dblp.uni-trier.dewww.uni-trier.de

Günter Karjoth Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
47EEDavid A. Basin, Samuel J. Burri, Günter Karjoth: Dynamic Enforcement of Abstract Separation of Duty Constraints. ESORICS 2009: 250-267
2008
46EEGünter Karjoth, Andreas Schade, Els Van Herreweghen: Implementing ACL-Based Policies in XACML. ACSAC 2008: 183-192
45EES. Sitharama Iyengar, Richard R. Brooks, Günter Karjoth: International Journal of Distributed Sensor Networks. IJDSN 4(1): 1-3 (2008)
2007
44 Günter Karjoth, Ketil Stølen: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007
2006
43 Günter Karjoth, Fabio Massacci: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006
2005
42EEGünter Karjoth, Paul A. Moskowitz: Disabling RFID tags with visible confirmation: clipped tags are silenced. WPES 2005: 27-30
2004
41EEMichael Backes, Markus Dürmuth, Günter Karjoth: Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. POLICY 2004: 185-188
40EEMichael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter: Efficient comparison of enterprise privacy policies. SAC 2004: 375-382
39EEGünter Karjoth, Matthias Schunter, Michael Waidner: Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004)
2003
38EEGünter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner: Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449
37EEGünter Karjoth, Matthias Schunter, Els Van Herreweghen: Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. POLICY 2003: 135-146
36EEGünter Karjoth: Access control with IBM Tivoli access manager. ACM Trans. Inf. Syst. Secur. 6(2): 232-257 (2003)
2002
35 Dieter Gollmann, Günter Karjoth, Michael Waidner: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings Springer 2002
34EEGünter Karjoth, Matthias Schunter: A Privacy Policy Model for Enterprises. CSFW 2002: 271-281
33EEGünter Karjoth, Matthias Schunter, Michael Waidner: Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487
32EEGünter Karjoth, Matthias Schunter, Michael Waidner: Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84
31EEPaul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter: E-P3P privacy policies and privacy authorization. WPES 2002: 103-109
2001
30EEGünter Karjoth: The Authorization Service of Tivoli Policy Director. ACSAC 2001: 319-328
29EEJoy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth: Cryptographic Security for Mobile Code. IEEE Symposium on Security and Privacy 2001: 2-11
28 Jürgen Bohn, Günter Karjoth: Sicherheitsdienste für mobile Agentenanwendungen. Kommunikation in Verteilten Systemen 2001: 305-314
27EEJürgen Bohn, Günter Karjoth: Generische Sicherheitsdienste für mobile Anwendungen. HMD - Praxis Wirtschaftsinform. 220: (2001)
2000
26 Günter Karjoth: Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces. ASA/MA 2000: 44-56
25 Luke O'Connor, Günter Karjoth: Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees. CARDIS 2000: 327-344
24EEGünter Karjoth: An Operational Semantics of Java 2 Access Control. CSFW 2000: 224-232
23 Günter Karjoth: Authorization in CORBA Security. Journal of Computer Security 8(2/3): (2000)
1998
22EEPeter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166
21EEGünter Karjoth: Authorization in CORBA Security. ESORICS 1998: 143-158
20EEGünter Karjoth, N. Asokan, Ceki Gülcü: Protecting the Computation Results of Free-Roaming Agents. Mobile Agents 1998: 195-207
19EEGünter Karjoth, Danny B. Lange, Mitsuru Oshima: A Security Model for Aglets. Mobile Agents and Security 1998: 188-205
18 Günter Karjoth, N. Asokan, Ceki Gülcü: Protecting the Computation Results of Free-Roaming Agents. Personal and Ubiquitous Computing 2(2): (1998)
1997
17 Danny B. Lange, Mitsuru Oshima, Günter Karjoth, Kazuya Kosaka: Aglets: Programming Mobile Agents in Java. WWCA 1997: 253-266
16 Günter Karjoth, Danny B. Lange, Mitsuru Oshima: A Security Model for Aglets. IEEE Internet Computing 1(4): 68-77 (1997)
15EEWillibald A. Doeringer, Günter Karjoth, Mehdi Nassehi: Corrections to ``Routing on longest-matching prefixes''. IEEE/ACM Trans. Netw. 5(4): 600 (1997)
1996
14EEWillibald A. Doeringer, Günter Karjoth, Mehdi Nassehi: Routing on longest-matching prefixes. IEEE/ACM Trans. Netw. 4(1): 86-97 (1996)
1995
13 Günter Karjoth: Integrated Access Control Management. IS&N 1995: 64-74
1993
12 Günter Karjoth: Dynamic State Machines with Multiway Synchronization, Channels and Shared Variables. PSTV 1993: 61-76
11 Günter Karjoth, Carl Binding, Jan Gustafsson: LOEWE: A LOTOS Engineering Workbench. Computer Networks and ISDN Systems 25(7): 853-874 (1993)
1992
10EEGünter Karjoth: Implementing LOTOS Specifications by Communicating State Machines. CONCUR 1992: 386-400
9 Günter Karjoth: Generating transition graphs from LOTOS specifications. FORTE 1992: 281-294
8EEGünter Karjoth: XFSM: A Format Model of Communicating State Machines for Implementation Specification. PARLE 1992: 979-980
7 Carl Binding, Wiet Bouma, Michel Dauphin, Günter Karjoth, Yan Yang: A Common Compiler for LOTOS and SDL Specifications. IBM Systems Journal 31(4): 668-690 (1992)
1990
6 Günter Karjoth: A Compilation of Algebraic Processes Based on Extended-Action Derivation. FORTE 1990: 127-140
1988
5 Günter Karjoth: A LISP-Based LOTOS Environment. FORTE 1988: 73-77
1986
4 Günter Karjoth: On the Formal Specification of Protocols in Distributed Databases. ICCC 1986: 479-484
1985
3 Günter Karjoth: An interactive system for the analysis of communicating processes. PSTV 1985: 91-102
1984
2 Ed Brinksma, Günter Karjoth: A Specification of the OSI Transport Service in LOTOS. PSTV 1984: 227-251
1983
1 Günter Karjoth: A Behavioural Description Language for the Formal Treatment of Protocols in Distributed Systems. Protocol Specification, Testing, and Verification 1983: 125-136

