Search the dblp DataBase
Günter Karjoth :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Günter Karjoth The Authorization Service of Tivoli Policy Director. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:319-328 [Conf ] Luke O'Connor , Günter Karjoth Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees. [Citation Graph (0, 0)][DBLP ] CARDIS, 2000, pp:327-344 [Conf ] Günter Karjoth Implementing LOTOS Specifications by Communicating State Machines. [Citation Graph (0, 0)][DBLP ] CONCUR, 1992, pp:386-400 [Conf ] Günter Karjoth An Operational Semantics of Java 2 Access Control. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:224-232 [Conf ] Günter Karjoth , Matthias Schunter A Privacy Policy Model for Enterprises. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:271-281 [Conf ] Peter Y. A. Ryan , Dieter Gollmann , Li Gong , Günter Karjoth , Chris J. Mitchell Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:164-166 [Conf ] Günter Karjoth , Matthias Schunter , Els Van Herreweghen , Michael Waidner Amending P3P for Clearer Privacy Promises. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:445-449 [Conf ] Günter Karjoth , Matthias Schunter , Michael Waidner Privacy-Enabled Services for Enterprises. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:483-487 [Conf ] Günter Karjoth Authorization in CORBA Security. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:143-158 [Conf ] Günter Karjoth A LISP-Based LOTOS Environment. [Citation Graph (0, 0)][DBLP ] FORTE, 1988, pp:73-77 [Conf ] Günter Karjoth A Compilation of Algebraic Processes Based on Extended-Action Derivation. [Citation Graph (0, 0)][DBLP ] FORTE, 1990, pp:127-140 [Conf ] Günter Karjoth Generating transition graphs from LOTOS specifications. [Citation Graph (0, 0)][DBLP ] FORTE, 1992, pp:281-294 [Conf ] Günter Karjoth On the Formal Specification of Protocols in Distributed Databases. [Citation Graph (0, 0)][DBLP ] ICCC, 1986, pp:479-484 [Conf ] Günter Karjoth A Behavioural Description Language for the Formal Treatment of Protocols in Distributed Systems. [Citation Graph (0, 0)][DBLP ] Protocol Specification, Testing, and Verification, 1983, pp:125-136 [Conf ] Günter Karjoth Integrated Access Control Management. [Citation Graph (0, 0)][DBLP ] IS&N, 1995, pp:64-74 [Conf ] Jürgen Bohn , Günter Karjoth Sicherheitsdienste für mobile Agentenanwendungen. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 2001, pp:305-314 [Conf ] Günter Karjoth Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces. [Citation Graph (0, 0)][DBLP ] ASA/MA, 2000, pp:44-56 [Conf ] Günter Karjoth , N. Asokan , Ceki Gülcü Protecting the Computation Results of Free-Roaming Agents. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 1998, pp:195-207 [Conf ] Günter Karjoth , Danny B. Lange , Mitsuru Oshima A Security Model for Aglets. [Citation Graph (0, 0)][DBLP ] Mobile Agents and Security, 1998, pp:188-205 [Conf ] Günter Karjoth XFSM: A Format Model of Communicating State Machines for Implementation Specification. [Citation Graph (0, 0)][DBLP ] PARLE, 1992, pp:979-980 [Conf ] Günter Karjoth , Matthias Schunter , Michael Waidner Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:69-84 [Conf ] Günter Karjoth , Matthias Schunter , Els Van Herreweghen Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. [Citation Graph (0, 0)][DBLP ] POLICY, 2003, pp:135-146 [Conf ] Michael Backes , Markus Dürmuth , Günter Karjoth Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:185-188 [Conf ] Ed Brinksma , Günter Karjoth A Specification of the OSI Transport Service in LOTOS. [Citation Graph (0, 0)][DBLP ] PSTV, 1984, pp:227-251 [Conf ] Günter Karjoth An interactive system for the analysis of communicating processes. [Citation Graph (0, 0)][DBLP ] PSTV, 1985, pp:91-102 [Conf ] Günter Karjoth Dynamic State Machines with Multiway Synchronization, Channels and Shared Variables. [Citation Graph (0, 0)][DBLP ] PSTV, 1993, pp:61-76 [Conf ] Michael Backes , Günter Karjoth , Walid Bagga , Matthias Schunter Efficient comparison of enterprise privacy policies. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:375-382 [Conf ] Joy Algesheimer , Christian Cachin , Jan Camenisch , Günter Karjoth Cryptographic Security for Mobile Code. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:2-11 [Conf ] Paul Ashley , Satoshi Hada , Günter Karjoth , Matthias Schunter E-P3P privacy policies and privacy authorization. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:103-109 [Conf ] Günter Karjoth , Paul A. Moskowitz Disabling RFID tags with visible confirmation: clipped tags are silenced. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:27-30 [Conf ] Danny B. Lange , Mitsuru Oshima , Günter Karjoth , Kazuya Kosaka Aglets: Programming Mobile Agents in Java. [Citation Graph (0, 0)][DBLP ] WWCA, 1997, pp:253-266 [Conf ] Günter Karjoth , Carl Binding , Jan Gustafsson LOEWE: A LOTOS Engineering Workbench. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1993, v:25, n:7, pp:853-874 [Journal ] Günter Karjoth , Matthias Schunter , Michael Waidner Privacy-enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 2004, v:27, n:1, pp:3-9 [Journal ] Jürgen Bohn , Günter Karjoth Generische Sicherheitsdienste für mobile Anwendungen. [Citation Graph (0, 0)][DBLP ] HMD - Praxis Wirtschaftsinform., 2001, v:220, n:, pp:- [Journal ] Carl Binding , Wiet Bouma , Michel Dauphin , Günter Karjoth , Yan Yang A Common Compiler for LOTOS and SDL Specifications. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1992, v:31, n:4, pp:668-690 [Journal ] Günter Karjoth , Danny B. Lange , Mitsuru Oshima A Security Model for Aglets. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1997, v:1, n:4, pp:68-77 [Journal ] Günter Karjoth Authorization in CORBA Security. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal ] Günter Karjoth , N. Asokan , Ceki Gülcü Protecting the Computation Results of Free-Roaming Agents. [Citation Graph (0, 0)][DBLP ] Personal and Ubiquitous Computing, 1998, v:2, n:2, pp:- [Journal ] Günter Karjoth Access control with IBM Tivoli access manager. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:232-257 [Journal ] Willibald A. Doeringer , Günter Karjoth , Mehdi Nassehi Routing on longest-matching prefixes. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1996, v:4, n:1, pp:86-97 [Journal ] Willibald A. Doeringer , Günter Karjoth , Mehdi Nassehi Corrections to ``Routing on longest-matching prefixes''. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:600- [Journal ] Implementing ACL-Based Policies in XACML. [Citation Graph (, )][DBLP ] Dynamic Enforcement of Abstract Separation of Duty Constraints. [Citation Graph (, )][DBLP ] Search in 0.057secs, Finished in 0.059secs