|
Search the dblp DataBase
Konstantin Knorr:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Konstantin Knorr
Dynamic Access Control through Petri Net Workflows. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:159-167 [Conf]
- Susanne Röhrig, Konstantin Knorr
Towards a Secure Web-Based Health Care Application. [Citation Graph (0, 0)][DBLP] ECIS, 2000, pp:- [Conf]
- Konstantin Knorr, Susanne Röhrig
Security of Electronic Business Applications - Structure and Quantification. [Citation Graph (0, 0)][DBLP] EC-Web, 2000, pp:25-37 [Conf]
- Henrik Stormer, Konstantin Knorr
PDA- and Agent-based Execution of Work of Tasks. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (2), 2001, pp:968-972 [Conf]
- Konstantin Knorr, Susanne Röhrig
Security Requirements of E-Business Processes. [Citation Graph (0, 0)][DBLP] I3E, 2001, pp:73-86 [Conf]
- Konstantin Knorr, Harald Weidner
Analyzing Separation of Duties in Petri Net Workflows. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2001, pp:102-114 [Conf]
- Konstantin Knorr, Henrik Stormer
Modeling and Analyzing Separation of Duties in Workflow Environments. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:199-212 [Conf]
- Susanne Röhrig, Konstantin Knorr
Security Analysis of Electronic Business Processes. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research, 2004, v:4, n:1-2, pp:59-81 [Journal]
- Susanne Röhrig, Konstantin Knorr, Hansrudi Noser
Sicherheit von E-Business-Anwendungen - Struktur und Quantifizierung. [Citation Graph (0, 0)][DBLP] Wirtschaftsinformatik, 2000, v:42, n:6, pp:499-508 [Journal]
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|