Coauthor Index

1Joy Algesheimer [29]
2Paul Ashley [31]
3N. Asokan [18] [20]
4Michael Backes [40] [41]
5Walid Bagga [40]
6David A. Basin [47]
7Carl Binding [7] [11]
8Jürgen Bohn [27] [28]
9Wiet Bouma (L. G. Bouma) [7]
10Ed Brinksma [2]
11Richard R. Brooks [45]
12Samuel J. Burri [47]
13Christian Cachin [29]
14Jan Camenisch [29]
15Michel Dauphin [7]
16Willibald A. Doeringer [14] [15]
17Markus Dürmuth [41]
18Dieter Gollmann [22] [35]
19Li Gong [22]
20Ceki Gülcü [18] [20]
21Jan Gustafsson [11]
22Satoshi Hada [31]
23Els Van Herreweghen [37] [38] [46]
24S. Sitharama Iyengar [45]
25Kazuya Kosaka [17]
26Danny B. Lange [16] [17] [19]
27Fabio Massacci [43]
28Chris J. Mitchell [22]
29Paul A. Moskowitz [42]
30Mehdi Nassehi [14] [15]
31Luke O'Connor [25]
32Mitsuru Oshima [16] [17] [19]
33Peter Y. A. Ryan (Peter Ryan) [22]
34Andreas Schade [46]
35Matthias Schunter [31] [32] [33] [34] [37] [38] [39] [40]
36Ketil Stølen [44]
37Michael Waidner [32] [33] [35] [38] [39]
38Yan Yang [7]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)