The SCEAS System
Navigation Menu

Search the dblp DataBase


Heiko Krumm: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Illner, Heiko Krumm, Ingo Lück, Andre Pohl, Andreas Bobek, Hendrik Bohn, Frank Golatowski
    Model-based Management of Embedded Service Systems - An Applied Approach. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:519-523 [Conf]
  2. Heiko Krumm
    Projections of the Reachability Graph and Environment Models. [Citation Graph (0, 0)][DBLP]
    Automatic Verification Methods for Finite State Systems, 1989, pp:89-96 [Conf]
  3. Peter Herrmann, Lars Wiebusch, Heiko Krumm
    Tool-Assisted Security Assessment of Distributed Applications. [Citation Graph (0, 0)][DBLP]
    DAIS, 2001, pp:289-294 [Conf]
  4. Arnulf Mester, Heiko Krumm
    Formal Behavioural Patterns for the Tool-assisted Design of Distributed Applications. [Citation Graph (0, 0)][DBLP]
    DAIS, 1997, pp:- [Conf]
  5. Günter Graw, Peter Herrmann, Heiko Krumm
    Constraint-oriented formal modelling of OO-systems. [Citation Graph (0, 0)][DBLP]
    DAIS, 1999, pp:345-0 [Conf]
  6. Michael Wimmers, Arnulf Mester, Heiko Krumm
    A Component framework for the configuration management of networks. [Citation Graph (0, 0)][DBLP]
    DAIS, 1999, pp:135-148 [Conf]
  7. Peter Herrmann, Lars Wiebusch, Heiko Krumm
    Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:55-70 [Conf]
  8. João Porto de Albuquerque, Holger Isenberg, Heiko Krumm, Paulo Lício de Geus
    Improving the Configuration Management of Large Network Security Systems. [Citation Graph (0, 0)][DBLP]
    DSOM, 2005, pp:36-47 [Conf]
  9. Ingo Lück, Marcus Schönbach, Arnulf Mester, Heiko Krumm
    Derivation of Backup Service Management Applications from Service and System Models. [Citation Graph (0, 0)][DBLP]
    DSOM, 1999, pp:243-256 [Conf]
  10. Günter Graw, Peter Herrmann, Heiko Krumm
    Composing Object-Oriented Specifications and Verifications with cTLA. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:318- [Conf]
  11. João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus
    On Scalability and Modularisation in the Modelling of Network Security Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:287-304 [Conf]
  12. Gerrit Rothmaier, Heiko Krumm
    A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks. [Citation Graph (0, 0)][DBLP]
    FORTE, 2005, pp:247-260 [Conf]
  13. João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus
    Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2005, pp:633-637 [Conf]
  14. Heiko Krumm
    Offener Zugang zu abgesetzten Daten im Bürosystem. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1987, pp:150-162 [Conf]
  15. Peter Herrmann, Lars Wiebusch, Heiko Krumm
    State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    I3E, 2002, pp:195-209 [Conf]
  16. Heiko Krumm, Oswald Drobnik
    Problem-Oriented Logical Specifications of Communication Services and Protocols. [Citation Graph (0, 0)][DBLP]
    ICCC, 1986, pp:474-478 [Conf]
  17. Günter Graw, Volker Gruhn, Heiko Krumm
    Support of cooperating and distributed business processes. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1996, pp:22-0 [Conf]
  18. Volker Gruhn, Peter Herrmann, Heiko Krumm
    User-Defined Telecooperation Services. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1998, pp:590-598 [Conf]
  19. Heiko Krumm, Oswald Drobnik
    Specification, Implementation, and Verification of Communication Services on the Basis of CIL. [Citation Graph (0, 0)][DBLP]
    Protocol Specification, Testing, and Verification, 1983, pp:301-316 [Conf]
  20. Peter Herrmann, Heiko Krumm
    Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:2-8 [Conf]
  21. Günter Graw, Peter Herrmann, Heiko Krumm
    Verification of UML-Based Real-Time System Designs by Means of cTLA. [Citation Graph (0, 0)][DBLP]
    ISORC, 2000, pp:86-95 [Conf]
  22. Peter Herrmann, Günter Graw, Heiko Krumm
    Compositional Specification and Structured Verification of Hybrid Systems in cTLA. [Citation Graph (0, 0)][DBLP]
    ISORC, 1998, pp:335-0 [Conf]
  23. Oswald Drobnik, Heiko Krumm
    CIL - Eine Sprache zur Implementierung von Kommunikationsdiensten. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1983, pp:301-315 [Conf]
