Publications with Keyword SECURITY

Sailer, R.*; Kühn, P.J.*: Ein Domain-Konzept zur systematischen und wirtschaftlichen Integration von Sicherheit in Kommunikationsnetze. Informationstechnik und Technische Informatik (it+ti), Vol. 38, No. 4, August 1996, pp. 30-33. [Show full record] / Download [PDF]

Sailer, R.*; Kühn, P.J.*: Integration von Authentikationsverfahren in Kommunikationsnetze unter Verwendung separat sicherbarer Bereiche. Mehrseitige Sicherheit in der Kommunikationstechnik; Verfahren, Komponenten, Integration, Addison-Wesley, Bonn, D, October 1997, pp. 133-165. [Show full record] / Download [PDF]

Sailer, R.*: Signalling and Service Interfaces for Separating Security Sensitive Telecommunication Functions Considering Multilateral Security. Proceedings of the 6th Open Workshop on High Speed Networks and Joint Workshop IND/Telecom Paris (Dept. Reseaux), Stuttgart, October 1997, pp. 99-109. [Show full record] / Download [PS]

Sailer, R.*: Security Services in an Open Service Environment. Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC '98), Phoenix, December 1998, pp. 223-234. [Show full record] / Download [PDF]

Gold, S.; Keck, D.O.*; Kühn, P.J.*; Müller, G.: Sichere Telekommunikationsdienste mit Intelligenten Netzen. Fachzeitschrift Praxis der Informationsverarbeitung und Kommunikation (PIK), Vol. 22, No. 2, April-June 1999, pp. 71-76. [Show full record] / Download [PS.GZ]

Kabatnik, M.*: Möglichkeiten des Zugangs zu PKI-Diensten für Anwender der SS7-Infrastruktur des ISDN. Beiträge zum 6. Deutschen IT-Sicherheitskongreß des BSI 1999, Bonn-Bad Godesberg, May 1999, pp. 231-244. [Show full record] / Download [PDF]

Sailer, R.*: Sicherheitsarchitektur für mehrseitig sichere Kommunikationsdienste am Beispiel ISDN - 76. Bericht über verkehrstheoretische Arbeiten. Dissertation, Universität Stuttgart, Elektrotechnik und Informationstechnik, 1999. [Show full record] / Download [PDF]

Kabatnik, M.*; Keck, D.O.*; Kreutzer, M.; Zugenmaier, A.: Multilateral Security in Intelligent Networks. Proceedings of the 2000 IEEE Intelligent Network Workshop, Cape Town, South Africa, May 2000. [Show full record]

Sailer, R.; Kabatnik, M.*: History Based Distributed Filtering - A Tagging Approach to Network-Level Access Control. Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), New Orleans, December 2000, pp. 373-382. [Show full record]

Hauser, C.*: Privacy Aspects of Nexus. Geo-Informations-Systeme, October 2001, pp. 35-36. [Show full record] / Download [PDF]

Hauser, C.*; Kabatnik, M.*: Towards privacy support in a global location service. Proceedings of the IFIP Workshop on IP and ATM Traffic Management (WATM/EUNICE 2001), Paris, September 2001, pp. 81-89. [Show full record] / Download [PDF]

Kabatnik, M.*; Sailer, R.: Distributed Filtering with Contags and Security-Labels. Proceedings of the International Conference on Telecommunication 2001 (ICT), Bucharest, June 2001. [Show full record]

Kabatnik, M.*; Zugenmaier, A.: Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks. Proceedings of the 1st International Conference on Networking (ICN 2001), Colmar, July 2001. [Show full record] / Download [PDF]

Kabatnik, M.*; Sailer, R.: Verteiltes Filtern mit Contags und Sicherheits-Labeln. Beiträge zur 12. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2001), Hamburg, February 2001, pp. 93-102. [Show full record]

