Search the dblp DataBase
Karsten Sohr :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Karsten Sohr , Gail-Joon Ahn , Martin Gogolla , Lars Migge Specification and Validation of Authorisation Constraints Using UML and OCL. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:64-79 [Conf ] Steffen Deter , Karsten Sohr Pini - A Jini-Like Plug&Play Technology for the KVM/CLDC. [Citation Graph (0, 0)][DBLP ] IICS, 2001, pp:53-66 [Conf ] Karsten Sohr Nicht verifizierter Code: Eine neue Sicherheitslücke in Java. [Citation Graph (0, 0)][DBLP ] Java-Informations-Tage, 1999, pp:171-181 [Conf ] Michael Drouineaud , Maksym Bortin , Paolo Torrini , Karsten Sohr A First Step Towards Formal Verification of Security Policy Properties for RBAC. [Citation Graph (0, 0)][DBLP ] QSIC, 2004, pp:60-67 [Conf ] Karsten Sohr , Michael Drouineaud , Gail-Joon Ahn Formal specification of role-based security policies for clinical information systems. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:332-339 [Conf ] Andreas Schaad , Volkmar Lotz , Karsten Sohr A model-checking approach to analysing organisational controls in a loan origination process. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:139-149 [Conf ] Till Mossakowski , Michael Drouineaud , Karsten Sohr A temporal-logic extension of role-based access control covering dynamic separation of duties. [Citation Graph (0, 0)][DBLP ] TIME, 2003, pp:83-90 [Conf ] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. [Citation Graph (, )][DBLP ] Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection. [Citation Graph (, )][DBLP ] Supporting Agile Development of Authorization Rules for SME Applications. [Citation Graph (, )][DBLP ] Idea: Towards Architecture-Centric Security Analysis of Software. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs