 15th European Conference on Software Architecture - Companion (ECSA-C 2021), Virtual online (originally: Växjö, Sweden), September, 13-17, 2021. Ed.: R. Heinrich, RWTH Aachen
On Forging SPHINCS -Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI)
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI)
Quantifying Software Reliability via Model-Counting
Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer-Verlag. doi:10.1007/978-3-030-85172-9_4
Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer-Verlag. doi:10.1007/978-3-030-85172-9_4
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture. Ed.: S. Biffl, 101–116, Springer-Verlag. doi:10.1007/978-3-030-86044-8_7
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture. Ed.: S. Biffl, 101–116, Springer-Verlag. doi:10.1007/978-3-030-86044-8_7
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS)
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS)
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Roy, A.; Andreeva, E.; Sauer, J. F.
2021. Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Ed.: O. Dunkelman, 273–300, Springer International Publishing. doi:10.1007/978-3-030-81652-0_11
Roy, A.; Andreeva, E.; Sauer, J. F.
2021. Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Ed.: O. Dunkelman, 273–300, Springer International Publishing. doi:10.1007/978-3-030-81652-0_11
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024
Lower Bounds and Hardness Magnification for Sublinear-Time Shrinking Cellular Automata
Modanese, A.
2021. Computer Science – Theory and Applications : 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28–July 2, 2021, Proceedings. Ed.: R. Santhanam, 296–320, Springer-Verlag. doi:10.1007/978-3-030-79416-3_18
Modanese, A.
2021. Computer Science – Theory and Applications : 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28–July 2, 2021, Proceedings. Ed.: R. Santhanam, 296–320, Springer-Verlag. doi:10.1007/978-3-030-79416-3_18
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037
Runtime Verification of Generalized Test Tables
Weigl, A.; Ulbrich, M.; Tyszberowicz, S.; Klamroth, J.
2021. NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24–28, 2021, Proceedings. Ed.: A. Dutle, 358–374, Springer-Verlag. doi:10.1007/978-3-030-76384-8_22
Weigl, A.; Ulbrich, M.; Tyszberowicz, S.; Klamroth, J.
2021. NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24–28, 2021, Proceedings. Ed.: A. Dutle, 358–374, Springer-Verlag. doi:10.1007/978-3-030-76384-8_22
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357
Towards an automated classification approach for software engineering research
Kaplan, A.; Keim, J.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 347–352, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463358
Kaplan, A.; Keim, J.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 347–352, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463358
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719
A Multivariate Characterization and Detection of Software Performance Antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5
Automatically extracting business level access control requirements from BPMN Models to align RBAC policies
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021, 1–10
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021, 1–10
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74
Bücher
Composing Model-Based Analysis Tools
Heinrich, R.; Durán, F.; Talcott, C.; Zschaler, S.; Reussner, R. (Hrsg.)
2021. Springer International Publishing. doi:10.1007/978-3-030-81915-6
Heinrich, R.; Durán, F.; Talcott, C.; Zschaler, S.; Reussner, R. (Hrsg.)
2021. Springer International Publishing. doi:10.1007/978-3-030-81915-6
Tactile Internet : with Human-in-the-Loop
Fitzek, F. H. P.; Speidel, S.; Simsek, M.; Li, S.-C.; Strufe, T.; Reisslein, M. (Hrsg.)
2021. Academic Press. doi:10.1016/C2019-0-01386-6
Fitzek, F. H. P.; Speidel, S.; Simsek, M.; Li, S.-C.; Strufe, T.; Reisslein, M. (Hrsg.)
2021. Academic Press. doi:10.1016/C2019-0-01386-6
Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Hrsg.)
2021. Springer Nature. doi:10.1007/978-3-030-86942-7
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Hrsg.)
2021. Springer Nature. doi:10.1007/978-3-030-86942-7
Datenschutzrechtliche Aspekte neuer Mobilitätskonzepte im Öffentlichen Nahverkehr
Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft
Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
A conceptual framework for resilience: fundamental definitions, strategies and metrics
Andersson, J.; Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2021. Computing, 103 (4), 559–588. doi:10.1007/s00607-020-00874-x
Andersson, J.; Grassi, V.; Mirandola, R.; Perez-Palacin, D.
2021. Computing, 103 (4), 559–588. doi:10.1007/s00607-020-00874-x
Switched Systems as Hybrid Programs
Tan, Y. K.; Platzer, A.
2021. IFAC-PapersOnLine, 54 (5), 247–252. doi:10.1016/j.ifacol.2021.08.506
Tan, Y. K.; Platzer, A.
2021. IFAC-PapersOnLine, 54 (5), 247–252. doi:10.1016/j.ifacol.2021.08.506
Structured Proofs for Adversarial Cyber-Physical Systems
Bohrer, R.; Platzer, A.
2021. ACM Transactions on Embedded Computing Systems, 20 (5s), 1–26. doi:10.1145/3477024
Bohrer, R.; Platzer, A.
2021. ACM Transactions on Embedded Computing Systems, 20 (5s), 1–26. doi:10.1145/3477024
Pegasus: sound continuous invariant generation
Sogokon, A.; Mitsch, S.; Tan, Y. K.; Cordwell, K.; Platzer, A.
2021. Formal Methods in System Design, 58 (1-2), 5–41. doi:10.1007/s10703-020-00355-z
Sogokon, A.; Mitsch, S.; Tan, Y. K.; Cordwell, K.; Platzer, A.
2021. Formal Methods in System Design, 58 (1-2), 5–41. doi:10.1007/s10703-020-00355-z
An axiomatic approach to existence and liveness for differential equations
Tan, Y. K.; Platzer, A.
2021. Formal Aspects of Computing, 33 (4-5), 461–518. doi:10.1007/s00165-020-00525-0
Tan, Y. K.; Platzer, A.
2021. Formal Aspects of Computing, 33 (4-5), 461–518. doi:10.1007/s00165-020-00525-0
Proving properties of autonomous car manoeuvres in urban traffic
Schwammberger, M.
2021. it - Information Technology, 63 (5-6), 253–263. doi:10.1515/itit-2021-0007
Schwammberger, M.
2021. it - Information Technology, 63 (5-6), 253–263. doi:10.1515/itit-2021-0007
Motivation-based Attacker Modelling for Cyber Risk Management: A Quantitative Content Analysis and a Natural Experiment
Kaiser, F.-K.; Wiens, M.; Schultmann, F.
2021. Journal of Information Security & Cybercrimes Research, 4 (2), 132–147. doi:10.26735/NMMD9869
Kaiser, F.-K.; Wiens, M.; Schultmann, F.
2021. Journal of Information Security & Cybercrimes Research, 4 (2), 132–147. doi:10.26735/NMMD9869
Private Stream Aggregation with Labels in the Standard Model
Ernst, J.; Koch, A.
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Ernst, J.; Koch, A.
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430. doi:10.17705/1thci.00155
Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430. doi:10.17705/1thci.00155
NoPhish-Challenge-Karten – Evaluation in der Praxis
Aldag, L.; Berens, B.; Burgdorf, M.; Lorenz, A.; Thiery, M.-C.; Volkamer, M.
2021. Datenschutz und Datensicherheit - DuD, 45 (11), 721–726. doi:10.1007/s11623-021-1523-1
Aldag, L.; Berens, B.; Burgdorf, M.; Lorenz, A.; Thiery, M.-C.; Volkamer, M.
2021. Datenschutz und Datensicherheit - DuD, 45 (11), 721–726. doi:10.1007/s11623-021-1523-1
On the Security of IIoT Deployments: An Investigation of Secure Provisioning Solutions for OPC UA
Kohnhäuser, F.; Meier, D.; Patzer, F.; Finster, S.
2021. IEEE access, 9, 99299–99311. doi:10.1109/ACCESS.2021.3096062
Kohnhäuser, F.; Meier, D.; Patzer, F.; Finster, S.
2021. IEEE access, 9, 99299–99311. doi:10.1109/ACCESS.2021.3096062
Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review
Yari, I. A.; Dehling, T.; Kluge, F.; Geck, J.; Sunyaev, A.; Eskofier, B.
2021. Journal of Medical Internet Research, 23 (11), e24460. doi:10.2196/24460
Yari, I. A.; Dehling, T.; Kluge, F.; Geck, J.; Sunyaev, A.; Eskofier, B.
2021. Journal of Medical Internet Research, 23 (11), e24460. doi:10.2196/24460
Herausforderungen der Digitalisierung im Gesundheitswesen Corona-Warn-App, Forschungsdaten und Künstliche Intelligenz
Bretthauer, S.
2021. Die Verwaltung, 54 (3), 411–441
Bretthauer, S.
2021. Die Verwaltung, 54 (3), 411–441
Online-Wahlen zu Parlamenten als modernes Instrument demokratischer Partizipation in Zeiten von Pandemie und Digitalisierung
Bretthauer, S.
2021. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 104 (1), 3–33. doi:10.5771/2193-7869-2021-1-3
Bretthauer, S.
2021. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 104 (1), 3–33. doi:10.5771/2193-7869-2021-1-3
Scalability and Precision by Combining Expressive Type Systems and Deductive Verification
Lanzinger, F.; Weigl, A.; Ulbrich, M.; Dietl, W.
2021. Proceedings of the ACM on programming languages, 5 (OOPSLA), Article no: 143. doi:10.1145/3485520
Lanzinger, F.; Weigl, A.; Ulbrich, M.; Dietl, W.
2021. Proceedings of the ACM on programming languages, 5 (OOPSLA), Article no: 143. doi:10.1145/3485520
A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search
Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110. doi:10.54364/aaiml.2021.1107
Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110. doi:10.54364/aaiml.2021.1107
Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU
Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193
Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193
Ein Netzwerk für Europas Cybersicherheit
Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695
Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695
Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15. doi:10.9785/cri-2021-220103
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15. doi:10.9785/cri-2021-220103
Secure and privacy-respecting documentation for interactive manufacturing and quality assurance
Wagner, P. G.; Lengenfelder, C.; Holzbach, G.; Becker, M.; Birnstill, P.; Voit, M.; Bejhad, A.; Samorei, T.; Beyerer, J.
2021. Applied Sciences (Switzerland), 11 (16), Art.-Nr.: 7339. doi:10.3390/app11167339
Wagner, P. G.; Lengenfelder, C.; Holzbach, G.; Becker, M.; Birnstill, P.; Voit, M.; Bejhad, A.; Samorei, T.; Beyerer, J.
2021. Applied Sciences (Switzerland), 11 (16), Art.-Nr.: 7339. doi:10.3390/app11167339
A Hitchhiker’s Guide to Model-Driven Engineering for Data-Centric Systems
Combemale, B.; Kienzle, J.; Mussbacher, G.; Ali, H.; Amyot, D.; Bagherzadeh, M.; Batot, E.; Bencomo, N.; Benni, B.; Bruel, J.-M.; Cabot, J.; Cheng, B. H. C.; Collet, P.; Engels, G.; Heinrich, R.; Jezequel, J.-M.; Koziolek, A.; Mosser, S.; Reussner, R.; Sahraoui, H.; Saini, R.; Sallou, J.; Stinckwich, S.; Syriani, E.; Wimmer, M.
2021. IEEE software, 38 (4), 71–84. doi:10.1109/MS.2020.2995125
Combemale, B.; Kienzle, J.; Mussbacher, G.; Ali, H.; Amyot, D.; Bagherzadeh, M.; Batot, E.; Bencomo, N.; Benni, B.; Bruel, J.-M.; Cabot, J.; Cheng, B. H. C.; Collet, P.; Engels, G.; Heinrich, R.; Jezequel, J.-M.; Koziolek, A.; Mosser, S.; Reussner, R.; Sahraoui, H.; Saini, R.; Sallou, J.; Stinckwich, S.; Syriani, E.; Wimmer, M.
2021. IEEE software, 38 (4), 71–84. doi:10.1109/MS.2020.2995125
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Card-Based Cryptography Meets Formal Verification
Koch, A.; Schrempp, M.; Kirsten, M.
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Koch, A.; Schrempp, M.; Kirsten, M.
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Multi-paradigm modelling for cyber–physical systems: a descriptive framework
Amrani, M.; Blouin, D.; Heinrich, R.; Rensink, A.; Vangheluwe, H.; Wortmann, A.
2021. Software and Systems Modeling, 20, 611–639. doi:10.1007/s10270-021-00876-z
Amrani, M.; Blouin, D.; Heinrich, R.; Rensink, A.; Vangheluwe, H.; Wortmann, A.
2021. Software and Systems Modeling, 20, 611–639. doi:10.1007/s10270-021-00876-z
Use of digital healthcare solutions for care delivery during a pandemic-chances and (cyber) risks referring to the example of the COVID-19 pandemic
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2021. Health and Technology, 11, 1125–1137. doi:10.1007/s12553-021-00541-x
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2021. Health and Technology, 11, 1125–1137. doi:10.1007/s12553-021-00541-x
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?
Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13
Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13
When Data Fly: An Open Data Trading System in Vehicular Ad Hoc Networks
Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654. doi:10.3390/electronics10060654
Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654. doi:10.3390/electronics10060654
Analysis of the Matrix Event Graph Replicated Data Type
Jacob, F.; Beer, C.; Henze, N.; Hartenstein, H.
2021. IEEE access, 9, 28317–28333. doi:10.1109/ACCESS.2021.3058576
Jacob, F.; Beer, C.; Henze, N.; Hartenstein, H.
2021. IEEE access, 9, 28317–28333. doi:10.1109/ACCESS.2021.3058576
Datensouveränität für Patienten im Gesundheitswesen
Bretthauer, S.; Appenzeller, A.; Birnstill, P.
2021. Datenschutz und Datensicherheit, 45 (3), 173–179. doi:10.1007/s11623-021-1413-6
Bretthauer, S.; Appenzeller, A.; Birnstill, P.
2021. Datenschutz und Datensicherheit, 45 (3), 173–179. doi:10.1007/s11623-021-1413-6
Token Economy
Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478. doi:10.1007/s12599-021-00684-1
Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478. doi:10.1007/s12599-021-00684-1
Efficient communication protection of many-core systems against active attackers
Moriam, S.; Franz, E.; Walther, P.; Kumar, A.; Strufe, T.; Fettweis, G.
2021. Electronics, 10 (3), Art.-Nr.: 238. doi:10.3390/electronics10030238
Moriam, S.; Franz, E.; Walther, P.; Kumar, A.; Strufe, T.; Fettweis, G.
2021. Electronics, 10 (3), Art.-Nr.: 238. doi:10.3390/electronics10030238
Meldepflicht von Mitarbeitenden bei IT Sicherheits- und Datenschutzvorfällen Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Zeitschrift für Datenschutz, 11 (1), 8–13
Müllmann, D.; Volkamer, M.
2021. Zeitschrift für Datenschutz, 11 (1), 8–13
Enabling consistency in view-based system development - The Vitruvius approach
Klare, H.; Kramer, M. E.; Langhammer, M.; Werle, D.; Burger, E.; Reussner, R.
2021. The journal of systems and software, 171, Article no: 110815. doi:10.1016/j.jss.2020.110815
Klare, H.; Kramer, M. E.; Langhammer, M.; Werle, D.; Burger, E.; Reussner, R.
2021. The journal of systems and software, 171, Article no: 110815. doi:10.1016/j.jss.2020.110815
A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis
Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2021. IEEE transactions on software engineering, 47 (4), 775–800. doi:10.1109/TSE.2019.2903797
Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2021. IEEE transactions on software engineering, 47 (4), 775–800. doi:10.1109/TSE.2019.2903797
2020
Buchaufsätze
Verteilte Steuerungen für beweisbar sichere, lebendige und faire autonome Fahrmanöver im Stadtverkehr
Schwammberger, M.
2020. S. Hölldobler, S. Apel, A. Bernstein, F. C. Freiling, H.-P. Lenhof, G. Neumann, R. Reischuk, K. U. Römer, B. Scheuermann, N. Schweikardt, M. Spiliopoulou, S. Süsstrunk & K. Wehrle (Hrsg.), Ausgezeichnete Informatikdissertationen 2020, Ed.: S. Hölldobler, 299–308, Gesellschaft für Informatik (GI)
Schwammberger, M.
2020. S. Hölldobler, S. Apel, A. Bernstein, F. C. Freiling, H.-P. Lenhof, G. Neumann, R. Reischuk, K. U. Römer, B. Scheuermann, N. Schweikardt, M. Spiliopoulou, S. Süsstrunk & K. Wehrle (Hrsg.), Ausgezeichnete Informatikdissertationen 2020, Ed.: S. Hölldobler, 299–308, Gesellschaft für Informatik (GI)
Industrial Security by Design – Nachverfolgbare Informationssicherheit für Cyber-Physische Produktionssysteme
Gerking, C.; Bodden, E.; Schäfer, W.
2020. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 139–162, Springer. doi:10.1007/978-3-662-52979-9_8
Gerking, C.; Bodden, E.; Schäfer, W.
2020. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 139–162, Springer. doi:10.1007/978-3-662-52979-9_8
Security for mobile edge cloud
Hanisch, S.; Osman, A.; Li, T.; Strufe, T.
2020. Computing in Communication Networks. Ed.: F.H.P. Fitzek, 371–385, Academic Press. doi:10.1016/B978-0-12-820488-7.00038-4
Hanisch, S.; Osman, A.; Li, T.; Strufe, T.
2020. Computing in Communication Networks. Ed.: F.H.P. Fitzek, 371–385, Academic Press. doi:10.1016/B978-0-12-820488-7.00038-4
Fundamental Properties of the Layer Below a Payment Channel Network
Grundmann, M.; Hartenstein, H.
2020. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 409–420, Springer International Publishing. doi:10.1007/978-3-030-66172-4_26
Grundmann, M.; Hartenstein, H.
2020. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 409–420, Springer International Publishing. doi:10.1007/978-3-030-66172-4_26
Integration of Static and Dynamic Analysis Techniques for Checking Noninterference
Beckert, B.; Herda, M.; Kirsten, M.; Tyszberowicz, S.
2020. Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY. Ed.: W. Ahrendt, 287–312, Springer. doi:10.1007/978-3-030-64354-6_12
Beckert, B.; Herda, M.; Kirsten, M.; Tyszberowicz, S.
2020. Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY. Ed.: W. Ahrendt, 287–312, Springer. doi:10.1007/978-3-030-64354-6_12
Ein europäisches Netzwerk für Cybersicherheit
Müllmann, D.; Wintzingerode, C. von
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 475–492, OlWIR Verlag für Wirtschaft
Müllmann, D.; Wintzingerode, C. von
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 475–492, OlWIR Verlag für Wirtschaft
Homeland Security Act vs. BSIG - Eine rechtsvergleichende Betrachtung der IT-Sicherheit kritischer Infrastrukturen in den USA und Deutschland
Müllmann, D.; Ebert, A.; Reißner, L.
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 459–473, OlWIR Verlag für Wirtschaft
Müllmann, D.; Ebert, A.; Reißner, L.
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 459–473, OlWIR Verlag für Wirtschaft
Herausforderungen im Datenschutz von Unternehmen
Spiecker gen. Döhmann, I.; Benecke, A.
2020. Handbuch Industrie 4.0 : Recht, Technik, Gesellschaft. Hrsg.: W. Frenz, 181–200, Springer
Spiecker gen. Döhmann, I.; Benecke, A.
2020. Handbuch Industrie 4.0 : Recht, Technik, Gesellschaft. Hrsg.: W. Frenz, 181–200, Springer
Perspektiven des Europäischen Katastrophenschutzrechts - Herausforderungen eines vernachlässigten Rechtsgebiets
Bretthauer, S.
2020. Zehn Jahre Vertrag von Lissabon. Hrsg.: S. Martini, 133–150, Nomos Verlag
Bretthauer, S.
2020. Zehn Jahre Vertrag von Lissabon. Hrsg.: S. Martini, 133–150, Nomos Verlag
A European and German Perspective on data protection law in a digitalized world
Bretthauer, S.
2020. Comparative Privacy and Defamation. Ed.: A. Koltay, 199–215, Edward Elgar Publishing
Bretthauer, S.
2020. Comparative Privacy and Defamation. Ed.: A. Koltay, 199–215, Edward Elgar Publishing
Audio CAPTCHA with a Few Cocktails: It’s so Noisy I Can’t Hear You
Reinheimer, B. M.; Islam, F.; Shumailov, I.
2020. Security Protocols XXVII – 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers. Ed.: J. Anderson, 20–40, Springer International Publishing. doi:10.1007/978-3-030-57043-9_3
Reinheimer, B. M.; Islam, F.; Shumailov, I.
2020. Security Protocols XXVII – 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers. Ed.: J. Anderson, 20–40, Springer International Publishing. doi:10.1007/978-3-030-57043-9_3
Dissertationen
Distributed controllers for provably safe, live and fair autonomous car manoeuvres in urban traffic. Dissertation
Schwammberger, M.
2020
Schwammberger, M.
2020
Model-Driven Information Flow Security Engineering for Cyber-Physical Systems. Dissertation
Gerking, C.
2020. Universität Paderborn. doi:10.17619/UNIPB/1-1033
Gerking, C.
2020. Universität Paderborn. doi:10.17619/UNIPB/1-1033
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
Hartung, G. R.
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Hartung, G. R.
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Secure and Usable User Authentication. Dissertation
Mayer, P.
2020, März 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117445
Mayer, P.
2020, März 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117445
Combining Static and Dynamic Program Analysis Techniques for Checking Relational Properties. Dissertation
Herda, M.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000104496
Herda, M.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000104496
Masterarbeiten
Enabling Consistency between Software Artefacts for Software Adaption and Evolution. Masterarbeit
Monschein, D.
2020, Oktober 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166031
Monschein, D.
2020, Oktober 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166031
Bachelorarbeiten
Optimizations of Isogeny-based Key Exchange. Bachelorarbeit
Reichert, P.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133155
Reichert, P.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133155
Proceedingsbeiträge
Verification of Fair Controllers for Urban Traffic Manoeuvres at Intersections
Bischopink, C.; Schwammberger, M.
2020. Formal Methods. FM 2019 International Workshops – Porto, Portugal, October 7–11, 2019, Revised Selected Papers, Part I. Ed.: E. Sekerinski, 249–264, Springer International Publishing. doi:10.1007/978-3-030-54994-7_18
Bischopink, C.; Schwammberger, M.
2020. Formal Methods. FM 2019 International Workshops – Porto, Portugal, October 7–11, 2019, Revised Selected Papers, Part I. Ed.: E. Sekerinski, 249–264, Springer International Publishing. doi:10.1007/978-3-030-54994-7_18
Performance Modelling of Message-Oriented Middleware with Priority Queues
Singh, S.; Schmid, L.; Koziolek, A.
2020. 11th Symposium on Software Performance 2020, 12.–13. November 2020, Leipzig, Germany
Singh, S.; Schmid, L.; Koziolek, A.
2020. 11th Symposium on Software Performance 2020, 12.–13. November 2020, Leipzig, Germany
Architektur-basierte Analyse von Änderungsausbreitung in Software-intensiven Systemen
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R. H.; Vogel-Heuser, B.
2020. Software Engineering 2020, Fachtagung des GI-Fachbereichs Softwaretechnik. Hrsg.: Felderer, Michael; Hasselbring, Wilhelm; Rabiser, Rick; Jung, Reiner, 45–46, Gesellschaft für Informatik (GI). doi:10.18420/SE2020_10
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R. H.; Vogel-Heuser, B.
2020. Software Engineering 2020, Fachtagung des GI-Fachbereichs Softwaretechnik. Hrsg.: Felderer, Michael; Hasselbring, Wilhelm; Rabiser, Rick; Jung, Reiner, 45–46, Gesellschaft für Informatik (GI). doi:10.18420/SE2020_10
Third International Workshop on Variability and Evolution of Software-Intensive Systems (VariVolution 2020)
Krüger, J.; Ananieva, S.; Gerling, L.; Walkingshaw, E.
2020. Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A, 1, Association for Computing Machinery (ACM). doi:10.1145/3382025.3414944
Krüger, J.; Ananieva, S.; Gerling, L.; Walkingshaw, E.
2020. Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A, 1, Association for Computing Machinery (ACM). doi:10.1145/3382025.3414944
SoK on Performance Bounds in Anonymous Communication
Kuhn, C.; Kitzing, F.; Strufe, T.
2020. Proceedings of the 19th Workshop on Privacy in the Electronic Society, 21–39, Association for Computing Machinery (ACM). doi:10.1145/3411497.3420218
Kuhn, C.; Kitzing, F.; Strufe, T.
2020. Proceedings of the 19th Workshop on Privacy in the Electronic Society, 21–39, Association for Computing Machinery (ACM). doi:10.1145/3411497.3420218
Transparent Microsegmentation in Smart Home IoT Networks
Osman, A.; Wasicek, A.; Köpsell, S.; Strufe, T.
2020. 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 20), USENIX Association
Osman, A.; Wasicek, A.; Köpsell, S.; Strufe, T.
2020. 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 20), USENIX Association
Inference Attacks on Physical Layer Channel State Information
Walther, P.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 935–942, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00125
Walther, P.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 935–942, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00125
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing
Becher, K.; Lagodzinski, J. A. G.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 998–1005, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00133
Becher, K.; Lagodzinski, J. A. G.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 998–1005, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00133
Practical Trade-Offs in Integrity Protection for Binaries via Ethereum
Stengele, O.; Droll, J.; Hartenstein, H.
2020. Middleware ’20 Demos and Posters: Proceedings of the 21st International Middleware Conference Demos and Posters, 9–10, Association for Computing Machinery (ACM). doi:10.1145/3429358.3429374
Stengele, O.; Droll, J.; Hartenstein, H.
2020. Middleware ’20 Demos and Posters: Proceedings of the 21st International Middleware Conference Demos and Posters, 9–10, Association for Computing Machinery (ACM). doi:10.1145/3429358.3429374
On Pseudorandom Encodings
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Tiepelt, M.; D’Anvers, J.-P.
2020. 7th ACM Workshop on Asia Public-Key Cryptography, APKC 2020, held in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security, ACM ASIACCS 2020, Taipei, Taiwan, 6 October 2020 (05.-09.2020). Ed.: K. Emura; N. Yanai, 45–54. doi:10.1145/3384940.3388957
Tiepelt, M.; D’Anvers, J.-P.
2020. 7th ACM Workshop on Asia Public-Key Cryptography, APKC 2020, held in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security, ACM ASIACCS 2020, Taipei, Taiwan, 6 October 2020 (05.-09.2020). Ed.: K. Emura; N. Yanai, 45–54. doi:10.1145/3384940.3388957
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption
Becher, K.; Strufe, T.
2020. 2020 IEEE Symposium on Computers and Communications (ISCC), 7-10 July 2020, Rennes, France, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISCC50000.2020.9219588
Becher, K.; Strufe, T.
2020. 2020 IEEE Symposium on Computers and Communications (ISCC), 7-10 July 2020, Rennes, France, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISCC50000.2020.9219588
Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation
Walther, P.; Strufe, T.
2020. 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 31 August - 3 September 2020, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PIMRC48278.2020.9217278
Walther, P.; Strufe, T.
2020. 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 31 August - 3 September 2020, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PIMRC48278.2020.9217278
Modular Verification of JML Contracts Using Bounded Model Checking
Beckert, B.; Kirsten, M.; Klamroth, J.; Ulbrich, M.
2020. ISoLA 2020: Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium (ISoLA 2020), 60–80, Springer. doi:10.1007/978-3-030-61362-4_4
Beckert, B.; Kirsten, M.; Klamroth, J.; Ulbrich, M.
2020. ISoLA 2020: Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium (ISoLA 2020), 60–80, Springer. doi:10.1007/978-3-030-61362-4_4
Browsing unicity: On the limits of anonymizing web tracking data
Deuser, C.; Passmann, S.; Strufe, T.
2020. Proceedings 2020 IEEE Symposium on Security and Privacy SP 2020, San Francisco, California, USA, 18-21 May 2020. Ed.: P. Kellenberger, 777–790. doi:10.1109/SP40000.2020.00018
Deuser, C.; Passmann, S.; Strufe, T.
2020. Proceedings 2020 IEEE Symposium on Security and Privacy SP 2020, San Francisco, California, USA, 18-21 May 2020. Ed.: P. Kellenberger, 777–790. doi:10.1109/SP40000.2020.00018
The german-speaking twitter community reference data set
Pflugmacher, J.; Escher, S.; Reubold, J.; Strufe, T.
2020. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 6-9 July 2020, online, 1172–1177, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFOCOMWKSHPS50562.2020.9162728
Pflugmacher, J.; Escher, S.; Reubold, J.; Strufe, T.
2020. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 6-9 July 2020, online, 1172–1177, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFOCOMWKSHPS50562.2020.9162728
Does BERT Understand Code? : An Exploratory Study on the Detection of Architectural Tactics in Code
Keim, J.; Kaplan, A.; Koziolek, A.; Mirakhorli, M.
2020. Software Architecture. Ed.: A. Jansen, 220–228, Springer International Publishing. doi:10.1007/978-3-030-58923-3_15
Keim, J.; Kaplan, A.; Koziolek, A.; Mirakhorli, M.
2020. Software Architecture. Ed.: A. Jansen, 220–228, Springer International Publishing. doi:10.1007/978-3-030-58923-3_15
Multi-user authorization for simultaneous collaborative situation analysis workspaces using XACML
Appenzeller, A.; Krempel, E.; Birnstill, P.; Beyerer, J.
2020. Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies IV, 21-25 September 2020 (Teilkonferenz von SPIE Security + Defence Digital Forum 2020). Ed.: H. Bouma, Art.-Nr.: 1154207, SPIE. doi:10.1117/12.2570824
Appenzeller, A.; Krempel, E.; Birnstill, P.; Beyerer, J.
2020. Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies IV, 21-25 September 2020 (Teilkonferenz von SPIE Security + Defence Digital Forum 2020). Ed.: H. Bouma, Art.-Nr.: 1154207, SPIE. doi:10.1117/12.2570824
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems
Borcherding, A.; Pfrang, S.; Haas, C.; Weiche, A.; Beyerer, J.
2020. SECRYPT 2020 : proceedings of the 17th International Conference on Security and Cryptography : July 8-10, 2020 (SECRYPT is part of ICETE, the 17th International Joint Conference on e-Business and Telecommunications). Vol. 3. Ed.: P. Samarati, 27–38, SciTePress. doi:10.5220/0009517800270038
Borcherding, A.; Pfrang, S.; Haas, C.; Weiche, A.; Beyerer, J.
2020. SECRYPT 2020 : proceedings of the 17th International Conference on Security and Cryptography : July 8-10, 2020 (SECRYPT is part of ICETE, the 17th International Joint Conference on e-Business and Telecommunications). Vol. 3. Ed.: P. Samarati, 27–38, SciTePress. doi:10.5220/0009517800270038
Context-Based Confidentiality Analysis for Industrial IoT
Boltz, N.; Walter, M.; Heinrich, R.
2020. Proceedings - 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). Ed.: A. Martini, 589–596, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA51224.2020.00096
Boltz, N.; Walter, M.; Heinrich, R.
2020. Proceedings - 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). Ed.: A. Martini, 589–596, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA51224.2020.00096
A Taxonomy of Dynamic Changes Affecting Confidentiality
Walter, M.; Seifermann, S.; Heinrich, R.
2020. 11th Workshop Design For Future – Langlebige Softwaresysteme
Walter, M.; Seifermann, S.; Heinrich, R.
2020. 11th Workshop Design For Future – Langlebige Softwaresysteme
Dynamische personale Identitäten als Schutzgegenstand der DSGVO und technische Gestaltungsvorgabe
Steinbrück, A.
2020. Den Wandel begleiten - IT-rechtliche Herausforderung der Digitalisierung : DSRI-Tagungsband Herbstakademie 2020. Hrsg.: J. Taeger, 73–86, OIWIR
Steinbrück, A.
2020. Den Wandel begleiten - IT-rechtliche Herausforderung der Digitalisierung : DSRI-Tagungsband Herbstakademie 2020. Hrsg.: J. Taeger, 73–86, OIWIR
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2020. Security and Trust Management. Ed.: K. Markantonakis, 73–89, Springer Nature. doi:10.1007/978-3-030-59817-4_5
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2020. Security and Trust Management. Ed.: K. Markantonakis, 73–89, Springer Nature. doi:10.1007/978-3-030-59817-4_5
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
Mossano, M.; Vaniea, K.; Aldag, L.; Düzgün, R.; Mayer, P.; Volkamer, M.
2020. IEEE European Symposium on Security and Privacy 2020, (EuroS&PW) - The 5th European Workshop on Usable Security, September 7, 2020, Online (ursprünglich: June 15, 2020, Genova, Italy), 130–139, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW51379.2020.00026
Mossano, M.; Vaniea, K.; Aldag, L.; Düzgün, R.; Mayer, P.; Volkamer, M.
2020. IEEE European Symposium on Security and Privacy 2020, (EuroS&PW) - The 5th European Workshop on Usable Security, September 7, 2020, Online (ursprünglich: June 15, 2020, Genova, Italy), 130–139, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW51379.2020.00026
Identification and Localization of Cyber-Attacks in Industrial Facilities
Reibelt, K.; Matthes, J.; Keller, H. B.; Hagenmeyer, V.
2020. ESCAPE 30, 30th European Symposium on Computer Aided Process Engineering, Milan, Italy, 30 August 2020 – 2 September 2020. Ed.: S. Pierucci, 1747–1752, Elsevier
Reibelt, K.; Matthes, J.; Keller, H. B.; Hagenmeyer, V.
2020. ESCAPE 30, 30th European Symposium on Computer Aided Process Engineering, Milan, Italy, 30 August 2020 – 2 September 2020. Ed.: S. Pierucci, 1747–1752, Elsevier
Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks
Patzer, F.; Lüdtke, P.; Meshram, A.; Beyerer, J.
2020. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 137–161, Springer-Verlag. doi:10.1007/978-3-030-49443-8_7
Patzer, F.; Lüdtke, P.; Meshram, A.; Beyerer, J.
2020. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 137–161, Springer-Verlag. doi:10.1007/978-3-030-49443-8_7
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools
Grashöfer, J.; Titze, C.; Hartenstein, H.
2020. 2020 IEEE Conference on Communications and Network Security (CNS), 9 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS48642.2020.9162332
Grashöfer, J.; Titze, C.; Hartenstein, H.
2020. 2020 IEEE Conference on Communications and Network Security (CNS), 9 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS48642.2020.9162332
An investigation of phishing awareness and education over time: When and how to best remind users
Reinheimer, B. M.; Aldag, L.; Mayer, P.; Mossano, M.; Düzgün, R.; Lofthouse, B.; Landesberger, T. von; Volkamer, M.
2020. Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) : August 10-11, 2020, 259–284, Advanced Computing Systems Association (USENIX)
Reinheimer, B. M.; Aldag, L.; Mayer, P.; Mossano, M.; Düzgün, R.; Lofthouse, B.; Landesberger, T. von; Volkamer, M.
2020. Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) : August 10-11, 2020, 259–284, Advanced Computing Systems Association (USENIX)
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays
Düzgün, R.; Mayer, P.; Das, S.; Volkamer, M.
2020. Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2020), August 7–11, 2020
Düzgün, R.; Mayer, P.; Das, S.; Volkamer, M.
2020. Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2020), August 7–11, 2020
Enabling Data Sovereignty for Patients through Digital Consent Enforcement
Appenzeller, A.; Rode, E.; Krempel, E.; Beyerer, J.
2020. PETRA ’20: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 30 June - 3 July 2020, Article No.: 33, Association for Computing Machinery (ACM). doi:10.1145/3389189.3393745
Appenzeller, A.; Rode, E.; Krempel, E.; Beyerer, J.
2020. PETRA ’20: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 30 June - 3 July 2020, Article No.: 33, Association for Computing Machinery (ACM). doi:10.1145/3389189.3393745
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Agrikola, T.; Couteau, G.; Hofheinz, D.
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
Agrikola, T.; Couteau, G.; Hofheinz, D.
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Agrikola, T.; Hofheinz, D.; Kastner, J.
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Agrikola, T.; Hofheinz, D.; Kastner, J.
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Smart Contracts: Application Scenarios for Deductive Program Verification
Beckert, B.; Schiffl, J.; Ulbrich, M.
2020. Formal Methods. FM 2019 International Workshops : Porto, Portugal, October 7–11, 2019, Revised Selected Papers, Part I. Ed.: Emil Sekerinski, 293–298, Springer. doi:10.1007/978-3-030-54994-7_21
Beckert, B.; Schiffl, J.; Ulbrich, M.
2020. Formal Methods. FM 2019 International Workshops : Porto, Portugal, October 7–11, 2019, Revised Selected Papers, Part I. Ed.: Emil Sekerinski, 293–298, Springer. doi:10.1007/978-3-030-54994-7_21
Verified Construction of Fair Voting Rules
Diekhoff, K.; Kirsten, M.; Krämer, J.
2020. Logic-Based Program Synthesis and Transformation : 29th International Symposium, LOPSTR 2019, Porto, Portugal, October 8–10, 2019, Revised Selected Papers. Ed.: M. Gabbrielli, 90–104, Springer International Publishing. doi:10.1007/978-3-030-45260-5_6
Diekhoff, K.; Kirsten, M.; Krämer, J.
2020. Logic-Based Program Synthesis and Transformation : 29th International Symposium, LOPSTR 2019, Porto, Portugal, October 8–10, 2019, Revised Selected Papers. Ed.: M. Gabbrielli, 90–104, Springer International Publishing. doi:10.1007/978-3-030-45260-5_6
Towards Improving the Efficacy of Code-Based Verification in Internet Voting
Kulyk, O.; Volkamer, M.; Müller, M.; Renaud, K.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, [1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020; Kota Kinabalu; Malaysia; 14 February 2020 through 14 February 2020], Revised Selected Papers. Ed.: Matthew Bernhard, 291–309, Springer. doi:10.1007/978-3-030-54455-3_21
Kulyk, O.; Volkamer, M.; Müller, M.; Renaud, K.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, [1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020; Kota Kinabalu; Malaysia; 14 February 2020 through 14 February 2020], Revised Selected Papers. Ed.: Matthew Bernhard, 291–309, Springer. doi:10.1007/978-3-030-54455-3_21
A meta model for a comprehensive description of network protocols improving security tests
Pfrang, S.; Meier, D.; Fleig, A.; Beyerer, J.
2020. Proceedings of the 6th International Conference on Information Systems Security and Privacy. Ed.: S. Furnell, 671–682, SciTePress
Pfrang, S.; Meier, D.; Fleig, A.; Beyerer, J.
2020. Proceedings of the 6th International Conference on Information Systems Security and Privacy. Ed.: S. Furnell, 671–682, SciTePress
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, O.; Reinheimer, B.; Aldag, L.; Mayer, P.; Gerber, N.; Volkamer, M.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Ed.: Matthew Bernhard, 84–101, Springer. doi:10.1007/978-3-030-54455-3_7
Kulyk, O.; Reinheimer, B.; Aldag, L.; Mayer, P.; Gerber, N.; Volkamer, M.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Ed.: Matthew Bernhard, 84–101, Springer. doi:10.1007/978-3-030-54455-3_7
Bücher
40 Klausuren aus dem Verwaltungsrecht
Bretthauer, S.; Collin, P.; Egidy, S.; Spiecker gen. Döhmann, I.
2020. Vahlen
Bretthauer, S.; Collin, P.; Egidy, S.; Spiecker gen. Döhmann, I.
2020. Vahlen
Zeitschriftenaufsätze
Uncertainty in Self-adaptive Systems: A Research Community Perspective
Hezavehi, S. M.; Weyns, D.; Avgeriou, P.; Calinescu, R.; Mirandola, R.; Perez-Palacin, D.
2020. ACM Transactions on Autonomous and Adaptive Systems, 15 (4), 36 S. doi:10.1145/3487921
Hezavehi, S. M.; Weyns, D.; Avgeriou, P.; Calinescu, R.; Mirandola, R.; Perez-Palacin, D.
2020. ACM Transactions on Autonomous and Adaptive Systems, 15 (4), 36 S. doi:10.1145/3487921
IT-Sicherheit im Wettstreit um die erste autonome Fahrzeugflotte: Ein Diffusionsmodell
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. TATuP-Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis/Journal for Technology Assessment in Theory and Practice, 29 (1), 16–22
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. TATuP-Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis/Journal for Technology Assessment in Theory and Practice, 29 (1), 16–22
Resiliente soziotechnische Prozesse im industriellen Internet der Dinge
Henrich, V.; Struwe, S.; Koch, S.; Hansert, J.; Schlegel, T.
2020. Zeitschrift für wirtschaftlichen Fabrikbetrieb, 115 (3), 131–135. doi:10.3139/104.112243
Henrich, V.; Struwe, S.; Koch, S.; Hansert, J.; Schlegel, T.
2020. Zeitschrift für wirtschaftlichen Fabrikbetrieb, 115 (3), 131–135. doi:10.3139/104.112243
Das Digitale Versorgung Gesetz als Einfallstor für eine Neujustierung von einstweiligem Rechtsschutz vor dem BVerfG und der Eingriffsqualität bei Datenverwendungen
Bretthauer, S.; Spiecker gen. Döhmann, I.
2020. Juristenzeitung, 75, 990–996
Bretthauer, S.; Spiecker gen. Döhmann, I.
2020. Juristenzeitung, 75, 990–996
"Ich habe nichts zu verbergen" – wirklich nicht? : Unterscheidung versus Diskriminierung durch KI, Algorithmen und die digitalen Dienste
Spiecker gen. Döhmann, I.
2020. Forschung Frankfurt, 37 (1), 38–41
Spiecker gen. Döhmann, I.
2020. Forschung Frankfurt, 37 (1), 38–41
Comparing the Perception of Privacy for Medical Devices and Devices With Medical Functionality
Kaiser, F.; Wiens, M.; Schultmann, F.
2020. International journal of privacy and health information management, 8 (1), 52–69. doi:10.4018/IJPHIM.2020010103
Kaiser, F.; Wiens, M.; Schultmann, F.
