Search the dblp DataBase
Volkmar Lotz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Martin Wimmer , Martina-Cezara Albutiu , Alfons Kemper , Maarten Rits , Volkmar Lotz Efficient Access Control for Composite Applications. [Citation Graph (0, 0)][DBLP ] BTW, 2007, pp:613-616 [Conf ] Martin Wimmer , Alfons Kemper , Maarten Rits , Volkmar Lotz Consolidating the Access Control of Composite Applications and Workflows. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:44-59 [Conf ] Volkmar Lotz Threat Scenarios as a Means to Formally Develop Secure Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:242-265 [Conf ] David von Oheimb , Volkmar Lotz Formal Security Analysis with Interacting State Machines. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:212-228 [Conf ] David von Oheimb , Georg Walter , Volkmar Lotz A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:217-234 [Conf ] Volkmar Lotz , Volker Kessler , Georg Walter A Formal Security Model for Microprocessor Hardware. [Citation Graph (0, 0)][DBLP ] World Congress on Formal Methods, 1999, pp:718-737 [Conf ] David von Oheimb , Volkmar Lotz Generic Interacting State Machines and Their Instantiation with Dynamic Features. [Citation Graph (0, 0)][DBLP ] ICFEM, 2003, pp:144-166 [Conf ] Andreas Schaad , Volkmar Lotz , Karsten Sohr A model-checking approach to analysing organisational controls in a loan origination process. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:139-149 [Conf ] David von Oheimb , Volkmar Lotz , Georg Walter Analyzing SLE 88 memory management security using Interacting State Machines. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:3, pp:155-171 [Journal ] Volkmar Lotz Threat Scenarios as a Means to Formally Develop Secure Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:1, pp:31-68 [Journal ] Volkmar Lotz , Volker Kessler , Georg Walter A Formal Security Model for Microprocessor Hardware. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2000, v:26, n:8, pp:702-712 [Journal ] Towards Validating Security Protocol Deployment in the Wild. [Citation Graph (, )][DBLP ] Formal Verification of Business Workflows and Role Based Access Control Systems. [Citation Graph (, )][DBLP ] Preface. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs