The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter Herrmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Peter Herrmann
    Information Flow Analysis of Component-Structured Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:45-54 [Conf]
  2. Peter Herrmann, Lars Wiebusch, Heiko Krumm
    Tool-Assisted Security Assessment of Distributed Applications. [Citation Graph (0, 0)][DBLP]
    DAIS, 2001, pp:289-294 [Conf]
  3. Günter Graw, Peter Herrmann, Heiko Krumm
    Constraint-oriented formal modelling of OO-systems. [Citation Graph (0, 0)][DBLP]
    DAIS, 1999, pp:345-0 [Conf]
  4. Peter Herrmann, Lars Wiebusch, Heiko Krumm
    Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:55-70 [Conf]
  5. Günter Graw, Peter Herrmann, Heiko Krumm
    Composing Object-Oriented Specifications and Verifications with cTLA. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:318- [Conf]
  6. Günter Graw, Peter Herrmann
    Generation and Enactment of Controllers for Business Architectures Using MDA. [Citation Graph (0, 0)][DBLP]
    EWSA, 2004, pp:148-166 [Conf]
  7. Olaf Drögehorn, Peter Herrmann
    Werkzeugunterstützte Protokollverifikation mit dem Transferprotokoll-Framework. [Citation Graph (0, 0)][DBLP]
    FBT, 1998, pp:48-59 [Conf]
  8. Peter Herrmann, Manfred Noël
    Formale Verifikation eines Reglers für Fahrbahnmarkierungsmaschinen. [Citation Graph (0, 0)][DBLP]
    FBT, 1999, pp:83-92 [Conf]
  9. Peter Herrmann
    Formal Security Policy Verification of Distributed Component-Structured Software. [Citation Graph (0, 0)][DBLP]
    FORTE, 2003, pp:257-272 [Conf]
  10. Peter Herrmann, Lars Wiebusch, Heiko Krumm
    State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    I3E, 2002, pp:195-209 [Conf]
  11. Frank Alexander Kraemer, Peter Herrmann
    Service Specification by Composition of Collaborations--An Example. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:129-133 [Conf]
  12. Volker Gruhn, Peter Herrmann, Heiko Krumm
    User-Defined Telecooperation Services. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1998, pp:590-598 [Conf]
  13. Peter Herrmann, Heiko Krumm
    Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:2-8 [Conf]
  14. Günter Graw, Peter Herrmann, Heiko Krumm
    Verification of UML-Based Real-Time System Designs by Means of cTLA. [Citation Graph (0, 0)][DBLP]
    ISORC, 2000, pp:86-95 [Conf]
  15. Peter Herrmann, Günter Graw, Heiko Krumm
    Compositional Specification and Structured Verification of Hybrid Systems in cTLA. [Citation Graph (0, 0)][DBLP]
    ISORC, 1998, pp:335-0 [Conf]
  16. Peter Herrmann
    Trust-Based Protection of Software Component Users and Designers. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:75-90 [Conf]
  17. Peter Herrmann
    Temporal Logic-Based Specification and Verification of Trust Models. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:105-119 [Conf]
  18. Frank Alexander Kraemer, Peter Herrmann, Rolv Bræk
    Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2006, pp:1613-1632 [Conf]
  19. Peter Herrmann, Heiko Krumm
    Compositional specification and verification of high-speed transfer protocols. [Citation Graph (0, 0)][DBLP]
    PSTV, 1994, pp:339-346 [Conf]
  20. Peter Herrmann, Heiko Krumm
    Re-usable verification elements for high-speed transfer protocol configurations. [Citation Graph (0, 0)][DBLP]
    PSTV, 1995, pp:171-186 [Conf]
  21. Peter Herrmann, Heiko Krumm
    Formal Hazard Analysis of Hybrid Systems in cTLA. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:68-77 [Conf]
  22. Peter Herrmann, Heiko Krumm
    A framework for modeling transfer protocols. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:2, pp:317-337 [Journal]
  23. Gaby Herrmann, Peter Herrmann
    Introduction: Security and Trust in Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:5-7 [Journal]
  24. Peter Herrmann, Gaby Herrmann
    Security requirement analysis of business processes. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2006, v:6, n:3-4, pp:305-335 [Journal]
  25. Günter Graw, Peter Herrmann
    Transformation and Verification of Executable UML Models. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:101, n:, pp:3-24 [Journal]
  26. Peter Herrmann, Heiko Krumm
    Modular specification and verification of XTP. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1998, v:9, n:2, pp:207-221 [Journal]
  27. Peter Herrmann, Heiko Krumm, Olaf Drögehorn, Walter Geisselhardt
    Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2002, v:20, n:3-4, pp:291-310 [Journal]
  28. Inéz Frerichs, Jose Hinz, Peter Herrmann, Gerald Weisser, Günter Hahn, Michael Quintel, Gerhard Hellige
    Regional Lung Perfusion as Determined by Electrical Impedance Tomography in Comparison with Electron Beam CT Imaging. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Med. Imaging, 2002, v:21, n:6, pp:646-652 [Journal]
  29. Frank Alexander Kraemer, Rolv Bræk, Peter Herrmann
    Synthesizing Components with Sessions from Collaboration-Oriented Service Specifications. [Citation Graph (0, 0)][DBLP]
    SDL Forum, 2007, pp:166-185 [Conf]

  30. 08102 Outcome Working Group -- Situational Awareness. [Citation Graph (, )][DBLP]


  31. Cost-Efficient Deployment of Collaborating Components. [Citation Graph (, )][DBLP]


  32. Foraging for Better Deployment of Replicated Service Components. [Citation Graph (, )][DBLP]


  33. Reactive Semantics for Distributed UML Activities. [Citation Graph (, )][DBLP]


  34. Cross-Situation Trust Reasoning. [Citation Graph (, )][DBLP]


  35. Automated Encapsulation of UML Activities for Incremental Development and Verification. [Citation Graph (, )][DBLP]


  36. Trust transferability among similar contexts. [Citation Graph (, )][DBLP]


  37. Model-Driven Construction of Embedded Applications Based on Reusable Building Blocks - An Example. [Citation Graph (, )][DBLP]


  38. Adaptable model-based component deployment guided by artificial ants. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002