2020. International journal of privacy and health information management, 8 (1), 52–69. doi:10.4018/IJPHIM.2020010103
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2020. Journal of Cybersecurity, 6 (1), Article: tyaa022. doi:10.1093/cybsec/tyaa022
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2020. Journal of Cybersecurity, 6 (1), Article: tyaa022. doi:10.1093/cybsec/tyaa022
IT Sicherheitsgesetz 2.0 und das Vorbild USA
Müllmann, D.; Ebert, A.; Reissner, L.
2020. Computer und Recht, 36 (9), 584–592
Müllmann, D.; Ebert, A.; Reissner, L.
2020. Computer und Recht, 36 (9), 584–592
Der Wille zur Beibehaltung der Vorratsdatenspeicherung - Zugleich Kommentar zu BVerwG, Beschluss vom 25.9.2019 - 6 C 12.18, K&R 2019, 819 ff
Hammer, T.; Müllmann, D.
2020. Kommunikation & Recht, 2020 (2), 103–105
Hammer, T.; Müllmann, D.
2020. Kommunikation & Recht, 2020 (2), 103–105
Digital data for more efficient prevention : ethical and legal considerations regarding potentials and risks = Digitale Daten für eine effizientere Prävention : Ethische und rechtliche Überlegugen zu Potentialen und Risiken
Friele, M.; Bröckerhoff, P.; Fröhlich, W.; Spiecker gen. Döhmann, I.; Woopen, C.
2020. Bundesgesundheitsblatt, 63 (6), 741–748
Friele, M.; Bröckerhoff, P.; Fröhlich, W.; Spiecker gen. Döhmann, I.; Woopen, C.
2020. Bundesgesundheitsblatt, 63 (6), 741–748
Die datenschutzrechtliche Informierung als neuartiges Instrument der Aufsichtsbehörden nach Art. 58 Abs. 2 DSGVO
Bretthauer, S.
2020. Recht der Datenverarbeitung, 36 (4), 183–186
Bretthauer, S.
2020. Recht der Datenverarbeitung, 36 (4), 183–186
Privatsphärengerechte intelligente Mobilitätssteuerung
Bretthauer, S.; Schmitt, A. A.
2020. Zeitschrift für Datenschutz : ZD, (7), 341–347
Bretthauer, S.; Schmitt, A. A.
2020. Zeitschrift für Datenschutz : ZD, (7), 341–347
Die rechtliche Zulässigkeit einer Onlinewahl zur Sozialwahl
Bretthauer, S.; Spiecker gen. Döhmann, I.
2020. Neue Zeitschrift für Sozialrecht, 2020 (7), 241–247
Bretthauer, S.; Spiecker gen. Döhmann, I.
2020. Neue Zeitschrift für Sozialrecht, 2020 (7), 241–247
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness – Analyse aus verschiedenen Blickwinkeln – Security, Recht und Faktor Mensch
Volkamer, M.; Sasse, M. A.; Boehm, F.
2020. Datenschutz und Datensicherheit, 44 (8), 518–521. doi:10.1007/s11623-020-1317-x
Volkamer, M.; Sasse, M. A.; Boehm, F.
2020. Datenschutz und Datensicherheit, 44 (8), 518–521. doi:10.1007/s11623-020-1317-x
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit
Mayer, P.; Ballreich, F.; Düzgün, R.; Schwarz, C.; Volkamer, M.
2020. Datenschutz und Datensicherheit, 44 (8), 522–527. doi:10.1007/s11623-020-1318-9
Mayer, P.; Ballreich, F.; Düzgün, R.; Schwarz, C.; Volkamer, M.
2020. Datenschutz und Datensicherheit, 44 (8), 522–527. doi:10.1007/s11623-020-1318-9
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
IT-Sicherheit im Wettstreit um die erste autonome Fahrzeugflotte
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. Technikfolgenabschätzung, Theorie und Praxis, 29 (1), 16–22. doi:10.14512/tatup.29.1.16
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. Technikfolgenabschätzung, Theorie und Praxis, 29 (1), 16–22. doi:10.14512/tatup.29.1.16
Sensibilisierung für Phishing und andere betrügerische Nachrichten – Vergleich frei verfügbarer Angebote
Volkamer, M.; Hilt, T.
2020. Datenschutz und Datensicherheit, 44 (2), 121–125. doi:10.1007/s11623-020-1234-z
Volkamer, M.; Hilt, T.
2020. Datenschutz und Datensicherheit, 44 (2), 121–125. doi:10.1007/s11623-020-1234-z
Biggest Failures in Security (Dagstuhl Seminar 19451)
Armknecht, F.; Verbauwhede, I.; Volkamer, M.; Yung, M.
2020. Dagstuhl Reports, 9 (11), 1–23. doi:10.4230/DagRep.9.11.1
Armknecht, F.; Verbauwhede, I.; Volkamer, M.; Yung, M.
2020. Dagstuhl Reports, 9 (11), 1–23. doi:10.4230/DagRep.9.11.1
2019
Buchaufsätze
Formal Verification of Evolutionary Changes
Beckert, B.; Mund, J.; Ulbrich, M.; Weigl, A.
2019. Managed Software Evolution. Hrsg.: Ralf H. Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin, 309–332, Springer. doi:10.1007/978-3-030-13499-0_11
Beckert, B.; Mund, J.; Ulbrich, M.; Weigl, A.
2019. Managed Software Evolution. Hrsg.: Ralf H. Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin, 309–332, Springer. doi:10.1007/978-3-030-13499-0_11
Challenges of Using Trusted Computing for Collaborative Data Processing
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2019. Security and Trust Management – 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings. Ed.: S. Mauw, 107–123, Springer. doi:10.1007/978-3-030-31511-5_7
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2019. Security and Trust Management – 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings. Ed.: S. Mauw, 107–123, Springer. doi:10.1007/978-3-030-31511-5_7
TEE-based distributed watchtowers for fraud protection in the Lightning Network
Leinweber, M.; Grundmann, M.; Schönborn, L.; Hartenstein, H.
2019. Data privacy management, cryptocurrencies and blockchain technology. Ed.: C. Pérez-Solà, 177–194, Springer Nature. doi:10.1007/978-3-030-31500-9_11
Leinweber, M.; Grundmann, M.; Schönborn, L.; Hartenstein, H.
2019. Data privacy management, cryptocurrencies and blockchain technology. Ed.: C. Pérez-Solà, 177–194, Springer Nature. doi:10.1007/978-3-030-31500-9_11
Verfassungsrechtliche Grundlagen des Europäischen und nationalen Datenschutzrechts
Bretthauer, S.
2019. Handbuch europäisches und deutsches Datenschutzrecht. Hrsg.: L. Specht, 7–37, Verlag C.H.Beck
Bretthauer, S.
2019. Handbuch europäisches und deutsches Datenschutzrecht. Hrsg.: L. Specht, 7–37, Verlag C.H.Beck
Dissertationen
Cryptographic Protocols from Physical Assumptions. Dissertation
Koch, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Koch, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Security and Anonymity Aspects of the Network Layer of Permissionless Blockchains. Dissertation
Neudecker, T.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000089033
Neudecker, T.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000089033
Specification Languages for Preserving Consistency between Models of Different Languages. Dissertation
Kramer, M. E.
2019. KIT Scientific Publishing. doi:10.5445/KSP/1000081446
Kramer, M. E.
2019. KIT Scientific Publishing. doi:10.5445/KSP/1000081446
Masterarbeiten
Incentivized Privacy-Preserving Participatory Sensing. Masterarbeit
Lauser, T.
2019, Dezember 18. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000124803
Lauser, T.
2019, Dezember 18. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000124803
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions. Masterarbeit
Sauer, F.
2019, Dezember 31. KIT Scientific Publishing. doi:10.5445/IR/1000124048
Sauer, F.
2019, Dezember 31. KIT Scientific Publishing. doi:10.5445/IR/1000124048
Modular Verification of JML Contracts Using Bounded Model Checking. Masterarbeit
Klamroth, J.
2019, März 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000122228
Klamroth, J.
2019, März 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000122228
UC-sichere private Schnittmengenberechnung mit transparenten Enklaven. Masterarbeit
Zinkina, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000099120
Zinkina, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000099120
Proceedingsbeiträge
Who Controls Your Energy? On the (In)Security of Residential Battery Energy Storage Systems
Baumgart, I.; Börsig, M.; Goerke, N.; Hackenjos, T.; Rill, J.; Wehmer, M.
2019. 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 21-23 October 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2019.8909749
Baumgart, I.; Börsig, M.; Goerke, N.; Hackenjos, T.; Rill, J.; Wehmer, M.
2019. 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 21-23 October 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2019.8909749
Explainability of Provably Safe and Live Distributed Controllers for Autonomous Car Manoeuvres
Schwammberger, M.
2019. Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, Ed.: J. Greenyer, Joel, 56–58
Schwammberger, M.
2019. Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, Ed.: J. Greenyer, Joel, 56–58
Self-explainable cyber-physical systems
Blumreiter, M.; Greenyer, J.; Garcia, F. J. C.; Karlsson, J.; Klös, V.; Schwammberger, M.; Sommer, C.; Vogelsang, A.; Wortmann, A.
2019. J. Greenyer, M. Lochau & T. Vogel (Hrsg.), Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, Ed.: J. Greenyer, 8–9
Blumreiter, M.; Greenyer, J.; Garcia, F. J. C.; Karlsson, J.; Klös, V.; Schwammberger, M.; Sommer, C.; Vogelsang, A.; Wortmann, A.
2019. J. Greenyer, M. Lochau & T. Vogel (Hrsg.), Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, Ed.: J. Greenyer, 8–9
Towards Self-Explainable Cyber-Physical Systems
Blumreiter, M.; Greenyer, J.; Chiyah Garcia, F. J.; Klos, V.; Schwammberger, M.; Sommer, C.; Sommer, C.; Vogelsang, A.; Vogelsang, A.; Wortmann, A.; Wortmann, A.
2019. L. Burgueño, A. Pretschner, S. Voss, M. Chaudron, J. Kienzle, M. Völter, S. Gérard, E. Bousse & F. Polack (Hrsg.), 22nd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, MODELS Companion, Ed.: L. Burgueño, 543–548, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C.2019.00084
Blumreiter, M.; Greenyer, J.; Chiyah Garcia, F. J.; Klos, V.; Schwammberger, M.; Sommer, C.; Sommer, C.; Vogelsang, A.; Vogelsang, A.; Wortmann, A.; Wortmann, A.
2019. L. Burgueño, A. Pretschner, S. Voss, M. Chaudron, J. Kienzle, M. Völter, S. Gérard, E. Bousse & F. Polack (Hrsg.), 22nd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, MODELS Companion, Ed.: L. Burgueño, 543–548, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C.2019.00084
A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems
Lackorzynski, T.; Kopsell, S.; Strufe, T.
2019. 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27-29 May 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WFCS.2019.8758010
Lackorzynski, T.; Kopsell, S.; Strufe, T.
2019. 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27-29 May 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WFCS.2019.8758010
Towards a Correspondence Model for the Reuse of Software in Multiple Domains
Koch, S.; Reiche, F.
2019. 10. Workshop „Design For Future – Langlebige Softwaresysteme“, 41–42, Softwaretechnik-Trends
Koch, S.; Reiche, F.
2019. 10. Workshop „Design For Future – Langlebige Softwaresysteme“, 41–42, Softwaretechnik-Trends
Towards Reverse Engineering for Component-Based Systemswith Domain Knowledge of the Technologies Used
Schneider, Y. R.; Koziolek, A.
2019. Proceedings of the 10th Symposium on Software Performance (SSP), 35–37, Gesellschaft für Informatik (GI)
Schneider, Y. R.; Koziolek, A.
2019. Proceedings of the 10th Symposium on Software Performance (SSP), 35–37, Gesellschaft für Informatik (GI)
Towards a conceptual model for unifying variability in space and time
Ananieva, S.; Kehrer, T.; Klare, H.; Koziolek, A.; Lönn, H.; Ramesh, S.; Burger, A.; Taentzer, G.; Westfechtel, B.
2019. Proceedings of the 23rd International Systems and Software Product Line Conference volume B - SPLC ’19, 1–5, ACM Digital Library. doi:10.1145/3307630.3342412
Ananieva, S.; Kehrer, T.; Klare, H.; Koziolek, A.; Lönn, H.; Ramesh, S.; Burger, A.; Taentzer, G.; Westfechtel, B.
2019. Proceedings of the 23rd International Systems and Software Product Line Conference volume B - SPLC ’19, 1–5, ACM Digital Library. doi:10.1145/3307630.3342412
Detecting Parametric Dependencies for Performance Models Using Feature Selection Techniques
Grohmann, J.; Eismann, S.; Elflein, S.; Kistowski, J. V.; Kounev, S.; Mazkatli, M.
2019. 2019 IEEE 27th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 309–322, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MASCOTS.2019.00042
Grohmann, J.; Eismann, S.; Elflein, S.; Kistowski, J. V.; Kounev, S.; Mazkatli, M.
2019. 2019 IEEE 27th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 309–322, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MASCOTS.2019.00042
Heuristic Inference of Model Transformation Definitions from Type Mappings
Gerking, C.; Budde, I.
2019. 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems companion : 15-20 September 2019, Munich, Germany : proceedings. Ed.: L. Burgueño, 182–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C.2019.00031
Gerking, C.; Budde, I.
2019. 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems companion : 15-20 September 2019, Munich, Germany : proceedings. Ed.: L. Burgueño, 182–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C.2019.00031
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Gerking, C.; Schubert, D.
2019. IEEE International Conference on Software Architecture : ICSA 2019 : 25-29 March 2019, Hamburg, Germany : proceedings. Ed.: Matthias Riebisch, 61–70, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00015
Gerking, C.; Schubert, D.
2019. IEEE International Conference on Software Architecture : ICSA 2019 : 25-29 March 2019, Hamburg, Germany : proceedings. Ed.: Matthias Riebisch, 61–70, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00015
Physical Layer Privacy in Broadcast Channels
Lin, P.-H.; Kuhn, C.; Strufe, T.; Jorswieck, E. A.
2019. 2019 IEEE International Workshop on Information Forensics and Security (WIFS), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WIFS47025.2019.9035093
Lin, P.-H.; Kuhn, C.; Strufe, T.; Jorswieck, E. A.
2019. 2019 IEEE International Workshop on Information Forensics and Security (WIFS), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WIFS47025.2019.9035093
SeCoNetBench: A modular framework for Secure Container Networking Benchmarks
Osman, A.; Hanisch, S.; Strufe, T.
2019. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17-19 June 2019, 21–28, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00009
Osman, A.; Hanisch, S.; Strufe, T.
2019. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17-19 June 2019, 21–28, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00009
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Osman, A.; Bruckner, P.; Salah, H.; Fitzek, F. H. P.; Strufe, T.; Fischer, M.
2019. ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20-24 May 2019, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICC.2019.8761171
Osman, A.; Bruckner, P.; Salah, H.; Fitzek, F. H. P.; Strufe, T.; Fischer, M.
2019. ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20-24 May 2019, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICC.2019.8761171
Detasyr: Decentralized Ticket-based Authorization with Sybil Resistance
Friebe, S.; Martinat, P.; Zitterbart, M.
2019. 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 14-17 Oct. 2019, 60–68, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN44214.2019.8990773
Friebe, S.; Martinat, P.; Zitterbart, M.
2019. 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 14-17 Oct. 2019, 60–68, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN44214.2019.8990773
Unpatchable? - Der gesetzliche Umgang mit von menschlichem Verhalten ausgehenden Risiken für die IT-Sicherheit kritischer Infrastrukturen
Müllmann, D.
2019. Die Macht der Daten und der Algorithmen - Regulierung von IT, IoT und KI : Tagungsband Herbstakademie 2019. Hrsg.: J. Taeger, 245–260, OlWIR
Müllmann, D.
2019. Die Macht der Daten und der Algorithmen - Regulierung von IT, IoT und KI : Tagungsband Herbstakademie 2019. Hrsg.: J. Taeger, 245–260, OlWIR
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
The Industrie 4.0 Asset Administration Shell as Information Source for Security Analysis
Patzer, F.; Volz, F.; Usländer, T.; Blöcher, I.; Beyerer, J.
2019. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) : Paraninfo Building, University of Zaragoza, Zaragoza, Spain, 10-13 September, 2019 : proceedings, 420–427, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2019.8869059
Patzer, F.; Volz, F.; Usländer, T.; Blöcher, I.; Beyerer, J.
2019. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) : Paraninfo Building, University of Zaragoza, Zaragoza, Spain, 10-13 September, 2019 : proceedings, 420–427, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2019.8869059
Formal Property-Oriented Design of Voting Rules Using Composable Modules
Diekhoff, K.; Kirsten, M.; Krämer, J.
2019. Algorithmic Decision Theory - 6th International Conference, ADT 2019, Durham, NC, USA, October 25–27, 2019, Proceedings. Ed.: S. Pekeč, 164–166, Springer. doi:10.1007/978-3-030-31489-7
Diekhoff, K.; Kirsten, M.; Krämer, J.
2019. Algorithmic Decision Theory - 6th International Conference, ADT 2019, Durham, NC, USA, October 25–27, 2019, Proceedings. Ed.: S. Pekeč, 164–166, Springer. doi:10.1007/978-3-030-31489-7
Card-Based Cryptography Meets Formal Verification
Koch, A.; Schrempp, M.; Kirsten, M.
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
Koch, A.; Schrempp, M.; Kirsten, M.
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations
Kulyk, O.; Henzel, J.; Renaud, K.; Volkamer, M.
2019. Human-Computer Interaction – INTERACT 2019. Part I. Ed.: D. Lamas, 519–538, Springer International Publishing. doi:10.1007/978-3-030-29381-9_32
Kulyk, O.; Henzel, J.; Renaud, K.; Volkamer, M.
2019. Human-Computer Interaction – INTERACT 2019. Part I. Ed.: D. Lamas, 519–538, Springer International Publishing. doi:10.1007/978-3-030-29381-9_32
Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin
Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 84–92, Springer International Publishing. doi:10.1007/978-3-030-32101-7_6
Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 84–92, Springer International Publishing. doi:10.1007/978-3-030-32101-7_6
Quantum LLL with an application to mersenne number cryptosystems
Tiepelt, M.; Szepieniec, A.
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
Tiepelt, M.; Szepieniec, A.
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
Using Relational Verification for Program Slicing
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2019. Software Engineering and Formal Methods – 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ed.: P. Ölveczky, 353–372, Springer. doi:10.1007/978-3-030-30446-1_19
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2019. Software Engineering and Formal Methods – 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ed.: P. Ölveczky, 353–372, Springer. doi:10.1007/978-3-030-30446-1_19
Towards Consistency Analysis Between Formal and Informal Software Architecture Artefacts
Keim, J.; Schneider, Y.; Koziolek, A.
2019. Proceedings of the 2nd International Workshop on Establishing a Community-Wide Infrastructure for Architecture-Based Software Engineering, 6–12, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ECASE.2019.00010
Keim, J.; Schneider, Y.; Koziolek, A.
2019. Proceedings of the 2nd International Workshop on Establishing a Community-Wide Infrastructure for Architecture-Based Software Engineering, 6–12, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ECASE.2019.00010
Understanding Counterexamples for Relational Properties with DIbugger
Herda, M.; Kirsten, M.; Brunner, E.; Plewnia, J.; Scheler, U.; Staudenmaier, C.; Wagner, B.; Zwick, P.; Beckert, B.
2019. Proceedings of the Sixth Workshop on Horn Clauses for Verification and Synthesis and Third Workshop on Program Equivalence and Relational Reasoning (EPTCS), Prague, Czech Republic, 6-7th April 2019. Ed.: E. De Angelis, 6–13, Open Publishing Association. doi:10.4204/EPTCS.296.4
Herda, M.; Kirsten, M.; Brunner, E.; Plewnia, J.; Scheler, U.; Staudenmaier, C.; Wagner, B.; Zwick, P.; Beckert, B.
2019. Proceedings of the Sixth Workshop on Horn Clauses for Verification and Synthesis and Third Workshop on Program Equivalence and Relational Reasoning (EPTCS), Prague, Czech Republic, 6-7th April 2019. Ed.: E. De Angelis, 6–13, Open Publishing Association. doi:10.4204/EPTCS.296.4
Why Johnny Fails to Protect his Privacy
Gerber, N.; Zimmermann, V.; Volkamer, M.
2019. 4th IEEE European Symposium on Security and Privacy Workshops : proceedings : 17-19 June 2019, Stockholm, Sweden, 109–118, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00019
Gerber, N.; Zimmermann, V.; Volkamer, M.
2019. 4th IEEE European Symposium on Security and Privacy Workshops : proceedings : 17-19 June 2019, Stockholm, Sweden, 109–118, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00019
Erklärvideo “Online-Betrug” – Nach nur fünf Minuten Phishing E-Mails nachweislich signifikant besser erkennen
Volkamer, M.; Renaud, K.; Reinheimer, B.; Rack, P.; Ghiglieri, M.; Gerber, N.; Mayer, P.; Kunz, A.
2019. IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung : Tagungsband zum 16. Deutschen IT-Sicherheitskongress, 307–318, SecuMedia Verlag
Volkamer, M.; Renaud, K.; Reinheimer, B.; Rack, P.; Ghiglieri, M.; Gerber, N.; Mayer, P.; Kunz, A.
2019. IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung : Tagungsband zum 16. Deutschen IT-Sicherheitskongress, 307–318, SecuMedia Verlag
Towards Consistency Checking Between Software Architecture and Informal Documentation
Keim, J.; Koziolek, A.
2019. IEEE International Conference on Software Architecture Companion (ICSA-C), Hamburg, 25.-29. März 2019, 250–253, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C.2019.00052
Keim, J.; Koziolek, A.
2019. IEEE International Conference on Software Architecture Companion (ICSA-C), Hamburg, 25.-29. März 2019, 250–253, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C.2019.00052
PerOpteryx: Automated Improvement of Software Architectures
Busch, A.; Fuchß, D.; Koziolek, A.
2019. IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019. Tool Demo Track, 162–165. doi:10.1109/ICSA-C.2019.00036
Busch, A.; Fuchß, D.; Koziolek, A.
2019. IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019. Tool Demo Track, 162–165. doi:10.1109/ICSA-C.2019.00036
Access Control for Binary Integrity Protection using Ethereum
Stengele, O.; Baumeister, A.; Birnstill, P.; Hartenstein, H.
2019. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT ’19), Toronto, CDN, June 4-6, 2019, 3–12, Association for Computing Machinery (ACM). doi:10.1145/3322431.3325108
Stengele, O.; Baumeister, A.; Birnstill, P.; Hartenstein, H.
2019. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT ’19), Toronto, CDN, June 4-6, 2019, 3–12, Association for Computing Machinery (ACM). doi:10.1145/3322431.3325108
Data-driven software architecture for analyzing confidentiality
Seifermann, S.; Heinrich, R.; Reussner, R.
2019. 2019 IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019, Art. Nr.: 8703910, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00009
Seifermann, S.; Heinrich, R.; Reussner, R.
2019. 2019 IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019, Art. Nr.: 8703910, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00009
Verification-based test case generation for information-flow properties
Herda, M.; Müssig, J.; Tyszberowicz, S.; Beckert, B.
2019. 34th Annual ACM Symposium on Applied Computing, SAC 2019; Limassol; Cyprus; 8 April 2019 through 12 April 2019, 2231–2238, Association for Computing Machinery (ACM). doi:10.1145/3297280.3297500
Herda, M.; Müssig, J.; Tyszberowicz, S.; Beckert, B.
2019. 34th Annual ACM Symposium on Applied Computing, SAC 2019; Limassol; Cyprus; 8 April 2019 through 12 April 2019, 2231–2238, Association for Computing Machinery (ACM). doi:10.1145/3297280.3297500
On Tightly Secure Primitives in the Multi-instance Setting
Hofheinz, D.; Nguyen, N. K.
2019. 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019; Beijing; China; 14 April 2019 through 17 April 2019. Ed.: D. Lin, 581–611, Springer. doi:10.1007/978-3-030-17253-4_20
Hofheinz, D.; Nguyen, N. K.
2019. 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019; Beijing; China; 14 April 2019 through 17 April 2019. Ed.: D. Lin, 581–611, Springer. doi:10.1007/978-3-030-17253-4_20
Single underlying models for projectional, multi-view environments
Meier, J.; Klare, H.; Tunjic, C.; Atkinson, C.; Burger, E.; Reussner, R.; Winter, A.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 119–130, SciTePress. doi:10.5220/0007396401190130
Meier, J.; Klare, H.; Tunjic, C.; Atkinson, C.; Burger, E.; Reussner, R.; Winter, A.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 119–130, SciTePress. doi:10.5220/0007396401190130
Automated incident response for industrial control systems leveraging software-defined networking
Patzer, F.; Meshram, A.; Heß, M.
2019. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 319–327, SciTePress
Patzer, F.; Meshram, A.; Heß, M.
2019. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 319–327, SciTePress
Applying metamodel-based tooling to object-oriented code
Klare, H.; Saglam, T.; Burger, E.; Reussner, R.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 219–230, SciTePress. doi:10.5220/0007246202190230
Klare, H.; Saglam, T.; Burger, E.; Reussner, R.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 219–230, SciTePress. doi:10.5220/0007246202190230
Balancing Performance Characteristics of Hierarchical Heavy Hitters
Heseding, H.; Glöckle, J.; Bauer, R.; Zitterbart, M.
2019. IFIP NETWORKING 2019, Warsaw, Poland, May 20-22, 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/IFIPNetworking.2019.8816832
Heseding, H.; Glöckle, J.; Bauer, R.; Zitterbart, M.
2019. IFIP NETWORKING 2019, Warsaw, Poland, May 20-22, 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/IFIPNetworking.2019.8816832
Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin
Grundmann, M.; Leinweber, M.; Hartenstein, H.
2019. Proceedings of 1st IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019), Seoul, Südkorea, 14 - 17 Mai 2019, 268–276, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BLOC.2019.8751394
Grundmann, M.; Leinweber, M.; Hartenstein, H.
2019. Proceedings of 1st IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019), Seoul, Südkorea, 14 - 17 Mai 2019, 268–276, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BLOC.2019.8751394
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
Kulyk, O.; Gerber, P.; Marky, K.; Beckmann, C.; Volkamer, M.
2019. Proceedings 2019 Workshop on Usable Security. Ed.: M.F. Theofanos. doi:10.14722/usec.2019.23029
Kulyk, O.; Gerber, P.; Marky, K.; Beckmann, C.; Volkamer, M.
2019. Proceedings 2019 Workshop on Usable Security. Ed.: M.F. Theofanos. doi:10.14722/usec.2019.23029
Towards computer-aided security life cycle management for critical industrial control systems
Patzer, F.; Meshram, A.; Birnstill, P.; Haas, C.; Beyerer, J.
2019. 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018; Kaunas; Lithuania; 24 September 2018 through 26 September 2018. Ed.: E. Luiijf, 45–56, Springer. doi:10.1007/978-3-030-05849-4_4
Patzer, F.; Meshram, A.; Birnstill, P.; Haas, C.; Beyerer, J.
2019. 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018; Kaunas; Lithuania; 24 September 2018 through 26 September 2018. Ed.: E. Luiijf, 45–56, Springer. doi:10.1007/978-3-030-05849-4_4
I (don’t) see what you typed there! Shoulder-surfing resistant password entry on gamepads
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, Association for Computing Machinery (ACM). doi:10.1145/3290605.3300779
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, Association for Computing Machinery (ACM). doi:10.1145/3290605.3300779
Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
Grundmann, M.; Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security : FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, (FC 2018), Nieuwpoort, CU, March 2, 2018. Ed.: A. Zohar, 113–126, Springer-Verlag. doi:10.1007/978-3-662-58820-8_9
Grundmann, M.; Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security : FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, (FC 2018), Nieuwpoort, CU, March 2, 2018. Ed.: A. Zohar, 113–126, Springer-Verlag. doi:10.1007/978-3-662-58820-8_9
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness
Kulyk, O.; Volkamer, M.
2019. Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. Ed.: Tung X. Bui, 2842–2851, University of Hawaii at Manoa, Hamilton Library, ScholarSpace. doi:10.24251/HICSS.2019.343
Kulyk, O.; Volkamer, M.
2019. Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. Ed.: Tung X. Bui, 2842–2851, University of Hawaii at Manoa, Hamilton Library, ScholarSpace. doi:10.24251/HICSS.2019.343
Bücher
Managed Software Evolution
Reussner, R.; Goedicke, M.; Hasselbring, W.; Vogel-Heuser, B.; Keim, J.; Märtin, L. (Hrsg.)
2019. Springer Nature. doi:10.1007/978-3-030-13499-0
Reussner, R.; Goedicke, M.; Hasselbring, W.; Vogel-Heuser, B.; Keim, J.; Märtin, L. (Hrsg.)
2019. Springer Nature. doi:10.1007/978-3-030-13499-0
Gesundheitsversorgung in Zeiten der DSGVO
Spiecker gen. Döhmann, I.; Wallrabenstein, A. (Hrsg.)
2019. Lang. doi:10.3726/b15795
Spiecker gen. Döhmann, I.; Wallrabenstein, A. (Hrsg.)
2019. Lang. doi:10.3726/b15795
Entwicklung von Echtzeitsystemen – Einführung in die Entwicklung zuverlässiger softwarebasierter Funktionen unter Echtzeitbedingungen
Keller, H. B.
2019. Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-26641-7
Keller, H. B.
2019. Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-26641-7
Datenschutzrecht DSGVO mit BDSG
Simitis, S.; Albrecht, J. P.
2019. (Spiecker gen. Döhmann & G. Hornung, Hrsg.), Nomos Verlagsgesellschaft
Simitis, S.; Albrecht, J. P.
2019. (Spiecker gen. Döhmann & G. Hornung, Hrsg.), Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Digitale Mobilität
Spiecker gen. Döhmann, I.
2019. Gewerblicher Rechtsschutz und Urheberrecht, 341–352
Spiecker gen. Döhmann, I.
2019. Gewerblicher Rechtsschutz und Urheberrecht, 341–352
Können Algorithmen diskriminieren
Spiecker gen. Döhmann, I.; Fröhlich, W.
2019. Zeitschrift des Deutschen Juristinnenbundes : djbZ, 22, 91–93
Spiecker gen. Döhmann, I.; Fröhlich, W.
2019. Zeitschrift des Deutschen Juristinnenbundes : djbZ, 22, 91–93
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Game-theoretical model on the GDPR: Market for lemons?
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Journal of intellectual property, information technology and electronic commerce law, 10 (2), 200–208
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Journal of intellectual property, information technology and electronic commerce law, 10 (2), 200–208
Modeling and control of multimodal and hybrid energy systems (Editorial)
Wolter, M.; Hagenmeyer, V.
2019. Automatisierungstechnik, 67 (11), 891–892. doi:10.1515/auto-2019-0112
Wolter, M.; Hagenmeyer, V.
2019. Automatisierungstechnik, 67 (11), 891–892. doi:10.1515/auto-2019-0112
Web Application Security (Dagstuhl Seminar 18321)
Johns, M.; Nikiforakis, N.; Volkamer, M.; Wilander, J.
2019. Dagstuhl Reports, 8 (8), 1–17. doi:10.4230/DagRep.8.8.1
Johns, M.; Nikiforakis, N.; Volkamer, M.; Wilander, J.
2019. Dagstuhl Reports, 8 (8), 1–17. doi:10.4230/DagRep.8.8.1
Investigating People’s Privacy Risk Perception
Gerber, N.; Reinheimer, B.; Volkamer, M.
2019. Proceedings on privacy enhancing technologies, 2019 (3), 267–288. doi:10.2478/popets-2019-0047
Gerber, N.; Reinheimer, B.; Volkamer, M.
2019. Proceedings on privacy enhancing technologies, 2019 (3), 267–288. doi:10.2478/popets-2019-0047
Spieltheoretische Modellierung der Verarbeitung personenbezogener Daten
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Datenschutz und Datensicherheit, 43 (5), 270–275. doi:10.1007/s11623-019-1106-6
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Datenschutz und Datensicherheit, 43 (5), 270–275. doi:10.1007/s11623-019-1106-6
Keep on rating – on the systematic rating and comparison of authentication schemes
Zimmermann, V.; Gerber, N.; Mayer, P.; Kleboth, M.; Preuschen, A. von; Schmidt, K.
2019. Information and computer security, 26 (5), 621–635. doi:10.1108/ICS-01-2019-0020
Zimmermann, V.; Gerber, N.; Mayer, P.; Kleboth, M.; Preuschen, A. von; Schmidt, K.
2019. Information and computer security, 26 (5), 621–635. doi:10.1108/ICS-01-2019-0020
Sichere Instant Messaging Apps
Brendel, J.; Gerber, N.
2019. Datenschutz und Datensicherheit, 43 (5), 276–280. doi:10.1007/s11623-019-1107-5
Brendel, J.; Gerber, N.
2019. Datenschutz und Datensicherheit, 43 (5), 276–280. doi:10.1007/s11623-019-1107-5
The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Ralf Reussner
2019. Communications in computer and information science, 977, 109–124. doi:10.1007/978-3-030-25109-3_6
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Ralf Reussner
2019. Communications in computer and information science, 977, 109–124. doi:10.1007/978-3-030-25109-3_6
Mehr als nur Whistleblowing: das Gesetz zum Schutz von Geschäftsgeheimnissen
Müllmann, D.
2019. Zeitschrift für Rechtspolitik, (1), 25–26
Müllmann, D.
2019. Zeitschrift für Rechtspolitik, (1), 25–26
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen “Diese Webseite verwendet Cookies”
Oksana Kulyk; Nina Gerber; Melanie Volkamer; Annika Hilt
2019. Datenschutz und Datensicherheit, 43 (2), 81–85. doi:10.1007/s11623-019-1068-8
Oksana Kulyk; Nina Gerber; Melanie Volkamer; Annika Hilt
2019. Datenschutz und Datensicherheit, 43 (2), 81–85. doi:10.1007/s11623-019-1068-8
Identitätsverwaltung über die Blockchain? Rechtliche Betrachtungen am Beispiel des Internets der Dinge
Steinbrück, A.
2019. Jusletter IT, (21.02.2019)
Steinbrück, A.
2019. Jusletter IT, (21.02.2019)
An extensible approach to implicit incremental model analyses
Hinkel, G.; Heinrich, R.; Reussner, R.
2019. Software and systems modeling, 18 (5), 3151–3187. doi:10.1007/s10270-019-00719-y
Hinkel, G.; Heinrich, R.; Reussner, R.
2019. Software and systems modeling, 18 (5), 3151–3187. doi:10.1007/s10270-019-00719-y
2018
Buchaufsätze
Industrial Security by Design : Nachverfolgbare Informationssicherheit für Cyber-Physische Produktionssysteme
Gerking, C.; Bodden, E.; Schäfer, W.
2018. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 1–24, Springer. doi:10.1007/978-3-662-52903-4_8-1
Gerking, C.; Bodden, E.; Schäfer, W.
2018. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 1–24, Springer. doi:10.1007/978-3-662-52903-4_8-1
Schutz von Betriebs- und Geschäftsgeheimnissen in Industrie 4.0-Umgebungen
Müllmann, D.
2018. Rechtsfragen digitaler Transformation - Gestaltung digitaler Veränderungsprozesse durch Recht. Tagungsband der Deutsche Stiftung für Recht und Informatik (DSRI). Hrsg.: J. Taeger, 697–711, OlWIR
Müllmann, D.
2018. Rechtsfragen digitaler Transformation - Gestaltung digitaler Veränderungsprozesse durch Recht. Tagungsband der Deutsche Stiftung für Recht und Informatik (DSRI). Hrsg.: J. Taeger, 697–711, OlWIR
Illi Isabellistes Se Custodes Egregios Praestabant
Bischof, S.; Breitner, J.; Lohner, D.; Snelting, G.
2018. Principled Software Development – Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday. Ed.: P. Müller, 267–282, Springer International Publishing. doi:10.1007/978-3-319-98047-8_17
Bischof, S.; Breitner, J.; Lohner, D.; Snelting, G.
2018. Principled Software Development – Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday. Ed.: P. Müller, 267–282, Springer International Publishing. doi:10.1007/978-3-319-98047-8_17
Reusing Tamper-Proof Hardware in UC-Secure Protocols
Mechler, J.; Müller-Quade, J.; Nilges, T.
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Mechler, J.; Müller-Quade, J.; Nilges, T.
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Human Factors in Security
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Vieweg Verlag. doi:10.1007/978-3-658-19523-6_5
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Vieweg Verlag. doi:10.1007/978-3-658-19523-6_5
Dissertationen
A Framework for Non-Interference in Component-Based Systems. Dissertation
Greiner, S.
2018. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000082042
Greiner, S.
2018. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000082042
Proceedingsbeiträge
Introducing Liveness into Multi-lane Spatial Logic lane change controllers using UPPAAL
Schwammberger, M.
2018. M. Gleirscher, S. Kugele & S. Linker (Hrsg.), Proceedings 2nd International Workshop on Safe Control of Autonomous Vehicles, SCAV@CPSWeek 2018, Porto, Portugal, 10th April 2018, Ed.: M. Gleirscher, 17–31, Open Publishing Association. doi:10.4204/EPTCS.269.3
Schwammberger, M.
2018. M. Gleirscher, S. Kugele & S. Linker (Hrsg.), Proceedings 2nd International Workshop on Safe Control of Autonomous Vehicles, SCAV@CPSWeek 2018, Porto, Portugal, 10th April 2018, Ed.: M. Gleirscher, 17–31, Open Publishing Association. doi:10.4204/EPTCS.269.3
Towards Semantic Composition of Event-Based Simulation
Koch, S.
2018. Softwaretechnik-Trends. Berichte aus den Fachgruppen und Arbeitskreisen FG SRE: 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) und 9. Workshop "Design for Future" des GI-Arbeitskreises "Langlebige Softwaresysteme" (L2S2), Bad-Honnef, 59–50, Softwaretechnik-Trends
Koch, S.
2018. Softwaretechnik-Trends. Berichte aus den Fachgruppen und Arbeitskreisen FG SRE: 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) und 9. Workshop "Design for Future" des GI-Arbeitskreises "Langlebige Softwaresysteme" (L2S2), Bad-Honnef, 59–50, Softwaretechnik-Trends
Specification of Information Flow Security Policies in Model-Based Systems Engineering
Gerking, C.
2018. M. Mazzara, I. Ober & G. Salaün (Hrsg.), Software technologies: applications and foundations: STAF 2018 collocated workshops, Toulouse, France, June 25-29, 2018 : revised selected papers. Ed.: Manuel Mazzara, 617–632, Springer. doi:10.1007/978-3-030-04771-9_47
Gerking, C.
2018. M. Mazzara, I. Ober & G. Salaün (Hrsg.), Software technologies: applications and foundations: STAF 2018 collocated workshops, Toulouse, France, June 25-29, 2018 : revised selected papers. Ed.: Manuel Mazzara, 617–632, Springer. doi:10.1007/978-3-030-04771-9_47
Towards ensuring security by design in cyber-physical systems engineering processes
Geismann, J.; Gerking, C.; Bodden, E.
2018. M. Kuhrmann, R. V. O’Connor & D. Houston (Hrsg.), Proceedings of the 2018 International Conference on Software and System Process (ICSSP ’18) : Gothenburg, Sweden, May 26 - 27, 2018. Ed.: Marco Kuhrmann, 123–127, Association for Computing Machinery (ACM). doi:10.1145/3202710.3203159
Geismann, J.; Gerking, C.; Bodden, E.
2018. M. Kuhrmann, R. V. O’Connor & D. Houston (Hrsg.), Proceedings of the 2018 International Conference on Software and System Process (ICSSP ’18) : Gothenburg, Sweden, May 26 - 27, 2018. Ed.: Marco Kuhrmann, 123–127, Association for Computing Machinery (ACM). doi:10.1145/3202710.3203159
Model Checking the Information Flow Security of Real-Time Systems
Gerking, C.; Schubert, D.; Bodden, E.
2018. M. Payer, A. Rashid & J. M. Such (Hrsg.), Engineering Secure Software and Systems : 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings. Ed.: Mathias Payer, 27–43, Springer. doi:10.1007/978-3-319-94496-8_3
Gerking, C.; Schubert, D.; Bodden, E.
2018. M. Payer, A. Rashid & J. M. Such (Hrsg.), Engineering Secure Software and Systems : 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings. Ed.: Mathias Payer, 27–43, Springer. doi:10.1007/978-3-319-94496-8_3
Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems
Gerking, C.; Schubert, D.
2018. C. E. Cuesta, D. Garlan & J. Pérez (Hrsg.), Software Architecture : 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018, Proceedings. Ed. by Carlos E. Cuesta, David Garlan, Jennifer Pérez, 147–155, Springer. doi:10.1007/978-3-030-00761-4_10
Gerking, C.; Schubert, D.
2018. C. E. Cuesta, D. Garlan & J. Pérez (Hrsg.), Software Architecture : 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018, Proceedings. Ed. by Carlos E. Cuesta, David Garlan, Jennifer Pérez, 147–155, Springer. doi:10.1007/978-3-030-00761-4_10
Interactively Secure Groups from Obfuscation
Agrikola, T.; Hofheinz, D.
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Agrikola, T.; Hofheinz, D.
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Tailored quality modeling and analysis of software-intensive systems
Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 336–341, Knowledge Systems Institute. doi:10.18293/SEKE2018-020
Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 336–341, Knowledge Systems Institute. doi:10.18293/SEKE2018-020
Modeling and Simulation of Load Balancing Strategies for Computing in High Energy Physics
Caspart, R.; Firnkes, P.; Giffels, M.; Koziolek, A.; Quast, G.; Reussner, R.; Stemmer-Grabow, M.
2018. CHEP 2018 - 23rd International Conference on Computing in High Energy and Nuclear Physics, Sofia, BG, July 9-13,2018. Ed.: P. Hristov, EDP Sciences
Caspart, R.; Firnkes, P.; Giffels, M.; Koziolek, A.; Quast, G.; Reussner, R.; Stemmer-Grabow, M.
2018. CHEP 2018 - 23rd International Conference on Computing in High Energy and Nuclear Physics, Sofia, BG, July 9-13,2018. Ed.: P. Hristov, EDP Sciences
Considering Not-quantified Quality Attributes in an Automated Design Space Exploration
Busch, A.; Koziolek, A.
2018. Software Engineering 2018 - Fachtagung des GI-Fachbereichs Softwaretechnik (SE 20108), Ulm, 06.-09. März 2018, Gesellschaft für Informatik (GI)
Busch, A.; Koziolek, A.
2018. Software Engineering 2018 - Fachtagung des GI-Fachbereichs Softwaretechnik (SE 20108), Ulm, 06.-09. März 2018, Gesellschaft für Informatik (GI)
A Cross-Disciplinary Language for Change Propagation Rules
Busch, K.; Werle, D.; Loper, M.; Heinrich, R.; Reussner, R.; Vogel-Heuser, B.
2018. IEEE 14th International Conference on Automation Science and Engineering (CASE 2018), München, 20.-24. August 2018, 1099–1104, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560364
Busch, K.; Werle, D.; Loper, M.; Heinrich, R.; Reussner, R.; Vogel-Heuser, B.
2018. IEEE 14th International Conference on Automation Science and Engineering (CASE 2018), München, 20.-24. August 2018, 1099–1104, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560364
Automated Analysis of the Co-evolution of Software Systems and Business Processes
Busch, K.; Heinrich, R.; Busch, A.; Reussner, R. H.
2018. Software Engineering und Software Management 2018, Ulm, 5.-9. März 2018. Hrsg.:M. Tichy, 159–160, Gesellschaft für Informatik (GI)
Busch, K.; Heinrich, R.; Busch, A.; Reussner, R. H.
2018. Software Engineering und Software Management 2018, Ulm, 5.-9. März 2018. Hrsg.:M. Tichy, 159–160, Gesellschaft für Informatik (GI)
Rapid Testing of IaaS Resource Management Algorithms via Cloud Middleware Simulation
Stier, C.; Domaschka, J.; Koziolek, A.; Krach, S.; Krzywda, J.; Reussner, R.
2018. Proceedings of the 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 184–191, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184428
Stier, C.; Domaschka, J.; Koziolek, A.; Krach, S.; Krzywda, J.; Reussner, R.
2018. Proceedings of the 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 184–191, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184428
An approach to requirement analysis in automated production systems
Maier, T.; Busch, K.; Reussner, R.
2018. 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) - 9. Workshop „Design for Future“des GI-Arbeitskreises „Langlebige Softwaresysteme“ (L2S2), Bad-Honnef, 02.-04. Mai 2018
Maier, T.; Busch, K.; Reussner, R.
2018. 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) - 9. Workshop „Design for Future“des GI-Arbeitskreises „Langlebige Softwaresysteme“ (L2S2), Bad-Honnef, 02.-04. Mai 2018
Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Reussner, R.
2018. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, P, January 22-24, 2018. Ed.: P. Mori. Vol. 1, 74–82, SciTePress. doi:10.5220/0006606200740082
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Reussner, R.
2018. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, P, January 22-24, 2018. Ed.: P. Mori. Vol. 1, 74–82, SciTePress. doi:10.5220/0006606200740082
A Methodology for Domain-Spanning Change Impact Analysis
Heinrich, R.; Busch, K.; Koch, S.
2018. 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA 2018), Prague, CZ, August 29-31, 2018, 326–330, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00060
Heinrich, R.; Busch, K.; Koch, S.
2018. 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA 2018), Prague, CZ, August 29-31, 2018, 326–330, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00060
Investigating Performance Metrics for Scaling Microservices in CloudIoT-Environments
Gotin, M.; Lösch, F.; Heinrich, R.; Reussner, R.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 09.-13. April 2018, 157–167, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184430
Gotin, M.; Lösch, F.; Heinrich, R.; Reussner, R.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 09.-13. April 2018, 157–167, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184430
A Model-Based Approach to Calculate Maintainability Task Lists of PLC Programs for Factory Automation
Busch, K.; Rätz, J.; Koch, S.; Heinrich, R.; Reussner, R.; Cha, S.; Seitz, M.; Vogel-Heuser, B.
2018. 44th Annual Conference of the IEEE Industrial Electronics Society (IECON 2018), Washington DC, October 20-23, 2018, 2949–2954, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2018.8591302
Busch, K.; Rätz, J.; Koch, S.; Heinrich, R.; Reussner, R.; Cha, S.; Seitz, M.; Vogel-Heuser, B.
2018. 44th Annual Conference of the IEEE Industrial Electronics Society (IECON 2018), Washington DC, October 20-23, 2018, 2949–2954, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2018.8591302
Predicting the Perceived Modularity of MOF-based Metamodels
Hinkel, G.; Strittmatter, M.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 48–58, SciTePress
Hinkel, G.; Strittmatter, M.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 48–58, SciTePress
Automated Consistency Preservation in Electronics Development of Cyber-Physical Systems
Zimmermann, D.; Reussner, R. H.
2018. Software Technologies: Applications and Foundations - STAF 2018 Collocated Workshops,Toulouse, France, June 25–29, 2018. Ed.: M. Mazzara, 506–511, Springer Nature. doi:10.1007/978-3-030-04771-9_36
Zimmermann, D.; Reussner, R. H.
2018. Software Technologies: Applications and Foundations - STAF 2018 Collocated Workshops,Toulouse, France, June 25–29, 2018. Ed.: M. Mazzara, 506–511, Springer Nature. doi:10.1007/978-3-030-04771-9_36
Formal Specification and Verification of Hyperledger Fabric Chaincode
Beckert, B.; Herda, M.; Kirsten, M.; Schiffl, J.
2018. 3rd Symposium on Distributed Ledger Technology (SDLT-2018) co-located with ICFEM 2018: the 20th International Conference on Formal Engineering Methods, Gold Coast, Australia, November 12, 2018, 44–48, Institute for Integrated and Intelligent Systems
Beckert, B.; Herda, M.; Kirsten, M.; Schiffl, J.
2018. 3rd Symposium on Distributed Ledger Technology (SDLT-2018) co-located with ICFEM 2018: the 20th International Conference on Formal Engineering Methods, Gold Coast, Australia, November 12, 2018, 44–48, Institute for Integrated and Intelligent Systems
Towards automatic argumentation about voting rules
Kirsten, M.; Cailloux, O.
2018. 4ème conférence sur les Applications Pratiques de l’Intelligence Artificielle, APIA 2018, Nancy, France, July 2-3, 2018., Ed.: S. Bringay, J. Mattioli
Kirsten, M.; Cailloux, O.
2018. 4ème conférence sur les Applications Pratiques de l’Intelligence Artificielle, APIA 2018, Nancy, France, July 2-3, 2018., Ed.: S. Bringay, J. Mattioli
Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems
Birnstill, P.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, (PETRA), Corfu, Greece, June 26-29, 2018, 292–296, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201563
Birnstill, P.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, (PETRA), Corfu, Greece, June 26-29, 2018, 292–296, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201563
Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2018. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, 85–91, Association for Computing Machinery (ACM). doi:10.1145/3205977.3205990
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2018. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, 85–91, Association for Computing Machinery (ACM). doi:10.1145/3205977.3205990
The EU General Data Protection Regulation and its Effects on Designing Assistive Environments
Krempel, E.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018, Corfu, Greece, June 26-29, 2018, 327–330, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201567
Krempel, E.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018, Corfu, Greece, June 26-29, 2018, 327–330, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201567
Achieving delta description of the control software for an automated production system evolution
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. 14th IEEE International Conference on Automation Science and Engineering, CASE 2018; Technical University MunichMunich; Germany; 20 August 2018 through 24 August 2018, 1170–1176, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560588
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. 14th IEEE International Conference on Automation Science and Engineering, CASE 2018; Technical University MunichMunich; Germany; 20 August 2018 through 24 August 2018, 1170–1176, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560588
Assistance in Daily Password Generation Tasks
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. 2018 Joint ACM International Conference on Pervasive and Ubiquitous Computing, UbiComp 2018 and 2018 ACM International Symposium on Wearable Computers, ISWC 2018; Singapore; Singapore; 8 October 2018 through 12 October 2018, 786–793, Association for Computing Machinery (ACM). doi:10.1145/3267305.3274127
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. 2018 Joint ACM International Conference on Pervasive and Ubiquitous Computing, UbiComp 2018 and 2018 ACM International Symposium on Wearable Computers, ISWC 2018; Singapore; Singapore; 8 October 2018 through 12 October 2018, 786–793, Association for Computing Machinery (ACM). doi:10.1145/3267305.3274127
Towards Application of Cuckoo Filters in Network Security Monitoring
Grashöfer, J.; Jacob, F.; Hartenstein, H.
2018. 14th International Conference on Network and Service Management (CNSM), Rome, Italy, Nov. 5 - Nov. 9, 2018, 373–377, Institute of Electrical and Electronics Engineers (IEEE)
Grashöfer, J.; Jacob, F.; Hartenstein, H.
2018. 14th International Conference on Network and Service Management (CNSM), Rome, Italy, Nov. 5 - Nov. 9, 2018, 373–377, Institute of Electrical and Electronics Engineers (IEEE)
Using dependence graphs to assist verification and testing of information-flow properties
Herda, M.; Tyszberowicz, S.; Beckert, B.
2018. Tests and Proofs : 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings. Ed. by Catherine Dubois, Burkhart Wolff, 83–102, Springer. doi:10.1007/978-3-319-92994-1_5
Herda, M.; Tyszberowicz, S.; Beckert, B.
2018. Tests and Proofs : 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings. Ed. by Catherine Dubois, Burkhart Wolff, 83–102, Springer. doi:10.1007/978-3-319-92994-1_5
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode
Hamann, T.; Herda, M.; Mantel, H.; Mohr, M.; Schneider, D.; Tasch, M.
2018. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018; Proceedings. Ed.: N. Gruschka, 437–453, Springer Nature. doi:10.1007/978-3-030-03638-6_27
Hamann, T.; Herda, M.; Mantel, H.; Mohr, M.; Schneider, D.; Tasch, M.
2018. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018; Proceedings. Ed.: N. Gruschka, 437–453, Springer Nature. doi:10.1007/978-3-030-03638-6_27
Relational Equivalence Proofs Between Imperative and MapReduce Algorithms
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. Verified Software: Theories, Tools, and Experiments; 10th International Conference, VSTTE 2018; Oxford, UK, July 18–19, 2018; Revised Selected Papers. Ed.: R. Piskac, 248–266, Springer Nature. doi:10.1007/978-3-030-03592-1_14
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. Verified Software: Theories, Tools, and Experiments; 10th International Conference, VSTTE 2018; Oxford, UK, July 18–19, 2018; Revised Selected Papers. Ed.: R. Piskac, 248–266, Springer Nature. doi:10.1007/978-3-030-03592-1_14
Guidance of architectural changes in technical systems with varying operational modes
Märtin, L.; Forjahn, N.-A.; Koziolek, A.; Reussner, R.
2018. Software Architecture: 12th European Conference on Software Architecture (ECSA 2018), Madrid, E, September 24-28, 2018; Proceedings. Ed.: C.E. Cuesta, 37–45, Springer Nature. doi:10.1007/978-3-030-00761-4_3
Märtin, L.; Forjahn, N.-A.; Koziolek, A.; Reussner, R.
2018. Software Architecture: 12th European Conference on Software Architecture (ECSA 2018), Madrid, E, September 24-28, 2018; Proceedings. Ed.: C.E. Cuesta, 37–45, Springer Nature. doi:10.1007/978-3-030-00761-4_3
Using informal knowledge for improving software quality trade-off decisions
Schneider, Y.; Busch, A.; Koziolek, A.
2018. Software Architecture: 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018; Proceedings, 265–283, Springer Nature. doi:10.1007/978-3-030-00761-4_18
Schneider, Y.; Busch, A.; Koziolek, A.
2018. Software Architecture: 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018; Proceedings, 265–283, Springer Nature. doi:10.1007/978-3-030-00761-4_18
Categories of change triggers in business processes
Kaplan, A.; Busch, K.; Koziolek, A.; Heinrich, R.
2018. Euromicro Conference on Software Engineering and Advanced Applications 2018 (SEAA 2018), Prague, CZ, August 29-31, 2018. Ed.: T. Bures, 252–259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00049
Kaplan, A.; Busch, K.; Koziolek, A.; Heinrich, R.
2018. Euromicro Conference on Software Engineering and Advanced Applications 2018 (SEAA 2018), Prague, CZ, August 29-31, 2018. Ed.: T. Bures, 252–259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00049
A model-based approach for build avoidance
Neumann, M.; Busch, K.; Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 104–109, KSI. doi:10.18293/SEKE2018-030
Neumann, M.; Busch, K.; Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 104–109, KSI. doi:10.18293/SEKE2018-030
Using theorem provers to increase the precision of dependence analysis for information flow control
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2018. 20th International Conference on Formal Engineering Methods, ICFEM 2018; Gold Coast; Australia; 12 November 2018 through 16 November 2018. Ed.: J. Sun, 284–300, Springer. doi:10.1007/978-3-030-02450-5_17
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2018. 20th International Conference on Formal Engineering Methods, ICFEM 2018; Gold Coast; Australia; 12 November 2018 through 16 November 2018. Ed.: J. Sun, 284–300, Springer. doi:10.1007/978-3-030-02450-5_17
Modularizing and layering metamodels with the modular EMF designer
Kechaou, A.; Strittmatter, M.
2018. 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS 2018), Copenhagen, DK, October 14-19, 2018, 32–36, Association for Computing Machinery (ACM). doi:10.1145/3270112.3270119
Kechaou, A.; Strittmatter, M.
2018. 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS 2018), Copenhagen, DK, October 14-19, 2018, 32–36, Association for Computing Machinery (ACM). doi:10.1145/3270112.3270119
Towards a notion of coverage for incomplete program-correctness proofs
Beckert, B.; Herda, M.; Kobischke, S.; Ulbrich, M.
2018. 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018; Limassol; Cyprus; 5 November 2018 through 9 November 2018. Ed.: T. Margaria, 53–63, Springer. doi:10.1007/978-3-030-03421-4_4
Beckert, B.; Herda, M.; Kobischke, S.; Ulbrich, M.
2018. 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018; Limassol; Cyprus; 5 November 2018 through 9 November 2018. Ed.: T. Margaria, 53–63, Springer. doi:10.1007/978-3-030-03421-4_4
Aligning Business Process Access Control Policies with Enterprise Architecture
Pilipchuk, R.; Seifermann, S.; Heinrich, R.
2018. Proceedings of the Central European Cybersecurity Conference 2018 (CECC 2018), Ljubljana, SLO, November 15-16, 2018, Article no 17, Association for Computing Machinery (ACM). doi:10.1145/3277570.3277588
Pilipchuk, R.; Seifermann, S.; Heinrich, R.
2018. Proceedings of the Central European Cybersecurity Conference 2018 (CECC 2018), Ljubljana, SLO, November 15-16, 2018, Article no 17, Association for Computing Machinery (ACM). doi:10.1145/3277570.3277588
Modeling of dynamic trust contracts for industry 4.0 systems
Al-Ali, R.; Heinrich, R.; Hnetynka, P.; Juan-Verdejo, A.; Seifermann, S.; Walter, M.
2018. Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings (ECSA 2018), Madrid, E, September 24-28, 2018, 45:1–45:4, Association for Computing Machinery (ACM). doi:10.1145/3241403.3241450
Al-Ali, R.; Heinrich, R.; Hnetynka, P.; Juan-Verdejo, A.; Seifermann, S.; Walter, M.
2018. Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings (ECSA 2018), Madrid, E, September 24-28, 2018, 45:1–45:4, Association for Computing Machinery (ACM). doi:10.1145/3241403.3241450
Towards a metamodel for modular simulation environments
Koch, S.; Reiche, F.; Heinrich, R.
2018. ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS), Kopenhagen, DK, October 14-19, 2018. Ed.: R. Hebig
Koch, S.; Reiche, F.; Heinrich, R.
2018. ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS), Kopenhagen, DK, October 14-19, 2018. Ed.: R. Hebig
Integrating semantically-related legacy models in vitruvius
Mazkatli, M.; Burger, E.; Quante, J.; Koziolek, A.
2018. 10th ACM/IEEE International Workshop on Modelling in Software Engineering, MiSE 2018; Gothenburg; Sweden; 27 May 2018 through 28 May 2018, 41–48, Association for Computing Machinery (ACM). doi:10.1145/3193954.3193961
Mazkatli, M.; Burger, E.; Quante, J.; Koziolek, A.
2018. 10th ACM/IEEE International Workshop on Modelling in Software Engineering, MiSE 2018; Gothenburg; Sweden; 27 May 2018 through 28 May 2018, 41–48, Association for Computing Machinery (ACM). doi:10.1145/3193954.3193961
Identifying Microservices Using Functional Decomposition
Tyszberowicz, S.; Heinrich, R.; Liu, B.; Liu, Z.
2018. 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2018), Beijing, CHN, September 4-6, 2018, 50–65, Springer. doi:10.1007/978-3-319-99933-3_4
Tyszberowicz, S.; Heinrich, R.; Liu, B.; Liu, Z.
2018. 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2018), Beijing, CHN, September 4-6, 2018, 50–65, Springer. doi:10.1007/978-3-319-99933-3_4
Refinements and structural decompositions in generated code
Hinkel, G.; Busch, K.; Heinrich, R.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 303–310, SciTePress
Hinkel, G.; Busch, K.; Heinrich, R.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 303–310, SciTePress
Continuous integration of performance model
Mazkatli, M.; Koziolek, A.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018) Berlin, 9.-13. April 2018, 153–158, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186285
Mazkatli, M.; Koziolek, A.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018) Berlin, 9.-13. April 2018, 153–158, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186285
Diagnosis of privacy and performance problems in the context of mobile applications
Monschein, D.; Heinrich, R.; Heger, C.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 167–172, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186283
Monschein, D.; Heinrich, R.; Heger, C.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 167–172, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186283
Branchenreport UX/Usability 2018
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-up-0142
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-up-0142
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC ’18 Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA — December 03 - 07, 2018, 733–748, Association for Computing Machinery (ACM). doi:10.1145/3274694.3274747
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC ’18 Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA — December 03 - 07, 2018, 733–748, Association for Computing Machinery (ACM). doi:10.1145/3274694.3274747
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Non-malleability vs. CCA-Security: The Case of Commitments
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-ws08-0542
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-ws08-0542
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
Stengele, O.; Hartenstein, H.
2018. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Ed.: J. Garcia-Alfaro, 85–93, Springer International Publishing. doi:10.1007/978-3-030-00305-0_7
Stengele, O.; Hartenstein, H.
2018. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Ed.: J. Garcia-Alfaro, 85–93, Springer International Publishing. doi:10.1007/978-3-030-00305-0_7
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security
Motivating Users to Consider Recommendations on Password Management Strategies
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37, University of Plymouth
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37, University of Plymouth
Usability is not Enough: Lessons Learned from ’Human Factors in Security’ Research for Verifiability
Kulyk, O.; Volkamer, M.
2018. Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press
Kulyk, O.; Volkamer, M.
2018. Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press
The palladio-bench for modeling and simulating software architectures
Heinrich, R.; Werle, D.; Klare, H.; Reussner, R.; Kramer, M.; Becker, S.; Happe, J.; Koziolek, H.; Krogmann, K.
2018. 40th ACM/IEEE International Conference on Software Engineering (ICSE 2018), Gothenburg, S, May 27 June 3, 2018, 37–40, Association for Computing Machinery (ACM). doi:10.1145/3183440.3183474
Heinrich, R.; Werle, D.; Klare, H.; Reussner, R.; Kramer, M.; Becker, S.; Happe, J.; Koziolek, H.; Krogmann, K.
2018. 40th ACM/IEEE International Conference on Software Engineering (ICSE 2018), Gothenburg, S, May 27 June 3, 2018, 37–40, Association for Computing Machinery (ACM). doi:10.1145/3183440.3183474
Developing and Evaluating a Five Minute Phishing Awareness Video
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer
Proving equivalence between imperative and MapReduce implementations using program transformations
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. 3rd Workshop on Models for Formal Analysis of Real Systems and 6th International Workshop on Verification and Program Transformation, MARSVPT 2018; Thessaloniki; Greece; 20 April 2018. Ed.: R. van Glabbeek, 185–199, Open Publishing Association. doi:10.4204/EPTCS.268.7
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. 3rd Workshop on Models for Formal Analysis of Real Systems and 6th International Workshop on Verification and Program Transformation, MARSVPT 2018; Thessaloniki; Greece; 20 April 2018. Ed.: R. van Glabbeek, 185–199, Open Publishing Association. doi:10.4204/EPTCS.268.7
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
Kulyk, O.; Mayer, P.; Käfer O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom/BigDataSE.2018.00148
Kulyk, O.; Mayer, P.; Käfer O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom/BigDataSE.2018.00148
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, Association for Computing Machinery (ACM). doi:10.1145/3230833.3230859
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, Association for Computing Machinery (ACM). doi:10.1145/3230833.3230859
Helping John to Make Informed Decisions on Using Social Login
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, Association for Computing Machinery (ACM)
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, Association for Computing Machinery (ACM)
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, Advanced Computing Systems Association (USENIX)
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, Advanced Computing Systems Association (USENIX)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen Druck+Verlag. doi:10.18420/sicherheit2018_15
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen Druck+Verlag. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, Association for Computing Machinery (ACM). doi:10.1145/3173574.3173750
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, Association for Computing Machinery (ACM). doi:10.1145/3173574.3173750
FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2018. Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST ’17), Orlando, Florida, December 05, 2017, 53–63, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167999
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2018. Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST ’17), Orlando, Florida, December 05, 2017, 53–63, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167999
Variants and Versions Management for Models with Integrated Consistency Preservation
Ananieva, S.; Klare, H.; Burger, E.; Reussner, R.
2018. Proceedings of the 12th International Workshop on Variability Modelling of Software-Intensive Systems (VAMOS 2018), Madrid, E, February 7-9, 2018, 3–10, Association for Computing Machinery (ACM). doi:10.1145/3168365.3168377
Ananieva, S.; Klare, H.; Burger, E.; Reussner, R.
2018. Proceedings of the 12th International Workshop on Variability Modelling of Software-Intensive Systems (VAMOS 2018), Madrid, E, February 7-9, 2018, 3–10, Association for Computing Machinery (ACM). doi:10.1145/3168365.3168377
Bücher
Dokumentation zum Datenschutzrecht mit Informationsfreiheitsrecht
Spiecker gen. Döhmann, I.; Bretthauer, S. (Hrsg.)
2018. Nomos Verlagsgesellschaft
Spiecker gen. Döhmann, I.; Bretthauer, S. (Hrsg.)
2018. Nomos Verlagsgesellschaft
Technical Safety – An Attribute of Quality : An Interdisciplinary Approach and Guideline
Keller, H.; Pilz, W.-D.; Schulz-Forberg, B.; Langenbach, C.
2018. Springer. doi:10.1007/978-3-319-68625-7
Keller, H.; Pilz, W.-D.; Schulz-Forberg, B.; Langenbach, C.
2018. Springer. doi:10.1007/978-3-319-68625-7
Zeitschriftenaufsätze
An abstract model for proving safety of autonomous urban traffic
Schwammberger, M.
2018. Theoretical Computing Science, 744, 143–169. doi:10.1016/j.tcs.2018.05.028
Schwammberger, M.
2018. Theoretical Computing Science, 744, 143–169. doi:10.1016/j.tcs.2018.05.028
Identity Management and Protection Motivated by the General Data Protection Regulation of the European Union-A Conceptual Framework Based on State-of-the-Art Software Technologies
Birnstill, P.; Krempel, E.; Wagner, P. G.; Beyerer, J.
2018. Technologies, 6 (4), 115/1–14. doi:10.3390/technologies6040115
Birnstill, P.; Krempel, E.; Wagner, P. G.; Beyerer, J.
2018. Technologies, 6 (4), 115/1–14. doi:10.3390/technologies6040115
Fortgeschrittenenklausur Verwaltungsrecht/Polizeirecht - Aufenthaltsverbot für Fussballfans
Bretthauer, S.
2018. Jura, 409–417
Bretthauer, S.
2018. Jura, 409–417
Auswirkungen der Industrie 4.0 auf den Schutz von Betriebs- und Geschäftsgeheimnissen
Müllmann, D.
2018. Wettbewerb in Recht und Praxis, (10), 1177–1183
Müllmann, D.
2018. Wettbewerb in Recht und Praxis, (10), 1177–1183
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer; Hilt, T.
2018. Datenschutz und Datensicherheit, 42 (11), 680–685. doi:10.1007/s11623-018-1024-z
Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer; Hilt, T.
2018. Datenschutz und Datensicherheit, 42 (11), 680–685. doi:10.1007/s11623-018-1024-z
Systematisierung des IT-Sicherheitsrechts
Raabe, O.; Schallbruch, M.; Steinbrück, A.
2018. Computer und Recht / International, 34 (11), 706–715. doi:10.9785/cr-2018-341105
Raabe, O.; Schallbruch, M.; Steinbrück, A.
2018. Computer und Recht / International, 34 (11), 706–715. doi:10.9785/cr-2018-341105
Der Arbeitnehmer 4.0? Automatisierte Arbeitgeberentscheidungen durch Sensorik am smarten Arbeitsplatz
Brecht, C.; Steinbrück, A.; Wagner, M.
2018. Privacy in Germany : PinG ; Datenschutz und Compliance, 2018 (1), 10–15
Brecht, C.; Steinbrück, A.; Wagner, M.
2018. Privacy in Germany : PinG ; Datenschutz und Compliance, 2018 (1), 10–15
Effektiver Schutz vor betrügerischen Nachrichten - Ein Schulungsprogramm zur Erkennung betrügerischer Nachrichten für KMU
Neumann, S.; Reinheimer, B.; Volkamer, M.; Kunz, A.; Schwartz, C.
2018. Datenschutz und Datensicherheit, 42 (5), 301–306. doi:10.1007/s11623-018-0945-x
Neumann, S.; Reinheimer, B.; Volkamer, M.; Kunz, A.; Schwartz, C.
2018. Datenschutz und Datensicherheit, 42 (5), 301–306. doi:10.1007/s11623-018-0945-x
Applicability of generalized test tables: a case study using the manufacturing system demonstrator xPPU
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. Automatisierungstechnik, 66 (10), 834–848. doi:10.1515/auto-2018-0028
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. Automatisierungstechnik, 66 (10), 834–848. doi:10.1515/auto-2018-0028
Enhancing neural non-intrusive load monitoring with generative adversarial networks
Bao, K.; Ibrahimov, K.; Wagner, M.; Schmeck, H.
2018. Energy Informatics, S1 (18), 295–302. doi:10.1186/s42162-018-0038-y
Bao, K.; Ibrahimov, K.; Wagner, M.; Schmeck, H.
2018. Energy Informatics, S1 (18), 295–302. doi:10.1186/s42162-018-0038-y
The influence of differential privacy on short term electric load forecasting
Eibl, G.; Bao, K.; Grassal, P.-W.; Bernau, D.; Schmeck, H.
2018. Energy Informatics, S1 (48), 93–113. doi:10.1186/s42162-018-0025-3
Eibl, G.; Bao, K.; Grassal, P.-W.; Bernau, D.; Schmeck, H.
2018. Energy Informatics, S1 (48), 93–113. doi:10.1186/s42162-018-0025-3
Modeling flexibility using artificial neural networks
Förderer, K.; Ahrens, M.; Bao, K.; Mauser, I.; Schmeck, H.
2018. Energy Informatics, S1 (21), 73–91. doi:10.1186/s42162-018-0024-4
Förderer, K.; Ahrens, M.; Bao, K.; Mauser, I.; Schmeck, H.
2018. Energy Informatics, S1 (21), 73–91. doi:10.1186/s42162-018-0024-4
Architecture-based change impact analysis in cross-disciplinary automated production systems
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R.; Vogel-Heuser, B.
2018. The journal of systems and software, 146, 167–185. doi:10.1016/j.jss.2018.08.058
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R.; Vogel-Heuser, B.
2018. The journal of systems and software, 146, 167–185. doi:10.1016/j.jss.2018.08.058
IT-Sicherheit - ein rechtsfreier Raum?
Hackenjos, T.; Mechler, J.; Rill, J.
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Hackenjos, T.; Mechler, J.; Rill, J.
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Network Layer Aspects of Permissionless Blockchains
Neudecker, T.; Hartenstein, H.
2018. IEEE communications surveys & tutorials, 21 (1), 838–857. doi:10.1109/COMST.2018.2852480
Neudecker, T.; Hartenstein, H.
2018. IEEE communications surveys & tutorials, 21 (1), 838–857. doi:10.1109/COMST.2018.2852480
Low-deterministic security for low-nondeterministic programs
Bischof, S.; Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2018. Journal of computer security, 26, 335–366. doi:10.3233/JCS-17984
Bischof, S.; Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2018. Journal of computer security, 26, 335–366. doi:10.3233/JCS-17984
Concern-oriented language development (COLD): Fostering reuse in language engineering
Combemalee, B.; Kienzle, J.; Mussbacher, G.; Barais, O.; Bousse, E.; Cazzola, W.; Collet, P.; Degueule, T.; Heinrich, R.; Jézéquel, J.-M.; Leduc, M.; Mayerhofer, T.; Mosser, S.; Schöttle, M.; Strittmatter, M.; Wortmann, A.
2018. Computer languages, systems and structures, 54, 139–155. doi:10.1016/j.cl.2018.05.004
Combemalee, B.; Kienzle, J.; Mussbacher, G.; Barais, O.; Bousse, E.; Cazzola, W.; Collet, P.; Degueule, T.; Heinrich, R.; Jézéquel, J.-M.; Leduc, M.; Mayerhofer, T.; Mosser, S.; Schöttle, M.; Strittmatter, M.; Wortmann, A.
2018. Computer languages, systems and structures, 54, 139–155. doi:10.1016/j.cl.2018.05.004
Mobilität 4.0 - Informationsrechtliche Herausforderungen und Restriktionen am Beispiel der Optimierung und Effektivitätssteigerung von Verkehrsflüssen
Bretthauer, S.
2018. PinG - Privacy in Germany, (2), 66
Bretthauer, S.
2018. PinG - Privacy in Germany, (2), 66
2017
Buchaufsätze
Formalising a Hazard Warning Communication Protocol with Timed Automata
Olderog, E.-R.; Schwammberger, M.
2017. Models, Algorithms, Logics and Tools - Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, Ed.: L. Aceto, 640–660, Springer International Publishing. doi:10.1007/978-3-319-63121-9_32
Olderog, E.-R.; Schwammberger, M.
2017. Models, Algorithms, Logics and Tools - Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, Ed.: L. Aceto, 640–660, Springer International Publishing. doi:10.1007/978-3-319-63121-9_32
Reference Scenarios for Self-aware Computing
Kephart, J. O.; Maggio, M.; Diaconescu, A.; Giese, H.; Hoffmann, H.; Kounev, S.; Koziolek, A.; Lewis, P.; Robertsson, A.; Spinner, S.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 87–106, Springer International Publishing. doi:10.1007/978-3-319-47474-8_4
Kephart, J. O.; Maggio, M.; Diaconescu, A.; Giese, H.; Hoffmann, H.; Kounev, S.; Koziolek, A.; Lewis, P.; Robertsson, A.; Spinner, S.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 87–106, Springer International Publishing. doi:10.1007/978-3-319-47474-8_4
Assessing Self-awareness
Esterle, L.; Bellman, K. L.; Becker, S.; Koziolek, A.; Landauer, C.; Lewis, P.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 465–481, Springer International Publishing. doi:10.1007/978-3-319-47474-8_15
Esterle, L.; Bellman, K. L.; Becker, S.; Koziolek, A.; Landauer, C.; Lewis, P.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 465–481, Springer International Publishing. doi:10.1007/978-3-319-47474-8_15
An Architectural Model-Based Approach to Quality-Aware DevOps in Cloud Applicationsc
Heinrich, R.; Jung, R.; Zirkelbach, C.; Hasselbring, W.; Reussner, R.
2017. Software Architecture for Big Data and the Cloud. Ed.: I. Mistrik, 69–89, Elsevier
Heinrich, R.; Jung, R.; Zirkelbach, C.; Hasselbring, W.; Reussner, R.
2017. Software Architecture for Big Data and the Cloud. Ed.: I. Mistrik, 69–89, Elsevier
An Introduction to Voting Rule Verification
Beckert, B.; Bormer, T.; Goré, R.; Kirsten, M.; Schürmann, C.
2017. Trends in Computational Social Choice. Ed by.: Ulle Endriss, 269–287, AI Access
Beckert, B.; Bormer, T.; Goré, R.; Kirsten, M.; Schürmann, C.
2017. Trends in Computational Social Choice. Ed by.: Ulle Endriss, 269–287, AI Access
Automatic Margin Computation for Risk-Limiting Audits
Beckert, B.; Kirsten, M.; Klebanov, V.; Schürmann, C.
2017. Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Ed.: R. Krimmer, M. Volkamer, J. Barrat, J. Benaloh, N. J. Goodman, P. Y. A. Ryan, V. Teague, 18–35, Springer International Publishing. doi:10.1007/978-3-319-52240-1_2
Beckert, B.; Kirsten, M.; Klebanov, V.; Schürmann, C.
2017. Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Ed.: R. Krimmer, M. Volkamer, J. Barrat, J. Benaloh, N. J. Goodman, P. Y. A. Ryan, V. Teague, 18–35, Springer International Publishing. doi:10.1007/978-3-319-52240-1_2
Guided Information Markets by the latest European Court of Justice decisions - the Google Spain, Weltimmo and Schrems (Safe Harbor) Decisions
Spiecker gen. Döhmann, I.
2017. Privacy in a Digital Age: Perspectives from Two Continents. Ed.: R. L. Weaver; S. I. Friedland, W. Gilles; I. Bouhadana, 17–46, Carolina Academic Press
Spiecker gen. Döhmann, I.
2017. Privacy in a Digital Age: Perspectives from Two Continents. Ed.: R. L. Weaver; S. I. Friedland, W. Gilles; I. Bouhadana, 17–46, Carolina Academic Press
Security by Delegation für Industrie 4.0
Jung, M.
2017. Kommunikation und Bildverarbeitung in der Automation. Ed.: J. Jasperneite, Lohweg V., 73–84, Springer-Verlag. doi:10.1007/978-3-662-55232-2_6
Jung, M.
2017. Kommunikation und Bildverarbeitung in der Automation. Ed.: J. Jasperneite, Lohweg V., 73–84, Springer-Verlag. doi:10.1007/978-3-662-55232-2_6
Smart Home, Smart Grid, Smart Meter - digitale Konzepte und das Recht an Daten
Spiecker gen. Döhmann, I.
2017. Herausforderung Utility 4.0 - Wie sich die Energiewirtschaft im Zeitalter der Digitalisierung verändert. Hrsg.: O. Doleski, 285–300, Springer-Verlag. doi:10.1007/978-3-658-15737-1_15
Spiecker gen. Döhmann, I.
2017. Herausforderung Utility 4.0 - Wie sich die Energiewirtschaft im Zeitalter der Digitalisierung verändert. Hrsg.: O. Doleski, 285–300, Springer-Verlag. doi:10.1007/978-3-658-15737-1_15
Die technischen Grenzen des Rechts: Recht durch Technik und Technik durch Recht
Spiecker gen. Döhmann, I.
2017. Formate der Rechtswissenschaft. Hrsg.: A. Funke, 181–207, Velbrück Wissenschaft
Spiecker gen. Döhmann, I.
2017. Formate der Rechtswissenschaft. Hrsg.: A. Funke, 181–207, Velbrück Wissenschaft
Kommentierung zu §§ 49, 50 MsbG
Raabe, O.
2017. Berliner Kommentar zum Energierecht : Messstellenbetriebsgesetz (MsbG), Band 5. Hrsg.: F. J. Säcker, 896 S., Deutscher Fachverlag GmbH
Raabe, O.
2017. Berliner Kommentar zum Energierecht : Messstellenbetriebsgesetz (MsbG), Band 5. Hrsg.: F. J. Säcker, 896 S., Deutscher Fachverlag GmbH
Dissertationen
Specification Languages for Preserving Consistency between Models of Different Languages. Dissertation
Kramer, M. E.
2017. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000069284
Kramer, M. E.
2017. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000069284
Proceedingsbeiträge
Imperfect Knowledge in Autonomous Urban Traffic Manoeuvres
Schwammberger, M.
2017. L. Bulwahn, M. Kamali & S. Linker (Hrsg.), Proceedings First Workshop on Formal Verification of Autonomous Vehicles, FVAV@iFM 2017, Turin, Italy, 19th September 2017, Ed.: L. Bulwahn, 59–74, Open Publishing Association. doi:10.4204/EPTCS.257.7
Schwammberger, M.
2017. L. Bulwahn, M. Kamali & S. Linker (Hrsg.), Proceedings First Workshop on Formal Verification of Autonomous Vehicles, FVAV@iFM 2017, Turin, Italy, 19th September 2017, Ed.: L. Bulwahn, 59–74, Open Publishing Association. doi:10.4204/EPTCS.257.7
How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach
Schivo, S.; Yildiz, B. M.; Ruijters, E.; Gerking, C.; Kumar, R.; Dziwok, S.; Rensink, A.; Stoelinga, M.
2017. Dependable software engineering : theories, tools, and applications$dThird International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017 : proceedings. Ed.: K. G. Larsen, 319–336, Springer. doi:10.1007/978-3-319-69483-2_19
Schivo, S.; Yildiz, B. M.; Ruijters, E.; Gerking, C.; Kumar, R.; Dziwok, S.; Rensink, A.; Stoelinga, M.
2017. Dependable software engineering : theories, tools, and applications$dThird International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017 : proceedings. Ed.: K. G. Larsen, 319–336, Springer. doi:10.1007/978-3-319-69483-2_19
Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities
Gerking, C.; Schubert, D.; Budde, I.
2017. E. Guerra & M. van den Brand (Hrsg.), 10th International Conference, ICMT 2017, held as part of STAF 2017, Marburg, Germany, July 17-18, 2017 : proceedings, 19–34, Springer. doi:10.1007/978-3-319-61473-1_2
Gerking, C.; Schubert, D.; Budde, I.
2017. E. Guerra & M. van den Brand (Hrsg.), 10th International Conference, ICMT 2017, held as part of STAF 2017, Marburg, Germany, July 17-18, 2017 : proceedings, 19–34, Springer. doi:10.1007/978-3-319-61473-1_2
Towards the modelling of complex communication networks in AutomationML
Patzer, F.; Sarkar, A.; Birnstill, P.; Schleipen, M.; Beyerer, J.
2017. 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12-15 Sept. 2017, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2017.8247571
Patzer, F.; Sarkar, A.; Birnstill, P.; Schleipen, M.; Beyerer, J.
2017. 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12-15 Sept. 2017, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2017.8247571
Automotive Systems Modelling with Vitruvius
Mazkatli, M.; Burger, E.; Koziolek, A.; Reussner, R. H.
2017. INFORMATIK 2017. Tagung, Chemnitz, 25.- 29. September 2017. Hrsg.: M. Eibl, 1487–1498, Gesellschaft für Informatik (GI). doi:10.18420/in2017_148
Mazkatli, M.; Burger, E.; Koziolek, A.; Reussner, R. H.
2017. INFORMATIK 2017. Tagung, Chemnitz, 25.- 29. September 2017. Hrsg.: M. Eibl, 1487–1498, Gesellschaft für Informatik (GI). doi:10.18420/in2017_148
Reconstructing Development Artifacts for Change Impact Analysis
Rostami, K.; Langhammer, M.; Busch, A.; Gleitze, J.; Heinrich, R.; Reussner, R.
2017. 19. Workshop Software-Reengineering & Evolution, Bad Honnef, 08.-10.05.2017
Rostami, K.; Langhammer, M.; Busch, A.; Gleitze, J.; Heinrich, R.; Reussner, R.
2017. 19. Workshop Software-Reengineering & Evolution, Bad Honnef, 08.-10.05.2017
Considering Transient Effects of Self-Adaptations in Model-Driven Performance Analyses
Stier, C.; Koziolek, A.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 99–100, Gesellschaft für Informatik (GI)
Stier, C.; Koziolek, A.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 99–100, Gesellschaft für Informatik (GI)
Change Impact Analysis by Ar chitectur e-based Assessment and Planning
Rostami, K.; Stammel, J.; Heinrich, R.; Reussner, R.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 69–70, Gesellschaft für Informatik (GI)
Rostami, K.; Stammel, J.; Heinrich, R.; Reussner, R.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 69–70, Gesellschaft für Informatik (GI)
Welthandel mit Daten
Spiecker gen. Döhmann, I.
2017. Globalisierung und Datenschutz. 22. Wiesbadener Forum Datenschutz, 23.10.2017, Wiesbaden. Hrsg.: M. Ronellenfitsch
Spiecker gen. Döhmann, I.
2017. Globalisierung und Datenschutz. 22. Wiesbadener Forum Datenschutz, 23.10.2017, Wiesbaden. Hrsg.: M. Ronellenfitsch
Defining a Security-Oriented Evolution Scenario for the CoCoME Case Study
Pilipchuk, R.; Seifermann, S.; Taspolatoglu, E.
2017. 4nd Collaborative Workshop on Evolution and Maintenance of Long-Living Software Systems (EMLS’17), Hannover, 21. Februar 2017, 70–73, Universität Duisburg-Essen
Pilipchuk, R.; Seifermann, S.; Taspolatoglu, E.
2017. 4nd Collaborative Workshop on Evolution and Maintenance of Long-Living Software Systems (EMLS’17), Hannover, 21. Februar 2017, 70–73, Universität Duisburg-Essen
Supporting software architecture evolution by functional decomposition
Faitelson, D.; Heinrich, R.; Tyszberowicz, S. S.
2017. MODELSWARD 2017 : Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, Porto, P, February 19-21, 2017. Ed.: L. Pires. Vol. 1, 435–442, SciTePress. doi:10.5220/0006206204350442
Faitelson, D.; Heinrich, R.; Tyszberowicz, S. S.
2017. MODELSWARD 2017 : Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, Porto, P, February 19-21, 2017. Ed.: L. Pires. Vol. 1, 435–442, SciTePress. doi:10.5220/0006206204350442
On using sarkar metrics to evaluate the modularity of metamodels
Hinkel, G.; Strittmatter, M.