Macian, C.*: The Octopus Network Model: Opening up the Internet to Active and Programmable Network Implementations. Proceedings of the 3rd International Working Conference on Active Networks (IWAN 2001), Philadelphia, September/October 2001. [Show full record] / Download [PDF]

Hauser, C.*; Leonhardi, A.; Kühn, P.J.*: Sicherheitsaspekte in NEXUS - einer Plattform für ortsbezogene Anwendungen. Informationstechnik und Technische Informatik (it+ti), Vol. 44, No. 5, October 2002, pp. 268-277. [Show full record] / Download [PDF]

Necker, M.C.; Contis, D.; Schimmel, D.: TCP-stream reassembly and state tracking in hardware. Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2002), Napa, CA, April 2002, pp. 286-287. [Show full record]

Horvath, O.; Macian, C.*; Stanchina, S.*: A Simple Autonomous Reconfigurable Cryptographic Node. Proceedings of the 9th EUNICE Open European Summer School and IFIP Workshop on Next Generation Networks, Balatonfüred, September 2003. [Show full record] / Download [PDF]

Rothermel, K.; Fritsch, D.; Kühn, P.J.*; Mitschang, B.; Bauer, M.; Becker, C.; Hauser, C.*; Nicklas, D.; Volz, S.: SFB627 Umgebungsmodelle für mobile kontextbezogene Systeme. Beiträge zur Informatik 2003 Innovative Informatikanwendungen, Frankfurt/Main, September 2003, pp. 103-115. [Show full record]

Clarke, J.; Butler, S.; Dempsey, S.; Crotty, M.; Brazil, J.; Blazic, A.; Hauser, C.*; Neubauer, M.*: Challenges of Identity, Authentication, and Discovery Management in a Ubiquitous Environment: The DAIDALOS perspective. Proceedings of the 7th International Symposium on Communications Interworking, INTERWORKING - 2004, Ottawa, November 2004. [Show full record] / Download [PDF]

Lück, S.*; Gutscher, A.*: Improving Access Discovery by Analysing World-Model Information. Ortsbezogene Anwendungen und Dienste, Fachgespräch der GI-Fachgruppe KuVS, Hagen, June 2004. [Show full record] / Download [PDF]

Zhang, W.*: Interworking Security in Heterogeneous Wireless IP Networks. Proceedings of 3rd International Conference on Networking (ICN '04), Guadeloupe, March 2004. [Show full record] / Download [PDF]

Clarke, J.; Butler, S.; Hauser, C.*; Neubauer, M.*; Robertson, P.; Orazem, I.; Jerman Blazic, A.; Williams, H.; Yang, Y.: Security and Privacy in a Pervasive World. Proceedings of the Eurescom Summit 2005, Heidelberg, April 2005. [Show full record] / Download [PDF]

Clarke, J.; Neubauer, M.*; Hauser, C.*: Security and privacy in a pervasive world - The Daidalos approach. EURESCOM message, Vol. 2, June 2005, pp. 8-8. [Show full record] / Download [PDF]

Fitzgerald, W.; Doolin, K.; Mahon, F.; Gomez Skarmeta, A.F.; Butler, S.; Schlosser, P.; Weyl, B.; Hauser, C.*: Daidalos Security Framework for Mobile Services. Proceedings of eChallanges 2005, Ljubljana, October 2005. [Show full record] / Download [PDF]

Olivereau, A.; Gomez Skarmeta, A.F.; Marin Lopez, R.; Weyl, B.; Brandao, P.; Mishra, P.; Ziemek, H.; Hauser, C.*: An Advanced Authorization Framework for IP-based B3G Systems. Proceedings of the 14th IST Mobile & Wireless Communications Summit, Dresden, June 2005. [Show full record] / Download [PDF]

Weyl, B.; Brandao, P.; Gomez Skarmeta, A.F.; Marin Lopez, R.; Mishra, P.; Ziemek, H.; Hauser, C.*: Protecting Privacy of Identities in Federated Operator Environments. Proceedings of the 14th IST Mobile & Wireless Communications Summit, Dresden, June 2005. [Show full record] / Download [PDF]

