The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Günter Karjoth: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Günter Karjoth
    The Authorization Service of Tivoli Policy Director. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:319-328 [Conf]
  2. Luke O'Connor, Günter Karjoth
    Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:327-344 [Conf]
  3. Günter Karjoth
    Implementing LOTOS Specifications by Communicating State Machines. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1992, pp:386-400 [Conf]
  4. Günter Karjoth
    An Operational Semantics of Java 2 Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:224-232 [Conf]
  5. Günter Karjoth, Matthias Schunter
    A Privacy Policy Model for Enterprises. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:271-281 [Conf]
  6. Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell
    Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:164-166 [Conf]
  7. Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner
    Amending P3P for Clearer Privacy Promises. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:445-449 [Conf]
  8. Günter Karjoth, Matthias Schunter, Michael Waidner
    Privacy-Enabled Services for Enterprises. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:483-487 [Conf]
  9. Günter Karjoth
    Authorization in CORBA Security. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:143-158 [Conf]
  10. Günter Karjoth
    A LISP-Based LOTOS Environment. [Citation Graph (0, 0)][DBLP]
    FORTE, 1988, pp:73-77 [Conf]
  11. Günter Karjoth
    A Compilation of Algebraic Processes Based on Extended-Action Derivation. [Citation Graph (0, 0)][DBLP]
    FORTE, 1990, pp:127-140 [Conf]
  12. Günter Karjoth
    Generating transition graphs from LOTOS specifications. [Citation Graph (0, 0)][DBLP]
    FORTE, 1992, pp:281-294 [Conf]
  13. Günter Karjoth
    On the Formal Specification of Protocols in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    ICCC, 1986, pp:479-484 [Conf]
  14. Günter Karjoth
    A Behavioural Description Language for the Formal Treatment of Protocols in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Protocol Specification, Testing, and Verification, 1983, pp:125-136 [Conf]
  15. Günter Karjoth
    Integrated Access Control Management. [Citation Graph (0, 0)][DBLP]
    IS&N, 1995, pp:64-74 [Conf]
  16. Jürgen Bohn, Günter Karjoth
    Sicherheitsdienste für mobile Agentenanwendungen. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 2001, pp:305-314 [Conf]
  17. Günter Karjoth
    Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces. [Citation Graph (0, 0)][DBLP]
    ASA/MA, 2000, pp:44-56 [Conf]
  18. Günter Karjoth, N. Asokan, Ceki Gülcü
    Protecting the Computation Results of Free-Roaming Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 1998, pp:195-207 [Conf]
  19. Günter Karjoth, Danny B. Lange, Mitsuru Oshima
    A Security Model for Aglets. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:188-205 [Conf]
  20. Günter Karjoth
    XFSM: A Format Model of Communicating State Machines for Implementation Specification. [Citation Graph (0, 0)][DBLP]
    PARLE, 1992, pp:979-980 [Conf]
  21. Günter Karjoth, Matthias Schunter, Michael Waidner
    Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:69-84 [Conf]
  22. Günter Karjoth, Matthias Schunter, Els Van Herreweghen
    Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:135-146 [Conf]
  23. Michael Backes, Markus Dürmuth, Günter Karjoth
    Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:185-188 [Conf]
  24. Ed Brinksma, Günter Karjoth
    A Specification of the OSI Transport Service in LOTOS. [Citation Graph (0, 0)][DBLP]
    PSTV, 1984, pp:227-251 [Conf]
  25. Günter Karjoth
    An interactive system for the analysis of communicating processes. [Citation Graph (0, 0)][DBLP]
    PSTV, 1985, pp:91-102 [Conf]
  26. Günter Karjoth
    Dynamic State Machines with Multiway Synchronization, Channels and Shared Variables. [Citation Graph (0, 0)][DBLP]
    PSTV, 1993, pp:61-76 [Conf]
  27. Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter
    Efficient comparison of enterprise privacy policies. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:375-382 [Conf]
  28. Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth
    Cryptographic Security for Mobile Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:2-11 [Conf]
  29. Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter
    E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:103-109 [Conf]
  30. Günter Karjoth, Paul A. Moskowitz
    Disabling RFID tags with visible confirmation: clipped tags are silenced. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:27-30 [Conf]
  31. Danny B. Lange, Mitsuru Oshima, Günter Karjoth, Kazuya Kosaka
    Aglets: Programming Mobile Agents in Java. [Citation Graph (0, 0)][DBLP]
    WWCA, 1997, pp:253-266 [Conf]
  32. Günter Karjoth, Carl Binding, Jan Gustafsson
    LOEWE: A LOTOS Engineering Workbench. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1993, v:25, n:7, pp:853-874 [Journal]
  33. Günter Karjoth, Matthias Schunter, Michael Waidner
    Privacy-enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:3-9 [Journal]
  34. Jürgen Bohn, Günter Karjoth
    Generische Sicherheitsdienste für mobile Anwendungen. [Citation Graph (0, 0)][DBLP]
    HMD - Praxis Wirtschaftsinform., 2001, v:220, n:, pp:- [Journal]
  35. Carl Binding, Wiet Bouma, Michel Dauphin, Günter Karjoth, Yan Yang
    A Common Compiler for LOTOS and SDL Specifications. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1992, v:31, n:4, pp:668-690 [Journal]
  36. Günter Karjoth, Danny B. Lange, Mitsuru Oshima
    A Security Model for Aglets. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1997, v:1, n:4, pp:68-77 [Journal]
  37. Günter Karjoth
    Authorization in CORBA Security. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  38. Günter Karjoth, N. Asokan, Ceki Gülcü
    Protecting the Computation Results of Free-Roaming Agents. [Citation Graph (0, 0)][DBLP]
    Personal and Ubiquitous Computing, 1998, v:2, n:2, pp:- [Journal]
  39. Günter Karjoth
    Access control with IBM Tivoli access manager. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:232-257 [Journal]
  40. Willibald A. Doeringer, Günter Karjoth, Mehdi Nassehi
    Routing on longest-matching prefixes. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1996, v:4, n:1, pp:86-97 [Journal]
  41. Willibald A. Doeringer, Günter Karjoth, Mehdi Nassehi
    Corrections to ``Routing on longest-matching prefixes''. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:600- [Journal]

  42. Implementing ACL-Based Policies in XACML. [Citation Graph (, )][DBLP]


  43. Dynamic Enforcement of Abstract Separation of Duty Constraints. [Citation Graph (, )][DBLP]


Search in 0.058secs, Finished in 0.059secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002