2017. MODELSWARD 2017 : proceedings of the 5th International Conference on Model-Driven Engineering and Software Development : Porto, P, February 19-21, 2017. Ed.: L. Pires, 253–260, SciTePress. doi:10.5220/0006105502530260
Hinkel, G.; Strittmatter, M.
2017. MODELSWARD 2017 : proceedings of the 5th International Conference on Model-Driven Engineering and Software Development : Porto, P, February 19-21, 2017. Ed.: L. Pires, 253–260, SciTePress. doi:10.5220/0006105502530260
Branchenreport UX/Usability 2017
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-up-0207
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-up-0207
Addressing Misconceptions About Password Security Effectively
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167998
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167998
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer. doi:10.1007/978-3-319-58460-7_18
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer. doi:10.1007/978-3-319-58460-7_18
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer. doi:10.1007/978-3-319-58460-7_44
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer. doi:10.1007/978-3-319-58460-7_44
Security vs. privacy? User preferences regarding text passwords and biometric authentication
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0405
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0405
Promoting secure Email communication and authentication
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0404
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0404
Reliable Behavioural Factors in the Information Security Context
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098986
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc
Don’t be Deceived: The Message Might be Fake
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer. doi:10.1007/978-3-319-64483-7_13
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098990
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Gabler Verlag. doi:10.1007/978-3-658-16835-3_8
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Gabler Verlag. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer
Election-Dependent Security Evaluation of Internet Voting Schemes
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer. doi:10.1007/978-3-319-58469-0_25
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer. doi:10.1007/978-3-319-58469-0_25
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer. doi:10.1007/978-3-319-58460-7_46
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer. doi:10.1007/978-3-319-58460-7
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien
Architecture-driven reduction of specification overhead for verifying confidentiality in component-based software systems
Yurchenko, K.; Behr, M.; Klare, H.; Kramer, M.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017. Ed.: L. Burgueño, 321–323, RWTH Aachen
Yurchenko, K.; Behr, M.; Klare, H.; Kramer, M.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017. Ed.: L. Burgueño, 321–323, RWTH Aachen
Proving JDK’s Dual Pivot Quicksort Correct
Beckert, B.; Schiffl, J.; Schmitt, P. H.; Ulbrich, M.
2017. Verified Software : Theories, Tools, and Experiments, Proceedings of the 9th International Conference, VSTTE 2017, Revised Selected Papers, Heidelberg, Germany, 22nd - 23th July 2017. Ed.: A. Paskevich, 35–48, Springer. doi:10.1007/978-3-319-72308-2_3
Beckert, B.; Schiffl, J.; Schmitt, P. H.; Ulbrich, M.
2017. Verified Software : Theories, Tools, and Experiments, Proceedings of the 9th International Conference, VSTTE 2017, Revised Selected Papers, Heidelberg, Germany, 22nd - 23th July 2017. Ed.: A. Paskevich, 35–48, Springer. doi:10.1007/978-3-319-72308-2_3
Ecoreification: Making Arbitrary Java Code Accessible to Metamodel-Based Tools
Klare, H.; Burger, E.; Kramer, M.; Langhammer, M.; Saglam, T.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017, 221–228, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS.2017.30
Klare, H.; Burger, E.; Kramer, M.; Langhammer, M.; Saglam, T.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017, 221–228, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS.2017.30
User-Centric Secure Data Sharing: Exploration of Concepts and Values
Grashöfer, J.; Degitz, A.; Raabe, O.
2017. Informatik 2017 : 25.-29. September 2017 Chemnitz, Deutschland. Bd. 2. Hrsg.: M. Eibl, 1243–1258, Gesellschaft für Informatik (GI). doi:10.18420/in2017_126
Grashöfer, J.; Degitz, A.; Raabe, O.
2017. Informatik 2017 : 25.-29. September 2017 Chemnitz, Deutschland. Bd. 2. Hrsg.: M. Eibl, 1243–1258, Gesellschaft für Informatik (GI). doi:10.18420/in2017_126
The Minimum Number of Cards in Practical Card-Based Protocols
Kastner, J.; Koch, A.; Walzer, S.; Miyahara, D.; Hayashi, Y.- ichi; Mizuki, T.; Sone, H.
2017. Advances in Cryptology - ASIACRYPT 2017 : Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Part III, Hong Kong, China, 3rd - 7th December 2017. Ed.: T. Takagi, 126–155, Springer. doi:10.1007/978-3-319-70700-6_5
Kastner, J.; Koch, A.; Walzer, S.; Miyahara, D.; Hayashi, Y.- ichi; Mizuki, T.; Sone, H.
2017. Advances in Cryptology - ASIACRYPT 2017 : Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Part III, Hong Kong, China, 3rd - 7th December 2017. Ed.: T. Takagi, 126–155, Springer. doi:10.1007/978-3-319-70700-6_5
A Non-Invasive Cyberrisk in Cooperative Driving
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Attacks on Secure Logging Schemes
Hartung, G.
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Hartung, G.
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Automatic Evaluation of Complex Design Decisions in Component-based Software Architectures
Scheerer, M.; Busch, A.; Koziolek, A.
2017. MEMOCODE ’17 : Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, Vienna, Austria, 29th September - 2nd October 2017, 67–76, Association for Computing Machinery (ACM). doi:10.1145/3127041.3127059
Scheerer, M.; Busch, A.; Koziolek, A.
2017. MEMOCODE ’17 : Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, Vienna, Austria, 29th September - 2nd October 2017, 67–76, Association for Computing Machinery (ACM). doi:10.1145/3127041.3127059
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Herold, G.; Hoffmann, M.; Klooß, M.; Ràfols, C.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1547–1564, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134068
Herold, G.; Hoffmann, M.; Klooß, M.; Ràfols, C.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1547–1564, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134068
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
Could Network Information Facilitate Address Clustering in Bitcoin?
Neudecker, T.; Hartenstein, H.
2017. Financial Cryptography and Data Security : FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, 7th April 2017. Ed.: M. Brenner, 155–169, Springer. doi:10.1007/978-3-319-70278-0_9
Neudecker, T.; Hartenstein, H.
2017. Financial Cryptography and Data Security : FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, 7th April 2017. Ed.: M. Brenner, 155–169, Springer. doi:10.1007/978-3-319-70278-0_9
An interaction concept for program verification systems with explicit proof object
Beckert, B.; Grebing, S.; Ulbrich, M.
2017. Hardware and Software : Verification and Testing, 13th International Haifa Verification Conference, Haifa, Israel, 13th - 15th November 2017. Ed.: O. Strichman, 163–178, Springer. doi:10.1007/978-3-319-70389-3_11
Beckert, B.; Grebing, S.; Ulbrich, M.
2017. Hardware and Software : Verification and Testing, 13th International Haifa Verification Conference, Haifa, Israel, 13th - 15th November 2017. Ed.: O. Strichman, 163–178, Springer. doi:10.1007/978-3-319-70389-3_11
Towards Realising Oblivious Voting
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
Computing Exact Loop Bounds for Bounded Program Verification
Liu, T.; Tyszberowicz, S.; Beckert, B. ..; Taghdiri, M.
2017. Dependable Software Engineering : Theories, Tools, and Applications, 3rd International Symposium, SETTA 2017, Proceedings, Changsha, China, 23rd - 25th October. Ed.: O. Sokolsky, 147–163, Springer. doi:10.1007/978-3-319-69483-2_9
Liu, T.; Tyszberowicz, S.; Beckert, B. ..; Taghdiri, M.
2017. Dependable Software Engineering : Theories, Tools, and Applications, 3rd International Symposium, SETTA 2017, Proceedings, Changsha, China, 23rd - 25th October. Ed.: O. Sokolsky, 147–163, Springer. doi:10.1007/978-3-319-69483-2_9
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Anonymous coinjoin transactions with arbitrary values
Maurer, F. K.; Neudecker, T.; Florian, M.
2017. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017; Sydney; Australia; 1 August 2017 through 4 August 2017, 522–529, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.280
Maurer, F. K.; Neudecker, T.; Florian, M.
2017. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017; Sydney; Australia; 1 August 2017 through 4 August 2017, 522–529, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.280
Generalised Test Tables : A Practical Specification Language for Reactive Systems
Beckert, B.; Cha, S.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 129–144, Springer. doi:10.1007/978-3-319-66845-1_9
Beckert, B.; Cha, S.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 129–144, Springer. doi:10.1007/978-3-319-66845-1_9
SemSlice : Exploiting Relational Verification for Automatic Program Slicing
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 312–319, Springer. doi:10.1007/978-3-319-66845-1_20
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 312–319, Springer. doi:10.1007/978-3-319-66845-1_20
Deriving Power Models for Architecture-Level Energy Efficiency Analyses
Stier, C.; Werle, D.; Koziolek, A.
2017. Computer Performance Engineering : 14th European Workshop, EPEW 2017, Berlin, Germany, 7th - 8th September 2017. Ed.: P. Reinecke, 214–229, Springer International Publishing. doi:10.1007/978-3-319-66583-2_14
Stier, C.; Werle, D.; Koziolek, A.
2017. Computer Performance Engineering : 14th European Workshop, EPEW 2017, Berlin, Germany, 7th - 8th September 2017. Ed.: P. Reinecke, 214–229, Springer International Publishing. doi:10.1007/978-3-319-66583-2_14
Modular verification of information flow security in component-based systems
Greiner, S.; Mohr, M.; Beckert, B.
2017. 15th IEEE International Conference on Software Engineering and Formal Methods, Trento, Italy, 4th - 8th September 2017. Ed.: A. Cimatti, 300–315, Springer. doi:10.1007/978-3-319-66197-1_19
Greiner, S.; Mohr, M.; Beckert, B.
2017. 15th IEEE International Conference on Software Engineering and Formal Methods, Trento, Italy, 4th - 8th September 2017. Ed.: A. Cimatti, 300–315, Springer. doi:10.1007/978-3-319-66197-1_19
CASPA : A platform for comparability of architecture-based software performance engineering approaches
Dullmann, T. F.; Heinrich, R.; Van Hoorn, A.; Pitakrat, T.; Walter, J.; Willnecker, F.
2017. 2017 IEEE International Conference on Software Architecture Workshops (ICSAW 2017), Gothenburg, S, Apriel 3-7, 2017, 294–297, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSAW.2017.26
Dullmann, T. F.; Heinrich, R.; Van Hoorn, A.; Pitakrat, T.; Walter, J.; Willnecker, F.
2017. 2017 IEEE International Conference on Software Architecture Workshops (ICSAW 2017), Gothenburg, S, Apriel 3-7, 2017, 294–297, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSAW.2017.26
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Generalized Test Tables: A Powerful and Intuitive Specification Language for Reactive Systems
Weigl, A.; Wiebe, F.; Ulbrich, M.; Ulewicz, S.; Cha, S.; Kirsten, M.; Beckert, B.; Birgit Vogel-Heuser
2017. 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, July 24-26 2017, Institute of Electrical and Electronics Engineers (IEEE)
Weigl, A.; Wiebe, F.; Ulbrich, M.; Ulewicz, S.; Cha, S.; Kirsten, M.; Beckert, B.; Birgit Vogel-Heuser
2017. 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, July 24-26 2017, Institute of Electrical and Electronics Engineers (IEEE)
Architecture-Based Change Impact Analysis in Information Systems and Business Processes
Rostami, K.; Heinrich, R.; Busch, A.; Reussner, R.
2017. ICSA 2017 : 2017 IEEE International Conference on Software Architecture : proceedings : 3-7 April 2017, Gothenburg, Sweden, 179–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2017.17
Rostami, K.; Heinrich, R.; Busch, A.; Reussner, R.
2017. ICSA 2017 : 2017 IEEE International Conference on Software Architecture : proceedings : 3-7 April 2017, Gothenburg, Sweden, 179–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2017.17
Anomaly Detection in Industrial Networks using Machine Learning : A Roadmap
Meshram, A.; Haas, C.
2017. Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2016. Ed.: J. Beyerer, 65–72, Springer-Verlag. doi:10.1007/978-3-662-53806-7_8
Meshram, A.; Haas, C.
2017. Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2016. Ed.: J. Beyerer, 65–72, Springer-Verlag. doi:10.1007/978-3-662-53806-7_8
Combining Graph-Based and Deduction-Based Information-Flow Analysis
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2017. ETAPS 2017: 5th Workshop on Hot Issues in Security Principles and Trust : Hotspot 2017, Uppsala, Sweden, 22-29 April 2017, 6–25, Theoretical Foundations of Security Analysis and Design (IFIP WG 1.7)
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2017. ETAPS 2017: 5th Workshop on Hot Issues in Security Principles and Trust : Hotspot 2017, Uppsala, Sweden, 22-29 April 2017, 6–25, Theoretical Foundations of Security Analysis and Design (IFIP WG 1.7)
Performance Engineering for Microservices: Research Challenges and Directions
Heinrich, R.; Van Hoorn, A.; Knoche, H.; Li, F.; Lwakatare, L. E.; Pahl, C.; Schulte, S.; Wettinger, J.
2017. 8th ACM/SPEC on International Conference on Performance Engineering (ICPE 2017), L’Aquila, I, April 22-26, 2017, 223–226, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053653
Heinrich, R.; Van Hoorn, A.; Knoche, H.; Li, F.; Lwakatare, L. E.; Pahl, C.; Schulte, S.; Wettinger, J.
2017. 8th ACM/SPEC on International Conference on Performance Engineering (ICPE 2017), L’Aquila, I, April 22-26, 2017, 223–226, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053653
A Generic Platform for Transforming Monitoring Data into Performance Models
Kunz, J.; Heger, C.; Heinrich, R.
2017. 8th ACM/SPEC International Conference on Performance Engineering, L’Aquila, I, April 22-26, 2017, 151–156, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053635
Kunz, J.; Heger, C.; Heinrich, R.
2017. 8th ACM/SPEC International Conference on Performance Engineering, L’Aquila, I, April 22-26, 2017, 151–156, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053635
Concurrently composable security with shielded super-polynomial simulators
Broadnax, B.; Döttling, N.; Hartung, G.; Müller-Quade, J.; Nagel, M.
2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017; Paris; France; 30 April 2017 through 4 May 2017. Ed.: J. B. Nielsen, 351–381, Springer. doi:10.1007/978-3-319-56620-7_13
Broadnax, B.; Döttling, N.; Hartung, G.; Müller-Quade, J.; Nagel, M.
2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017; Paris; France; 30 April 2017 through 4 May 2017. Ed.: J. B. Nielsen, 351–381, Springer. doi:10.1007/978-3-319-56620-7_13
Adaptive partitioning
Hofheinz, D.
2017. Advances in Cryptology – EUROCRYPT 2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017. Ed.: J.-S. Coron, 489–518, Springer. doi:10.1007/978-3-319-56617-7_17
Hofheinz, D.
2017. Advances in Cryptology – EUROCRYPT 2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017. Ed.: J.-S. Coron, 489–518, Springer. doi:10.1007/978-3-319-56617-7_17
Capturing ambiguity in artifacts to support requirements engineering for self-adaptive systems
Muñoz-Fernández, J. C.; Knauss, A.; Castañeda, L.; Derakhshanmanesh, M.; Heinrich, R.; Becker, M.; Taherimakhsousi, N.
2017. Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, 27. Februar 2017. Ed.: E. Knauss, RWTH Aachen
Muñoz-Fernández, J. C.; Knauss, A.; Castañeda, L.; Derakhshanmanesh, M.; Heinrich, R.; Becker, M.; Taherimakhsousi, N.
2017. Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, 27. Februar 2017. Ed.: E. Knauss, RWTH Aachen
A database adapter for secure outsourcing
Dowsley, R.; Gabel, M.; Yurchenko, K.; Zipf, V.
2017. 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, L, December 12-15, 2016, 503–508, IEEE Computer Society. doi:10.1109/CloudCom.2016.0088
Dowsley, R.; Gabel, M.; Yurchenko, K.; Zipf, V.
2017. 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, L, December 12-15, 2016, 503–508, IEEE Computer Society. doi:10.1109/CloudCom.2016.0088
Bücher
Intelligente Videoüberwachung - Eine datenschutzrechtliche Analyse unter Berücksichtigung technischer Schutzmaßnahmen
Bretthauer, S.
2017. Nomos Verlagsgesellschaft
Bretthauer, S.
2017. Nomos Verlagsgesellschaft
Datenschutzprinzipien in IKT-basierten kritischen Infrastrukturen : Die Formalisierung der datenschutzrechtlichen Einwilligung in Smart Metering Systemen
Bräuchle, T.
2017. Nomos Verlagsgesellschaft
Bräuchle, T.
2017. Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Supporting the Development of Interdisciplinary Product Lines in the Manufacturing Domain
Kowal, M.; Ananieva, S.; Thüm, T.; Schaefer, I.
2017. IFAC-PapersOnLine, 50 (1), 4336–4341. doi:10.1016/j.ifacol.2017.08.870
Kowal, M.; Ananieva, S.; Thüm, T.; Schaefer, I.
2017. IFAC-PapersOnLine, 50 (1), 4336–4341. doi:10.1016/j.ifacol.2017.08.870
30 Thesen: Der Mensch, der Netzbürger, die Algorithmen, das Internet und das Recht. Wer denkt und wer lenkt im Zeitalter der systematoschen Digitalisierung
Spiecker gen. Döhmann, I.
2017. Kommunikation & Recht, (7-8), 4–6
Spiecker gen. Döhmann, I.
2017. Kommunikation & Recht, (7-8), 4–6
Auf dem Weg zu datenschutzfreundlichen Dashcams - Technische Maßnahmen zur Erhögung des Datenschutzes
Bretthauer, S.; Wagner, P. G.; Birnstill, P.; Krempel, E.
2017. Datenschutz und Datensicherheit, 41 (3), 159–164
Bretthauer, S.; Wagner, P. G.; Birnstill, P.; Krempel, E.
2017. Datenschutz und Datensicherheit, 41 (3), 159–164
Coercion-resistant proxy voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Maintenance effort estimation with KAMP4aPS for cross-disciplinary automated PLC-based Production Systems - a collaborative approach
Vogel-Heuser, B.; Heinrich, R.; Cha, S.; Rostami, K.; Ocker, F.; Koch, S.; Reussner, R.; Ziegltrum, S.
2017. IFAC-PapersOnLine, 50 (1), 4360–4367. doi:10.1016/j.ifacol.2017.08.877
Vogel-Heuser, B.; Heinrich, R.; Cha, S.; Rostami, K.; Ocker, F.; Koch, S.; Reussner, R.; Ziegltrum, S.
2017. IFAC-PapersOnLine, 50 (1), 4360–4367. doi:10.1016/j.ifacol.2017.08.877
Relational Program Reasoning Using Compiler IR : Combining Static Verification and Dynamic Analysis
Kiefer, M.; Klebanov, V.; Ulbrich, M.
2017. Journal of automated reasoning, 1–27. doi:10.1007/s10817-017-9433-5
Kiefer, M.; Klebanov, V.; Ulbrich, M.
2017. Journal of automated reasoning, 1–27. doi:10.1007/s10817-017-9433-5
Automating regression verification of pointer programs by predicate abstraction
Klebanov, V.; Rümmer, P.; Ulbrich, M.
2017. Formal methods in system design, 1–31. doi:10.1007/s10703-017-0293-8
Klebanov, V.; Rümmer, P.; Ulbrich, M.
2017. Formal methods in system design, 1–31. doi:10.1007/s10703-017-0293-8
A survey on design and implementation of protected searchable data in the cloud
Dowsley, R.; Michalas, A.; Nagel, M.; Paladi, N.
2017. Computer science review, 26, 17–30. doi:10.1016/j.cosrev.2017.08.001
Dowsley, R.; Michalas, A.; Nagel, M.; Paladi, N.
2017. Computer science review, 26, 17–30. doi:10.1016/j.cosrev.2017.08.001
A threat analysis of the vehicle-to-grid charging protocol ISO 15118
Bao, K.; Valev, H.; Wagner, M.; Schmeck, H.
2017. Computer science - research and development, 33 (1-2), 3–12. doi:10.1007/s00450-017-0342-y
Bao, K.; Valev, H.; Wagner, M.; Schmeck, H.
2017. Computer science - research and development, 33 (1-2), 3–12. doi:10.1007/s00450-017-0342-y
Sicherheit relativ definieren
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Smart Meter im Spannungsfeld zwischen Europäischer Datenschutzgrundverordnung und Messstellenbetriebsgesetz
Bretthauer, S.
2017. Zeitschrift für das gesamte Recht der Energiewirtschaft, (3), 56–61
Bretthauer, S.
2017. Zeitschrift für das gesamte Recht der Energiewirtschaft, (3), 56–61
Big und Smart Data: Zweckbindung zwecklos?
Spiecker gen. Döhmann, I.
2017. Spektrum der Wissenschaft, 2017 (1), 56–62
Spiecker gen. Döhmann, I.
2017. Spektrum der Wissenschaft, 2017 (1), 56–62
A Privacy-Aware Fall Detection System for Hospitals and Nursing Facilities
Krempel, E.; Birnstill, P.; Beyerer, J.
2017. European Journal for Security Research. doi:10.1007/s41125-017-0016-6
Krempel, E.; Birnstill, P.; Beyerer, J.
2017. European Journal for Security Research. doi:10.1007/s41125-017-0016-6
Using internal domain-specific languages to inherit tool support and modularity for model transformations
Hinkel, G.; Goldschmidt, T.; Burger, E.; Reussner, R.
2017. Software and systems modeling, 18 (1), 129–155. doi:10.1007/s10270-017-0578-9
Hinkel, G.; Goldschmidt, T.; Burger, E.; Reussner, R.
2017. Software and systems modeling, 18 (1), 129–155. doi:10.1007/s10270-017-0578-9
Integrating business process simulation and information system simulation for performance prediction
Heinrich, R.; Merkle, P.; Henss, J.; Paech, B.
2017. Software and systems modeling, 16 (1), 257–277. doi:10.1007/s10270-015-0457-1
Heinrich, R.; Merkle, P.; Henss, J.; Paech, B.
2017. Software and systems modeling, 16 (1), 257–277. doi:10.1007/s10270-015-0457-1
2016
Buchaufsätze
Praxis der Forschung. Eine Lehrveranstaltung des forschungsnahen Lehrens und Lernens in der Informatik am KIT
Beckert, B.; Beigl, M.; Budde, M.; Burger, E.; Grebing, S.; Kramer, M.; Reussner, R.
2016. Neues Handbuch Hochschullehre. Lehren und Lernen effizient gestalten. Hrsg.: B. Berendt, 55–79, Raabe, Fachverl. für Wiss.-Information
Beckert, B.; Beigl, M.; Budde, M.; Burger, E.; Grebing, S.; Kramer, M.; Reussner, R.
2016. Neues Handbuch Hochschullehre. Lehren und Lernen effizient gestalten. Hrsg.: B. Berendt, 55–79, Raabe, Fachverl. für Wiss.-Information
Verantwortung bei begrenztem Wissen in der vernetzten Welt
Spiecker Döhmann, I.
2016. Neue Macht- und Verantwortungsstrukturen in der digitalen Welt. Hrsg.: M. Fehling; U. Schliesky, 53–72, Nomos Verlagsgesellschaft
Spiecker Döhmann, I.
2016. Neue Macht- und Verantwortungsstrukturen in der digitalen Welt. Hrsg.: M. Fehling; U. Schliesky, 53–72, Nomos Verlagsgesellschaft
Datenschutzrecht im Internet in der Kollision
Spiecker gen. Döhmann, I.
2016. Zukunft der informationellen Selbstbestimmung, 137–150, Erich Schmidt Verlag GmbH & Co. KG (ESV)
Spiecker gen. Döhmann, I.
2016. Zukunft der informationellen Selbstbestimmung, 137–150, Erich Schmidt Verlag GmbH & Co. KG (ESV)
Gegenrechte – Datenschutz/Schutz von Betriebs- und Geschäftsgeheimnissen, Geistiges Eigentum
Dreier, T.; Spiecker gen. Döhmann, I.
2016. Informationen der öffentlichen Hand - Zugang und Nutzung. Hrsg.: T. Dreier, V. Fischer, A. van Raay, I. Spiecker gen. Döhmann, 165–192, Nomos Verlagsgesellschaft. doi:10.5771/9783845251653-165
Dreier, T.; Spiecker gen. Döhmann, I.
2016. Informationen der öffentlichen Hand - Zugang und Nutzung. Hrsg.: T. Dreier, V. Fischer, A. van Raay, I. Spiecker gen. Döhmann, 165–192, Nomos Verlagsgesellschaft. doi:10.5771/9783845251653-165
A Study on Corporate Compliance with Transparency Requirements of Data Protection Law
Bier, C.; Kömpf, S.; Beyerer, J.
2016. Data protection and privacy : (in)visibilities and infrastructures. Ed.: Ronald Leenes, 271–289, Springer. doi:10.1007/978-3-319-50796-5_10
Bier, C.; Kömpf, S.; Beyerer, J.
2016. Data protection and privacy : (in)visibilities and infrastructures. Ed.: Ronald Leenes, 271–289, Springer. doi:10.1007/978-3-319-50796-5_10
Technische und organisatorische Umsetzung - Technische Rahmenbedingungen
Bretthauer, S.; Bräuchle, T.
2016. Informationen der öffentlichen Hand : Zugang und Nutzung. Hrsg.: T. Dreier, 395–408, Nomos Verlagsgesellschaft
Bretthauer, S.; Bräuchle, T.
2016. Informationen der öffentlichen Hand : Zugang und Nutzung. Hrsg.: T. Dreier, 395–408, Nomos Verlagsgesellschaft
Dissertationen
Usable Security Evaluation of EasyVote in the Context of Complex Elections. Dissertation
Budurushi, J.
2016. Darmstadt
Budurushi, J.
2016. Darmstadt
Evaluation and Improvement of Internet Voting Schemes Based on Legally-Founded Security Requirements. Dissertation
Neumann, S.
2016. Darmstadt
Neumann, S.
2016. Darmstadt
Information Flow Control with System Dependence Graphs - Improving Modularity, Scalability and Precision for Object Oriented Languages. Dissertation
Graf, J.
2016. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000068211
Graf, J.
2016. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000068211
Proceedingsbeiträge
An Abstract Model for Proving Safety of Autonomous Urban Traffic
Hilscher, M.; Schwammberger, M.
2016. Theoretical Aspects of Computing – ICTAC 2016, 13th International Colloquium, Taipei, Taiwan, ROC, October 24–31, 2016, Proceedings, 274–292, Springer International Publishing. doi:10.1007/978-3-319-46750-4_16
Hilscher, M.; Schwammberger, M.
2016. Theoretical Aspects of Computing – ICTAC 2016, 13th International Colloquium, Taipei, Taiwan, ROC, October 24–31, 2016, Proceedings, 274–292, Springer International Publishing. doi:10.1007/978-3-319-46750-4_16
Implicit Constraints in Partial Feature Models
Ananieva, S.; Kowal, M.; Thüm, T.; Schaefer, I.
2016. Proceedings of the 7th International Workshop on Feature-Oriented Software Development, 18–27, Association for Computing Machinery (ACM). doi:10.1145/3001867.3001870
Ananieva, S.; Kowal, M.; Thüm, T.; Schaefer, I.
2016. Proceedings of the 7th International Workshop on Feature-Oriented Software Development, 18–27, Association for Computing Machinery (ACM). doi:10.1145/3001867.3001870
Explaining anomalies in feature models
Kowal, M.; Ananieva, S.; Thüm, T.
2016. Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 132–143, Association for Computing Machinery (ACM). doi:10.1145/2993236.2993248
Kowal, M.; Ananieva, S.; Thüm, T.
2016. Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 132–143, Association for Computing Machinery (ACM). doi:10.1145/2993236.2993248
Traceability of Information Flow Requirements in Cyber-Physical Systems Engineering
Gerking, C.
2016. S. Nejati & R. Salay (Hrsg.), Proceedings of the Doctoral Symposium at the 19th ACM/IEEE International Conference of Model-Driven Engineering Languages and Systems 2016 (MoDELS 2016), 7 S., Universität Paderborn
Gerking, C.
2016. S. Nejati & R. Salay (Hrsg.), Proceedings of the Doctoral Symposium at the 19th ACM/IEEE International Conference of Model-Driven Engineering Languages and Systems 2016 (MoDELS 2016), 7 S., Universität Paderborn
Towards Safe Execution of Reconfigurations in Cyber-Physical Systems
Schubert, D.; Heinzemann, C.; Gerking, C.
2016. 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering, CBSE 2016, 33–38, IEEE Computer Society. doi:10.1109/CBSE.2016.10
Schubert, D.; Heinzemann, C.; Gerking, C.
2016. 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering, CBSE 2016, 33–38, IEEE Computer Society. doi:10.1109/CBSE.2016.10
Automated Verification for Functional and Relational Properties of Voting Rules
Beckert, B.; Bormer, T.; Kirsten, M.; Neuber, T.; Ulbrich, M.
2016. Sixth International Workshop on Computational Social Choice, COMSOC-2016, Toulouse, France, 22–24 June 2016, 16 S
Beckert, B.; Bormer, T.; Kirsten, M.; Neuber, T.; Ulbrich, M.
2016. Sixth International Workshop on Computational Social Choice, COMSOC-2016, Toulouse, France, 22–24 June 2016, 16 S
Recht und Technik - Datenschutz im Diskurs
Spiecker gen. Döhmann, I.; Sorge, C.; Grimm, R.
2016. Informatik 2016, Klagenfurt, Österreich, 26.-30. September 2016. Hrsg.: H. C. Mayr; M. Pinzger, 411–412, Gesellschaft für Informatik (GI)
Spiecker gen. Döhmann, I.; Sorge, C.; Grimm, R.
2016. Informatik 2016, Klagenfurt, Österreich, 26.-30. September 2016. Hrsg.: H. C. Mayr; M. Pinzger, 411–412, Gesellschaft für Informatik (GI)
Architectural Data Flow Analysis
Seifermann, S.
2016. 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016, Venice, I, April 5-8, 2016, 270–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.49
Seifermann, S.
2016. 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016, Venice, I, April 5-8, 2016, 270–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.49
Branchenreport UX/Usability 2016
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V. doi:10.18420/muc2016-up-0044
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V. doi:10.18420/muc2016-up-0044
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-mci-0075
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-mci-0075
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-ws03-0001
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-ws03-0001
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik (GI)
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik (GI)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, Association for Computing Machinery (ACM). doi:10.1145/2976749.2989045
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, Association for Computing Machinery (ACM). doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer
Understanding information security compliance - Why goal setting and rewards might be a bad idea
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth
Introducing Proxy Voting to Helios
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2016.38
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth
Memorable And Secure: How Do You Choose Your PIN?
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth
Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH Aachen
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH Aachen
Teaching Phishing-Security: Which Way is Best?
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer. doi:10.1007/978-3-319-33630-5_10
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer. doi:10.1007/978-3-319-33630-5_12
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society
Efficiency Comparison of Various Approaches in E-Voting Protocols
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer-Verlag
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer-Verlag
Access Pattern Confidentiality-Preserving Relational Databases: Deployment Concept and Efficiency Evaluation
Degitz, A.; Köhler, J.; Hartenstein, H.
2016. Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, Bordeaux, France, 15th - 16th March 2016
Degitz, A.; Köhler, J.; Hartenstein, H.
2016. Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, Bordeaux, France, 15th - 16th March 2016
Consideration of values in the design of access control systems
Neudecker, T.; Hayrapetyan, A.; Degitz, A.; Andelfinger, P.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016; Klagenfurt; Austria; 26 September 2016 through 30 September 2016. Ed.: H. C. Mayr, 275–288, Gesellschaft für Informatik (GI)
Neudecker, T.; Hayrapetyan, A.; Degitz, A.; Andelfinger, P.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016; Klagenfurt; Austria; 26 September 2016 through 30 September 2016. Ed.: H. C. Mayr, 275–288, Gesellschaft für Informatik (GI)
Security by Delegation für Industrie 4.0
Jung, M.
2016. 7. Jahreskolloquium "Kommunikation in der Automation" : 30.11.2016 : KommA 2016 Kommunikation in der Automation. Hrsg.: Jürgen Jasperneite KommA - Kommunikation in der Automation Hochschule Ostwestfalen-Lippe Institut für Industrielle Informationstechnik - inIT, 2 S., Institut für Industrielle Informationstechnik (inIT)
Jung, M.
2016. 7. Jahreskolloquium "Kommunikation in der Automation" : 30.11.2016 : KommA 2016 Kommunikation in der Automation. Hrsg.: Jürgen Jasperneite KommA - Kommunikation in der Automation Hochschule Ostwestfalen-Lippe Institut für Industrielle Informationstechnik - inIT, 2 S., Institut für Industrielle Informationstechnik (inIT)
Automated Inversion of Attribute Mappings in Bidirectional Model Transformations
Kramer, M. E.; Rakhman, K.
2016. 5th International Workshop on Bidirectional Transformations, Bx 2016, Eindhoven, Netherlands, 8 April 2016. Hrsg.: Anthony Anjorin, 61–76, RWTH Aachen
Kramer, M. E.; Rakhman, K.
2016. 5th International Workshop on Bidirectional Transformations, Bx 2016, Eindhoven, Netherlands, 8 April 2016. Hrsg.: Anthony Anjorin, 61–76, RWTH Aachen
Unabhängigkeit von Datenschutzbehörden als Voraussetzung von Effektivität
Spiecker gen. Döhmann, I.
2016. Unabhängiges Verwalten in der Europäischen Union - Unabhängiges Verwalten in Europa, Hamburg, Germany, 18. August 2014. Hrsg.: M. Kröger, 97–120, Mohr Siebeck
Spiecker gen. Döhmann, I.
2016. Unabhängiges Verwalten in der Europäischen Union - Unabhängiges Verwalten in Europa, Hamburg, Germany, 18. August 2014. Hrsg.: M. Kröger, 97–120, Mohr Siebeck
Datenschutzziele im Konflikt: Eine Metrik für Unverkettbarkeit als Hilfestellung für den Betroffenen
Bier, C.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 455–468, Gesellschaft für Informatik (GI)
Bier, C.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 455–468, Gesellschaft für Informatik (GI)
Privacy-Dashcam - Datenschutzfreundliche Dashcams durch Erzwingen externer Anonymisierung
Wagner, P.; Birnstill, P.; Krempel, E.; Bretthauer, S.; Beyerer, J.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 427–440, Gesellschaft für Informatik (GI)
Wagner, P.; Birnstill, P.; Krempel, E.; Bretthauer, S.; Beyerer, J.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 427–440, Gesellschaft für Informatik (GI)
Sicherheitsanalyse mit JOANA
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI), Bonn, Deutschland, 5. - 7. April 2016. Hrsg.: M. Meier, 11–21, Gesellschaft für Informatik (GI)
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI), Bonn, Deutschland, 5. - 7. April 2016. Hrsg.: M. Meier, 11–21, Gesellschaft für Informatik (GI)
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
Birnstill, P.; Bier, C.; Wagner, P.; Beyerer, J.
2016. SAM 2016 : proceedings of the 2016 International Conference on Security & Management : WORLDCOMP ’16, July 25-28, 2016, Las Vegas, Nevada, USA. Ed.: Kevin Daimi, 185–191, CSREA Press
Birnstill, P.; Bier, C.; Wagner, P.; Beyerer, J.
2016. SAM 2016 : proceedings of the 2016 International Conference on Security & Management : WORLDCOMP ’16, July 25-28, 2016, Las Vegas, Nevada, USA. Ed.: Kevin Daimi, 185–191, CSREA Press
PrivacyInsight: The Next Generation Privacy Dashboard
Bier, C.; Beyerer, J.; Kühne, K.
2016. Privacy Technologies and Policy : 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016 ; Proceedings. Ed.: Stefan, Schiffner, 135–152, Springer. doi:10.1007/978-3-319-44760-5_9
Bier, C.; Beyerer, J.; Kühne, K.
2016. Privacy Technologies and Policy : 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016 ; Proceedings. Ed.: Stefan, Schiffner, 135–152, Springer. doi:10.1007/978-3-319-44760-5_9
Towards Measuring The Linkage Risk In Information Flows
Bier, C.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13-14, 2016 : proceedings / Fraunhofer VVS. Ed.: Oliver Ambacher, 293–298, Fraunhofer Verlag
Bier, C.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13-14, 2016 : proceedings / Fraunhofer VVS. Ed.: Oliver Ambacher, 293–298, Fraunhofer Verlag
Working And Living In Interaktive Environments - Requirements For Security And Privacy
Krempel, E.; Birnstill, P.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13 - 14, 2016 : proceedings / Fraunhofer VVS Hrsg.: Oliver Ambacher, Rüdiger Quay, Joachim Wagner, 315–322, Fraunhofer Verlag
Krempel, E.; Birnstill, P.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13 - 14, 2016 : proceedings / Fraunhofer VVS Hrsg.: Oliver Ambacher, Rüdiger Quay, Joachim Wagner, 315–322, Fraunhofer Verlag
’Smart Regulation for Smart Industry’ - DatenschutDatenschutz Aspekte des Aktionsplanes der europäischen Kommission zur Digitalisierung der europäischen Industrie
Müllmann, D.
2016. Smart World - Smart Law? : weltweite Netze mit regionaler Regulierung : Tagungsband Herbstakademie 2016. Hrsg.: Jürgen Taeger, 603–619, OlWIR Oldenburger Verlag für Wirtschaft
Müllmann, D.
2016. Smart World - Smart Law? : weltweite Netze mit regionaler Regulierung : Tagungsband Herbstakademie 2016. Hrsg.: Jürgen Taeger, 603–619, OlWIR Oldenburger Verlag für Wirtschaft
Multilinear Maps from Obfuscation
Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; Paterson, K. G.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 446–473, Springer-Verlag. doi:10.1007/978-3-662-49096-9_19
Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; Paterson, K. G.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 446–473, Springer-Verlag. doi:10.1007/978-3-662-49096-9_19
Tightly CCA-Secure Encryption Without Pairings
Gay, R.; Hofheinz, D.; Kiltz, E.; Wee, H.
2016. 35th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016; Vienna; Austria; 8 May 2016 through 12 May 2016. Ed.: M. Fischlin, 1–27, Springer-Verlag. doi:10.1007/978-3-662-49890-3_1
Gay, R.; Hofheinz, D.; Kiltz, E.; Wee, H.
2016. 35th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016; Vienna; Austria; 8 May 2016 through 12 May 2016. Ed.: M. Fischlin, 1–27, Springer-Verlag. doi:10.1007/978-3-662-49890-3_1
Tool Demonstration: JOANA
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 89–93, Springer-Verlag. doi:10.1007/978-3-662-49635-0_5
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 89–93, Springer-Verlag. doi:10.1007/978-3-662-49635-0_5
Algebraic Partitioning : Fully Compact and (almost) Tightly Secure Cryptography
Hofheinz, D.
2016. 13th International Conference on Theory of Cryptography, TCC 2016-A, Proceedings Part I, Tel Aviv, Israel; 10th - 13th January 2016. Ed.: E. Kushilevitz, 251–281, Springer-Verlag. doi:10.1007/978-3-662-49096-9_11
Hofheinz, D.
2016. 13th International Conference on Theory of Cryptography, TCC 2016-A, Proceedings Part I, Tel Aviv, Israel; 10th - 13th January 2016. Ed.: E. Kushilevitz, 251–281, Springer-Verlag. doi:10.1007/978-3-662-49096-9_11
On Improvements of Low-Deterministic Security
Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 68–88, Springer-Verlag. doi:10.1007/978-3-662-49635-0_4
Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 68–88, Springer-Verlag. doi:10.1007/978-3-662-49635-0_4
Secure Audit Logs with Verifiable Excerpts
Hartung, G.
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing. doi:10.1007/978-3-319-29485-8_11
Hartung, G.
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing. doi:10.1007/978-3-319-29485-8_11
Fault-Tolerant Aggregate Signatures
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Rupp, A.
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer-Verlag. doi:10.1007/978-3-662-49384-7_13
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Rupp, A.
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer-Verlag. doi:10.1007/978-3-662-49384-7_13
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security
Hesse, J.; Hofheinz, D.; Rupp, A.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 416–445, Springer-Verlag. doi:10.1007/978-3-662-49096-9_18
Hesse, J.; Hofheinz, D.; Rupp, A.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 416–445, Springer-Verlag. doi:10.1007/978-3-662-49096-9_18
Context-Based Architectural Security Analysis
Taspolatoglu, E.; Heinrich, R.
2016. 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 5–8 April 2016, 281–282, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.55
Taspolatoglu, E.; Heinrich, R.
2016. 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 5–8 April 2016, 281–282, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.55
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2016. The 13th IEEE International Conference on Ubiquitous Intelligence and Computing, The 13th IEEE International Conference on Advanced and Trusted Computing, The 16th IEEE International Conference on Scalable Computing and Communications, The IEEE International Conference on Cloud and Big Data Computing, The IEEE International Conference on Internet of People, The IEEE Smart World Congress and Workshops, Toulouse, F, July 18-21, 2016. Ed.: D. El Baz, 358–367, IEEE Computer Society. doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2016. The 13th IEEE International Conference on Ubiquitous Intelligence and Computing, The 13th IEEE International Conference on Advanced and Trusted Computing, The 16th IEEE International Conference on Scalable Computing and Communications, The IEEE International Conference on Cloud and Big Data Computing, The IEEE International Conference on Internet of People, The IEEE Smart World Congress and Workshops, Toulouse, F, July 18-21, 2016. Ed.: D. El Baz, 358–367, IEEE Computer Society. doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070
ZeTA-zero-trust authentication: Relying on innate human ability, not technology
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
How to Generate and Use Universal Samplers
Hofheinz, D.; Jager, T.; Khurana, D.; Sahai, A.; Waters, B.; Zhandry, M.
2016. 22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016; Hanoi; Viet Nam; 4 December 2016 through 8 December 2016. Ed. : J. H. Cheon, 715–744, Springer-Verlag. doi:10.1007/978-3-662-53890-6_24
Hofheinz, D.; Jager, T.; Khurana, D.; Sahai, A.; Waters, B.; Zhandry, M.