  24. Stefan Illner, Heiko Krumm, Andre Pohl, Ingo Lück, Darius Manka, Thomas Sparenberg
    Policy Controlled Automated Management of Distributed and Embedded Service Systems. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2005, pp:710-715 [Conf]
  25. João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus
    Policy Modeling and Refinement for Network Security Systems. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:24-33 [Conf]
  26. Ingo Lück, Christian Schäfer, Heiko Krumm
    Model-Based Tool-Assistance for Packet-Filter Design. [Citation Graph (0, 0)][DBLP]
    POLICY, 2001, pp:120-136 [Conf]
  27. Peter Herrmann, Heiko Krumm
    Compositional specification and verification of high-speed transfer protocols. [Citation Graph (0, 0)][DBLP]
    PSTV, 1994, pp:339-346 [Conf]
  28. Peter Herrmann, Heiko Krumm
    Re-usable verification elements for high-speed transfer protocol configurations. [Citation Graph (0, 0)][DBLP]
    PSTV, 1995, pp:171-186 [Conf]
  29. Heiko Krumm, Oswald Drobnik
    Transformation of Constructive Specifications of Services and Protocols into the Logical Language of CIL. [Citation Graph (0, 0)][DBLP]
    PSTV, 1984, pp:31-45 [Conf]
  30. Gerrit Rothmaier, Andre Pohl, Heiko Krumm
    Analyzing Network Management Effects with SPIN and cTLA. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:65-82 [Conf]
  31. Gerrit Rothmaier, Heiko Krumm
    Formale Modellierung und Analyse protokollbasierter Angriffe in TCP/IP Netzwerken am Beispiel von ARP und RIP. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:77-88 [Conf]
  32. Gerrit Rothmaier, Tobias Kneiphoff, Heiko Krumm
    Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models. [Citation Graph (0, 0)][DBLP]
    SPIN, 2005, pp:236-250 [Conf]
  33. Peter Herrmann, Heiko Krumm
    Formal Hazard Analysis of Hybrid Systems in cTLA. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:68-77 [Conf]
  34. Carsten Heyl, Arnulf Mester, Heiko Krumm
    cTc - A Tool Supporting the Construction of cTLA-Specifications. [Citation Graph (0, 0)][DBLP]
    TACAS, 1996, pp:407-411 [Conf]
  35. Heiko Krumm, Oswald Drobnik
    Interactive verification of communication software on the basis of CIL. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 1984, v:14, n:2, pp:92-99 [Journal]
  36. Peter Herrmann, Heiko Krumm
    A framework for modeling transfer protocols. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:2, pp:317-337 [Journal]
  37. Hartmut König, Peter Langendörfer, Heiko Krumm
    Improving the efficiency of automated protocol implementations using a configurable FDT compiler. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:12, pp:1179-1195 [Journal]
  38. Hartmut König, Heiko Krumm
    Implementierung von Kommunikationsprotokollen. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1996, v:19, n:6, pp:316-325 [Journal]
  39. Peter Herrmann, Heiko Krumm
    Modular specification and verification of XTP. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1998, v:9, n:2, pp:207-221 [Journal]
  40. Peter Herrmann, Heiko Krumm, Olaf Drögehorn, Walter Geisselhardt
    Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2002, v:20, n:3-4, pp:291-310 [Journal]
  41. Heiko Krumm
    Logische Verifikation nebenläufiger Programme. [Citation Graph (0, 0)][DBLP]
    Angewandte Informatik, 1987, v:29, n:4, pp:131-140 [Journal]

  42. Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems. [Citation Graph (, )][DBLP]

  43. Location-Transparent Integration of Distributed OSGi Frameworks and Web Services. [Citation Graph (, )][DBLP]

  44. Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems. [Citation Graph (, )][DBLP]

  45. Policy-gesteuertes Management adaptiver und gütegesicherter Dienstesysteme im Projekt OSAMI. [Citation Graph (, )][DBLP]

  46. Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms. [Citation Graph (, )][DBLP]

  47. Model-based configuration of VPNs. [Citation Graph (, )][DBLP]

  48. Model-based management of security services in complex network environments. [Citation Graph (, )][DBLP]

Search in 0.757secs, Finished in 0.759secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002