The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Volkmar Lotz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemper, Maarten Rits, Volkmar Lotz
    Efficient Access Control for Composite Applications. [Citation Graph (0, 0)][DBLP]
    BTW, 2007, pp:613-616 [Conf]
  2. Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz
    Consolidating the Access Control of Composite Applications and Workflows. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:44-59 [Conf]
  3. Volkmar Lotz
    Threat Scenarios as a Means to Formally Develop Secure Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:242-265 [Conf]
  4. David von Oheimb, Volkmar Lotz
    Formal Security Analysis with Interacting State Machines. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:212-228 [Conf]
  5. David von Oheimb, Georg Walter, Volkmar Lotz
    A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:217-234 [Conf]
  6. Volkmar Lotz, Volker Kessler, Georg Walter
    A Formal Security Model for Microprocessor Hardware. [Citation Graph (0, 0)][DBLP]
    World Congress on Formal Methods, 1999, pp:718-737 [Conf]
  7. David von Oheimb, Volkmar Lotz
    Generic Interacting State Machines and Their Instantiation with Dynamic Features. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2003, pp:144-166 [Conf]
  8. Andreas Schaad, Volkmar Lotz, Karsten Sohr
    A model-checking approach to analysing organisational controls in a loan origination process. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:139-149 [Conf]
  9. David von Oheimb, Volkmar Lotz, Georg Walter
    Analyzing SLE 88 memory management security using Interacting State Machines. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:155-171 [Journal]
  10. Volkmar Lotz
    Threat Scenarios as a Means to Formally Develop Secure Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:1, pp:31-68 [Journal]
  11. Volkmar Lotz, Volker Kessler, Georg Walter
    A Formal Security Model for Microprocessor Hardware. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:8, pp:702-712 [Journal]

  12. Towards Validating Security Protocol Deployment in the Wild. [Citation Graph (, )][DBLP]


  13. Formal Verification of Business Workflows and Role Based Access Control Systems. [Citation Graph (, )][DBLP]


  14. Preface. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002