2016. 22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016; Hanoi; Viet Nam; 4 December 2016 through 8 December 2016. Ed. : J. H. Cheon, 715–744, Springer-Verlag. doi:10.1007/978-3-662-53890-6_24
A Distributed Key Management Approach
Dowsley, R.; Gabel, M.; Hübsch, G.; Schiefer, G.; Schwichtenberg, A.
2016. IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, 12–15 December 2016, 509–514, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2016.0089
Dowsley, R.; Gabel, M.; Hübsch, G.; Schiefer, G.; Schwichtenberg, A.
2016. IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, 12–15 December 2016, 509–514, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2016.0089
Oblivious Voting - Hiding Votes from the Voting Machine in Bingo Voting
Achenbach, D.; Löwe, B.; Müller-Quade, J.; Rill, J.
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SciTePress. doi:10.5220/0005964300850096
Achenbach, D.; Löwe, B.; Müller-Quade, J.; Rill, J.
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SciTePress. doi:10.5220/0005964300850096
A Microservice Architecture for the Intranet of Things and Energy in Smart Buildings
Bao, K.; Mauser, I.; Kochanneck, S.; Xu, H.; Schmeck, H.
2016. Proceedings of the Article17th Annual Middleware Conference (ACM/IFIP/USENIX Middleware) - First International Workshop on Mashups of Things and APIs (MOTA) - Trento, Italy, December 12-16, 2016, Article No.3, Association for Computing Machinery (ACM). doi:10.1145/3007203.3007215
Bao, K.; Mauser, I.; Kochanneck, S.; Xu, H.; Schmeck, H.
2016. Proceedings of the Article17th Annual Middleware Conference (ACM/IFIP/USENIX Middleware) - First International Workshop on Mashups of Things and APIs (MOTA) - Trento, Italy, December 12-16, 2016, Article No.3, Association for Computing Machinery (ACM). doi:10.1145/3007203.3007215
Smarter Energy by an Intranet of Things in Buildings
Bao, K.; Fiebig, F.; Frank, L.; Kochanneck, S.; Mauser, I.; Schmeck, H.
2016. VDE-Kongress : Internet der Dinge : Technologien, Anwendungen, Perspektiven - Mannheim, 7.-8. November 2016, CD-ROM, VDE Verlag
Bao, K.; Fiebig, F.; Frank, L.; Kochanneck, S.; Mauser, I.; Schmeck, H.
2016. VDE-Kongress : Internet der Dinge : Technologien, Anwendungen, Perspektiven - Mannheim, 7.-8. November 2016, CD-ROM, VDE Verlag
Standard security does not imply indistinguishability under selective opening
Hofheinz, D.; Rao, V.; Wichs, D.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016. Ed. : A. Smith, 121–145, Springer-Verlag. doi:10.1007/978-3-662-53644-5_5
Hofheinz, D.; Rao, V.; Wichs, D.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016. Ed. : A. Smith, 121–145, Springer-Verlag. doi:10.1007/978-3-662-53644-5_5
Public-key encryption with simulation-based selective-opening security and compact ciphertexts
Hofheinz, D.; Jager, T.; Rupp, A.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016, 146–168, Springer-Verlag. doi:10.1007/978-3-662-53644-5_6
Hofheinz, D.; Jager, T.; Rupp, A.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016, 146–168, Springer-Verlag. doi:10.1007/978-3-662-53644-5_6
A Formal Treatment of Privacy in Video Data
Fetzer, V.; Müller-Quade, J.; Nilges, T.
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing. doi:10.1007/978-3-319-45741-3_21
Fetzer, V.; Müller-Quade, J.; Nilges, T.
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing. doi:10.1007/978-3-319-45741-3_21
Eliciting and refining requirements for comprehensible security
Broadnax, B.; Birnstill, P.; Müller-Quade, J.; Beyerer, J.
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verlag
Broadnax, B.; Birnstill, P.; Müller-Quade, J.; Beyerer, J.
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verlag
Pseudo-Random Number Generator Verification: A Case Study
Dörre, F.; Klebanov, V.
2016. Proceedings, Verified Software: Theories, Tools, and Experiments (VSTTE) : 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Hrsg.: A. Gurfinkel, 61–72, Springer International Publishing. doi:10.1007/978-3-319-29613-5_4
Dörre, F.; Klebanov, V.
2016. Proceedings, Verified Software: Theories, Tools, and Experiments (VSTTE) : 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Hrsg.: A. Gurfinkel, 61–72, Springer International Publishing. doi:10.1007/978-3-319-29613-5_4
Bücher
Modeling and Simulating Software Architectures – The Palladio Approach
Reussner, R. H.; Becker, S.; Happe, J.; Heinrich, R.; Koziolek, A.; Koziolek, H.; Kramer, M.; Krogmann, K. (Hrsg.)
2016. MIT Press
Reussner, R. H.; Becker, S.; Happe, J.; Heinrich, R.; Koziolek, A.; Koziolek, H.; Kramer, M.; Krogmann, K. (Hrsg.)
2016. MIT Press
Zeitschriftenaufsätze
Challenges in Secure Software Evolution - The Role of Software Architecture
Seifermann, S.; Taspolatoglu, E.; Reussner, R. H.; Heinrich, R.
2016. Softwaretechnik-Trends, 36 (1)
Seifermann, S.; Taspolatoglu, E.; Reussner, R. H.; Heinrich, R.
2016. Softwaretechnik-Trends, 36 (1)
Challenges to Trading-Off Performance and Privacy of Component-Based Systems
Seifermann, S.; Yurchenko, K.; Kramer, M. E.
2016. Softwaretechnik-Trends, 36 (4)
Seifermann, S.; Yurchenko, K.; Kramer, M. E.
2016. Softwaretechnik-Trends, 36 (4)
Spot the phish by checking the pruned URL
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Untersuchung des Sicherheitsbewusstseins im Kontext von "E-Mail made in Germany“
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
A Framework for a Uniform Quantitative Description of Risk with Respect to Safety and Security
Beyerer, J.; Geisler, J.
2016. European Journal for Security Research, 1 (2), 135–150. doi:10.1007/s41125-016-0008-y
Beyerer, J.; Geisler, J.
2016. European Journal for Security Research, 1 (2), 135–150. doi:10.1007/s41125-016-0008-y
Zweckkonforme und zweckändernde Weiternutzung
Müllmann, D.
2016. Neue Zeitschrift für Verwaltungsrecht, 35 (23), 1692–1696
Müllmann, D.
2016. Neue Zeitschrift für Verwaltungsrecht, 35 (23), 1692–1696
The regulation of commercial profiling - a comparative analysis
Spiecker gen. Döhmann, I.; Tambou, O.; Bernal, P.; Hu, M.; Molinaro, C.; Negre, E.; Sarlet, I.; Schertel Mendes, L.; Witzleb, N.; Yger, F.
2016. European Data Protection Law Review, 2 (4), 535–554
Spiecker gen. Döhmann, I.; Tambou, O.; Bernal, P.; Hu, M.; Molinaro, C.; Negre, E.; Sarlet, I.; Schertel Mendes, L.; Witzleb, N.; Yger, F.
2016. European Data Protection Law Review, 2 (4), 535–554
Zur Zukunft systemischer Digitalisierung - Erste Gedanken zur Haftungs- und Verantwortungszuschreibung bei informationstechnischen Systemen
Spiecker gen. Döhmann, I.
2016. Computer und Recht / International, 32 (10), 698–704. doi:10.9785/cr-2016-1016
Spiecker gen. Döhmann, I.
2016. Computer und Recht / International, 32 (10), 698–704. doi:10.9785/cr-2016-1016
Industry 4.0: Legal Systems, the Social Contract and Health Care
Spiecker gen. Döhmann, I.
2016. Society for Computers and Law, (6/7), 26–28
Spiecker gen. Döhmann, I.
2016. Society for Computers and Law, (6/7), 26–28
7 Irrtümer zum Datenschutz im Kontext von Smart Data
Wagner, M.; Raabe, O.
2016. Datenbank-Spektrum, 16 (2), 173–178. doi:10.1007/s13222-016-0218-5
Wagner, M.; Raabe, O.
2016. Datenbank-Spektrum, 16 (2), 173–178. doi:10.1007/s13222-016-0218-5
Verantwortlicher Einsatz von Big Data : Ein Zwischenfazit zur Entwicklung von Leitplanken für die digitale Gesellschaft
Raabe, O.; Wagner, M.
2016. Datenschutz und Datensicherheit - DuD, 40 (7), 434–439. doi:10.1007/s11623-016-0632-8
Raabe, O.; Wagner, M.
2016. Datenschutz und Datensicherheit - DuD, 40 (7), 434–439. doi:10.1007/s11623-016-0632-8
Datenschutz und Datenanalyse
Steinbach, M.; Krempel, E.; Jung, C.; Hoffmann, M.
2016. Datenschutz und Datensicherheit, 40 (7), 440–445
Steinbach, M.; Krempel, E.; Jung, C.; Hoffmann, M.
2016. Datenschutz und Datensicherheit, 40 (7), 440–445
Establishing location privacy in decentralized long-distance geocast services
Florian, M.; Pieper, F.; Baumgart, I.
2016. Ad hoc Networks, 37, Part 1, SI (February), 110–121. doi:10.1016/j.adhoc.2015.07.015
Florian, M.; Pieper, F.; Baumgart, I.
2016. Ad hoc Networks, 37, Part 1, SI (February), 110–121. doi:10.1016/j.adhoc.2015.07.015
Architectural run-time models for performance and privacy analysis in dynamic cloud applications
Heinrich, R.
2016. ACM SIGMETRICS performance evaluation review, 43 (4), 13–22. doi:10.1145/2897356.2897359
Heinrich, R.
2016. ACM SIGMETRICS performance evaluation review, 43 (4), 13–22. doi:10.1145/2897356.2897359
Zuverlässige und sichere Software offener Automatisierungssysteme der Zukunft – Herausforderungen und Lösungswege
Keller, H. B.; Schneider, O.; Matthes, J.; Hagenmeyer, V.
2016. Automatisierungstechnik, 64 (12), 930–947. doi:10.1515/auto-2016-0060
Keller, H. B.; Schneider, O.; Matthes, J.; Hagenmeyer, V.
2016. Automatisierungstechnik, 64 (12), 930–947. doi:10.1515/auto-2016-0060
Integrierte Entwicklung zuverlässiger Software
Schneider, O.; Keller, H. B.
2016. Softwaretechnik-Trends, 36 (3), 12–16
Schneider, O.; Keller, H. B.
2016. Softwaretechnik-Trends, 36 (3), 12–16
Software-based smart factory networking
Bauer, R.; Bless, R.; Haas, C.; Jung, M.; Zitterbart, M.
2016. Automatisierungstechnik, 64 (9), 765–773. doi:10.1515/auto-2016-0072
Bauer, R.; Bless, R.; Haas, C.; Jung, M.; Zitterbart, M.
2016. Automatisierungstechnik, 64 (9), 765–773. doi:10.1515/auto-2016-0072
Tightly secure signatures and public-key encryption
Hofheinz, D.; Jager, T.
2016. Designs, Codes and Cryptography, 80 (1), 29–61. doi:10.1007/s10623-015-0062-x
Hofheinz, D.; Jager, T.
2016. Designs, Codes and Cryptography, 80 (1), 29–61. doi:10.1007/s10623-015-0062-x
Information and communication technology in energy lab 2.0: Smart energies system simulation and control center with an open-street-map-based power flow simulation example
Hagenmeyer, V.; Cakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Waczowicz, S.; Mikut, R.
2016. Energy Technology, 4 (1), 145–162. doi:10.1002/ente.201500304
Hagenmeyer, V.; Cakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Waczowicz, S.; Mikut, R.
2016. Energy Technology, 4 (1), 145–162. doi:10.1002/ente.201500304
2015
Buchaufsätze
Kooperation als Lösungsansatz in Dreiecksbeziehungen des Verwaltungsrechts
Spiecker genannt Döhmann, I.
2015. 100 Jahre Rechtswissenschaft in Frankfurt. Hrsg.: Fachbereich Rechtswissenschaft der Goethe-Universität Frankfurt am Main, 201–215, Klostermann
Spiecker genannt Döhmann, I.
2015. 100 Jahre Rechtswissenschaft in Frankfurt. Hrsg.: Fachbereich Rechtswissenschaft der Goethe-Universität Frankfurt am Main, 201–215, Klostermann
Recht und Verhaltenssteuerung
Spiecker genannt Döhmann, I.
2015. Recht, Kultur, Normativität. Hrsg.: Jan-Christoph Marschelke, 49–75, transcript Verlag
Spiecker genannt Döhmann, I.
2015. Recht, Kultur, Normativität. Hrsg.: Jan-Christoph Marschelke, 49–75, transcript Verlag
Staatliche Instrumente zur Bewältigung von Nicht-Wissens-Szenarien
Spiecker genannt Döhmann, I.
2015. Die Herausforderungen des Rechts in der globalen Risikogesellschaft, Barcelona, 2011. Hrsg.: Merce Darnaculleta Gardella, 43–63
Spiecker genannt Döhmann, I.
2015. Die Herausforderungen des Rechts in der globalen Risikogesellschaft, Barcelona, 2011. Hrsg.: Merce Darnaculleta Gardella, 43–63
Datenschutz in der Globalisierung - Mission Impossible in einer Welt der Technikzukünfte unter Einwirkung einer neuen europäischen Datenschutz-Grundverordnung?
Spiecker gen. Döhmann, I.
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 63–95, KIT Scientific Publishing
Spiecker gen. Döhmann, I.
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 63–95, KIT Scientific Publishing
Dissertationen
Tunable Security for Deployable Data Outsourcing. Dissertation
Köhler, J.
2015. KIT Scientific Publishing. doi:10.5445/KSP/1000048084
Köhler, J.
2015. KIT Scientific Publishing. doi:10.5445/KSP/1000048084
Magisterarbeiten
Konzeption und Leistungsbewertung von Database-as-a-Service Ansätzen zur Zugriffsmusterverschleierung. Magisterarbeit
Degitz, A.
2015. Karlsruher Institut für Technologie (KIT)
Degitz, A.
2015. Karlsruher Institut für Technologie (KIT)
Masterarbeiten
Anwesenheitserkennung und effiziente Speicherung von Energiedaten zur privatsphärengerechten Visualisierung. Masterarbeit
Erdrich, F.
2015
Erdrich, F.
2015
Funktions- und Performancebewertung von Exploit Mitigation Techniques. Masterarbeit
Laschinger, M.
2015. Karlsruher Institut für Technologie (KIT)
Laschinger, M.
2015. Karlsruher Institut für Technologie (KIT)
Modellierung und Simulation des Bitcoin Peer-to-Peer Netzwerkes. Masterarbeit
Bittner, J.
2015. Karlsruher Institut für Technologie (KIT)
Bittner, J.
2015. Karlsruher Institut für Technologie (KIT)
Application agnostic confidentiality enforcement for database-centric SaaS offerings. Masterarbeit
Fuhry, B.
2015. Karlsruher Institut für Technologie (KIT)
Fuhry, B.
2015. Karlsruher Institut für Technologie (KIT)
Realitätsnahe Emulation drahtloser Sensornetze in OMNeT++. Masterarbeit
Jung, M.
2015. Karlsruher Institut für Technologie (KIT)
Jung, M.
2015. Karlsruher Institut für Technologie (KIT)
Bachelorarbeiten
Analyse aktueller Source-to-Source Transformationsmechanismen zur teilautomatischen Erzeugung von Discrete-Event-Simulationsmodellen. Bachelorarbeit
Martinat, P.
2015. Karlsruher Institut für Technologie (KIT)
Martinat, P.
2015. Karlsruher Institut für Technologie (KIT)
Evaluierung der Kryptographie Bibliothek NaCl zur Anwendung in drahtlosen Sensornetzen. Bachelorarbeit
Männle, K.
2015. Karlsruher Institut für Technologie (KIT)
Männle, K.
2015. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
Properties of Communicating Controllers for Safe Traffic Manoeuvres
Schwammberger, M.
2015. B. K. Aichernig & A. Rossini (Hrsg.), Proceedings of the Doctoral Symposium of Formal Methods 2015, Ed.: B. Aichernig, 3–7
Schwammberger, M.
2015. B. K. Aichernig & A. Rossini (Hrsg.), Proceedings of the Doctoral Symposium of Formal Methods 2015, Ed.: B. Aichernig, 3–7
Model-driven test case design for model-to-model semantics preservation
Gerking, C.; Ladleif, J.; Schäfer, W.
2015. A-TEST 2015: Proceedings of the 6th International Workshop on Automating Test Case Design, Selection and Evaluation. Ed.: T. E. J. Vos, 1–7, Association for Computing Machinery (ACM). doi:10.1145/2804322.2804323
Gerking, C.; Ladleif, J.; Schäfer, W.
2015. A-TEST 2015: Proceedings of the 6th International Workshop on Automating Test Case Design, Selection and Evaluation. Ed.: T. E. J. Vos, 1–7, Association for Computing Machinery (ACM). doi:10.1145/2804322.2804323
Domain-Specific Model Checking for Cyber-Physical Systems
Gerking, C.; Schäfer, W.; Dziwok, S.; Heinzemann, C.
2015. M. Famelis, D. Ratiu, M. Seidl & G. M. K. Selim (Hrsg.), Proceedings of the 12th Workshop on Model-Driven Engineering, Verification and Validation co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, MoDeVVa@MoDELS 2015, 18–27, RWTH Aachen
Gerking, C.; Schäfer, W.; Dziwok, S.; Heinzemann, C.
2015. M. Famelis, D. Ratiu, M. Seidl & G. M. K. Selim (Hrsg.), Proceedings of the 12th Workshop on Model-Driven Engineering, Verification and Validation co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, MoDeVVa@MoDELS 2015, 18–27, RWTH Aachen
Security overlay for distributed encrypted containers
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. SAM2015 : proceedings of the 2015 International Conference on Security & Management : Worldcomp’15 : July 27-30, 2015, Las Vegas, Nevada, USA. Ed.: K. Daimi, 130–136, CSREA Press
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. SAM2015 : proceedings of the 2015 International Conference on Security & Management : Worldcomp’15 : July 27-30, 2015, Las Vegas, Nevada, USA. Ed.: K. Daimi, 130–136, CSREA Press
Protecting sensitive data in a distributed and mobile environment
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. ICCWS 2015, 10th International Conference on Cyber Warfare and Security. Proceedings : Kruger National Park, South Africa, 24-25 March 2015. Ed.: J. Zaaiman, 519–524, Academic Conferences and Publishing International Limited
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. ICCWS 2015, 10th International Conference on Cyber Warfare and Security. Proceedings : Kruger National Park, South Africa, 24-25 March 2015. Ed.: J. Zaaiman, 519–524, Academic Conferences and Publishing International Limited
Exploring Mental Models Underlying PIN Management Strategies
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WorldCIS.2015.7359406
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, Association for Computing Machinery (ACM). doi:10.1145/2818000.2818043
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, Association for Computing Machinery (ACM). doi:10.1145/2818000.2818043
Branchenreport UX/Usability 2015
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, Oldenbourg Verlag
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, Oldenbourg Verlag
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der "Mental Model Diagramm"-Methode
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, Oldenbourg Verlag
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, Oldenbourg Verlag
A Socio-Technical Investigation into Smartphone Security
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer. doi:10.1007/978-3-319-24858-5_17
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. Mensch und Computer 2015 Workshopband. Ed. A. Weisbecker, 647–655, Oldenbourg Verlag
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. Mensch und Computer 2015 Workshopband. Ed. A. Weisbecker, 647–655, Oldenbourg Verlag
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer. doi:10.1007/978-3-319-22846-4_7
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer. doi:10.1007/978-3-319-22270-7_4
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2015.75
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer. doi:10.1007/978-3-319-18500-2_8
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer. doi:10.1007/978-3-319-18500-2_8
Zertifizierte Apps
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl
NoPhish App Evaluation: Lab and Retention Study
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society
A quantitative risk model for a uniform description of safety and security
Beyerer, J.; Geisler, J.
2015. Proceedings of the 10th Future Security - Security Research Conference "Future Security", Berlin, 10, 2015, 317–324, Fraunhofer Verlag
Beyerer, J.; Geisler, J.
2015. Proceedings of the 10th Future Security - Security Research Conference "Future Security", Berlin, 10, 2015, 317–324, Fraunhofer Verlag
Executive Summary
Hutchison, D.; Nahrstedt, K.; Schöller, M.; Spiecker gen. Döhmann, I.; Tauber, M.
2015. Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations - Report from Dagstuhl (Seminar 15151), Wadern, Germany, 07. – 10. April 2015, 1–4, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI)
Hutchison, D.; Nahrstedt, K.; Schöller, M.; Spiecker gen. Döhmann, I.; Tauber, M.
2015. Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations - Report from Dagstuhl (Seminar 15151), Wadern, Germany, 07. – 10. April 2015, 1–4, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI)
Zur Architektonik des europäischen und deutschen Datenschutzes im Zeitalter von Vorratsdatenspeicherung, Big Data und IT-Enhancement im Lichte der Goog/e-Sßam-Entscheidung des Europäischen Gerichtshofs
Spiecker gen. Döhmann, I.
2015. Datenschutz im digitalen Zeitalter: global, europäisch, national, 61–90, Verlag C.H.Beck
Spiecker gen. Döhmann, I.
2015. Datenschutz im digitalen Zeitalter: global, europäisch, national, 61–90, Verlag C.H.Beck
On the Security of Public Cloud Storage
Müller, S.; Pallas, F.; Balaban, S.
2015. 10th Future Security Conference 2015 (Future Security 2015). Ed.: J. Beyerer, Fraunhofer Verlag
Müller, S.; Pallas, F.; Balaban, S.
2015. 10th Future Security Conference 2015 (Future Security 2015). Ed.: J. Beyerer, Fraunhofer Verlag
Idealizing Identity-Based Encryption
Hofheinz, D.; Matt, C.; Maurer, U.
2015. Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security (Proceedings Part 1), Auckland, New Zealand, 29th November - 3rd December 2015. Ed.: T. Iwata, 495–520, Springer-Verlag. doi:10.1007/978-3-662-48797-6_21
Hofheinz, D.; Matt, C.; Maurer, U.
2015. Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security (Proceedings Part 1), Auckland, New Zealand, 29th November - 3rd December 2015. Ed.: T. Iwata, 495–520, Springer-Verlag. doi:10.1007/978-3-662-48797-6_21
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
Hofheinz, D.; Koch, J.; Striecks, C.
2015. PKC 2015 : Public-Key Cryptography : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, Maryland, USA, 30th March - 1st April 2015. Ed.: J. Katz Public key cryptography - PKC 2015 ; 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015 . Ed.: J. Katz, 799–822, Springer-Verlag. doi:10.1007/978-3-662-46447-2
Hofheinz, D.; Koch, J.; Striecks, C.
2015. PKC 2015 : Public-Key Cryptography : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, Maryland, USA, 30th March - 1st April 2015. Ed.: J. Katz Public key cryptography - PKC 2015 ; 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015 . Ed.: J. Katz, 799–822, Springer-Verlag. doi:10.1007/978-3-662-46447-2
Tightly-Secure Authenticated Key Exchange
Bader, C.; Hofheinz, D.; Jager, T.; Kiltz, E.; Li, Y.
2015. Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Proceedings Part I, Warsaw, Poland, 23th - 25th March 2015. Ed.: Y. Dodis, 629–658, Springer-Verlag. doi:10.1007/978-3-662-46494-6_26
Bader, C.; Hofheinz, D.; Jager, T.; Kiltz, E.; Li, Y.
2015. Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Proceedings Part I, Warsaw, Poland, 23th - 25th March 2015. Ed.: Y. Dodis, 629–658, Springer-Verlag. doi:10.1007/978-3-662-46494-6_26
Privacy Score: Making privacy aspects of surveillance systems comparable
Krempel, E.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Hrsg.: Jürgen Beyerer, 65–72, Fraunhofer Verlag
Krempel, E.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Hrsg.: Jürgen Beyerer, 65–72, Fraunhofer Verlag
Graphical Model-based Privacy Policy Editing for Smart Video Surveillance
Birnstill, P.; Burkert, C.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Ed.: Jürgen Beyerer, 81–811, Fraunhofer Verlag
Birnstill, P.; Burkert, C.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Ed.: Jürgen Beyerer, 81–811, Fraunhofer Verlag
A user study on anonymization techniques for smart video surveillance
Birnstill, P.; Ren, D.; Beyerer, J.
2015. 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS 2015) : Karlsruhe, Germany, 25 - 28 August 2015 : [including workshop papers], 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2015.7301805
Birnstill, P.; Ren, D.; Beyerer, J.
2015. 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS 2015) : Karlsruhe, Germany, 25 - 28 August 2015 : [including workshop papers], 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2015.7301805
SECURUS : A Provably Secure Database Outsourcing Scheme
Nilges, T.; Köhler, J.
2015. Security Research Conference : 10th Future Security, Proceedings, Berlin, Germany, 15th - 17th September 2015. Ed.: J. Beyerer, 57–67, Fraunhofer Verlag
Nilges, T.; Köhler, J.
2015. Security Research Conference : 10th Future Security, Proceedings, Berlin, Germany, 15th - 17th September 2015. Ed.: J. Beyerer, 57–67, Fraunhofer Verlag
Zur Architektonik des europäischen und deutschen Datenschutzes im Zeitalter von Vorratsdatenspeicherung, Big Data und IT-Enhancement im Lichte der Google-Spain-Entscheidung des Europäischen Gerichtshofs
Spiecker genannt Döhmann, I.
2015. Datenschutz im digitalen Zeitalter - global, europäisch, national, Vortragsveranstaltung des Instituts für Rundfunkrecht an der Universität zu Köln vom 16. Mai 2014., 61–91, Verlag C.H.Beck
Spiecker genannt Döhmann, I.
2015. Datenschutz im digitalen Zeitalter - global, europäisch, national, Vortragsveranstaltung des Instituts für Rundfunkrecht an der Universität zu Köln vom 16. Mai 2014., 61–91, Verlag C.H.Beck
Evaluation der Kryptografiebibliothek NaCl im Kontext drahtloser Sensornetze
Jung, M.; Hergenröder, A.; Männle, K.
2015. 14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme (FGSN), Erlangen, 23.-24. September 2015. Hrsg.: J. Eckert, 37–40, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)
Jung, M.; Hergenröder, A.; Männle, K.
2015. 14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme (FGSN), Erlangen, 23.-24. September 2015. Hrsg.: J. Eckert, 37–40, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)
A Usability Evaluation of Interactive Theorem Provers Using Focus Groups
Beckert, B.; Grebing, S.; Böhl, F.
2015. International Conference on Software Engineering and Formal Methods : SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS - Workshop on Human-Oriented Formal Methods (HOFM), Grenoble, France, September 1-2, 2014. Ed.: C. Canal, 3–19, Springer-Verlag. doi:10.1007/978-3-319-15201-1_1
Beckert, B.; Grebing, S.; Böhl, F.
2015. International Conference on Software Engineering and Formal Methods : SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS - Workshop on Human-Oriented Formal Methods (HOFM), Grenoble, France, September 1-2, 2014. Ed.: C. Canal, 3–19, Springer-Verlag. doi:10.1007/978-3-319-15201-1_1
Security of electricity supply in 2030
Raskob, W.; Bertsch, V.; Ruppert, M.; Strittmatter, M.; Happe, L.; Broadnax, B.; Wandler, S.; Deines, E.
2015. Critical Infrastructure Protection and Resilience Europe, Den Haag, Netherlands, 4th - 5th March 2015
Raskob, W.; Bertsch, V.; Ruppert, M.; Strittmatter, M.; Happe, L.; Broadnax, B.; Wandler, S.; Deines, E.
2015. Critical Infrastructure Protection and Resilience Europe, Den Haag, Netherlands, 4th - 5th March 2015
Informed Schema Design for Column Store-based Database Services
Bermbach, D.; Müller, S.; Eberhardt, J.; Tai, S.
2015. 8th IEEE International Conference on Service Oriented Computing & Applications (SOCA), Rome, Italy, 19-21 October, 2015, 163–172, IEEE Computer Society. doi:10.1109/SOCA.2015.29
Bermbach, D.; Müller, S.; Eberhardt, J.; Tai, S.
2015. 8th IEEE International Conference on Service Oriented Computing & Applications (SOCA), Rome, Italy, 19-21 October, 2015, 163–172, IEEE Computer Society. doi:10.1109/SOCA.2015.29
Sybil-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties
Florian, M.; Walter, J.; Baumgart, I.
2015. ACM 14th Workshop on Privacy in the Electronic Society, WPES 2015; Denver; United States; 12 October 2015, 65–74, Association for Computing Machinery (ACM). doi:10.1145/2808138.2808145
Florian, M.; Walter, J.; Baumgart, I.
2015. ACM 14th Workshop on Privacy in the Electronic Society, WPES 2015; Denver; United States; 12 October 2015, 65–74, Association for Computing Machinery (ACM). doi:10.1145/2808138.2808145
OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous Networks
Jung, M.; Hergenröder, A.
2015. Q2SWinet ’15 Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Cancun, Mexico; 2 November 2015 through 6 November 2015, 75–82, Association for Computing Machinery (ACM). doi:10.1145/2815317.2815331
Jung, M.; Hergenröder, A.
2015. Q2SWinet ’15 Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Cancun, Mexico; 2 November 2015 through 6 November 2015, 75–82, Association for Computing Machinery (ACM). doi:10.1145/2815317.2815331
Regression Verification for Java Using a Secure Information Flow Calculus
Beckert, B.; Klebanov, V.; Ulbrich, M.
2015. Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP ’15) , Prague, Czech Republic, July 7th, 2015, Art.Nr.: a6, Association for Computing Machinery (ACM). doi:10.1145/2786536.2786544
Beckert, B.; Klebanov, V.; Ulbrich, M.
2015. Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP ’15) , Prague, Czech Republic, July 7th, 2015, Art.Nr.: a6, Association for Computing Machinery (ACM). doi:10.1145/2786536.2786544
Change-Driven Consistency for Component Code, Architectural Models, and Contracts
Kramer, M. E.; Langhammer, M.; Messinger, D.; Seifermann, S.; Burger, E.
2015. Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE’15), Montreal, QC, Canada, May 04 - 08, 2015, 21–26, Association for Computing Machinery (ACM). doi:10.1145/2737166.2737177
Kramer, M. E.; Langhammer, M.; Messinger, D.; Seifermann, S.; Burger, E.
2015. Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE’15), Montreal, QC, Canada, May 04 - 08, 2015, 21–26, Association for Computing Machinery (ACM). doi:10.1145/2737166.2737177
JoDroid: Adding Android Support to a Static Information Flow Control Tool
Mohr, M.; Graf, J.; Hecker, M.
2015. Software Engineering Workshops 2015 - Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, Dresden, 17.-18. März 2015. Beiträge zur 8. Arbeitstagung Programmiersprachen (ATPS 2015). Hrsg.: W. Zimmermann, 140–145, RWTH Aachen
Mohr, M.; Graf, J.; Hecker, M.
2015. Software Engineering Workshops 2015 - Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, Dresden, 17.-18. März 2015. Beiträge zur 8. Arbeitstagung Programmiersprachen (ATPS 2015). Hrsg.: W. Zimmermann, 140–145, RWTH Aachen
SHRIFT System-Wide HybRid Information Flow Tracking
Lovat, E.; Fromm, A.; Mohr, M.; Pretschner, A.
2015. ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. Proceedings. Ed.: H. Federrath, 371–385, Springer. doi:10.1007/978-3-319-18467-8_25
Lovat, E.; Fromm, A.; Mohr, M.; Pretschner, A.
2015. ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. Proceedings. Ed.: H. Federrath, 371–385, Springer. doi:10.1007/978-3-319-18467-8_25
A Hybrid Approach for Proving Noninterference of Java Programs
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Kirsten, M.; Mohr, M.
2015. 28th IEEE Computer Security Foundations Symposium, 13 Jul - 17 Jul 2015, Verona, Italy. Ed.: P. Kellenberger, 305–319, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2015.28
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Kirsten, M.; Mohr, M.
2015. 28th IEEE Computer Security Foundations Symposium, 13 Jul - 17 Jul 2015, Verona, Italy. Ed.: P. Kellenberger, 305–319, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2015.28
Towards Privacy in Monitored Shared Environments
Bao, K.; Bräuchle, T.; Schmeck, H.
2015. 10th Future Security, Security Research Conference, September 15 - 17, 2015, Berlin. Ed.: J. Beyerer, 469–472, Fraunhofer Verlag
Bao, K.; Bräuchle, T.; Schmeck, H.
2015. 10th Future Security, Security Research Conference, September 15 - 17, 2015, Berlin. Ed.: J. Beyerer, 469–472, Fraunhofer Verlag
A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2015. 1st IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), 15th May 2015, Ottawa, Canada. Ed.: R. Badonnel, 1327–1332, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INM.2015.7140490
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2015. 1st IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), 15th May 2015, Ottawa, Canada. Ed.: R. Badonnel, 1327–1332, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INM.2015.7140490
Information and Communication Technology in Energy Lab 2.0
Hagenmeyer, V.; Çakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Mikut, R.
2015. Energy, Science and Technology 2015. The energy conference for scientists and researchers. Book of Abstracts, EST, Energy Science Technology, International Conference & Exhibition, 20-22 May 2015, Karlsruhe, Germany, 57, Karlsruher Institut für Technologie (KIT)
Hagenmeyer, V.; Çakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Mikut, R.
2015. Energy, Science and Technology 2015. The energy conference for scientists and researchers. Book of Abstracts, EST, Energy Science Technology, International Conference & Exhibition, 20-22 May 2015, Karlsruhe, Germany, 57, Karlsruher Institut für Technologie (KIT)
Index Optimization for L-Diversified Database-as-a-Service
Köhler, J.; Hartenstein, H.
2015. 9th International Workshop on Data Privacy Management, DPM 2014, 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014 and 3rd International Workshop on Quantitative Aspects in Security Assurance, QASA 2014 held in conjunction with 19th Annual European Research Event in Computer Security Symposium, ESORICS 2014; Wroclaw; Poland; 10 September 2014 through 11 September 2014. Ed.: J. Posegga, 114–132, Springer. doi:10.1007/978-3-319-17016-9_8
Köhler, J.; Hartenstein, H.
2015. 9th International Workshop on Data Privacy Management, DPM 2014, 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014 and 3rd International Workshop on Quantitative Aspects in Security Assurance, QASA 2014 held in conjunction with 19th Annual European Research Event in Computer Security Symposium, ESORICS 2014; Wroclaw; Poland; 10 September 2014 through 11 September 2014. Ed.: J. Posegga, 114–132, Springer. doi:10.1007/978-3-319-17016-9_8
Bücher
Certification of ICTs in Elections
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreno, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreno, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance
Zeitschriftenaufsätze
Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. Journal of Internet Technology and Secured Transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0048
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. Journal of Internet Technology and Secured Transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0048
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
Tonicelli, R.; Nascimento, A. C. A.; Dowsley, R.; Müller-Quade, J.; Imai, H.; Hanaoka, G.; Otsuka, A.
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8
Tonicelli, R.; Nascimento, A. C. A.; Dowsley, R.; Müller-Quade, J.; Imai, H.; Hanaoka, G.; Otsuka, A.
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8
Daten verschlüsselt speichern und verarbeiten in der Cloud
Müller-Quade, J.; Huber, M.; Nilges, T.
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Müller-Quade, J.; Huber, M.; Nilges, T.
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Intelligente Videoüberwachung in Kranken- und Pflegeeinrichtungen von morgen: eine Analyse der Bedingungen nach den Entwürfen der EU-Kommission und des EU-Parlaments für eine DS-GVO
Bretthauer, S.; Krempel, E.; Birnstill, P.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 31, 239–245. doi:10.9785/cr-2015-0406
Bretthauer, S.; Krempel, E.; Birnstill, P.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 31, 239–245. doi:10.9785/cr-2015-0406
A new framework for information markets - The ECJ Google Spain decision
Spiecker gen. Döhmann, I.
2015. Common market law review, 52 (4), 1033–1057
Spiecker gen. Döhmann, I.
2015. Common market law review, 52 (4), 1033–1057
Intelligente Videoueberwachung in Kranken- und Pflegeeinrichtungen von morgen
Bretthauer, S.; Birnstill, P.; Krempel, E.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 2015 (4), 239–245
Bretthauer, S.; Birnstill, P.; Krempel, E.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 2015 (4), 239–245
EuGH : Videoaufzeichnung öffentlichen Straßenraums mit privater Überwachungskamera
Bretthauer, S.
2015. Computer und Recht, (2), 100–103
Bretthauer, S.
2015. Computer und Recht, (2), 100–103
GNUC: A New Universal Composability Framework
Hofheinz, D.; Shoup, V.
2015. Journal of cryptology, 28 (3), 423–508. doi:10.1007/s00145-013-9160-y
Hofheinz, D.; Shoup, V.
2015. Journal of cryptology, 28 (3), 423–508. doi:10.1007/s00145-013-9160-y
Cryptographic theory meets practice: Efficient and privacy-preserving payments for public transport
Rupp, A.; Baldimtsi, F.; Hinterwaelder, G.; Paar, C.
2015. ACM transactions on information and system security, 17 (3), Art. Nr.: 10. doi:10.1145/2699904
Rupp, A.; Baldimtsi, F.; Hinterwaelder, G.; Paar, C.
2015. ACM transactions on information and system security, 17 (3), Art. Nr.: 10. doi:10.1145/2699904
Privacy-preserving surveillance: an interdisciplinary approach
Birnstill, P.; Bretthauer, S.; Greiner, S.; Krempel, E.
2015. International Data Privacy Law, 5 (4), 298–308. doi:10.1093/idpl/ipv021
Birnstill, P.; Bretthauer, S.; Greiner, S.; Krempel, E.
2015. International Data Privacy Law, 5 (4), 298–308. doi:10.1093/idpl/ipv021
An extensive systematic review on the Model-Driven Development of secure systems
Nguyen, P. H.; Kramer, M.; Klein, J.; Le Traon, Y.
2015. Information & software technology, 68, 62–81. doi:10.1016/j.infsof.2015.08.006
Nguyen, P. H.; Kramer, M.; Klein, J.; Le Traon, Y.
2015. Information & software technology, 68, 62–81. doi:10.1016/j.infsof.2015.08.006
A new algorithm for low-deterministic security
Giffhorn, D.; Snelting, G.
2015. International journal of information security, 14 (3), 263–287. doi:10.1007/s10207-014-0257-6
Giffhorn, D.; Snelting, G.
2015. International journal of information security, 14 (3), 263–287. doi:10.1007/s10207-014-0257-6
Implementation-level Verification of Algorithms with KeY
Bruns, D.; Mostowski, W.; Ulbrich, M.
2015. International journal on software tools for technology transfer, 17 (6), 729–744. doi:10.1007/s10009-013-0293-y
Bruns, D.; Mostowski, W.; Ulbrich, M.
2015. International journal on software tools for technology transfer, 17 (6), 729–744. doi:10.1007/s10009-013-0293-y
Understanding probabilistic software leaks
Snelting, G.
2015. Science of computer programming, 97 (P1), 122–126. doi:10.1016/j.scico.2013.11.008
Snelting, G.
2015. Science of computer programming, 97 (P1), 122–126. doi:10.1016/j.scico.2013.11.008
Confidential database-as-a-service approaches: taxonomy and survey
Köhler, J.; Jünemann, K.; Hartenstein, H.
2015. Journal of Cloud Computing, 4 (1), 1–14. doi:10.1186/s13677-014-0025-1
Köhler, J.; Jünemann, K.; Hartenstein, H.
2015. Journal of Cloud Computing, 4 (1), 1–14. doi:10.1186/s13677-014-0025-1
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
Bellare, M.; Hofheinz, D.; Kiltz, E.
2015. Journal of cryptology, 28 (1), 29–48. doi:10.1007/s00145-013-9167-4
Bellare, M.; Hofheinz, D.; Kiltz, E.
2015. Journal of cryptology, 28 (1), 29–48. doi:10.1007/s00145-013-9167-4
Confined Guessing: New Signatures From Standard Assumptions
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Striecks, C.
2015. Journal of Cryptology, 28 (1), 176–208. doi:10.1007/s00145-014-9183-z
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Striecks, C.
2015. Journal of Cryptology, 28 (1), 176–208. doi:10.1007/s00145-014-9183-z
2014
Buchaufsätze
A holistic framework for the evaluation of internet voting systems
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global. doi:10.4018/978-1-4666-5820-2.ch002
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global. doi:10.4018/978-1-4666-5820-2.ch002
Side Channels in Secure Database Outsourcing on the Example of the MimoSecco Scheme
Huber, M.; Hartung, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar, 35–48, Springer. doi:10.1007/978-3-319-12718-7_3
Huber, M.; Hartung, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar, 35–48, Springer. doi:10.1007/978-3-319-12718-7_3
Soziologie der Verfassung – ein Kommentar
Spiecker genannt Döhmann, I.
2014. Soziologie der Verfassung, (Fundamenta Juris Publici). Hrsg.: M. Morlok, 87–120, Mohr Siebeck
Spiecker genannt Döhmann, I.
2014. Soziologie der Verfassung, (Fundamenta Juris Publici). Hrsg.: M. Morlok, 87–120, Mohr Siebeck
Kommentierung zu § 21g, h EnWG
Raabe, O.; Lorenz, M.
2014. Berliner Kommentar zum Energierecht ; Energierecht, Band 1, Halbband 1. Hrsg.: Franz Jürgen Säcker, 1716, Dt. Fachverl
Raabe, O.; Lorenz, M.
2014. Berliner Kommentar zum Energierecht ; Energierecht, Band 1, Halbband 1. Hrsg.: Franz Jürgen Säcker, 1716, Dt. Fachverl
Diplomarbeiten
Formal Verification of Voting Schemes. Diplomarbeit
Kirsten, M.
2014. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000092716
Kirsten, M.
2014. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000092716
Privatheit, Smart-Metering und Sensornetze. Diplomarbeit
Munz, S.
2014. Karlsruher Institut für Technologie (KIT)
Munz, S.
2014. Karlsruher Institut für Technologie (KIT)
Masterarbeiten
Bachelorarbeiten
Entwicklung und Evaluation eines Sicherheitsbegriffs zur Anonymisierung von Videodaten. Bachelorarbeit
Fetzer, V.
