Search the dblp DataBase
Heiko Krumm :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stefan Illner , Heiko Krumm , Ingo Lück , Andre Pohl , Andreas Bobek , Hendrik Bohn , Frank Golatowski Model-based Management of Embedded Service Systems - An Applied Approach. [Citation Graph (0, 0)][DBLP ] AINA (2), 2006, pp:519-523 [Conf ] Heiko Krumm Projections of the Reachability Graph and Environment Models. [Citation Graph (0, 0)][DBLP ] Automatic Verification Methods for Finite State Systems, 1989, pp:89-96 [Conf ] Peter Herrmann , Lars Wiebusch , Heiko Krumm Tool-Assisted Security Assessment of Distributed Applications. [Citation Graph (0, 0)][DBLP ] DAIS, 2001, pp:289-294 [Conf ] Arnulf Mester , Heiko Krumm Formal Behavioural Patterns for the Tool-assisted Design of Distributed Applications. [Citation Graph (0, 0)][DBLP ] DAIS, 1997, pp:- [Conf ] Günter Graw , Peter Herrmann , Heiko Krumm Constraint-oriented formal modelling of OO-systems. [Citation Graph (0, 0)][DBLP ] DAIS, 1999, pp:345-0 [Conf ] Michael Wimmers , Arnulf Mester , Heiko Krumm A Component framework for the configuration management of networks. [Citation Graph (0, 0)][DBLP ] DAIS, 1999, pp:135-148 [Conf ] Peter Herrmann , Lars Wiebusch , Heiko Krumm Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software. [Citation Graph (0, 0)][DBLP ] DIMVA, 2004, pp:55-70 [Conf ] João Porto de Albuquerque , Holger Isenberg , Heiko Krumm , Paulo Lício de Geus Improving the Configuration Management of Large Network Security Systems. [Citation Graph (0, 0)][DBLP ] DSOM, 2005, pp:36-47 [Conf ] Ingo Lück , Marcus Schönbach , Arnulf Mester , Heiko Krumm Derivation of Backup Service Management Applications from Service and System Models. [Citation Graph (0, 0)][DBLP ] DSOM, 1999, pp:243-256 [Conf ] Günter Graw , Peter Herrmann , Heiko Krumm Composing Object-Oriented Specifications and Verifications with cTLA. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1999, pp:318- [Conf ] João Porto de Albuquerque , Heiko Krumm , Paulo Lício de Geus On Scalability and Modularisation in the Modelling of Network Security Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:287-304 [Conf ] Gerrit Rothmaier , Heiko Krumm A Framework Based Approach for Formal Modeling and Analysis of Multi-level Attacks in Computer Networks. [Citation Graph (0, 0)][DBLP ] FORTE, 2005, pp:247-260 [Conf ] João Porto de Albuquerque , Heiko Krumm , Paulo Lício de Geus Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (2), 2005, pp:633-637 [Conf ] Heiko Krumm Offener Zugang zu abgesetzten Daten im Bürosystem. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung, 1987, pp:150-162 [Conf ] Peter Herrmann , Lars Wiebusch , Heiko Krumm State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. [Citation Graph (0, 0)][DBLP ] I3E, 2002, pp:195-209 [Conf ] Heiko Krumm , Oswald Drobnik Problem-Oriented Logical Specifications of Communication Services and Protocols. [Citation Graph (0, 0)][DBLP ] ICCC, 1986, pp:474-478 [Conf ] Günter Graw , Volker Gruhn , Heiko Krumm Support of cooperating and distributed business processes. [Citation Graph (0, 0)][DBLP ] ICPADS, 1996, pp:22-0 [Conf ] Volker Gruhn , Peter Herrmann , Heiko Krumm User-Defined Telecooperation Services. [Citation Graph (0, 0)][DBLP ] ICPADS, 1998, pp:590-598 [Conf ] Heiko Krumm , Oswald Drobnik Specification, Implementation, and Verification of Communication Services on the Basis of CIL. [Citation Graph (0, 0)][DBLP ] Protocol Specification, Testing, and Verification, 1983, pp:301-316 [Conf ] Peter Herrmann , Heiko Krumm Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2001, pp:2-8 [Conf ] Günter Graw , Peter Herrmann , Heiko Krumm Verification of UML-Based Real-Time System Designs by Means of cTLA. [Citation Graph (0, 0)][DBLP ] ISORC, 2000, pp:86-95 [Conf ] Peter Herrmann , Günter Graw , Heiko Krumm Compositional Specification and Structured Verification of Hybrid Systems in cTLA. [Citation Graph (0, 0)][DBLP ] ISORC, 1998, pp:335-0 [Conf ] Oswald Drobnik , Heiko Krumm CIL - Eine Sprache zur Implementierung von Kommunikationsdiensten. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1983, pp:301-315 [Conf ] Stefan Illner , Heiko Krumm , Andre Pohl , Ingo Lück , Darius Manka , Thomas Sparenberg Policy Controlled Automated Management of Distributed and Embedded Service Systems. [Citation Graph (0, 0)][DBLP ] Parallel and Distributed Computing and Networks, 2005, pp:710-715 [Conf ] João Porto de Albuquerque , Heiko Krumm , Paulo Lício de Geus Policy Modeling and Refinement for Network Security Systems. [Citation Graph (0, 0)][DBLP ] POLICY, 2005, pp:24-33 [Conf ] Ingo Lück , Christian Schäfer , Heiko Krumm Model-Based Tool-Assistance for Packet-Filter Design. [Citation Graph (0, 0)][DBLP ] POLICY, 2001, pp:120-136 [Conf ] Peter Herrmann , Heiko Krumm Compositional specification and verification of high-speed transfer protocols. [Citation Graph (0, 0)][DBLP ] PSTV, 1994, pp:339-346 [Conf ] Peter Herrmann , Heiko Krumm Re-usable verification elements for high-speed transfer protocol configurations. [Citation Graph (0, 0)][DBLP ] PSTV, 1995, pp:171-186 [Conf ] Heiko Krumm , Oswald Drobnik Transformation of Constructive Specifications of Services and Protocols into the Logical Language of CIL. [Citation Graph (0, 0)][DBLP ] PSTV, 1984, pp:31-45 [Conf ] Gerrit Rothmaier , Andre Pohl , Heiko Krumm Analyzing Network Management Effects with SPIN and cTLA. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:65-82 [Conf ] Gerrit Rothmaier , Heiko Krumm Formale Modellierung und Analyse protokollbasierter Angriffe in TCP/IP Netzwerken am Beispiel von ARP und RIP. [Citation Graph (0, 0)][DBLP ] Sicherheit, 2005, pp:77-88 [Conf ] Gerrit Rothmaier , Tobias Kneiphoff , Heiko Krumm Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models. [Citation Graph (0, 0)][DBLP ] SPIN, 2005, pp:236-250 [Conf ] Peter Herrmann , Heiko Krumm Formal Hazard Analysis of Hybrid Systems in cTLA. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1999, pp:68-77 [Conf ] Carsten Heyl , Arnulf Mester , Heiko Krumm cTc - A Tool Supporting the Construction of cTLA-Specifications. [Citation Graph (0, 0)][DBLP ] TACAS, 1996, pp:407-411 [Conf ] Heiko Krumm , Oswald Drobnik Interactive verification of communication software on the basis of CIL. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 1984, v:14, n:2, pp:92-99 [Journal ] Peter Herrmann , Heiko Krumm A framework for modeling transfer protocols. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:34, n:2, pp:317-337 [Journal ] Hartmut König , Peter Langendörfer , Heiko Krumm Improving the efficiency of automated protocol implementations using a configurable FDT compiler. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:12, pp:1179-1195 [Journal ] Hartmut König , Heiko Krumm Implementierung von Kommunikationsprotokollen. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 1996, v:19, n:6, pp:316-325 [Journal ] Peter Herrmann , Heiko Krumm Modular specification and verification of XTP. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 1998, v:9, n:2, pp:207-221 [Journal ] Peter Herrmann , Heiko Krumm , Olaf Drögehorn , Walter Geisselhardt Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2002, v:20, n:3-4, pp:291-310 [Journal ] Heiko Krumm Logische Verifikation nebenläufiger Programme. [Citation Graph (0, 0)][DBLP ] Angewandte Informatik, 1987, v:29, n:4, pp:131-140 [Journal ] Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems. [Citation Graph (, )][DBLP ] Location-Transparent Integration of Distributed OSGi Frameworks and Web Services. [Citation Graph (, )][DBLP ] Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems. [Citation Graph (, )][DBLP ] Policy-gesteuertes Management adaptiver und gütegesicherter Dienstesysteme im Projekt OSAMI. [Citation Graph (, )][DBLP ] Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms. [Citation Graph (, )][DBLP ] Model-based configuration of VPNs. [Citation Graph (, )][DBLP ] Model-based management of security services in complex network environments. [Citation Graph (, )][DBLP ] Search in 0.757secs, Finished in 0.759secs