Aguiar, R.L.; Jähnert, J.; Gomez Skarmeta, A.F.; Hauser, C.*: Identity Management in Federated Telecommunications Systems. Proceedings of the Workshop on Standards for Privacy in User-Centric Identity Management 2006, Zurich, July 2006. [Show full record] / Download [PDF]

Gutscher, A.*: Coordinate Transformation - A Solution for the Privacy Problem of Location Based Services?. Proceedings of the 20th IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2006, 2nd International Workshop on Security in Systems and Networks (SSN) (in conjunction with IPDPS2006), Rhode Island, April 2006. [Show full record] / Download [PDF]

Kögel, J.*; Kiesel, S.*: Security Impact of DNS Delegation Structure and Configuration Problems. Beiträge zum Essener Workshop zur Netzwerksicherheit (EWNS) 2006, Essen, October 2006. [Show full record] / Download [PDF]

Rothermel, K.; Ertl, T.; Fritsch, D.; Kühn, P.J.*; Mitschang, B.; Westkämper, E.; Becker, C.; Dudkowski, D.; Gutscher, A.*; Hauser, C.*; Jendoubi, L.; Nicklas, D.; Volz, S.; Wieland, M.: SFB 627 ? Umgebungsmodelle für mobile kontextbezogene Systeme. Informatik - Forschung und Entwicklung, Vol. 21, No. 1-2, October 2006, pp. 105-113. [Show full record] / Download [PDF]

Roussaki, I.; Strimpakou, M.; Pils, C.; Kalatzis, N.; Neubauer, M.*; Hauser, C.*; Anagnostou, M.: Privacy-Aware Modelling and Distribution of Context Information in Pervasive Service Provision. Proceedings of the 2006 IEEE International Conference on Pervasive Services (ICPS 2006), Lyon, June 2006, pp. 150-160. [Show full record] / Download [PDF]

Gutscher, A.*: A Trust Model for an Open, Decentralized Reputation System. Proceedings of the Joint iTrust and PST Conferences on Privacy Trust Management and Security (IFIPTM 2007), Moncton, New Brunswick, July 2007. [Show full record] / Download [PDF]

Macian, C.*: Resource Management in Hardware Systems for Programmable Network Nodes - Communication Networks and Computer Engineering Report No. 94. Dissertation, Universität Stuttgart, EI, 2007. [Show full record] / Download [PDF]

Fries, S.; Kögel, J.*; Barisch, M.*; Rathgeb, E.P.: Kommunikationsdienste im Internet - Möglichkeiten und Risiken. NTZ - Nachrichtentechnische Zeitung, Vol. 61, No. 7-8, Vol. 61, No. 7-8, 2008, pp. 18-21. [Show full record]

Gutscher, A.*; Heesen, J.; Siemoneit, O.: Possibilities and Limitations of Modeling Trust and Reputation. Proceedings of the 5th International Workshop on Philosophy and Informatics, Kaiserslautern, April 2008. [Show full record] / Download [PDF]

Heesen, J.; Neubauer, M.*: Soziale Netze und die Individualisierung der IT als Datenschutzproblem. Beiträge zur Informatik 2008 Beherrschbare Systeme - 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI) im 'Workshop Digitale Soziale Netze', München, September 2008, pp. 2-916-2-922. [Show full record] / Download [PDF]

Kiesel, S.; Kögel, J.*: An operating system independent API for firewall control: design and implementation for Linux. Proceedings of the 14th Open European Summer School (EUNICE 2008), Brest, September 2008. [Show full record] / Download [PDF]

Kögel, J.*; Kiesel, S.*; Meier, S.: An API for dynamic firewall control and its implementation for Linux Netfilter. Beiträge zum 3. Essener Workshop 'Neue Herausforderungen in der Netzsicherheit', Essen, April 2008. [Show full record] / Download [PDF]