2014. Karlsruher Institut für Technologie (KIT)
Fetzer, V.
2014. Karlsruher Institut für Technologie (KIT)
Datenverschlüsselung in Key-Value Stores: Übertragung der Konzepte Client-Side Encryption und Server-Side Encryption von Amazon S3 auf Project Voldemort. Bachelorarbeit
Schlereth, M.
2014. Karlsruher Institut für Technologie (KIT)
Schlereth, M.
2014. Karlsruher Institut für Technologie (KIT)
Implementierung und Evaluierung eines lastverteilenden Routing-Protokolls für energieeffiziente Sensornetze. Bachelorarbeit
Niedermann, M.
2014. Karlsruher Institut für Technologie (KIT)
Niedermann, M.
2014. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
Integrating Run-Time Observations and Design Component Models for Cloud System Analysis
Heinrich, R.; Schmieders, E.; Jung, R.; Rostami, K.; Metzger, A.; Hasselbring, W.; Reussner, R.; Pohl, K.
2014. MRT 2014, Models@run.time 2014 : Proceedings of the 9th Workshop on Models@run.time co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014). Ed.: S. Götz, 41–46, RWTH Aachen
Heinrich, R.; Schmieders, E.; Jung, R.; Rostami, K.; Metzger, A.; Hasselbring, W.; Reussner, R.; Pohl, K.
2014. MRT 2014, Models@run.time 2014 : Proceedings of the 9th Workshop on Models@run.time co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014). Ed.: S. Götz, 41–46, RWTH Aachen
Deriving Work Plans for Solving Performance and Scalability Problems
Heger, C.; Heinrich, R.
2014. Computer Performance Engineering : 11th European Workshop, EPEW 2014, Florence, Italy, September 11-12, 2014, Proceedings. Ed.: A. Horváth, 104–118, Springer International Publishing. doi:10.1007/978-3-319-10885-8_8
Heger, C.; Heinrich, R.
2014. Computer Performance Engineering : 11th European Workshop, EPEW 2014, Florence, Italy, September 11-12, 2014, Proceedings. Ed.: A. Horváth, 104–118, Springer International Publishing. doi:10.1007/978-3-319-10885-8_8
A Method for Aspect-oriented Meta-Model Evolution
Jung, R.; Heinrich, R.; Schmieders, E.; Strittmatter, M.; Hasselbring, W.
2014. VAO ’14 : Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, 19–22, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631681
Jung, R.; Heinrich, R.; Schmieders, E.; Strittmatter, M.; Hasselbring, W.
2014. VAO ’14 : Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, 19–22, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631681
Evolution of the Palladio Component Model: Process and Modeling Methods
Jung, R.; Strittmatter, M.; Merkle, P.; Heinrich, R.
2014. SOSP ’14 : Symposium on Software Performance Joint Descartes/Kieker/Palladio Days 2014, Stuttgart, Germany, November 26–28, 2014, Proceedings. Ed.: S. Becker ; R. Reussner, 13, Universität Stuttgart
Jung, R.; Strittmatter, M.; Merkle, P.; Heinrich, R.
2014. SOSP ’14 : Symposium on Software Performance Joint Descartes/Kieker/Palladio Days 2014, Stuttgart, Germany, November 26–28, 2014, Proceedings. Ed.: S. Becker ; R. Reussner, 13, Universität Stuttgart
Solving the Movie Database Case with QVTo
Gerking, C.; Heinzemann, C.
2014. TTC 2014 - Transformation Tool Contest : Proceedings of the 7th Transformation Tool Contest part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences, York, United Kingdom, July 25, 2014. Ed.: L.M. Rose, 98–102, RWTH Aachen
Gerking, C.; Heinzemann, C.
2014. TTC 2014 - Transformation Tool Contest : Proceedings of the 7th Transformation Tool Contest part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences, York, United Kingdom, July 25, 2014. Ed.: L.M. Rose, 98–102, RWTH Aachen
A tool suite for the model-driven software engineering of cyber-physical systems
Dziwok, S.; Gerking, C.; Becker, S.; Thiele, S.; Heinzemann, C.; Pohlmann, U.
2014. S.-C. Cheung, A. Orso & M.-A. D. Storey (Hrsg.), Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE-22, 715–718, Association for Computing Machinery (ACM). doi:10.1145/2635868.2661665
Dziwok, S.; Gerking, C.; Becker, S.; Thiele, S.; Heinzemann, C.; Pohlmann, U.
2014. S.-C. Cheung, A. Orso & M.-A. D. Storey (Hrsg.), Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE-22, 715–718, Association for Computing Machinery (ACM). doi:10.1145/2635868.2661665
The MechatronicUML method: model-driven software engineering of self-adaptive mechatronic systems
Becker, S.; Dziwok, S.; Gerking, C.; Heinzemann, C.; Schäfer, W.; Meyer, M.; Pohlmann, U.
2014. P. Jalote, L. C. Briand & A. van der Hoek (Hrsg.), 36th International Conference on Software Engineering, ICSE ’14, Companion Proceedings, 614–615, Association for Computing Machinery (ACM). doi:10.1145/2591062.2591142
Becker, S.; Dziwok, S.; Gerking, C.; Heinzemann, C.; Schäfer, W.; Meyer, M.; Pohlmann, U.
2014. P. Jalote, L. C. Briand & A. van der Hoek (Hrsg.), 36th International Conference on Software Engineering, ICSE ’14, Companion Proceedings, 614–615, Association for Computing Machinery (ACM). doi:10.1145/2591062.2591142
Generating Modelica Models from Software Specifications for the Simulation of Cyber-Physical Systems
Pohlmann, U.; Holtmann, J.; Meyer, M.; Gerking, C.
2014. 40th EUROMICRO Conference on Software Engineering and Advanced Applications, Verona, Italy, 27-29 Aug. 2014, 191–198, IEEE Computer Society. doi:10.1109/SEAA.2014.18
Pohlmann, U.; Holtmann, J.; Meyer, M.; Gerking, C.
2014. 40th EUROMICRO Conference on Software Engineering and Advanced Applications, Verona, Italy, 27-29 Aug. 2014, 191–198, IEEE Computer Society. doi:10.1109/SEAA.2014.18
The ‘Hedonic’ in Human-Computer Interaction – History, Contributions, and Future Research Directions
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, Association for Computing Machinery (ACM). doi:10.1145/2598510.2598549
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, Association for Computing Machinery (ACM). doi:10.1145/2598510.2598549
Unterstützung für ein risikobewusstes Verhalten im Internet
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität
Authentication Schemes - Comparison and Effective Password Spaces
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer. doi:10.1007/978-3-319-13841-1_12
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001142
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001140
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001140
Pretty Understandable Democracy 2.0
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
What Deters Jane from Preventing Identification and Tracking on the Web?
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, Association for Computing Machinery (ACM). doi:10.1145/2665943.2665963
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, Association for Computing Machinery (ACM). doi:10.1145/2665943.2665963
NoPhish: An Anti-Phishing Education App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing
Shake hands to bedevil: Securing email with wearable technology
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag
Coercion-Resistant Internet Voting in Practice
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik (GI)
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik (GI)
Why doesn’t Jane protect her privacy?
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer. doi:10.1007/978-3-319-08506-7_13
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer. doi:10.1007/978-3-319-08506-7_13
A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2014.35
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik (GI)
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik (GI)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer. doi:10.1007/978-3-319-10178-1_20
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer. doi:10.1007/978-3-319-10178-1_20
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik (GI)
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik (GI)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität
Building castles in quicksand: blueprint for a crowdsourced study
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, Association for Computing Machinery (ACM). doi:10.1145/2559206.2578861
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, Association for Computing Machinery (ACM). doi:10.1145/2559206.2578861
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society. doi:10.14722/usec.2014.23037
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society. doi:10.14722/usec.2014.23037
ACCESS: Describing and Contrasting Authentication Mechanisms
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer. doi:10.1007/978-3-319-07620-1_17
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer. doi:10.1007/978-3-319-07620-1_35
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer. doi:10.1007/978-3-319-07620-1_35
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer. doi:10.1007/978-3-319-07620-1_16
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer. doi:10.1007/978-3-319-07620-1_16
An Agency Perspective to Cloud Computing
Pallas, F.
2014. GECON 2014 : 11th International Conference on Economics of Grids, Clouds, Systems, and Services (Revised Selected Papers), Cardiff, UK, 16-18 September 2014. Ed.: J. Altmann, 36–51, Springer International Publishing. doi:10.1007/978-3-319-14609-6_3
Pallas, F.
2014. GECON 2014 : 11th International Conference on Economics of Grids, Clouds, Systems, and Services (Revised Selected Papers), Cardiff, UK, 16-18 September 2014. Ed.: J. Altmann, 36–51, Springer International Publishing. doi:10.1007/978-3-319-14609-6_3
Establishing location-privacy in decentralized long-distance geocast services
Florian, M.; Pieper, F.; Baumgart, I.
2014. 2014 IEEE Vehicular Networking Conference (VNC), Paderborn, Germany, 3–5 December 2014. Ed.: B. Scheuermann, 151–158, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/VNC.2014.7013334
Florian, M.; Pieper, F.; Baumgart, I.
2014. 2014 IEEE Vehicular Networking Conference (VNC), Paderborn, Germany, 3–5 December 2014. Ed.: B. Scheuermann, 151–158, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/VNC.2014.7013334
The European Approach towards Data Protection in a Global World of Data Transfer
Spiecker genannt Döhmann, I.
2014. Privacy in the Internet Age: Proceedings of the 8th Privacy Discussion Forum, 46–70
Spiecker genannt Döhmann, I.
2014. Privacy in the Internet Age: Proceedings of the 8th Privacy Discussion Forum, 46–70
„Offlinetags – A Novel Privacy Approach to Online Photo Sharing“
Pallas, F.; Ulbricht, M.-R.; Jaume-Palasí L.; Höppner U.
2014. CHI EA 2014, CHI EA ’14: CHI ’14, Toronto, ON, Canada, 26.4. - 1.5. 2014, Extended Abstracts on Human Factors in Computing Systems, Work-in-Progress, 2179–2184, Association for Computing Machinery (ACM). doi:10.1145/2559206.2581195
Pallas, F.; Ulbricht, M.-R.; Jaume-Palasí L.; Höppner U.
2014. CHI EA 2014, CHI EA ’14: CHI ’14, Toronto, ON, Canada, 26.4. - 1.5. 2014, Extended Abstracts on Human Factors in Computing Systems, Work-in-Progress, 2179–2184, Association for Computing Machinery (ACM). doi:10.1145/2559206.2581195
Extending and Applying a Framework for the Cryptographic Verification of Java Programs
Küsters, R.; Scapin, E.; Truderung, T.; Graf, J.
2014. Principles of Security and Trust, POST 2014, Part of ETAPS 2014, Grenoble, France, April 5-13, 2014, 220–239, Springer-Verlag. doi:10.1007/978-3-642-54792-8_12
Küsters, R.; Scapin, E.; Truderung, T.; Graf, J.
2014. Principles of Security and Trust, POST 2014, Part of ETAPS 2014, Grenoble, France, April 5-13, 2014, 220–239, Springer-Verlag. doi:10.1007/978-3-642-54792-8_12
Big Data und der Grundsatz der Zweckbindung
Kring, M.
2014. Informatik 2014, Big Data – Komplexität meistern, 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, 22. – 26. September 2014. Hrsg.: E. Plödereder, 1–12
Kring, M.
2014. Informatik 2014, Big Data – Komplexität meistern, 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, 22. – 26. September 2014. Hrsg.: E. Plödereder, 1–12
Proposal for a Multi-View Modelling Case Study: Component-Based Software Engineering with UML, Plug-ins, and Java
Kramer, M. E.; Langhammer, M.
2014. Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, VAO ’14, York, United Kingdom, 22 July 2014, 7:7–7:10, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631676
Kramer, M. E.; Langhammer, M.
2014. Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, VAO ’14, York, United Kingdom, 22 July 2014, 7:7–7:10, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631676
Poster Abstract: Secure Metering Communication in the Energy Smart Home Lab
Hergenröder, A.; Bao, K.; Bräuchle, T.
2014. Poster and Demo Session of the 11th European Conference on Wireless Sensor Networks (EWSN), Oxford, U.K., 17 - 19 Februar 2014. Ed.: A. Cerpa, 32–33, EWSN
Hergenröder, A.; Bao, K.; Bräuchle, T.
2014. Poster and Demo Session of the 11th European Conference on Wireless Sensor Networks (EWSN), Oxford, U.K., 17 - 19 Februar 2014. Ed.: A. Cerpa, 32–33, EWSN
Secure Database Outsourcing to the Cloud using the MimoSecco Middleware
Gabel, M.; Hübsch, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar. Part III, 187–202, Springer-Verlag. doi:10.1007/978-3-319-12718-7_12
Gabel, M.; Hübsch, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar. Part III, 187–202, Springer-Verlag. doi:10.1007/978-3-319-12718-7_12
SMART-ER: peer-based privacy for smart metering
Finster, S.; Baumgart, I.
2014. IEEE Conference on Computer Communications workshops (INFOCOM WKSHPS 2014) - INFOCOM Workshop on Communications and Control for Smart Energy Systems - Toronto, ON, Canada, 27 April-2 May 2014, 652–657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2014.6849308
Finster, S.; Baumgart, I.
2014. IEEE Conference on Computer Communications workshops (INFOCOM WKSHPS 2014) - INFOCOM Workshop on Communications and Control for Smart Energy Systems - Toronto, ON, Canada, 27 April-2 May 2014, 652–657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2014.6849308
Videomonitoring zur Sturzdetektion und Alarmierung – Eine technische und rechtliche Analyse
Bretthauer, S.; Krempel, E.
2014. Transparenz IRIS 2014 : Tagungsband des 17. Internationalen Rechtsinformatik Symposions, Salzburg, 20. - 22. Februar 2014. Hrsg.: E. Schweighofer, 525–534, Österreichische Computer-Ges
Bretthauer, S.; Krempel, E.
2014. Transparenz IRIS 2014 : Tagungsband des 17. Internationalen Rechtsinformatik Symposions, Salzburg, 20. - 22. Februar 2014. Hrsg.: E. Schweighofer, 525–534, Österreichische Computer-Ges
Energiemanagementsysteme der Zukunft : Anforderungen an eine datenschutzkonforme Verbrauchsvisualisierung
Bräuchle, T.
2014. Big Data & Co : Neue Herausforderungen für das Informationsrecht - 15. Herbstakademie 2014 / DSRI, Deutsche Stiftung für Recht und Informatik; 10-13 September 2014, Mainz. Hrsg.: J. Taeger, 455–469, Oldenburger Verl. für Wirtschaft
Bräuchle, T.
2014. Big Data & Co : Neue Herausforderungen für das Informationsrecht - 15. Herbstakademie 2014 / DSRI, Deutsche Stiftung für Recht und Informatik; 10-13 September 2014, Mainz. Hrsg.: J. Taeger, 455–469, Oldenburger Verl. für Wirtschaft
Die datenschutzrechtliche Einwilligung in Smart Metering Systemen : Kollisionslagen zwischen Datenschutz- und Energiewirtschaftsrecht = The legal data protection consent in Smart Metering Systems : Situations involving conflicts between data protection act and energy industry legislation
Bräuchle, T.
2014. Informatik 2014 : Big Data - Komplexität meistern : 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26. September 2014. Hrsg.: E. Plödereder, 515–526, Köllen Druck+Verlag
Bräuchle, T.
2014. Informatik 2014 : Big Data - Komplexität meistern : 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26. September 2014. Hrsg.: E. Plödereder, 515–526, Köllen Druck+Verlag
Enhancing Privacy by Design From a Developer’s Perspective
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2014. Privacy technologies and policy : revised selected papers - First Annual Privacy Forum (APF), Limassol, Cyprus, October 10 - 11, 2012. Ed.: B. Preneel, 73–85, Springer-Verlag
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2014. Privacy technologies and policy : revised selected papers - First Annual Privacy Forum (APF), Limassol, Cyprus, October 10 - 11, 2012. Ed.: B. Preneel, 73–85, Springer-Verlag
Lessons Learned From Microkernel Verification
Beckert, B.; Bormer, T.
2014. International Workshop on Automated Verification of Critical Systems (AVoCS), Bamberg, Germany, Sep 18 - 20, 2012. Eds.: G. Lüttgen, Elsevier
Beckert, B.; Bormer, T.
2014. International Workshop on Automated Verification of Critical Systems (AVoCS), Bamberg, Germany, Sep 18 - 20, 2012. Eds.: G. Lüttgen, Elsevier
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
Böhl, F.; Greiner, S.; Scheidecker, P.
2014. 13th International Conference on Cryptology and Network Security (CANS) - Heraklion, Crete, Greece, October 22-24, 2014. Ed.: D. Gritzalis, 175–190, Springer-Verlag
Böhl, F.; Greiner, S.; Scheidecker, P.
2014. 13th International Conference on Cryptology and Network Security (CANS) - Heraklion, Crete, Greece, October 22-24, 2014. Ed.: D. Gritzalis, 175–190, Springer-Verlag
Automating Regression Verification
Felsing, D.; Grebing, S.; Klebanov, V.; Rümmer, P.; Ulbrich, M.
2014. ASE ’14 : proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering : September 15-19, 2014, Västerås, Sweden, 349–359, Association for Computing Machinery (ACM). doi:10.1145/2642937.2642987
Felsing, D.; Grebing, S.; Klebanov, V.; Rümmer, P.; Ulbrich, M.
2014. ASE ’14 : proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering : September 15-19, 2014, Västerås, Sweden, 349–359, Association for Computing Machinery (ACM). doi:10.1145/2642937.2642987
Benchmarking the Performance Impact of Transport Layer Security in Cloud Database Systems
Müller, S.; Bermbach, D.; Tai, S.; Pallas, F.
2014. 2nd IEEE International Conference on Cloud Engineering, IC2E 2014; Boston; United States; 10 March 2014 through 14 March 2014, 27–36, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IC2E.2014.48
Müller, S.; Bermbach, D.; Tai, S.; Pallas, F.
2014. 2nd IEEE International Conference on Cloud Engineering, IC2E 2014; Boston; United States; 10 March 2014 through 14 March 2014, 27–36, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IC2E.2014.48
Gesellschaftliche Relevanz der Informatik als Strukturtechnologie
Keller, H. B.
2014. Chancen und Risiken der Wagnisgesellschaft : Dokumentation der Veranstaltung am 15.Oktober 2014 in der Bundesanstalt für Materialforschung und -prüfung (BAM), 16–39, FORUM46 - Interdisziplinäres Forum für Europa e.V
Keller, H. B.
2014. Chancen und Risiken der Wagnisgesellschaft : Dokumentation der Veranstaltung am 15.Oktober 2014 in der Bundesanstalt für Materialforschung und -prüfung (BAM), 16–39, FORUM46 - Interdisziplinäres Forum für Europa e.V
Automated Modeling of I/O Performance and Interference Effects in Virtualized Storage Systems
Noorshams, Q.; Busch, A.; Rentschler, A.; Bruhn, D.; Kounev, S.; Tuma, P.; Reussner, R.
2014. IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW’14), Madrid, Spain, June 30 - July 3, 2014, 88–93, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW.2014.26
Noorshams, Q.; Busch, A.; Rentschler, A.; Bruhn, D.; Kounev, S.; Tuma, P.; Reussner, R.
2014. IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW’14), Madrid, Spain, June 30 - July 3, 2014, 88–93, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW.2014.26
JKelloy: A Proof Assistant for Relational Specifications of Java Programs
El Ghazi, A. A.; Ulbrich, M.; Gladisch, C.; Tyszberowicz, S.; Taghdiri, M.
2014. NASA Formal Methods - 6th International Symposium (NFM’14), Houston, Texas/USA, April 29 - May 1, 2014. Ed.: J. M. Badger, 173–187, Springer US. doi:10.1007/978-3-319-06200-6_13
El Ghazi, A. A.; Ulbrich, M.; Gladisch, C.; Tyszberowicz, S.; Taghdiri, M.
2014. NASA Formal Methods - 6th International Symposium (NFM’14), Houston, Texas/USA, April 29 - May 1, 2014. Ed.: J. M. Badger, 173–187, Springer US. doi:10.1007/978-3-319-06200-6_13
Standard versus Selective Opening Security: Separation and Equivalence Results
Hofheinz, D.; Rupp, A.
2014. Theory of Cryptography - 11th Theory of Cryptography Conference (TCC’14), San Diego, California/USA, February 24-26, 2014. Ed.: Y. Lindell, 591–615, Springer-Verlag. doi:10.1007/978-3-642-54242-8_25
Hofheinz, D.; Rupp, A.
2014. Theory of Cryptography - 11th Theory of Cryptography Conference (TCC’14), San Diego, California/USA, February 24-26, 2014. Ed.: Y. Lindell, 591–615, Springer-Verlag. doi:10.1007/978-3-642-54242-8_25
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
Hofheinz, D.; Striecks, C.
2014. Topics in Cryptology - The Cryptographer’s Track at the RSA Conference (CT-RSA’14), San Francisco, California/USA, February 25-28, 2014. Ed.: J. Benaloh, 48–63, Springer US. doi:10.1007/978-3-319-04852-9_3
Hofheinz, D.; Striecks, C.
2014. Topics in Cryptology - The Cryptographer’s Track at the RSA Conference (CT-RSA’14), San Francisco, California/USA, February 25-28, 2014. Ed.: J. Benaloh, 48–63, Springer US. doi:10.1007/978-3-319-04852-9_3
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
Böhl, F.; Davies, G. T.; Hofheinz, D.
2014. Public-Key Cryptography - 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC’14), Buenos Aires, Argentina, March 26-28, 2014. Ed.: H. Krawczyk, 483–500, Springer-Verlag. doi:10.1007/978-3-642-54631-0_28
Böhl, F.; Davies, G. T.; Hofheinz, D.
2014. Public-Key Cryptography - 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC’14), Buenos Aires, Argentina, March 26-28, 2014. Ed.: H. Krawczyk, 483–500, Springer-Verlag. doi:10.1007/978-3-642-54631-0_28
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Herold, G.; Hesse, J.; Hofheinz, D.; Rafols, C.; Rupp, A.
2014. Advances in Cryptology - 34th Annual Cryptology Conference (CRYPTO’14), Santa Barbara, California/USA, August 17-21, 2014. Ed.: J. A. Garay, 261–279, Springer-Verlag. doi:10.1007/978-3-662-44371-2_15
Herold, G.; Hesse, J.; Hofheinz, D.; Rafols, C.; Rupp, A.
2014. Advances in Cryptology - 34th Annual Cryptology Conference (CRYPTO’14), Santa Barbara, California/USA, August 17-21, 2014. Ed.: J. A. Garay, 261–279, Springer-Verlag. doi:10.1007/978-3-662-44371-2_15
Universally Composable Non-Interactive Key Exchange
Freire, E. S. V.; Hesse, J.; Hofheinz, D.
2014. 9th International Conference on Security and Cryptography for Networks, SCN 2014; Amalfi; Italy; 3 September 2014 through 5 September 2014. Ed.: M. Abdalla, 1–20, Springer US. doi:10.1007/978-3-319-10879-7_1
Freire, E. S. V.; Hesse, J.; Hofheinz, D.
2014. 9th International Conference on Security and Cryptography for Networks, SCN 2014; Amalfi; Italy; 3 September 2014 through 5 September 2014. Ed.: M. Abdalla, 1–20, Springer US. doi:10.1007/978-3-319-10879-7_1
Reasoning About Vote Counting Schemes Using Light-weight and Heavy-weight Methods
Beckert, B.; Bormer, T.; Gore, R.; Kirsten, M.; Meumann, T.
2014. 8th International Verification Workshop (VERIFY´14), Wien, Österreich, July 23-24, 2014
Beckert, B.; Bormer, T.; Gore, R.; Kirsten, M.; Meumann, T.
2014. 8th International Verification Workshop (VERIFY´14), Wien, Österreich, July 23-24, 2014
TAM-VS: A Technology Acceptance Model for Video Surveillance
Krempel, E.; Beyerer, J.
2014. Privacy Technologies and Policy - 2nd Annual Privacy Forum (APF’14), Athens, Greece, May 20-21, 2014. Ed.: B. Preneel, 86–100, Springer US. doi:10.1007/978-3-319-06749-0_6
Krempel, E.; Beyerer, J.
2014. Privacy Technologies and Policy - 2nd Annual Privacy Forum (APF’14), Athens, Greece, May 20-21, 2014. Ed.: B. Preneel, 86–100, Springer US. doi:10.1007/978-3-319-06749-0_6
Privacy-aware smart video surveillance revisited
Fischer, Y.; Krempel, E.; Birnstill, P.; Unmüßig, G.; Monari, E.; Moßgraber, J.; Schenk, M.; Beyerer, J.
2014. 9th Security Research Conference ’Future Security’, Berlin, September 16-18, 2014. Ed.: K. Thoma, 91–99, Fraunhofer Verlag
Fischer, Y.; Krempel, E.; Birnstill, P.; Unmüßig, G.; Monari, E.; Moßgraber, J.; Schenk, M.; Beyerer, J.
2014. 9th Security Research Conference ’Future Security’, Berlin, September 16-18, 2014. Ed.: K. Thoma, 91–99, Fraunhofer Verlag
Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions
Köhler, J.; Jünemann, K.
2014. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013. [Konferenz]. Ed.: M. Hansen, 139–149, Springer-Verlag
Köhler, J.; Jünemann, K.
2014. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013. [Konferenz]. Ed.: M. Hansen, 139–149, Springer-Verlag
Zeitschriftenaufsätze
Berichte aus der Usability/UX Branche: Ausbildungswege, Arbeitsfeld und aktuelle Diskussionen
Kolb, N.; Diefenbach, S.; Ullrich, D.
2014. i-com, 13 (1), 82–87. doi:10.1515/icom-2014-0011
Kolb, N.; Diefenbach, S.; Ullrich, D.
2014. i-com, 13 (1), 82–87. doi:10.1515/icom-2014-0011
Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen
Henning, M.; Budurushi, J.; Volkamer, M.
2014. Multimedia und Recht, 154–158
Henning, M.; Budurushi, J.; Volkamer, M.
2014. Multimedia und Recht, 154–158
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
A specious unlinking strategy
Friedl, S.; Nagel, M.; Powell, M.
2014. Periodica mathematica Hungarica, 69 (2), 207–210. doi:10.1007/s109980140063y
Friedl, S.; Nagel, M.; Powell, M.
2014. Periodica mathematica Hungarica, 69 (2), 207–210. doi:10.1007/s109980140063y
Überschussdaten in Retinabildern : Ein Beitrag zum datenschutzfreundlichen Entwurf biometrischer Systeme
Friedewald, M.; Wawrzyniak, S.; Pallas, F.
2014. Datenschutz und Datensicherheit - DuD, 2014 (7)
Friedewald, M.; Wawrzyniak, S.; Pallas, F.
2014. Datenschutz und Datensicherheit - DuD, 2014 (7)
Die Datenschutzgrundverordnung zwischen Technikneutralität und Technikbezug – Konkurrierende Leitbilder für den europäischen Rechtsrahmen
Sydow, G.; Kring, M.
2014. Zeitschrift für Datenschutz, 4 (6), 271–276
Sydow, G.; Kring, M.
2014. Zeitschrift für Datenschutz, 4 (6), 271–276
Steuerung im Datenschutzrecht: Ein Recht auf Vergessen wider Vollzugsdefizite und Typisierung
Spiecker genannt Döhmann, I.
2014. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 97 (1), 28–43. doi:10.5771/2193-7869-2014-1-28
Spiecker genannt Döhmann, I.
2014. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 97 (1), 28–43. doi:10.5771/2193-7869-2014-1-28
Editorial: Big Brother unter der Motorhaube
Spiecker genannt Döhmann, I.
2014. Neue juristische Wochenschrift, 10, 1 S
Spiecker genannt Döhmann, I.
2014. Neue juristische Wochenschrift, 10, 1 S
Big Data intelligent genutzt: Rechtskonforme Videoüberwachung im öffentlichen Raum
Spiecker gen. Döhmann, I.
2014. Kommunikation & Recht, 17, 549–555
Spiecker gen. Döhmann, I.
2014. Kommunikation & Recht, 17, 549–555
Anmerkung zu EuGH Rs. C-293/12 und C-594/12 – Vorratsdatenspeicherung
Spiecker genannt Döhmann, I.
2014. Juristenzeitung, 69, 1109–1113
Spiecker genannt Döhmann, I.
2014. Juristenzeitung, 69, 1109–1113
Ich sehe ‘was, was Du nicht siehst - Rechtliche Probleme intelligenter Videoüberwachung
Spiecker genannt Döhmann, I.
2014. DGRI-Jahrbuch, 147–163
Spiecker genannt Döhmann, I.
2014. DGRI-Jahrbuch, 147–163
Plug-and-Charge and E-Roaming–Capabilities of the ISO/IEC 15118 for the E-Mobility Scenario
Mültin, M.; Schmeck, H.
2014. Automatisierungstechnik, 62 (4), 241–248. doi:10.1515/auto-2014-0002
Mültin, M.; Schmeck, H.
2014. Automatisierungstechnik, 62 (4), 241–248. doi:10.1515/auto-2014-0002
Precise Quantitative Information Flow Analysis – A Symbolic Approach
Klebanov, V.
2014. Theoretical computer science, 538 (C), 124–139. doi:10.1016/j.tcs.2014.04.022
Klebanov, V.
2014. Theoretical computer science, 538 (C), 124–139. doi:10.1016/j.tcs.2014.04.022
Tagungsbericht DGRI Jahrestagung 2013
Haase, S.; Kring, M.; Pieper, F.
2014. Kommunikation & Recht, 2, 5
Haase, S.; Kring, M.; Pieper, F.
2014. Kommunikation & Recht, 2, 5
Energy Informatics - Current and Future Research Directions
Goebel, C.; Jacobsen, H.-A.; Razo, V. del; Doblander, C.; Rivera, J.; Ilg, J.; Flath, C.; Schmeck, H.; Weinhardt, C.; Pathmaperuma, D.; Appelrath, H.-J.; Sonnenschein, M.; Lehnhoff, S.; Kramer, O.; Staake, T.; Fleisch, E.; Neumann, D.; Strüker, J.; Erek, K.; Zarnekow, R.; Ziekow, H.; Lässig, J.
2014. Business & information systems engineering, 6 (1), 25–31. doi:10.1007/s12599-013-0304-2
Goebel, C.; Jacobsen, H.-A.; Razo, V. del; Doblander, C.; Rivera, J.; Ilg, J.; Flath, C.; Schmeck, H.; Weinhardt, C.; Pathmaperuma, D.; Appelrath, H.-J.; Sonnenschein, M.; Lehnhoff, S.; Kramer, O.; Staake, T.; Fleisch, E.; Neumann, D.; Strüker, J.; Erek, K.; Zarnekow, R.; Ziekow, H.; Lässig, J.
2014. Business & information systems engineering, 6 (1), 25–31. doi:10.1007/s12599-013-0304-2
Die Menschenwürde im Fernsehen – Zur Problematik der Definition und des Verzichts in Konsenssituationen
Chinnow, D.
2014. Deutsches Verwaltungsblatt, 2, 74–78
Chinnow, D.
2014. Deutsches Verwaltungsblatt, 2, 74–78
Die Zukunft des europäischen Datenschutzes nach der Europawahl
Bretthauer, S.; Kring, M.
2014. Deutsches Verwaltungsblatt, 2014 (15), 977–978
Bretthauer, S.; Kring, M.
2014. Deutsches Verwaltungsblatt, 2014 (15), 977–978
A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks
Horneber, J.; Hergenröder, A.
2014. IEEE communications surveys & tutorials, 16 (4), 1820–1838. doi:10.1109/COMST.2014.2320051
Horneber, J.; Hergenröder, A.
2014. IEEE communications surveys & tutorials, 16 (4), 1820–1838. doi:10.1109/COMST.2014.2320051
Privacy-Preserving Cooperative Route Planning
Florian, M.; Finster, S.; Baumgart, I.
2014. IEEE Internet of Things Journal, 1 (6), 590–599. doi:10.1109/JIOT.2014.2361016
Florian, M.; Finster, S.; Baumgart, I.
2014. IEEE Internet of Things Journal, 1 (6), 590–599. doi:10.1109/JIOT.2014.2361016
Checking probabilistic noninterference using JOANA
Snelting, G.; Giffhorn, D.; Graf, J.; Hammer, C.; Hecker, M.; Mohr, M.; Wasserab, D.
2014. Information technology, 56 (6), 280–287. doi:10.1515/itit-2014-1051
Snelting, G.; Giffhorn, D.; Graf, J.; Hammer, C.; Hecker, M.; Mohr, M.; Wasserab, D.
2014. Information technology, 56 (6), 280–287. doi:10.1515/itit-2014-1051
Reasoning and Verification: State of the Art and Current Trends
Beckert, B.; Hahnle, R.
2014. IEEE intelligent systems & their applications, 29 (1), 20–29. doi:10.1109/MIS.2014.3
Beckert, B.; Hahnle, R.
2014. IEEE intelligent systems & their applications, 29 (1), 20–29. doi:10.1109/MIS.2014.3
How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers
Beckert, B.; Grebing, S.; Böhl, F.
2014. Electronic proceedings in theoretical computer science, 167, 4–13. doi:10.4204/EPTCS.167.3
Beckert, B.; Grebing, S.; Böhl, F.
2014. Electronic proceedings in theoretical computer science, 167, 4–13. doi:10.4204/EPTCS.167.3
Verifying voting schemes
Beckert, B.; Gore, R.; Schürmann, C.; Bormer, T.; Wang, J.
2014. Journal of information security and applications, 19 (2), 115–129. doi:10.1016/j.jisa.2014.04.005
Beckert, B.; Gore, R.; Schürmann, C.; Bormer, T.; Wang, J.
2014. Journal of information security and applications, 19 (2), 115–129. doi:10.1016/j.jisa.2014.04.005
Optimization of data life cycles
Jung, C.; Gasthuber, M.; Giesler, A.; Hardt, M.; Meyer, J.; Rigoll, F.; Schwarz, K.; Stotzka, R.; Streit, A.
2014. Journal of physics / Conference Series, 513 (TRACK 3), Art. Nr.: 032047. doi:10.1088/1742-6596/513/3/032047
Jung, C.; Gasthuber, M.; Giesler, A.; Hardt, M.; Meyer, J.; Rigoll, F.; Schwarz, K.; Stotzka, R.; Streit, A.
2014. Journal of physics / Conference Series, 513 (TRACK 3), Art. Nr.: 032047. doi:10.1088/1742-6596/513/3/032047
SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service
Köhler, J.; Jünemann, K.; Hartenstein, H.
2014. Praxis der Informationsverarbeitung und Kommunikation, 37 (2), 149–155. doi:10.1515/pik-2014-0011
Köhler, J.; Jünemann, K.; Hartenstein, H.
2014. Praxis der Informationsverarbeitung und Kommunikation, 37 (2), 149–155. doi:10.1515/pik-2014-0011
2013
Buchaufsätze
Mental Models: General Introduction and Review of Their Application to Human-Centred Security
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer-Verlag. doi:10.1007/978-3-642-42001-6_18
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer-Verlag. doi:10.1007/978-3-642-42001-6_18
Towards A Practical JCJ / Civitas Implementation
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference. doi:10.4018/978-1-4666-3640-8.ch011
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference. doi:10.4018/978-1-4666-3640-8.ch011
The Difference between Online and Offline Communication as a Factor in the Balancing of Interests with Freedom of Speech
Döhmann, I. S. genannt
2013. Free Speech in the Internet Era. Ed.: C. Walker, 91–106, Carolina Academic Press
Döhmann, I. S. genannt
2013. Free Speech in the Internet Era. Ed.: C. Walker, 91–106, Carolina Academic Press
Kommentierung von §§ 1, 46, 63, 64 KrWAbfG
Spiecker genannt Döhmann, I.
2013. GK-KrWG : Gemeinschaftskommentar zum Kreislaufwirtschaftsgesetz (KrWG) sowie zur Verpackungsverordnung (VerpackV), zur Altfahrzeugverordnung (AltfahrzeugV), zum Elektro- und Elektronikgesetz (ElektroG), zum Batteriegesetz (BattG), Bioabfallverordnung (BioAbfV), zur Abfallverzeichnisverordnung (AVV) und zur EU-Abfallverbringungsverordnung (VVA). Hrsg. Arndt Schmehl, Carl Heymanns Verlag GmbH
Spiecker genannt Döhmann, I.
2013. GK-KrWG : Gemeinschaftskommentar zum Kreislaufwirtschaftsgesetz (KrWG) sowie zur Verpackungsverordnung (VerpackV), zur Altfahrzeugverordnung (AltfahrzeugV), zum Elektro- und Elektronikgesetz (ElektroG), zum Batteriegesetz (BattG), Bioabfallverordnung (BioAbfV), zur Abfallverzeichnisverordnung (AVV) und zur EU-Abfallverbringungsverordnung (VVA). Hrsg. Arndt Schmehl, Carl Heymanns Verlag GmbH
Die Online-Durchsuchung als Instrument der Sicherheitsgewährleistung
Spiecker genannt Döhmann, I.
2013. Verfassungsstaatlichkeit im Wandel, Festschrift für Thomas Würtenberger zum 70. Geburtstag Hrsg.: D. Heckmann, 803–821, Duncker & Humblot
Spiecker genannt Döhmann, I.
2013. Verfassungsstaatlichkeit im Wandel, Festschrift für Thomas Würtenberger zum 70. Geburtstag Hrsg.: D. Heckmann, 803–821, Duncker & Humblot
Datenschutz und Elektromobilität
Raabe, O.; Weis, E.; Pallas, F.; Lorenz, M.
2013. Berliner Handbuch zur Elektromobilität, 297–324, Verlag C.H.Beck
Raabe, O.; Weis, E.; Pallas, F.; Lorenz, M.
2013. Berliner Handbuch zur Elektromobilität, 297–324, Verlag C.H.Beck
Programmiersprachen
Abke, J.; Braun, O.; Brune, P.; Hagel, G.; Keller, H.; Mottok, J.; Niemetz, M.; Pfeiffer, V.
2013. Perfekte Softwareentwicklung : Prozesse, Technologien und Methoden für erfolgreiche Softwareprojekte. Hrsg.: M. Lang, 247–294, Symposion Publishing
Abke, J.; Braun, O.; Brune, P.; Hagel, G.; Keller, H.; Mottok, J.; Niemetz, M.; Pfeiffer, V.
2013. Perfekte Softwareentwicklung : Prozesse, Technologien und Methoden für erfolgreiche Softwareprojekte. Hrsg.: M. Lang, 247–294, Symposion Publishing
Diplomarbeiten
Entwurf einer BSI-Schutzprofil-konformen Smart Meter Gateway Softwarearchitektur. Diplomarbeit
Smirek, L. D.
2013. Karlsruher Institut für Technologie (KIT)
Smirek, L. D.
2013. Karlsruher Institut für Technologie (KIT)
Privacy Risk Assessment & Privacy Impact Assessment: Eine methodische Analyse von Risiken und ihrer Behandlung in der IT. Diplomarbeit
Koch, A.
2013. Karlsruher Institut für Technologie (KIT)
Koch, A.
2013. Karlsruher Institut für Technologie (KIT)
Evaluierung der Energie-effizienz von Schlüsselaustauschprotokollen in Concast-Szenarien. Diplomarbeit
Klock, T.
2013. Karlsruher Institut für Technologie (KIT)
Klock, T.
2013. Karlsruher Institut für Technologie (KIT)
Kommunikation in drahtlosen Sensornetzen - Vergleich zwischen Realität und Simulation. Diplomarbeit
Benisch, S.
2013. Karlsruher Institut für Technologie (KIT)
Benisch, S.
2013. Karlsruher Institut für Technologie (KIT)
Masterarbeiten
Workload Characterization for I/O Performance Analysis on IBM SYSTEM Z. Masterarbeit
Busch, A.
2013. Karlsruher Institut für Technologie (KIT)
Busch, A.
2013. Karlsruher Institut für Technologie (KIT)
Impact of Erasure Coding Algorithms on the Availability of Federated Cloud Storage Systems. Masterarbeit
Wolf, P.
2013. Karlsruher Institut für Technologie (KIT)
Wolf, P.
2013. Karlsruher Institut für Technologie (KIT)
Establishing Location Privacy in Overlay-based Geocast Systems through Location Obfuscation and Location Spoofing Detection. Masterarbeit
Pieper, F.
2013. Karlsruher Institut für Technologie (KIT)
Pieper, F.
2013. Karlsruher Institut für Technologie (KIT)
Bachelorarbeiten
Implementierung und Evaluierung eines Random-Key-Distribution Verfahren in WSNs. Bachelorarbeit
Zickner, V.
2013. Karlsruher Institut für Technologie (KIT)
Zickner, V.
2013. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
On the Prediction of the Mutual Impact of Business Processes and Enterprise Information Systems
Heinrich, R.; Paech, B.
2013. Software Engineering 2013 : Fachtagung des GI-Fachbereichs Softwaretechnik; 26. Februar - 1. März 2013 in Aachen. Ed.: S. Kowalewski, 157–170, Gesellschaft für Informatik (GI)
Heinrich, R.; Paech, B.
2013. Software Engineering 2013 : Fachtagung des GI-Fachbereichs Softwaretechnik; 26. Februar - 1. März 2013 in Aachen. Ed.: S. Kowalewski, 157–170, Gesellschaft für Informatik (GI)
Towards automated software project planning extending palladio for the simulation of software processes
Hummel, O.; Heinrich, R.
2013. KPDAYS 2013 : Symposium on Software Performance: Joint Kieker/Palladio Days 2013 ; Proceedings of the Symposium on Software Performance: Joint Kieker/Palladio Days 2013. Ed.: S. Becker; R. Reussner, 20–29
Hummel, O.; Heinrich, R.
