The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ulrich Flegel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joachim Biskup, Ulrich Flegel
    Threshold-based identity recovery for privacy enhanced applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:71-79 [Conf]
  2. Joachim Biskup, Ulrich Flegel, Yücel Karabulut
    Secure Mediation: Requirements and Design. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:127-140 [Conf]
  3. Joachim Biskup, Ulrich Flegel
    On Pseudonymization of Audit Data for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:161-180 [Conf]
  4. Ulrich Flegel, Joachim Biskup
    Requirements of Information Reductions for Cooperating Intrusion Detection Agents. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:466-480 [Conf]
  5. Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier
    Simplifying Signature Engineering by Reuse. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:436-450 [Conf]
  6. Joachim Biskup, Ulrich Flegel
    Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:488-496 [Conf]
  7. Ulrich Flegel
    Ein Architektur-Modell für anonyme Autorisierungen und Überwachungsdaten. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:293-304 [Conf]
  8. Ulrich Flegel
    Pseudonymizing Unix Log Files. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:162-179 [Conf]
  9. Joachim Biskup, Ulrich Flegel
    Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:28-48 [Conf]
  10. Ulrich Flegel
    Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:221-232 [Conf]
  11. Sebastian Schmerl, Ulrich Flegel, Michael Meier
    Vereinfachung der Signaturentwicklung durch Wiederverwendung. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:201-212 [Conf]
  12. Ulrich Flegel
    Anonyme Audit-Daten im Überblick - Architekturen für anonyme Autorisierungen und Audit-Daten. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2003, v:27, n:5, pp:- [Journal]
  13. Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut
    Secure Mediation: Requirements, Design, and Architecture. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:365-398 [Journal]
  14. Ulrich Flegel, Michael Meier
    Authorization Architectures for Privacy-Respecting Surveillance. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:1-17 [Conf]

  15. Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. [Citation Graph (, )][DBLP]


  16. Systematic Signature Engineering by Re-use of Snort Signatures. [Citation Graph (, )][DBLP]


  17. Towards Validating Security Protocol Deployment in the Wild. [Citation Graph (, )][DBLP]


  18. 08102 Working Group -- Intrusion and Fraud Detection for Web Services. [Citation Graph (, )][DBLP]


  19. Cooperation enablement for centralistic early warning systems. [Citation Graph (, )][DBLP]


  20. Towards Early Warning Systems - Challenges, Technologies and Architecture. [Citation Graph (, )][DBLP]


  21. A Secure Task Delegation Model for Workflows. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002