Papadopoulou, E.; McBurney, S.; Taylor, N.; Williams, M.H.; Dolinar, K.; Neubauer, M.*: Using User Preferences to Enhance Privacy in Pervasive Systems. Proceedings of the 3rd International Conference on Systems (ICONS 2008), Cancun, April 2008, pp. 271-276. [Show full record] / Download [PDF]

Barisch, M.*: Modelling the Impact of Virtual Identities on Communication Infrastructures. Proceedings of the 5th ACM Workshop on Digital Identity Management (DIM 2009) (Collocated with ACM CCS2009), Chicago, IL, November 2009. [Show full record] / Download [PDF]

Barisch, M.*; Berg, S.; Brodt, A.; Geiger, L.; Gerpott, T.; Gutscher, A.*; Hubig, C.; Kühlewind, M.*; Kühn, P.J.*; Siemoneit, O.: Aspekte der Abrechenbarkeit und Bepreisung kontextbezogener Systeme. Report, SFB 627 Bericht Nr. 2010/03, Stuttgart, February 2010. [Show full record] / Download [PDF]

Barisch, M.*; Torroglosa, E.; Lischka, M.; Marques, R.; Marx, R.; Matos, A.; Perez, A.; Scheuermann, D.: Security and Privacy Enablers for Future Identity Management Systems. Future Network & Mobile Summit 2010, Florence, June 2010. [Show full record] / Download [PDF]

Güthle, M.; Kögel, J.*; Wahl, S.; Kaschub, M.*; Müller, C.M.*: Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures. Future Internet, Vol. 2, No. 4, 2010, pp. 662-669. [Show full record] / Download [PDF]

Güthle, M.; Kögel, J.*; Wahl, S.; Müller, C.M.*; Kaschub, M.*: Improving Anomaly Detection for Text-based Protocols by Exploiting Message Structures. Security in NGNs and the Future Internet Workshop (SNFI 2010), Berlin, September 2010. [Show full record] / Download [PDF]

Barisch, M.*: Design and Evaluation for Ubiquitous User Authentication based on Identity Management Systems. IEEE International Workshop on Trust and Identity in Mobile Internet, Computing and Communications, Changsha, November 2011. [Show full record] / Download [PDF]

Barisch, M.*: Design and Evaluation of a Sytem to Extend Identity Management to Multiple Devices - Communication Networks and Computer Engineering Report No. 109. Dissertation, Universität Stuttgart, Informatik, Elektrotechnik und Informationstechnik, 2012. [Show full record] / Download [PDF]

Berger, S.; Vensmer, A.*; Kiesel, S.: An ABAC-based Policy Framework for Dynamic Firewalling. Proceedings of The Seventh International Conference on Systems and Networks Communications (ICSNC 2012), Lisbon, November 2012, pp. 118-123. [Show full record] / Download [PDF]

Tavakoli, Z.*; Vensmer, A.*; Meier, S.*: A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment. Eunice 2012, Budapest, August 2012. [Show full record] / Download [PDF]

Vensmer, A.*; Kiesel, S.: DynFire: Dynamic Firewalling in Heterogeneous Environments. World Congress on Internet Security (WorldCIS-2012), Guelph, June 2012. [Show full record] / Download [PDF]

Vensmer, A.*; Berger, S.: DynFire - Verteilte Firewalls in heterogenen Netzwerken. 20. DFN Workshop "Sicherheit in vernetzten Systemen", Hamburg, February 2013. [Show full record] / Download [PDF]

Kabatnik, M.: Grammatikbasierte Zertifikate am Beispiel von Sicherheitsauditierungen in verteilten Systemen. Dissertation, Universität Stuttgart, Informatik, Elektrotechnik- und Informationstechnik, 2015. [Show full record] / Download [PDF]