2013. KPDAYS 2013 : Symposium on Software Performance: Joint Kieker/Palladio Days 2013 ; Proceedings of the Symposium on Software Performance: Joint Kieker/Palladio Days 2013. Ed.: S. Becker; R. Reussner, 20–29
Model-driven Instrumentation with Kieker and Palladio to Forecast Dynamic Applications
Jung, R.; Heinrich, R.; Schmieders, E.
2013. Proceedings of the Symposium on Software Performance: Joint Kieker/Palladio Days 2013, Karlsruhe, Germany, November 27-29, 2013. Ed.: S. Becker ; R. Reussner, 99–108, CEUR-WS.org
Jung, R.; Heinrich, R.; Schmieders, E.
2013. Proceedings of the Symposium on Software Performance: Joint Kieker/Palladio Days 2013, Karlsruhe, Germany, November 27-29, 2013. Ed.: S. Becker ; R. Reussner, 99–108, CEUR-WS.org
An Architectural Model for Deploying Critical Infrastructure Services in the Cloud
Schöller, M.; Bless, R.; Pallas, F.; Horneber, J.; Smith, P.
2013. IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), 2013 : 2 - 5 December 2013, Bristol, United Kingdom. Vol. 1, 458–465, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.67
Schöller, M.; Bless, R.; Pallas, F.; Horneber, J.; Smith, P.
2013. IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), 2013 : 2 - 5 December 2013, Bristol, United Kingdom. Vol. 1, 458–465, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.67
Branchenreport UX/Usability 2013
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V
Are Graphical Authentication Mechanisms As Strong As Passwords?
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, Institute of Electrical and Electronics Engineers (IEEE)
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, Institute of Electrical and Electronics Engineers (IEEE)
Modeling the German Legal Latitude Principles
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer-Verlag
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer-Verlag
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEEXplore. doi:10.1109/STAST.2013.12
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEEXplore. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik (GI)
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik (GI)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik (GI)
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik (GI)
Mental Models of Verifiability in Voting
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer-Verlag. doi:10.1007/978-3-642-39185-9_9
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer-Verlag. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer-Verlag. doi:10.1007/978-3-642-39185-9_4
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer-Verlag. doi:10.1007/978-3-642-39185-9_4
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer-Verlag. doi:10.1007/978-3-642-39185-9_11
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer-Verlag. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.27
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer-Verlag. doi:10.1007/978-3-642-39345-7-11
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer-Verlag. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer-Verlag. doi:10.1007/978-3-642-38908-5_16
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer-Verlag. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security
Developing and Testing a Visual Hash Scheme
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft
P4R : Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
Rupp, A.; Hinterwälder, G.; Baldimtsi, F.; Paar, C.
2013. FC 2013 : 17th International Conference on Financial Cryptography and Data Security : Revised Selected Papers, Okinawa, Japan, 1st - 5th April 2013. Ed.: A.-R. Sadeghi, 205–212, Springer-Verlag. doi:10.1007/978364239884117
Rupp, A.; Hinterwälder, G.; Baldimtsi, F.; Paar, C.
2013. FC 2013 : 17th International Conference on Financial Cryptography and Data Security : Revised Selected Papers, Okinawa, Japan, 1st - 5th April 2013. Ed.: A.-R. Sadeghi, 205–212, Springer-Verlag. doi:10.1007/978364239884117
Symbolic Universal Composability
Bohl, F.; Unruh, D.
2013. 2013 IEEE 26th Computer Security Foundations Symposium, CSF 2013; New Orleans, LA; United States; 26 June 2013 through 28 June 2013, 257–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2013.24
Bohl, F.; Unruh, D.
2013. 2013 IEEE 26th Computer Security Foundations Symposium, CSF 2013; New Orleans, LA; United States; 26 June 2013 through 28 June 2013, 257–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2013.24
Die Durchsetzung datenschutzrechtlicher Mindestanforderungen bei Facebook und anderen sozialen Netzwerken
Spiecker genannt Döhmann, I.
2013. Der Schutz der Persönlichkeit im Internet ; [Vorträge, die während des 12. @kit-Kongresses, der zugleich das 2. Forum "Kommunikation & Recht" war und am 21./22. Juni 2012 in Hamburg unter dem Generalthema "Der Schutz der Persönlichkeit im Internet" stattfand, gehalten wurden]. Hrsg.: Stefan Leible, 33–54, Boorberg
Spiecker genannt Döhmann, I.
2013. Der Schutz der Persönlichkeit im Internet ; [Vorträge, die während des 12. @kit-Kongresses, der zugleich das 2. Forum "Kommunikation & Recht" war und am 21./22. Juni 2012 in Hamburg unter dem Generalthema "Der Schutz der Persönlichkeit im Internet" stattfand, gehalten wurden]. Hrsg.: Stefan Leible, 33–54, Boorberg
Systemdienstleistungen und Elektromobilität im Verteilnetz : Rollen und Regulierung
Raabe, O.; Weis, E.; Ullmer, J.
2013. Informatik 2013: Informatik angepasst an Mensch, Organisation und Umwelt, Koblenz, Deutschland, 16. - 20. September 2013, 1485–1499, Köllen Druck+Verlag
Raabe, O.; Weis, E.; Ullmer, J.
2013. Informatik 2013: Informatik angepasst an Mensch, Organisation und Umwelt, Koblenz, Deutschland, 16. - 20. September 2013, 1485–1499, Köllen Druck+Verlag
Privacy Impact Assessment als besondere Form der Technikfolgenabschätzung
Pallas, F.; Rettke, A.
2013. 13. Österreichische Konferenz zur Technikfolgenabschätzung, Wien, 3. Juni 2013
Pallas, F.; Rettke, A.
2013. 13. Österreichische Konferenz zur Technikfolgenabschätzung, Wien, 3. Juni 2013
Modeling Quality Attributes of Cloud-Standby-Systems : A Long-Term Cost and Availability Model
Pallas, F.; Lenk, A.
2013. ESOCC 2013 : Second European Conference on Service-Oriented and Cloud Computing, Málaga, Spain, 1st - 3rd September 2013. Ed.: K.-K. Lau, 49–63, Springer-Verlag. doi:10.1007/978-3-642-40651-5_5
Pallas, F.; Lenk, A.
2013. ESOCC 2013 : Second European Conference on Service-Oriented and Cloud Computing, Málaga, Spain, 1st - 3rd September 2013. Ed.: K.-K. Lau, 49–63, Springer-Verlag. doi:10.1007/978-3-642-40651-5_5
Structural Composition Attacks on Anonymized Data
Nilges, T.; Müller-Quade, J.; Huber, M.
2013. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien, 443–460, Ges. für Informatik
Nilges, T.; Müller-Quade, J.; Huber, M.
2013. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien, 443–460, Ges. für Informatik
A Systematic Review of Model-Driven Security
Nguyen, P. H.; Klein, J.; Kramer, M. E.; Traon, Y. L.
2013. 20th Asia-Pacific Software Engineering Conference (APSEC 2013) : Bangkok, Thailand, 2 - 5 December 2013, [proceedings], 432–441, IEEE Computer Society. doi:10.1109/APSEC.2013.64
Nguyen, P. H.; Klein, J.; Kramer, M. E.; Traon, Y. L.
2013. 20th Asia-Pacific Software Engineering Conference (APSEC 2013) : Bangkok, Thailand, 2 - 5 December 2013, [proceedings], 432–441, IEEE Computer Society. doi:10.1109/APSEC.2013.64
SAT-based Analysis and Quantification of Information Flow in Programs
Klebanov, V.; Manthey, N.; Muise, C.
2013. Quantitative Evaluation of Systems : 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013, Proceedings. Ed.: K. Joshi, 177–192, Springer-Verlag. doi:10.1007/978-3-642-40196-1_16
Klebanov, V.; Manthey, N.; Muise, C.
2013. Quantitative Evaluation of Systems : 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013, Proceedings. Ed.: K. Joshi, 177–192, Springer-Verlag. doi:10.1007/978-3-642-40196-1_16
Defining Privacy Based on Distributions of Privacy Breaches
Huber, M.; Müller-Quade, J.; Nilges, T.
2013. Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Ed.: M. Fischlin, 211–225, Springer-Verlag. doi:10.1007/978-3-642-42001-6_15
Huber, M.; Müller-Quade, J.; Nilges, T.
2013. Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Ed.: M. Fischlin, 211–225, Springer-Verlag. doi:10.1007/978-3-642-42001-6_15
Cumulus4j: A Provably Secure Database Abstraction Layer
Huber, M.; Gabel, M.; Schulze, M.; Bieber, A.
2013. Security engineering and intelligence informatics : proceedings / CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2 - 6, 2013. Ed.: A. Cuzzocrea, 180–193, Springer-Verlag. doi:10.1007/978-3-642-40588-4_13
Huber, M.; Gabel, M.; Schulze, M.; Bieber, A.
2013. Security engineering and intelligence informatics : proceedings / CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2 - 6, 2013. Ed.: A. Cuzzocrea, 180–193, Springer-Verlag. doi:10.1007/978-3-642-40588-4_13
Energy-Efficient Security in Smart Metering Scenarios
Hergenröder, A.; Haas, C.
2013. IEEE 38th Conference on Local Computer Networks (LCN), Sydney, Australia, 21 Oct - 24 Oct 2013, 1–3, Institute of Electrical and Electronics Engineers (IEEE)
Hergenröder, A.; Haas, C.
2013. IEEE 38th Conference on Local Computer Networks (LCN), Sydney, Australia, 21 Oct - 24 Oct 2013, 1–3, Institute of Electrical and Electronics Engineers (IEEE)
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs
Haynberg, R.; Rill, J.; Achenbach, D.; Jörn Müller-Quade
2013. 10th International Conference on Security and Cryptography (SECRYPT), Reykjavík, Iceland, 29 - 31 July, 2013 : [part of ICETE 2013, 10th International Joint Conference on e-Business and Telecommunications]. Ed.: P. Samarati, 403–410, SciTePress
Haynberg, R.; Rill, J.; Achenbach, D.; Jörn Müller-Quade
2013. 10th International Conference on Security and Cryptography (SECRYPT), Reykjavík, Iceland, 29 - 31 July, 2013 : [part of ICETE 2013, 10th International Joint Conference on e-Business and Telecommunications]. Ed.: P. Samarati, 403–410, SciTePress
Using JOANA for Information Flow Control in Java Programs – A Practical Guide
Graf, J.; Hecker, M.; Mohr, M.
2013. Software Engineering 2013 : Workshopband (inkl. Doktorandensymposium) : Fachtagung des GI-Fachbereichs Softwaretechnik , Aachen, 26.02. - 01.03.2013. Hrsg.: S. Wagner, 123–138, Ges. für Informatik
Graf, J.; Hecker, M.; Mohr, M.
2013. Software Engineering 2013 : Workshopband (inkl. Doktorandensymposium) : Fachtagung des GI-Fachbereichs Softwaretechnik , Aachen, 26.02. - 01.03.2013. Hrsg.: S. Wagner, 123–138, Ges. für Informatik
On the Detectability of Weak DoS Attacks in Wireless Sensor Networks
Dudek, D.
2013. Data Privacy Management and Autonomous Spontaneous Security : 7th International Workshop (DPM 2012) and 5th International Workshop (SETOP 2012) : Revised Selected Papers, Pisa, Italy, 13th - 14th September 2012. Ed.: R. Di Pietro, 243–257, Springer-Verlag. doi:10.1007/978-3-642-35890-6_18
Dudek, D.
2013. Data Privacy Management and Autonomous Spontaneous Security : 7th International Workshop (DPM 2012) and 5th International Workshop (SETOP 2012) : Revised Selected Papers, Pisa, Italy, 13th - 14th September 2012. Ed.: R. Di Pietro, 243–257, Springer-Verlag. doi:10.1007/978-3-642-35890-6_18
Datensicherheit in intelligenten Infrastrukturen
Bretthauer, S.; Bräuchle, T.
2013. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, 2104–2118, Ges. für Informatik
Bretthauer, S.; Bräuchle, T.
2013. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, 2104–2118, Ges. für Informatik
Enforcing privacy through usage-controlled video surveillance
Birnstill, P.; Pretschner, A.
2013. 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) : Krakow, Poland ; 27 - 30 Aug. 2013, 318–323, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2013.6636659
Birnstill, P.; Pretschner, A.
2013. 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) : Krakow, Poland ; 27 - 30 Aug. 2013, 318–323, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2013.6636659
Usage-controlled Video Surveillance – Revealing its Potentials for Privacy
Birnstill, P.
2013. 8th future security : Security Research Conference, Berlin, September 17 - 19, 2013. Ed.: M. Lauster, 502–503, Fraunhofer Verlag
Birnstill, P.
2013. 8th future security : Security Research Conference, Berlin, September 17 - 19, 2013. Ed.: M. Lauster, 502–503, Fraunhofer Verlag
How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective
Bier, C.
2013. 4th International Workshop on Data Usage Management (DUMA) ; co-located with the IEEE Symposium on Security and Privacy (SP) - San Francisco, Calif., USA; 23 May 2013, 13–17, Institute of Electrical and Electronics Engineers (IEEE)
Bier, C.
2013. 4th International Workshop on Data Usage Management (DUMA) ; co-located with the IEEE Symposium on Security and Privacy (SP) - San Francisco, Calif., USA; 23 May 2013, 13–17, Institute of Electrical and Electronics Engineers (IEEE)
Analysing Vote Counting Algorithms Via Logic. And its Application to the CADE Election System
Beckert, B.; Goré, R.; Schürmann, C.
2013. Proceedings, 24th International Conference on Automated Deduction (CADE), Lake Placid, NY, USA Hrsg.: Maria Paola Bonacina, 135–144, Springer-Verlag. doi:10.1007/978-3-642-38574-2_9
Beckert, B.; Goré, R.; Schürmann, C.
2013. Proceedings, 24th International Conference on Automated Deduction (CADE), Lake Placid, NY, USA Hrsg.: Maria Paola Bonacina, 135–144, Springer-Verlag. doi:10.1007/978-3-642-38574-2_9
Non simplificate nubes! Ein rechtlicher Blick hinter die Kulissen informatischer Cloud-Forschung
Balaban, S.; Pallas, F.
2013. Law as a service (LaaS) : Recht im Internet- und Cloud-Zeitalter ; Tagungsband Herbstakademie / DSRI, Deutsche Stiftung für Recht und Informatik ; Oldenburg : 2013.09. Hrsg.: J. Taeger. Bd.: 1, 325–342, Oldenburger Verl. für Wirtschaft
Balaban, S.; Pallas, F.
2013. Law as a service (LaaS) : Recht im Internet- und Cloud-Zeitalter ; Tagungsband Herbstakademie / DSRI, Deutsche Stiftung für Recht und Informatik ; Oldenburg : 2013.09. Hrsg.: J. Taeger. Bd.: 1, 325–342, Oldenburger Verl. für Wirtschaft
Deduction soundness: prove one, get five for free
Böhl, F.; Cortier, V.; Warinschi, B.
2013. CCS ’13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany — November 04 - 08, 2013. Ed.: A.-R. Sadeghi, 1261–1272, Association for Computing Machinery (ACM). doi:10.1145/2508859.2516711
Böhl, F.; Cortier, V.; Warinschi, B.
2013. CCS ’13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany — November 04 - 08, 2013. Ed.: A.-R. Sadeghi, 1261–1272, Association for Computing Machinery (ACM). doi:10.1145/2508859.2516711
Compliance-preserving Cloud Storage Federation based on Data-driven Usage Control
Wüchner, T.; Müller, S.; Fischer, R.
2013. 2013 IEEE Fifth International Conference on Cloud Computing Technology and Science, Bristol, United Kingdom, 2-5 December 2013 (CloudCom 2013). Proceedings, 285–288, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.149
Wüchner, T.; Müller, S.; Fischer, R.
2013. 2013 IEEE Fifth International Conference on Cloud Computing Technology and Science, Bristol, United Kingdom, 2-5 December 2013 (CloudCom 2013). Proceedings, 285–288, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.149
Web technologies and privacy policies for the Smart Grid
Speiser, S.; Wagner, A.; Raabe, O.; Harth, A.
2013. IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society : Austria Center Vienna, Vienna, Austria, 10 - 14 November, 2013. Proceedings, 4809–4814, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2013.6699913
Speiser, S.; Wagner, A.; Raabe, O.; Harth, A.
2013. IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society : Austria Center Vienna, Vienna, Austria, 10 - 14 November, 2013. Proceedings, 4809–4814, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2013.6699913
Smart Grid-Ready Communication Protocols And Services For A Customer-Friendly Electromobility Experience
Mültin, M.; Gitte, C.; Schmeck, H.
2013. Informatik 2013 : 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz. [Konferenz]. Hrsg.: M. Horbach, 1470–1484, Gesellschaft für Informatik (GI)
Mültin, M.; Gitte, C.; Schmeck, H.
2013. Informatik 2013 : 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz. [Konferenz]. Hrsg.: M. Horbach, 1470–1484, Gesellschaft für Informatik (GI)
Eine Bestandsaufnahme von Standardisierungspotentialen und -lücken im Cloud Computing
Fischer, R.; Janiesch, C.; Strach, J.; Bieber, N.; Zink, W.; Tai, S.
2013. Proceedings of the 11th International Conference on Wirtschaftsinformatik (WI2013), Feb 27 - Mar 01 2013 University Leipzig, Germany. Vol. 2. Hrsg. R. Alt, 1359–1373, Merkur
Fischer, R.; Janiesch, C.; Strach, J.; Bieber, N.; Zink, W.; Tai, S.
2013. Proceedings of the 11th International Conference on Wirtschaftsinformatik (WI2013), Feb 27 - Mar 01 2013 University Leipzig, Germany. Vol. 2. Hrsg. R. Alt, 1359–1373, Merkur
On the Specification and Verification of Voting Schemes
Beckert, B.; Gore, R.; Schürmann, C.
2013. E-Voting and Identify - 4th International Conference, Guildford, United Kingdom, July 17-19, 2013 - Proceedings. Ed.: J. Heather, 25–40, Springer-Verlag. doi:10.1007/978-3-642-39185-9_2
Beckert, B.; Gore, R.; Schürmann, C.
2013. E-Voting and Identify - 4th International Conference, Guildford, United Kingdom, July 17-19, 2013 - Proceedings. Ed.: J. Heather, 25–40, Springer-Verlag. doi:10.1007/978-3-642-39185-9_2
Demo: Overdrive - An overlay-based geocast service for smart traffic applications
Florian, M.; Andreev, S.; Baumgart, I.
2013. 19th Annual International Conference on Mobile Computing & Networking (MobiCom’13), Miami, Florida/USA, September 30 - October 4, 2013, 147–150, Association for Computing Machinery (ACM). doi:10.1145/2500423.2505297
Florian, M.; Andreev, S.; Baumgart, I.
2013. 19th Annual International Conference on Mobile Computing & Networking (MobiCom’13), Miami, Florida/USA, September 30 - October 4, 2013, 147–150, Association for Computing Machinery (ACM). doi:10.1145/2500423.2505297
Evaluating energy-efficiency of hardware-based security mechanisms
Haas, C.; Munz, S.; Wilke, J.; Hergenroder, A.
2013. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’13), San Diego, California/USA, March 18-22, 2013, 560–565, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComW.2013.6529559
Haas, C.; Munz, S.; Wilke, J.; Hergenroder, A.
2013. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’13), San Diego, California/USA, March 18-22, 2013, 560–565, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComW.2013.6529559
Overdrive an overlay-based geocast service for smart traffic applications
Heep, B.; Florian, M.; Volz, J.; Baumgart, I.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578313
Heep, B.; Florian, M.; Volz, J.; Baumgart, I.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578313
Energy-efficiency of concast communication in Wireless Sensor Networks
Wilke, J.; Haas, C.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 34–38, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578318
Wilke, J.; Haas, C.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 34–38, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578318
Elderberry: A peer-to-peer, privacy-aware smart metering protocol
Finster, S.; Baumgart, I.
2013. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’13), Turin, Italy, April 14-19, 2013, 37–42, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2013.6562905
Finster, S.; Baumgart, I.
2013. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’13), Turin, Italy, April 14-19, 2013, 37–42, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2013.6562905
Pseudonymous Smart Metering without a Trusted Third Party
Finster, S.; Baumgart, I.
2013. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13), Melbourne, Australia, July 16-18, 2013, 1723–1728, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom.2013.234
Finster, S.; Baumgart, I.
2013. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13), Melbourne, Australia, July 16-18, 2013, 1723–1728, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom.2013.234
Smart Meter Speed Dating, short-term relationships for improved privacy in Smart Metering
Finster, S.
2013. IEEE International Conference on Smart Grid Communications (SmartGridComm’13), Vancouver, Canada, October 21-24, 2013, 426–431, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2013.6687995
Finster, S.
2013. IEEE International Conference on Smart Grid Communications (SmartGridComm’13), Vancouver, Canada, October 21-24, 2013, 426–431, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2013.6687995
Evaluating the Energy-Efficiency of the Rich Uncle Key Exchange Protocol in WSNs
Haas, C.; Wilke, J.; Knittel, F.
2013. 38th Annual IEEE Conference on Local Computer Networks, LCN 2013; Sydney, NSW; Australia; 21 October 2013 through 24 October 2013, 336–339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN.2013.6761263
Haas, C.; Wilke, J.; Knittel, F.
2013. 38th Annual IEEE Conference on Local Computer Networks, LCN 2013; Sydney, NSW; Australia; 21 October 2013 through 24 October 2013, 336–339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN.2013.6761263
Privacy in Overlay-based Smart Traffic Systems
Florian, M.; Baumgart, I.
2013. IEEE Workshop on Privacy and Anonymity for the Digital Economy (PADE’13), Sydney, Australia, October 24, 2013, 912–917, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCNW.2013.6758531
Florian, M.; Baumgart, I.
2013. IEEE Workshop on Privacy and Anonymity for the Digital Economy (PADE’13), Sydney, Australia, October 24, 2013, 912–917, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCNW.2013.6758531
Reuse and configuration for code generating architectural refinement transformations
Langhammer, M.; Lehrig, S.; Kramer, M. E.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 6, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489866
Langhammer, M.; Lehrig, S.; Kramer, M. E.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 6, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489866
View-centric engineering with synchronized heterogeneous models
Kramer, M. E.; Burger, E.; Langhammer, M.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 5, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489864
Kramer, M. E.; Burger, E.; Langhammer, M.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 5, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489864
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Token
Döttling, N.; Mie, T.; Müller-Quade, J.; Nilges, T.
2013. Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Ed.: A. Sahai, 642–661, Springer-Verlag. doi:10.1007/978-3-642-36594-2_36
Döttling, N.; Mie, T.; Müller-Quade, J.; Nilges, T.
2013. Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Ed.: A. Sahai, 642–661, Springer-Verlag. doi:10.1007/978-3-642-36594-2_36
Lossy Codes and a New Variant of the Learning-With-Errors Problem
Döttling, N.; Müller-Quade, J.
2013. Advances in cryptology : proceedings, EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26 - 30, 2013. Ed.: Th. Johansson, 18–34, Springer-Verlag. doi:10.1007/978-3-642-38348-9_2
Döttling, N.; Müller-Quade, J.
2013. Advances in cryptology : proceedings, EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26 - 30, 2013. Ed.: Th. Johansson, 18–34, Springer-Verlag. doi:10.1007/978-3-642-38348-9_2
Non-Interactive Key Exchange
Freire, E. S. V.; Hofheinz, D.; Kiltz, E.; Paterson, K. G.
2013. Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013 - Proceedings. Ed.: K. Kurosawa, 254–271, Springer-Verlag. doi:10.1007/978-3-642-36362-7_17
Freire, E. S. V.; Hofheinz, D.; Kiltz, E.; Paterson, K. G.
2013. Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013 - Proceedings. Ed.: K. Kurosawa, 254–271, Springer-Verlag. doi:10.1007/978-3-642-36362-7_17
Practical Signatures from Standard Assumptions
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Seo, J. H.; Striecks, C.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 461–485, Springer-Verlag. doi:10.1007/978-3-642-38348-9_28
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Seo, J. H.; Striecks, C.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 461–485, Springer-Verlag. doi:10.1007/978-3-642-38348-9_28
Circular Chosen-Ciphertext Security with Compact Ciphertexts
Hofheinz, D.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 520–536, Springer-Verlag. doi:10.1007/978-3-642-38348-9_31
Hofheinz, D.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 520–536, Springer-Verlag. doi:10.1007/978-3-642-38348-9_31
Programable Hash Functions in the Multilinear Setting
Freire, E. S. V.; Hofheinz, D.; Paterson, K. G.; Striecks, C.
2013. Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, California/USA, August 18-22, 2013 - Proceedings Part I. Ed.: R. Canetti, 513–530, Springer-Verlag. doi:10.1007/978-3-642-40041-4_28
Freire, E. S. V.; Hofheinz, D.; Paterson, K. G.; Striecks, C.
2013. Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, California/USA, August 18-22, 2013 - Proceedings Part I. Ed.: R. Canetti, 513–530, Springer-Verlag. doi:10.1007/978-3-642-40041-4_28
Privacy Preserving Surveillance and the Tracking-Paradox
Greiner, S.; Birnstill, P.; Krempel, E.; Beckert, B.; Beyerer, J.
2013. 8th Future Security - Security Research Conference, Berlin, September 17-19, 2013 - Proceedings. Ed.: M. Lauster, 296–302, Fraunhofer Verlag
Greiner, S.; Birnstill, P.; Krempel, E.; Beckert, B.; Beyerer, J.
2013. 8th Future Security - Security Research Conference, Berlin, September 17-19, 2013 - Proceedings. Ed.: M. Lauster, 296–302, Fraunhofer Verlag
Information Flow in Object-Oriented Software
Beckert, B.; Bruns, D.; Klebanov, V.; Scheben, C.; Schmitt, P. H.; Ulbrich, M.
2013. Logic-Based Program Synthesis and Transformation, LOPSTR 2013, Madrid, Spain, September 16-18, 2013 [Konferenz]. Ed.: G. Gupta, 15–32, Universidad
Beckert, B.; Bruns, D.; Klebanov, V.; Scheben, C.; Schmitt, P. H.; Ulbrich, M.
2013. Logic-Based Program Synthesis and Transformation, LOPSTR 2013, Madrid, Spain, September 16-18, 2013 [Konferenz]. Ed.: G. Gupta, 15–32, Universidad
A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Graf, J.; Scheben, C.
2013. Grande Region Security and Reliability Day 2013. April 12, 2013, University of Luxembourg. Ed.: Ch. Hammer, Luxembourg
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Graf, J.; Scheben, C.
2013. Grande Region Security and Reliability Day 2013. April 12, 2013, University of Luxembourg. Ed.: Ch. Hammer, Luxembourg
Dynamic Logic with Trace Semantics
Beckert, B.; Bruns, D.
2013. Automated Deduction - CADE-24 : 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013, Proceedings. Ed.: M.P. Bonacina, 315–329, Springer-Verlag
Beckert, B.; Bruns, D.
2013. Automated Deduction - CADE-24 : 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013, Proceedings. Ed.: M.P. Bonacina, 315–329, Springer-Verlag
Zeitschriftenaufsätze
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Smart Energy Systems
Schmeck, H.
2013. Information technology, 55 (2), 43–44. doi:10.1524/itit.2013.9002
Schmeck, H.
2013. Information technology, 55 (2), 43–44. doi:10.1524/itit.2013.9002
Legal Aspects of Demand Side Management in Germany
Raabe, O.; Ullmer, J.
2013. Information technology, 55 (2), 63–69. doi:10.1524/itit.2013.0008
Raabe, O.; Ullmer, J.
2013. Information technology, 55 (2), 63–69. doi:10.1524/itit.2013.0008
Vom Datenschutz bis zum Eichrecht – Gesetzliche Aspekte des Smart Grid
Raabe, O.
2013. E 21-Magazin, 1, 34 ff
Raabe, O.
2013. E 21-Magazin, 1, 34 ff
Sicherheit, Resilienz und rechtliche Herausforderungen in Bezug auf Cloud Computing und kritische Infrastruktur-IT
Pallas, F.; Tauber, M.; Wagner, C.
2013. Elektrotechnik und Informationstechnik, 130 (12), 33–36
Pallas, F.; Tauber, M.; Wagner, C.
2013. Elektrotechnik und Informationstechnik, 130 (12), 33–36
Belieferung von Informationsdienstleistern mit dokumentarisch aufbereiteten Entscheidungen durch Gerichte des Bundes [zugleich Besprechung der Entscheidung des VGH Baden-Württemberg vom 07.05.2013, Az.: 10 S 281/12]
Bretthauer, S.
2013. Recht, Bibliothek, Dokumentation, 43 (3), 185–198
Bretthauer, S.
2013. Recht, Bibliothek, Dokumentation, 43 (3), 185–198
Informationszugang im Recht der Europäischen Union
Bretthauer, S.
2013. Die öffentliche Verwaltung, 677–685
Bretthauer, S.
2013. Die öffentliche Verwaltung, 677–685
Haftung und Beweis bei geschachtelt komponierten Cloud-Services
Balaban, S.; Pallas, F.
2013. InTeR, 173 (4), 193–198
Balaban, S.; Pallas, F.
2013. InTeR, 173 (4), 193–198
Cloud Standby System and Quality Model
Lenk, A.; Pallas, F.
2013. Journal of Cloud Computing, 1 (2), 48–59
Lenk, A.; Pallas, F.
2013. Journal of Cloud Computing, 1 (2), 48–59
Technische Sicherheit und Informationssicherheit
Freiling, F.; Grimm, R.; Großpietsch, K. E.; Keller, H. B.; Mottok, J.; Münch, I.; Rannenberg, K.; Saglietti, F.
2013. Informatik-Spektrum, 24, 343–353. doi:10.1007/s00287-013-0748-2
Freiling, F.; Grimm, R.; Großpietsch, K. E.; Keller, H. B.; Mottok, J.; Münch, I.; Rannenberg, K.; Saglietti, F.
2013. Informatik-Spektrum, 24, 343–353. doi:10.1007/s00287-013-0748-2
Polynomial Runtime and Composability
Hofheinz, D.; Unruh, D.; Müller-Quade, J.
2013. Journal of Cryptology, 26 (3), 375–441. doi:10.1007/s00145-012-9127-4
Hofheinz, D.; Unruh, D.; Müller-Quade, J.
2013. Journal of Cryptology, 26 (3), 375–441. doi:10.1007/s00145-012-9127-4
Practical Chosen Ciphertext Secure Encryption from Factoring
Hofheinz, D.; Kiltz, D.; Shoup, V.
2013. Journal of cryptology, 26 (1), 102–118. doi:10.1007/s00145-011-9115-0
Hofheinz, D.; Kiltz, D.; Shoup, V.
2013. Journal of cryptology, 26 (1), 102–118. doi:10.1007/s00145-011-9115-0
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
Jager, T.; Schwenk, J.
2013. Journal of cryptology, 26 (2), 225–245. doi:10.1007/s00145-012-9120-y
Jager, T.; Schwenk, J.
2013. Journal of cryptology, 26 (2), 225–245. doi:10.1007/s00145-012-9120-y
2012
Buchaufsätze
C4PS - Helping Facebookers Manage Their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer-Verlag. doi:10.1007/978-3-642-35386-4_15
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer-Verlag. doi:10.1007/978-3-642-35386-4_15
Staatliche Informationen des Verbrauchers – Risiken und Nebenwirkungen
Spiecker gen. Döhmann, I.
2012. Jahrbuch der Juristischen Studiengesellschaft Bremen, 110–136, Bremen
Spiecker gen. Döhmann, I.
2012. Jahrbuch der Juristischen Studiengesellschaft Bremen, 110–136, Bremen
Rechtliche Begleitung der Technikentwicklung im Bereich moderner Infrastrukturen und Informationstechnologien
Spiecker genannt Döhmann, I.
2012. Die Vermessung des virtuellen Raums. Hrsg.: H. Hill, 137–161, Nomos Verlagsgesellschaft
Spiecker genannt Döhmann, I.
2012. Die Vermessung des virtuellen Raums. Hrsg.: H. Hill, 137–161, Nomos Verlagsgesellschaft
Beyond Gut Level – Some critical remarks on the German Privacy Approach to Smart Metering
Pallas, F.
2012. Computers, Privacy and Data Protection (CPDP). Hrsg.: Serge Gutwirth ..., 313–345, Springer Netherlands. doi:10.1007/978-94-007-5170-5_14
Pallas, F.
2012. Computers, Privacy and Data Protection (CPDP). Hrsg.: Serge Gutwirth ..., 313–345, Springer Netherlands. doi:10.1007/978-94-007-5170-5_14
Dissertationen
Slicing of Concurrent Programs and its Application to Information Flow Control. Dissertation
Giffhorn, D.
2012. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000028814
Giffhorn, D.
2012. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000028814
Diplomarbeiten
Evaluierung der Energieeffizienz des Rich Uncle Protokolls. Diplomarbeit
Knittel, F.
2012. Karlsruher Institut für Technologie (KIT)
Knittel, F.
2012. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
Developing a Process Quality Improvement Questionnaire – A Case Study on Writing Discharge Letters
Heinrich, R.; Paech, B.; Brandner, A.; Kutscha, U.; Bergh, B.
2012. Business Process Management Workshops : BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II. Ed.: F. Daniel, 261–272, Springer-Verlag. doi:10.1007/978-3-642-28115-0_25
Heinrich, R.; Paech, B.; Brandner, A.; Kutscha, U.; Bergh, B.
2012. Business Process Management Workshops : BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II. Ed.: F. Daniel, 261–272, Springer-Verlag. doi:10.1007/978-3-642-28115-0_25
Answering a Request for Proposal – Challenges and Proposed Solutions
Paech, B.; Heinrich, R.; Zorn-Pauli, G.; Jung, A.; Tadjiky, S.
2012. Requirements Engineering: Foundation for Software Quality – 18th International Working Conference, REFSQ 2012, Essen, Germany, March 19-22, 2012. Proceedings. Ed.: B. Regnell, 16–29, Springer-Verlag. doi:10.1007/978-3-642-28714-5_2
Paech, B.; Heinrich, R.; Zorn-Pauli, G.; Jung, A.; Tadjiky, S.
2012. Requirements Engineering: Foundation for Software Quality – 18th International Working Conference, REFSQ 2012, Essen, Germany, March 19-22, 2012. Proceedings. Ed.: B. Regnell, 16–29, Springer-Verlag. doi:10.1007/978-3-642-28714-5_2
Formal Treatment of Distributed Trust in Electronic Voting
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA
Branchenreport Usability 2012
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA
C4PS - Helping Facebookers Manage their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer-Verlag
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer-Verlag
The notary based PKI a lightweight PKI for long-term signatures on documents
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer-Verlag
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer-Verlag
Towards the Systematic Development of Contextualized Security Interventions
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York. doi:10.1145/2463728.2463807
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2012.75
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot
Partial Verifiability in POLYAS for the GI Elections
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik (GI)
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik (GI)
Security versus Trust Indicators in 2011 in Germany
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer-Verlag. doi:10.1007/978-3-642-32747-6_2
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer-Verlag. doi:10.1007/978-3-642-32747-6_2
Introduction
Spiecker gen. Döhmann, I.
2012. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, Gesellschaft für Informatik (GI)
Spiecker gen. Döhmann, I.
2012. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, Gesellschaft für Informatik (GI)
User-centric Protection and Privacy in Smart Surveillance Systems
Vagts, H.; Krempel, E.; Beyerer, J.
2012. 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4 - 6, 2012, 237–248, Springer-Verlag. doi:10.1007/978-3-642-33161-9_36
Vagts, H.; Krempel, E.; Beyerer, J.
2012. 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4 - 6, 2012, 237–248, Springer-Verlag. doi:10.1007/978-3-642-33161-9_36
Privacy-aware access control for video data in intelligent surveillance systems
Vagts, H.; Jakoby, A.
2012. Mobile multimedia/image processing, security, and applications 2012 : 23 - 24 April 2012, Baltimore, Maryland, United States ; [at SPIE Defense, Security + Sensing], SPIE. doi:10.1117/12.920623
Vagts, H.; Jakoby, A.
2012. Mobile multimedia/image processing, security, and applications 2012 : 23 - 24 April 2012, Baltimore, Maryland, United States ; [at SPIE Defense, Security + Sensing], SPIE. doi:10.1117/12.920623
Data Protection and Smart Grid Communication: The European Perspective
Pallas, F.
2012. IEEE PES Innovative Smart Grid Technologies, ISGT 2012, Washington, DC, United States, 16.1. - 20.1.2012, Art. Nr.: 6175695, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175695
Pallas, F.
2012. IEEE PES Innovative Smart Grid Technologies, ISGT 2012, Washington, DC, United States, 16.1. - 20.1.2012, Art. Nr.: 6175695, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175695
Integration of electric vehicles in smart homes - an ICT-based solution for V2G scenarios
Multin, M.; Allerding, F.; Schmeck, H.
2012. IEEE PES innovative smart grid technologies (ISGT 2012) : [conference], Washington, DC, USA, 16 - 20 January 2012, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175624
Multin, M.; Allerding, F.; Schmeck, H.
2012. IEEE PES innovative smart grid technologies (ISGT 2012) : [conference], Washington, DC, USA, 16 - 20 January 2012, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175624
A Framework for the Cryptographic Verification of Java-like Programs
Küsters, R.; Truderung, T.; Graf, J.
2012. IEEE 25th Computer Security Foundations Symposium (CSF), 2012, 198–212, IEEE Computer Society. doi:10.1109/CSF.2012.9
Küsters, R.; Truderung, T.; Graf, J.
2012. IEEE 25th Computer Security Foundations Symposium (CSF), 2012, 198–212, IEEE Computer Society. doi:10.1109/CSF.2012.9
Precise Quantitative Information Flow Analysis Using Symbolic Model Counting
Klebanov, V.
2012. QASA 2012 International Workshop on Quantitative Aspects in Security Assurance Affiliated workshop with ESORICS Pisa, Italy - September 14, 2012. Hrsg.: F. Martinelli
Klebanov, V.
2012. QASA 2012 International Workshop on Quantitative Aspects in Security Assurance Affiliated workshop with ESORICS Pisa, Italy - September 14, 2012. Hrsg.: F. Martinelli
Coercion-Resistant Electronic Elections with Write-In Candidates
Kempka, C.
2012. EVT/WOTE ’12 : 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012, Bellevue, WA, August 6 - 7, Advanced Computing Systems Association (USENIX)
Kempka, C.
2012. EVT/WOTE ’12 : 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012, Bellevue, WA, August 6 - 7, Advanced Computing Systems Association (USENIX)
Evaluating the Energy-Efficiency of Key Exchange Protocols in Wireless Sensor Networks
Haas, C.; Wilke, J.
2012. 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (PM2HW2N) , Paphos, Cyprus — October 21 - 22, 2012, 133–140, Association for Computing Machinery (ACM). doi:10.1145/2387191.2387210
Haas, C.; Wilke, J.
2012. 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (PM2HW2N) , Paphos, Cyprus — October 21 - 22, 2012, 133–140, Association for Computing Machinery (ACM). doi:10.1145/2387191.2387210
Collaborative Detection of Traffic Anomalies Using First Order Markov Chains
Dudek, D.
2012. 2012 Ninth International Conference on Networked Sensing Systems (INSS) - Antwerp, Belgium ; 11 - 14 June 2012, 1–4, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INSS.2012.6240522
Dudek, D.
2012. 2012 Ninth International Conference on Networked Sensing Systems (INSS) - Antwerp, Belgium ; 11 - 14 June 2012, 1–4, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INSS.2012.6240522
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem
Döttling, N.; Müller-Quade, J.; Nascimento, A. C. A.
2012. ASIACRYPT 2012: Advances in Cryptology - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2 - 6, 2012. Ed.: X. Wang, 485–503, Springer-Verlag. doi:10.1007/978-3-642-34961-4_30
Döttling, N.; Müller-Quade, J.; Nascimento, A. C. A.
2012. ASIACRYPT 2012: Advances in Cryptology - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2 - 6, 2012. Ed.: X. Wang, 485–503, Springer-Verlag. doi:10.1007/978-3-642-34961-4_30
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
Bernardo Machado, D.; Anderson, C. A. N.; Müller-Quade, J.
2012. International Conference on Information Theoretic Security (ICITS) : Montreal, QC, Canada, 15-17 August 2012. Ed.: A. Smith, 80–99, Springer-Verlag. doi:10.1007/978-3-642-32284-6_5
Bernardo Machado, D.; Anderson, C. A. N.; Müller-Quade, J.
2012. International Conference on Information Theoretic Security (ICITS) : Montreal, QC, Canada, 15-17 August 2012. Ed.: A. Smith, 80–99, Springer-Verlag. doi:10.1007/978-3-642-32284-6_5
Common Privacy Patterns in Video Surveillance and Smart Energy
Bier, C.; Krempel, E.
2012. 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 3 - 5 Dec. 2012. Ed.: K. Kwack, 610–615, Institute of Electrical and Electronics Engineers (IEEE)
Bier, C.; Krempel, E.
2012. 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 3 - 5 Dec. 2012. Ed.: K. Kwack, 610–615, Institute of Electrical and Electronics Engineers (IEEE)
How is Positive-Sum Privacy Feasible?
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2012. Future Security : 7th Security Research Conference, Bonn, Germany, September 4-6, 2012. Ed.: N. Aschenbruck, 265–268, Springer-Verlag. doi:10.1007/978-3-642-33161-9_39
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2012. Future Security : 7th Security Research Conference, Bonn, Germany, September 4-6, 2012. Ed.: N. Aschenbruck, 265–268, Springer-Verlag. doi:10.1007/978-3-642-33161-9_39
Evaluating the Usability of Interactive Verification Systems
Beckert, B.; Grebing, S.
2012. 1st International Workshop on Comparative Empirical Evaluation of Reasoning Systems (COMPARE), Manchester, UK, June 30, 2012. Ed.: V. Klebanov, 3–17, RWTH Aachen
Beckert, B.; Grebing, S.
2012. 1st International Workshop on Comparative Empirical Evaluation of Reasoning Systems (COMPARE), Manchester, UK, June 30, 2012. Ed.: V. Klebanov, 3–17, RWTH Aachen
Mind the Gap: Formal Verification and the Common Criteria
Beckert, B.; Bruns, D.; Grebing, S.
