The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Konstantin Knorr: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Konstantin Knorr
    Dynamic Access Control through Petri Net Workflows. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:159-167 [Conf]
  2. Susanne Röhrig, Konstantin Knorr
    Towards a Secure Web-Based Health Care Application. [Citation Graph (0, 0)][DBLP]
    ECIS, 2000, pp:- [Conf]
  3. Konstantin Knorr, Susanne Röhrig
    Security of Electronic Business Applications - Structure and Quantification. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:25-37 [Conf]
  4. Henrik Stormer, Konstantin Knorr
    PDA- and Agent-based Execution of Work of Tasks. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2001, pp:968-972 [Conf]
  5. Konstantin Knorr, Susanne Röhrig
    Security Requirements of E-Business Processes. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:73-86 [Conf]
  6. Konstantin Knorr, Harald Weidner
    Analyzing Separation of Duties in Petri Net Workflows. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:102-114 [Conf]
  7. Konstantin Knorr, Henrik Stormer
    Modeling and Analyzing Separation of Duties in Workflow Environments. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:199-212 [Conf]
  8. Susanne Röhrig, Konstantin Knorr
    Security Analysis of Electronic Business Processes. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:59-81 [Journal]
  9. Susanne Röhrig, Konstantin Knorr, Hansrudi Noser
    Sicherheit von E-Business-Anwendungen - Struktur und Quantifizierung. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 2000, v:42, n:6, pp:499-508 [Journal]

  10. A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002