2012. 6th International Verification Workshop – VERIFY-2010 - What are the verification problems? What are the deduction techniques? Edinburgh, Great Britain, July 20–21, 2010. Hrsg.: M. Aderhold, 4–12, EasyChair
Beckert, B.; Bruns, D.; Grebing, S.
2012. 6th International Verification Workshop – VERIFY-2010 - What are the verification problems? What are the deduction techniques? Edinburgh, Great Britain, July 20–21, 2010. Hrsg.: M. Aderhold, 4–12, EasyChair
Lessons Learned From Microkernel Verification: Specification is the New Bottleneck
Baumann, C.; Beckert, B.; Blasum, H.; Bormer, T.
2012. Seventh Conference on Systems Software Verification (SSV), Sydney, Australia, 28-30 November 2012. Ed.: F. Cassez, 18–32, NICTA
Baumann, C.; Beckert, B.; Blasum, H.; Bormer, T.
2012. Seventh Conference on Systems Software Verification (SSV), Sydney, Australia, 28-30 November 2012. Ed.: F. Cassez, 18–32, NICTA
User interaction interface for Energy Management in Smart Homes
Becker, B.; Kellerer, A.; Schmeck, H.
2012. 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012; Washington, DC; United States; 16 January 2012 through 20 January 2012, Art. Nr.: 6175616, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175616
Becker, B.; Kellerer, A.; Schmeck, H.
2012. 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012; Washington, DC; United States; 16 January 2012 through 20 January 2012, Art. Nr.: 6175616, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175616
Electrical Load Management in Smart Homes Using Evolutionary Algorithms
Allerding, F.; Premm, M.; Shukla, P. K.; Schmeck, H.
2012. Evolutionary Computation in Combinatorial Optimization - 12th European Conference, EvoCOP 2012, Málaga, Spain, April 11-13, 2012 - Proceedings. Ed.: J.-K. Hao, 99–110, Springer-Verlag. doi:10.1007/978-3-642-29124-1_9
Allerding, F.; Premm, M.; Shukla, P. K.; Schmeck, H.
2012. Evolutionary Computation in Combinatorial Optimization - 12th European Conference, EvoCOP 2012, Málaga, Spain, April 11-13, 2012 - Proceedings. Ed.: J.-K. Hao, 99–110, Springer-Verlag. doi:10.1007/978-3-642-29124-1_9
Formal Semantics of Model Fields in Annotation-based Specifications
Beckert, B.; Bruns, D.
2012. KI 2012: advances in artificial intelligence : 35th Annual German Conference on AI, Saarbrücken, Germany, September 24-27, 2012. Ed.: B. Glimm, 13–24, Springer-Verlag
Beckert, B.; Bruns, D.
2012. KI 2012: advances in artificial intelligence : 35th Annual German Conference on AI, Saarbrücken, Germany, September 24-27, 2012. Ed.: B. Glimm, 13–24, Springer-Verlag
On the security of TLS-DHE in the standard model
Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J.
2012. 32nd Annual International Cryptology Conference, CRYPTO 2012; Santa Barbara, CA; United States; 19 August 2012 through 23 August 2012. Ed.: R. Canetti, 273–293, Springer-Verlag. doi:10.1007/978-3-642-32009-5_17
Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J.
2012. 32nd Annual International Cryptology Conference, CRYPTO 2012; Santa Barbara, CA; United States; 19 August 2012 through 23 August 2012. Ed.: R. Canetti, 273–293, Springer-Verlag. doi:10.1007/978-3-642-32009-5_17
Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
Jager, T.; Schinzel, S.; Somorovsky, J.
2012. 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-12, 2012. Ed.: S. Foresti, 752–769, Springer-Verlag. doi:10.1007/978-3-642-33167-1
Jager, T.; Schinzel, S.; Somorovsky, J.
2012. 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-12, 2012. Ed.: S. Foresti, 752–769, Springer-Verlag. doi:10.1007/978-3-642-33167-1
Improving the usability of specification languages and methods for annotation-based verification
Beckert, B.; Bormer, T.; Klebanov, V.
2012. Proceeding FMCO’10 Proceedings of the 9th international conference on Formal Methods for Components and Objects, 61–79, Springer-Verlag. doi:10.1007/978-3-642-25271-6_4
Beckert, B.; Bormer, T.; Klebanov, V.
2012. Proceeding FMCO’10 Proceedings of the 9th international conference on Formal Methods for Components and Objects, 61–79, Springer-Verlag. doi:10.1007/978-3-642-25271-6_4
Integration of Bounded Model Checking and Deductive Verification
Beckert, B.; Bormer, T.; Merz, F.; Sinz, C.
2012. Formal Verification of Object-Oriented Software : international conference; revised selected papers, FoVeOOS 2011, Turin, Italy, October 5 - 7, 2011. Ed.: B. Beckert, 86–104, Springer-Verlag. doi:10.1007/978-3-642-31762-0_7
Beckert, B.; Bormer, T.; Merz, F.; Sinz, C.
2012. Formal Verification of Object-Oriented Software : international conference; revised selected papers, FoVeOOS 2011, Turin, Italy, October 5 - 7, 2011. Ed.: B. Beckert, 86–104, Springer-Verlag. doi:10.1007/978-3-642-31762-0_7
Maintenance and Privacy in Unstructured GeoCast Overlays for Smart Traffic Applications
Heep, B.; Baumgart, I.
2012. Proceedings of the 4th International Conference on Ubiquitous and Future Networks (ICUFN 2012), Phuket, Thailand, Juli 2012, 286–287, IEEE Computer Society. doi:10.1109/ICUFN.2012.6261712
Heep, B.; Baumgart, I.
2012. Proceedings of the 4th International Conference on Ubiquitous and Future Networks (ICUFN 2012), Phuket, Thailand, Juli 2012, 286–287, IEEE Computer Society. doi:10.1109/ICUFN.2012.6261712
Extending the Palladio Component Model using Profiles and Stereotypes
Kramer, M. E.; Durdik, Z.; Hauck, M.; Henss, J.; Küster, M.; Merkle, P.; Rentschler, A.
2012. Palladio Days 2012. Proceedings, 8 - 9 November 2012, Universität Paderborn, Germany. Ed.: S. Becker, 7–15, Karlsruher Institut für Technologie (KIT)
Kramer, M. E.; Durdik, Z.; Hauck, M.; Henss, J.; Küster, M.; Merkle, P.; Rentschler, A.
2012. Palladio Days 2012. Proceedings, 8 - 9 November 2012, Universität Paderborn, Germany. Ed.: S. Becker, 7–15, Karlsruher Institut für Technologie (KIT)
Waters Signatures with Optimal Security Reduction
Hofheinz, D.; Jager, T.; Knapp, E.
2012. Public Key Cryptography -PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography Darmstadt, Germany, May 21-23, 2012. Proceedings. Ed.: M. Fischlin, 66–83, Springer-Verlag. doi:10.1007/978-3-642-30057-8_5
Hofheinz, D.; Jager, T.; Knapp, E.
2012. Public Key Cryptography -PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography Darmstadt, Germany, May 21-23, 2012. Proceedings. Ed.: M. Fischlin, 66–83, Springer-Verlag. doi:10.1007/978-3-642-30057-8_5
All-But-Many Lossy Trapdoor Functions
Hofheinz, D.
2012. Advances in Cryptology -EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Cambridge, UK, April 15-19, 2012. Proceedings. Ed.: D. Pointcheval, 209–227, Springer-Verlag. doi:10.1007/978-3-642-29011-4_14
Hofheinz, D.
2012. Advances in Cryptology -EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Cambridge, UK, April 15-19, 2012. Proceedings. Ed.: D. Pointcheval, 209–227, Springer-Verlag. doi:10.1007/978-3-642-29011-4_14
Tightly Secure Signatures and Public-Key Encryption
Hofheinz, D.; Jager, T.
2012. Advances in Cryptology - CRYPTO 2012 32nd Annual Cryptology Conference Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Ed.: R. Safavi-Naini, 590–607, Springer-Verlag. doi:10.1007/978-3-642-32009-5_35
Hofheinz, D.; Jager, T.
2012. Advances in Cryptology - CRYPTO 2012 32nd Annual Cryptology Conference Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Ed.: R. Safavi-Naini, 590–607, Springer-Verlag. doi:10.1007/978-3-642-32009-5_35
On definitions of selective opening security
Böhl, F.; Hofheinz, D.; Kraschewski, D.
2012. 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012; Darmstadt; Germany; 21 May 2012 through 23 May 2012, 522–539, Springer-Verlag. doi:10.1007/978-3-642-30057-8_31
Böhl, F.; Hofheinz, D.; Kraschewski, D.
2012. 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012; Darmstadt; Germany; 21 May 2012 through 23 May 2012, 522–539, Springer-Verlag. doi:10.1007/978-3-642-30057-8_31
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2012. 6th International Conference on Information Theoretic Security, ICITS 2012 Montreal, QC, Canada, August 15-17, 2012 Proceedings. Ed.: A. Smith, 111–128, Springer-Verlag. doi:10.1007/978-3-642-32284-6_7
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2012. 6th International Conference on Information Theoretic Security, ICITS 2012 Montreal, QC, Canada, August 15-17, 2012 Proceedings. Ed.: A. Smith, 111–128, Springer-Verlag. doi:10.1007/978-3-642-32284-6_7
Bücher
Trust and Trustworthy Computing: 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012, proceedings
Katzenbeisser, S.; Weippl, E.; Camp, J.; Volkamer, M.; Reiter, M.; Zhang, X.
2012. Springer-Verlag. doi:10.1007/978-3-642-30921-2
Katzenbeisser, S.; Weippl, E.; Camp, J.; Volkamer, M.; Reiter, M.; Zhang, X.
2012. Springer-Verlag. doi:10.1007/978-3-642-30921-2
Recht ex machina – Formalisierung des Rechts im Internet der Dienste
Raabe, O.; Wacker, R.; Oberle, D.; Baumann, C.; Funk, C.
2012. Springer-Verlag
Raabe, O.; Wacker, R.; Oberle, D.; Baumann, C.; Funk, C.
2012. Springer-Verlag
Zeitschriftenaufsätze
Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Legal Aspects of Service Robotics
Spiecker genannt Döhmann, I.; Dreier, T.
2012. Poiesis & praxis, 9 (3/4), 201–217. doi:10.1007/s10202-012-0115-4
Spiecker genannt Döhmann, I.; Dreier, T.
2012. Poiesis & praxis, 9 (3/4), 201–217. doi:10.1007/s10202-012-0115-4
Engineering Compliant Services: Advising Developers by Automating Legal Reasoning
Raabe, O.; Oberle, D.; Drefs, F.; Wacker, R.; Baumann, C.
2012. Script-ed, 9 (3), 280–313. doi:10.2966/scrip.090312.280
Raabe, O.; Oberle, D.; Drefs, F.; Wacker, R.; Baumann, C.
2012. Script-ed, 9 (3), 280–313. doi:10.2966/scrip.090312.280
Anmerkung zum Urteil des VG Berlin vom 01.12.2011 (2 K 91.11; JZ 2012, 799) - Zur Eigenschaft als Bundesorgan iSd § 1 Abs. 1 S. 2 IFG, das öffentlich-rechtliche Verwaltungsaufgaben wahrnimmt
Heuner, L.; Küpper, J.
2012. Juristenzeitung, 67 (15-16), 801–805
Heuner, L.; Küpper, J.
2012. Juristenzeitung, 67 (15-16), 801–805
Model generation for quantified formulas with application to test data generation
Gladisch, C. D.
2012. International journal on software tools for technology transfer, 14 (4), 439–459. doi:10.1007/s10009-012-0227-0
Gladisch, C. D.
2012. International journal on software tools for technology transfer, 14 (4), 439–459. doi:10.1007/s10009-012-0227-0
Der Verwaltungsprozess und das erste deutsche Mediationsgesetz - Streit über den Weg der Streitschlichtung
Eisenbarth, M.; Döhmann, I. S. genannt
2012. Deutsches Verwaltungsblatt, 127 (16), 993–999
Eisenbarth, M.; Döhmann, I. S. genannt
2012. Deutsches Verwaltungsblatt, 127 (16), 993–999
Oblivious Transfer Based on the McEliece Assumptions
Dowsley, R.; Graaf, J. van de; Müller-Quade, J.; Nascimento, A. C. A.
2012. IEICE transactions / E / A, E95.A (2), 567–575
Dowsley, R.; Graaf, J. van de; Müller-Quade, J.; Nascimento, A. C. A.
2012. IEICE transactions / E / A, E95.A (2), 567–575
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2012. IACR Cryptology ePrint Archive
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2012. IACR Cryptology ePrint Archive
A CCA2 Secure Variant of the McEliece Cryptosystem
Döttling, N.; Dowsley, R.; Jörn Müller-Quade; Anderson C. A. Nascimento
2012. IEEE transactions on information theory, 58 (10), 6672–6680. doi:10.1109/TIT.2012.2203582
Döttling, N.; Dowsley, R.; Jörn Müller-Quade; Anderson C. A. Nascimento
2012. IEEE transactions on information theory, 58 (10), 6672–6680. doi:10.1109/TIT.2012.2203582
Schutz der Forschungsfreiheit nach dem Informationsfreiheitsgesetz (IFG)
Bretthauer, S.
2012. Neue Zeitschrift für Verwaltungsrecht, 2012 (18), 1144–1148
Bretthauer, S.
2012. Neue Zeitschrift für Verwaltungsrecht, 2012 (18), 1144–1148
Intelligente Videoüberwachung – Schreckensszenario oder Gewinn für den Datenschutz?
Bier, C.; Döhmann, I. S. genannt
2012. Computer und Recht, 28 (9), 610–619. doi:10.9785/ovs-cr-2012-610.
Bier, C.; Döhmann, I. S. genannt
2012. Computer und Recht, 28 (9), 610–619. doi:10.9785/ovs-cr-2012-610.
Eine formale Semantik für die Java Modeling Language
Bruns, D.
2012. Informatik-Spektrum, 35 (1), 45–49. doi:10.1007/s00287-011-0532-0
Bruns, D.
2012. Informatik-Spektrum, 35 (1), 45–49. doi:10.1007/s00287-011-0532-0
2011
Buchaufsätze
Online- und Offline-Nutzung von Daten: Einige Überlegungen zum Umgang mit Informationen im Internetzeitalter
Spiecker genannt Döhmann, I.
2011. Internet – Überholt die Wirklichkeit das Recht? Nürnberg, 07.10. – 09.10.2010, 39–54, Schmidt
Spiecker genannt Döhmann, I.
2011. Internet – Überholt die Wirklichkeit das Recht? Nürnberg, 07.10. – 09.10.2010, 39–54, Schmidt
Teil-Verfassungordnung Datenschutz
Spiecker genannt Döhmann, I.
2011. Der Eigenwert des Verfassungsrechts. Hrsg.: St. Korioth, 278–304, Mohr Siebeck
Spiecker genannt Döhmann, I.
2011. Der Eigenwert des Verfassungsrechts. Hrsg.: St. Korioth, 278–304, Mohr Siebeck
Prozessbezogener Datenschutz im Smart Grid
Raabe, O.
2011. Sicherheit und Datenschutz bei Smart Energy. Hrsg.: H. Thielmann; D. Klumpp; J. Eberspächer, 42 ff, Münchner Kreis
Raabe, O.
2011. Sicherheit und Datenschutz bei Smart Energy. Hrsg.: H. Thielmann; D. Klumpp; J. Eberspächer, 42 ff, Münchner Kreis
Dissertationen
From Formal Semantics to Verified Slicing : A Modular Framework with Applications in Language Based Security. Dissertation
Wasserrab, D.
2011. KIT Scientific Publishing. doi:10.5445/KSP/1000020678
Wasserrab, D.
2011. KIT Scientific Publishing. doi:10.5445/KSP/1000020678
Proceedingsbeiträge
Tool Support for the Comprehensive Modeling of Quality Information within Business Process Models
Heinrich, R.; Kappe, A.; Paech, B.
2011. Enterprise Modelling and Information Systems Architectures : (EMISA 2011) ; Hamburg, Germany, September 22 - 23, 2011. Ed.: M. Nüttgens, 213–218, Gesellschaft für Informatik (GI)
Heinrich, R.; Kappe, A.; Paech, B.
2011. Enterprise Modelling and Information Systems Architectures : (EMISA 2011) ; Hamburg, Germany, September 22 - 23, 2011. Ed.: M. Nüttgens, 213–218, Gesellschaft für Informatik (GI)
Modeling quality information within business process models
Heinrich, R.; Kappe, A.; Paech, B.
2011. Proceedings of the 4th Workshop "Software Quality Modeling and Evaluation" (SQMB 2011) : Tagungsband des 4. Workshops "Software-Qualitätsmodellierung und –bewertung" (SQMB 2011). Ed.: S. Wagner, 4–13
Heinrich, R.; Kappe, A.; Paech, B.
2011. Proceedings of the 4th Workshop "Software Quality Modeling and Evaluation" (SQMB 2011) : Tagungsband des 4. Workshops "Software-Qualitätsmodellierung und –bewertung" (SQMB 2011). Ed.: S. Wagner, 4–13
Feasibility Analysis of Pret a Voter for German Federal Elections
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer-Verlag. doi:10.1007/978-3-642-32747-6_10
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer-Verlag. doi:10.1007/978-3-642-32747-6_10
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045914
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045910
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society. doi:10.1109/ARES.2011.26
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., Advanced Computing Systems Association (USENIX)
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., Advanced Computing Systems Association (USENIX)
User Study of the Improved Helios Voting System Interface
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEEXplore. doi:10.1109/STAST.2011.6059254
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEEXplore. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045915
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, Association for Computing Machinery (ACM). doi:10.1145/2072069.2072071
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, Association for Computing Machinery (ACM). doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität
A Formal Approach Towards Measuring Trust in Distributed Systems
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, Association for Computing Machinery (ACM). doi:10.1145/1982185.1982548
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, Association for Computing Machinery (ACM). doi:10.1145/1982185.1982548
Die Vermessung der Welt als Problem des Datenschutzrechts – zum Umgang mit Geodaten im Internet
Spiecker genannt Döhmann, I.
2011. Perspektiven des deutschen, polnischen und europäischen Informationsrechts : Ergebnisse einer deutsch-polnischen Alexander von Humboldt-Institutspartnerschaft, 91–109, V&R unipress
Spiecker genannt Döhmann, I.
2011. Perspektiven des deutschen, polnischen und europäischen Informationsrechts : Ergebnisse einer deutsch-polnischen Alexander von Humboldt-Institutspartnerschaft, 91–109, V&R unipress
Die Nutzung elektronischer Medien: REACh-Datenbanken, Veröffentlichung von Genehmigungsverfahren im Internet und Geodaten-Vermittlung wie Google Maps
Spiecker genannt Döhmann, I.
2011. Aktuelle Rechtsfragen und Probleme des freien Informationszugangs, insbesondere im Umweltschutz, 26. Trierer Kolloquium zum Umwelt- und Technikrecht vom 5. bis 7. September 2010. Hrsg.: R. Hendler, 155–186, Schmidt
Spiecker genannt Döhmann, I.
2011. Aktuelle Rechtsfragen und Probleme des freien Informationszugangs, insbesondere im Umweltschutz, 26. Trierer Kolloquium zum Umwelt- und Technikrecht vom 5. bis 7. September 2010. Hrsg.: R. Hendler, 155–186, Schmidt
Sicherheit in der Informationstechnik-Verantwortungsteilung zwischen Nutzern, Wirtschaft und Staat
Schallbruch, M.; Micklitz, S.; Kurz, C.; Steels, L.; Broy, M.; Dolev, D.; Weßel, C.; Meyer, K.; Zwingenberger, F.; Donges, M.; others
2011. Informatik 2011: Informatik schafft Communities, Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 4. - 7.10.2011 in Berlin, 39, Ges. für Informatik
Schallbruch, M.; Micklitz, S.; Kurz, C.; Steels, L.; Broy, M.; Dolev, D.; Weßel, C.; Meyer, K.; Zwingenberger, F.; Donges, M.; others
2011. Informatik 2011: Informatik schafft Communities, Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 4. - 7.10.2011 in Berlin, 39, Ges. für Informatik
Verlässliche Software fur kritische Infrastrukturen - Preface
Beckert, B.; Snelting, G.
2011. INFORMATIK 2011 Informatik schafft Communities – Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Berlin, Germany, 4. - 7.10.2011. Ed.: H.-U. Heiß Hrsg.: Hans-Ulrich Heiß; Peter Pepper; Holger Schlingloff; Jörg Schneider, 347, Ges. für Informatik
Beckert, B.; Snelting, G.
2011. INFORMATIK 2011 Informatik schafft Communities – Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Berlin, Germany, 4. - 7.10.2011. Ed.: H.-U. Heiß Hrsg.: Hans-Ulrich Heiß; Peter Pepper; Holger Schlingloff; Jörg Schneider, 347, Ges. für Informatik
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions
Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings, 364–381, Springer-Verlag. doi:10.1007/978-3-642-19571-6_22
Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings, 364–381, Springer-Verlag. doi:10.1007/978-3-642-19571-6_22
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011. Extended full version in the IACR ePrint Archive, 164–181, Springer-Verlag
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011. Extended full version in the IACR ePrint Archive, 164–181, Springer-Verlag
Short Signatures from Weaker Assumptions
Hofheinz, D.; Jager, T.; Kiltz, E.
2011. Advances in Cryptology - ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security Seoul, South Korea, December 4-8, 2011., 647–666, Springer-Verlag. doi:10.1007/978-3-642-25385-0_35
Hofheinz, D.; Jager, T.; Kiltz, E.
2011. Advances in Cryptology - ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security Seoul, South Korea, December 4-8, 2011., 647–666, Springer-Verlag. doi:10.1007/978-3-642-25385-0_35
Efficient Reductions for Non-Signaling Cryptographic Primitives
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 5th International Conference on Information Theoretic Security, ICITS 2011; Amsterdam; Netherlands; 21 May 2011 through 24 May 2011. Ed.: S. Fehr, 120–137, Springer-Verlag. doi:10.1007/978-3-642-20728-0_12
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 5th International Conference on Information Theoretic Security, ICITS 2011; Amsterdam; Netherlands; 21 May 2011 through 24 May 2011. Ed.: S. Fehr, 120–137, Springer-Verlag. doi:10.1007/978-3-642-20728-0_12
The 1st Verified Software Competition: Experience Report
Klebanov, V.; Müller, P.; Shankar, N.; Leavens, G. T.; Wüstholz, V.; Alkassar, E.; Arthan, R.; Bronish, D.; Chapman, R.; Cohen, E.
2011. FM 2011: Formal Methods 17th International Symposium on Formal Methods Limerick, Ireland, June 20-24, 2011 Proceedings. Ed.: M. Butler, 154–168, Springer-Verlag. doi:10.1007/978-3-642-21437-0_14
Klebanov, V.; Müller, P.; Shankar, N.; Leavens, G. T.; Wüstholz, V.; Alkassar, E.; Arthan, R.; Bronish, D.; Chapman, R.; Cohen, E.
2011. FM 2011: Formal Methods 17th International Symposium on Formal Methods Limerick, Ireland, June 20-24, 2011 Proceedings. Ed.: M. Butler, 154–168, Springer-Verlag. doi:10.1007/978-3-642-21437-0_14
Information flow analysis via path condition refinement
Taghdiri, M.; Snelting, G.; Sinz, C.
2011. Formal Aspects of Security and Trust 7th InternationalWorkshop, FAST 2010 Pisa, Italy, September 16-17, 2010. Ed.: P. Degano Revised Selected Papers, 65–79, Springer-Verlag
Taghdiri, M.; Snelting, G.; Sinz, C.
2011. Formal Aspects of Security and Trust 7th InternationalWorkshop, FAST 2010 Pisa, Italy, September 16-17, 2010. Ed.: P. Degano Revised Selected Papers, 65–79, Springer-Verlag
User behavior prediction for energy management in smart homes
Bao, K.; Allerding, F.; Schmeck, H.
2011. Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC’11; Shanghai; China; 26 July 2011 through 28 July 201, 1335–1339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/FSKD.2011.6019758
Bao, K.; Allerding, F.; Schmeck, H.
2011. Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC’11; Shanghai; China; 26 July 2011 through 28 July 201, 1335–1339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/FSKD.2011.6019758
Organic smart Home - Architecture for Energy Management in Intelligent Buildings
Allerding, F.; Schmeck, H.
2011. Workshop Organic Computing as part of ICAC, June 14-18, 2011, Karlsruhe, 67–76, Association for Computing Machinery (ACM). doi:10.1145/1998642.1998654
Allerding, F.; Schmeck, H.
2011. Workshop Organic Computing as part of ICAC, June 14-18, 2011, Karlsruhe, 67–76, Association for Computing Machinery (ACM). doi:10.1145/1998642.1998654
Zeitschriftenaufsätze
From monolithic to component-based performance evaluation of software architectures – A series of experiments analysing accuracy and effort
Martens, A.; Koziolek, H.; Prechelt, L.; Reussner, R.
2011. Empirical Software Engineering, 16 (5), 587–622. doi:10.1007/s10664-010-9142-8
Martens, A.; Koziolek, H.; Prechelt, L.; Reussner, R.
2011. Empirical Software Engineering, 16 (5), 587–622. doi:10.1007/s10664-010-9142-8
Vertrauensbildung bei Internetwahlen
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Gebrauchstaugliche Informationssicherheit
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Gebrauchstaugliche Nutzerauthentifizierung
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Bonsai Trees, or How to Delegate a Lattice Basis
Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C.
2011. Journal of cryptology, 25 (4), 601–639. doi:10.1007/s00145-011-9105-2
Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C.
2011. Journal of cryptology, 25 (4), 601–639. doi:10.1007/s00145-011-9105-2
Die Entscheidung des Bundesverwaltungsgerichts vom 09.06.2010 -– Datei Gewalttäter Sport
Spiecker genannt Döhmann, I.; Kehr, T.
2011. Deutsches Verwaltungsblatt, 15, 930–936
Spiecker genannt Döhmann, I.; Kehr, T.
2011. Deutsches Verwaltungsblatt, 15, 930–936
Kommt das „Volkszählungsurteil“ nun durch den EuGH? – Der Europäische Datenschutz nach Inkrafttreten des Vertrages von Lissabon
Spiecker genannt Döhmann, I.; Eisenbarth, M.
2011. Juristenzeitung, 66 (4), 169–177
Spiecker genannt Döhmann, I.; Eisenbarth, M.
2011. Juristenzeitung, 66 (4), 169–177
Harmonisierung konträrer Kommunikationsmodelle im Datenschutzkonzept des EnWG – Stern trifft Kette
Raabe, O.; Lorenz, M.; Pallas, F.; Weis, E.
2011. Computer und Recht, 27 (12), 831–840. doi:10.9785/ovs-cr-2011-831
Raabe, O.; Lorenz, M.; Pallas, F.; Weis, E.
2011. Computer und Recht, 27 (12), 831–840. doi:10.9785/ovs-cr-2011-831
KASTEL - An Application-Driven Center of Excellence for IT Security
Müller-Quade, J.
2011. Information technology, 53 (5), 250–255. doi:10.1524/itit.2011.0650
Müller-Quade, J.
2011. Information technology, 53 (5), 250–255. doi:10.1524/itit.2011.0650
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Dowsley, R.; Müller-Quade, J.; Otsuka, A.; Hanaoka, G.; Imai, H.; Nascimento, A. C. A.
2011. IEICE transactions / E / A, E94.A (2), 725–734. doi:10.1587/transfun.E94.A.725
Dowsley, R.; Müller-Quade, J.; Otsuka, A.; Hanaoka, G.; Imai, H.; Nascimento, A. C. A.
2011. IEICE transactions / E / A, E94.A (2), 725–734. doi:10.1587/transfun.E94.A.725
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Döttling, N.; Mie, T.; Jörn Müller-Quade; Nilges, T.
2011. IACR Cryptology ePrint Archive, 2011, 1–32
Döttling, N.; Mie, T.; Jörn Müller-Quade; Nilges, T.
2011. IACR Cryptology ePrint Archive, 2011, 1–32
Kommunikation als Herausforderung: Neue Wege im Datenschutz sozialer Netzwerke
Spiecker Döhmann, I.
2011. Anwaltsblatt, 61 (4), 256–259
Spiecker Döhmann, I.
2011. Anwaltsblatt, 61 (4), 256–259
Software Security in Virtualized Infrastructures - The Smart Meter Example
Beckert, B.; Hofheinz, D.; Müller-Quade, J.; Pretschner, A.; Snelting, G.
2011. it - Information Technology, 53 (3), 142–151. doi:10.1524/itit.2011.0636
Beckert, B.; Hofheinz, D.; Müller-Quade, J.; Pretschner, A.; Snelting, G.
2011. it - Information Technology, 53 (3), 142–151. doi:10.1524/itit.2011.0636
Advanced chopping of sequential and concurrent programs
Giffhorn, D.
2011. Software Quality Journal, 19 (2), 239–294. doi:10.1007/s11219-010-9114-7
Giffhorn, D.
2011. Software Quality Journal, 19 (2), 239–294. doi:10.1007/s11219-010-9114-7
Service robotics: do you know your new companion? Framing an interdisciplinary technology assessment
Decker, M.; Dillmann, R.; Dreier, T.; Fischer, M.; Gutmann, M.; Ott, I.; Spiecker gen. Döhmann, I.
2011. Poiesis & praxis, 8 (1), 25–44. doi:10.1007/s10202-011-0098-6
Decker, M.; Dillmann, R.; Dreier, T.; Fischer, M.; Gutmann, M.; Ott, I.; Spiecker gen. Döhmann, I.
2011. Poiesis & praxis, 8 (1), 25–44. doi:10.1007/s10202-011-0098-6
2010
Buchaufsätze
A Process to Effectively Identify “Guilty” Performance Antipatterns
Cortellessa, V.; Martens, A.; Reussner, R.; Trubiani, C.
2010. Fundamental approaches to software engineering : 13th international conference, FASE 2010, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010 ; proceedings. Ed.: D. Rosenblum, 368–382, Springer-Verlag. doi:10.1007/978-3-642-12029-9_26
Cortellessa, V.; Martens, A.; Reussner, R.; Trubiani, C.
2010. Fundamental approaches to software engineering : 13th international conference, FASE 2010, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010 ; proceedings. Ed.: D. Rosenblum, 368–382, Springer-Verlag. doi:10.1007/978-3-642-12029-9_26
Electronic Voting in Germany
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer Netherlands
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer Netherlands
Proceedingsbeiträge
Defining the Quality of Business Processes
Heinrich, R.; Paech, B.
2010. Modellierung 2010 : 24. - 26. März 2010, Klagenfurt, Österreich / [Fachtagung "Modellierung"]. Ed.: G. Engels, 133–148, Gesellschaft für Informatik (GI)
Heinrich, R.; Paech, B.
2010. Modellierung 2010 : 24. - 26. März 2010, Klagenfurt, Österreich / [Fachtagung "Modellierung"]. Ed.: G. Engels, 133–148, Gesellschaft für Informatik (GI)
Using quality of service bounds for effective multi-objective software architecture optimization
Noorshams, Q.; Martens, A.; Reussner, R.
2010. Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems (QUASOSS ’10), Oslo, Norway, October 4, 2010, 1:1–1:6, Association for Computing Machinery (ACM). doi:10.1145/1858263.1858265
Noorshams, Q.; Martens, A.; Reussner, R.
2010. Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems (QUASOSS ’10), Oslo, Norway, October 4, 2010, 1:1–1:6, Association for Computing Machinery (ACM). doi:10.1145/1858263.1858265
Automatically Improve Software Architecture Models for Performance, Reliability, and Cost Using Evolutionary Algorithms
Martens, A.; Koziolek, H.; Becker, S.; Reussner, R.
2010. WOSP/SIPEW’10 : proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering; January 28 - 30, 2010, San José, CA, USA, 105–116, Association for Computing Machinery (ACM). doi:10.1145/1712605.1712624
Martens, A.; Koziolek, H.; Becker, S.; Reussner, R.
2010. WOSP/SIPEW’10 : proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering; January 28 - 30, 2010, San José, CA, USA, 105–116, Association for Computing Machinery (ACM). doi:10.1145/1712605.1712624
A Hybrid Approach for Multi-attribute QoS Optimisation in Component Based Software Systems
Martens, A.; Ardagna, D.; Koziolek, H.; Mirandola, R.; Reussner, R.
2010. Research into practice - reality and gaps : 6th International Conference on the Quality of Software Architectures, QoSA 2010, Prague, Czech Republic, June 23 - 25, 2010 ; proceedings. Ed.: G. T. Heineman, 84–101, Springer-Verlag. doi:10.1007/978-3-642-13821-8_8
Martens, A.; Ardagna, D.; Koziolek, H.; Mirandola, R.; Reussner, R.
2010. Research into practice - reality and gaps : 6th International Conference on the Quality of Software Architectures, QoSA 2010, Prague, Czech Republic, June 23 - 25, 2010 ; proceedings. Ed.: G. T. Heineman, 84–101, Springer-Verlag. doi:10.1007/978-3-642-13821-8_8
State dependence in performance evaluation of component-based software systems
Kapova, L.; Buhnova, B.; Martens, A.; Happe, J.; Reussner, R.
2010. First Joint WOSP/SIPEW International Conference on Performance Engineering San Jose California USA January 28 - 30, 2010. Ed.: A. Adamson, 37–48, ACM Digital Library. doi:10.1145/1712605.1712613
Kapova, L.; Buhnova, B.; Martens, A.; Happe, J.; Reussner, R.
2010. First Joint WOSP/SIPEW International Conference on Performance Engineering San Jose California USA January 28 - 30, 2010. Ed.: A. Adamson, 37–48, ACM Digital Library. doi:10.1145/1712605.1712613
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft
An Evaluation and Certification Approach to Enable Voting Service Providers
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, Gesellschaft für Informatik (GI)
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, Gesellschaft für Informatik (GI)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, Gesellschaft für Informatik (GI)
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, Gesellschaft für Informatik (GI)
Verifiability in Electronic Voting - Explanations for Non Security Experts
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, Gesellschaft für Informatik (GI)
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, Gesellschaft für Informatik (GI)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2010.106
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2010.106
Speeding up context-, object- and field-sensitive SDG generation
Graf, J.
2010. 10th IEEE International Working Conference on Source Code Analysis and Manipulation, Timisoara, Romania , September 12-13, 2010. Ed.: J. Vinju, 105–114, Institute of Electrical and Electronics Engineers (IEEE)
Graf, J.
2010. 10th IEEE International Working Conference on Source Code Analysis and Manipulation, Timisoara, Romania , September 12-13, 2010. Ed.: J. Vinju, 105–114, Institute of Electrical and Electronics Engineers (IEEE)
Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing
Wasserrab, D.; Lohner, D.
2010. 6th International Verification Workshop - VERIFY-2010, Edinburgh, July 20-21, 2010
Wasserrab, D.; Lohner, D.
2010. 6th International Verification Workshop - VERIFY-2010, Edinburgh, July 20-21, 2010
Experiences with PDG-based IFC
Hammer, C.
2010. Engineering secure software and systems - second international symposium, ESSoS 2010, Pisa, Italy, February 3 - 4, 2010. Proceedings. Ed.: F. Massacci, 44–60, Springer-Verlag
Hammer, C.
2010. Engineering secure software and systems - second international symposium, ESSoS 2010, Pisa, Italy, February 3 - 4, 2010. Proceedings. Ed.: F. Massacci, 44–60, Springer-Verlag
Gateway Decompositions for Constrained Reachability Problems
Katz, B.; Krug, M.; Lochbihler, A.; Rutter, I.; Snelting, G.; Wagner, D.
2010. Experimental Algorithms - 9th International Symposium, SEA 2010, Ischia Island, Naples, Italy, May 20-22, 2010. Proceedings. Ed.: P. Festa, 449–461, Springer-Verlag
Katz, B.; Krug, M.; Lochbihler, A.; Rutter, I.; Snelting, G.; Wagner, D.
2010. Experimental Algorithms - 9th International Symposium, SEA 2010, Ischia Island, Naples, Italy, May 20-22, 2010. Proceedings. Ed.: P. Festa, 449–461, Springer-Verlag
Zeitschriftenaufsätze
Using Genetic Search for Reverse Engineering of Parametric Behavior Models for Performance Prediction
Krogmann, K.; Kuperberg, M.; Reussner, R.
2010. IEEE transactions on software engineering, 36 (6), 865–877. doi:10.1109/TSE.2010.69
Krogmann, K.; Kuperberg, M.; Reussner, R.
2010. IEEE transactions on software engineering, 36 (6), 865–877. doi:10.1109/TSE.2010.69
Evaluierungsverfahren für Internetwahlsysteme
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Information Flow Noninterference via Slicing
Wasserrab, D.
2010. The Archive of Formal Proofs, (3), 44 S
Wasserrab, D.
2010. The Archive of Formal Proofs, (3), 44 S
2009
Buchaufsätze
Developing a Legal Framework for Remote Electronic Voting
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer-Verlag. doi:10.1007/978-3-642-04135-8_6
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer-Verlag. doi:10.1007/978-3-642-04135-8_6
Dissertationen
Evaluation of Electronic Voting -Requirements and Evaluation Procedures to Support Responsible Election Authorities. Dissertation
Volkamer, M.
2009. Springer-Verlag
Volkamer, M.
2009. Springer-Verlag
Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs. Dissertation
Hammer, C.
2009. Universitätsverlag Karlsruhe. doi:10.5445/KSP/1000012049
Hammer, C.
2009. Universitätsverlag Karlsruhe. doi:10.5445/KSP/1000012049
Proceedingsbeiträge
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, Association for Computing Machinery (ACM). doi:10.1145/1693042.1693084
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, Association for Computing Machinery (ACM). doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik (GI)
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik (GI)
Classifying Privacy and Verifiability Requirements for Electronic Voting
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen Druck+Verlag
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen Druck+Verlag
Towards the impact of the operational environment on the security of e-voting
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik (GI)
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik (GI)
Determine the Resilience of Evaluated Internet Voting Systems
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.2
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik (GI)
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik (GI)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag
Specification of a Voting Service Provider
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.8
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.8
Zeitschriftenaufsätze
Verifizierbarkeit elektronischer Wahlen
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Polynomial runtime in simulatability definitions
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
2009. Journal of computer security, 17 (5), 703–735. doi:10.3233/JCS-2009-0354
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
2009. Journal of computer security, 17 (5), 703–735. doi:10.3233/JCS-2009-0354
Backing up Slicing : Verifying the Interprocedural Two-Phase Horwitz-Reps-Binkley Slicer
Wasserrab, D.
2009. The Archive of Formal Proofs, (11), 543 S
Wasserrab, D.
2009. The Archive of Formal Proofs, (11), 543 S
On Temporal Path Conditions in Dependence Graphs
Lochbihler, A.; Snelting, G.
2009. Automated Software Engineering, 16 (2), 263–290
Lochbihler, A.; Snelting, G.
2009. Automated Software Engineering, 16 (2), 263–290
Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs
Hammer, C.; Snelting, G.
2009. International journal of information security, 8 (6), 399–422
Hammer, C.; Snelting, G.
2009. International journal of information security, 8 (6), 399–422
2008
Proceedingsbeiträge
Trust Models for Remote Electronic Voting
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik (GI)
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik (GI)
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Development of a Formal IT-Security Model for Remote Electronic Voting Systems
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik (GI)
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik (GI)
Precise Analysis of Java Programs using JOANA
Giffhorn, D.; Hammer, C.
2008. Proceedings of the 8th IEEE International Working Conference on Source Code Analysis and Manipulation. Ed.: S. Kawada, 267–268, IEEE Computer Society
Giffhorn, D.; Hammer, C.
2008. Proceedings of the 8th IEEE International Working Conference on Source Code Analysis and Manipulation. Ed.: S. Kawada, 267–268, IEEE Computer Society
2007
Proceedingsbeiträge
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges
Requirements and Evaluation Techniques for Online-Voting
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner
The Development of Remote E-Voting Around the World: A Review of Roads and Directions
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer-Verlag
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer-Verlag
Compliance of RIES to the proposed e-voting protection profile
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer-Verlag
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer-Verlag
Requirements and Evaluation Procedures for eVoting
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society. doi:10.1109/ARES.2007.124
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society. doi:10.1109/ARES.2007.124
Zeitschriftenaufsätze
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
2006
Proceedingsbeiträge
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, Gesellschaft für Informatik (GI)
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, Gesellschaft für Informatik (GI)
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Overview Online-Wahlen
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec
Information Flow Analysis Based Security Checking of Health Service Composition Plans
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: H. Stormer, 59–70, Ges. für Informatik
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: H. Stormer, 59–70, Ges. für Informatik
Information Flow Control to Secure Dynamic Web Service Composition
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer-Verlag. doi:10.1007/11734666_15
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer-Verlag. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, Gesellschaft für Informatik (GI)
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, Gesellschaft für Informatik (GI)
Enabling the Application of Open Systems like PCs for Online Voting
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, Gesellschaft für Informatik (GI)
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, Gesellschaft für Informatik (GI)
Multiple Cast in Online Voting - Analyzing Chances
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106, Ges. für Informatik
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106, Ges. für Informatik
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, Institute of Electrical and Electronics Engineers (IEEE)
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, Institute of Electrical and Electronics Engineers (IEEE)
Zeitschriftenaufsätze
Die Online-Wahl auf dem Weg zum Durchbruch
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
2005
Studienarbeiten
Empirical Validation and Comparison of the Model-Driven Performance Prediction Techniques of CB-SPE and Palladio. Studienarbeit
Martens, A.
2005, August 12. Carl von Ossietzky Universität Oldenburg. doi:10.5445/IR/1000173881
Martens, A.
2005, August 12. Carl von Ossietzky Universität Oldenburg. doi:10.5445/IR/1000173881
Proceedingsbeiträge
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg
Zeitschriftenaufsätze
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
2004
Proceedingsbeiträge
From Legal Principles to an Internet Voting System
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, Gesellschaft für Informatik (GI)
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, Gesellschaft für Informatik (GI)