Claudia Eckert
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
55 | EE | Frederic Stumpf, Claudia Eckert, Shane Balfe: Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. ARES 2008: 376-382 |
54 | EE | Sascha Müller, Stefan Katzenbeisser, Claudia Eckert: Distributed Attribute-Based Encryption. ICISC 2008: 20-36 |
53 | EE | Frederic Stumpf, Claudia Eckert: Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. SECURWARE 2008: 1-9 |
52 | EE | Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeisser, Claudia Eckert: Improving the scalability of platform attestation. STC 2008: 1-10 |
51 | EE | Lars Fischer, Claudia Eckert: 506 Ways to Track Your Lover. VTC Fall 2008: 1-5 |
50 | EE | Christoph Krauß, Markus Schneider, Claudia Eckert: Defending against false-endorsement-based dos attacks in wireless sensor networks. WISEC 2008: 13-23 |
49 | EE | Lars Fischer, Stefan Katzenbeisser, Claudia Eckert: Measuring unlinkability revisited. WPES 2008: 105-110 |
48 | EE | Christoph Krauß, Markus Schneider, Claudia Eckert: An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs. WiMob 2008: 586-591 |
2007 | ||
47 | EE | Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert: STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. ARES 2007: 310-317 |
46 | EE | Patrick Röder, Omid Tafreschi, Claudia Eckert: History-based access control for XML documents. ASIACCS 2007: 386-388 |
45 | EE | Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert: An Approach to a Trustworthy System Architecture Using Virtualization. ATC 2007: 191-202 |
44 | EE | Taufiq Rochaeli, Claudia Eckert: Using patterns paradigm to refine workflow policies. DEXA Workshops 2007: 760-764 |
43 | EE | Taufiq Rochaeli, Claudia Eckert: Model Checking of Restricted CTL* Formulas using ALCK. Description Logics 2007 |
42 | EE | Christoph Krauß, Frederic Stumpf, Claudia M. Eckert: Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. ESAS 2007: 203-217 |
41 | EE | Patrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia M. Eckert: A System Architecture for History-Based Access Control for XML Documents. ICICS 2007: 362-374 |
40 | EE | Patrick Röder, Omid Tafreschi, Claudia Eckert: On Flexible Modeling of History-Based Access Control Policies for XML Documents. KES (3) 2007: 1090-1097 |
39 | EE | Taufiq Rochaeli, Claudia Eckert: Expertise Knowledge-Based Policy Refinement Process. POLICY 2007: 61-65 |
38 | EE | Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert: Situation-Based Policy Enforcement. TrustBus 2007: 190-200 |
37 | EE | Frederic Stumpf, Patrick Röder, Claudia Eckert: An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. WISA 2007: 142-156 |
36 | Omid Tafreschi, Dominique Maehler, Janina Fengel, Michael Rebstock, Claudia Eckert: A Reputation System for Electronic Negotiations. WOSIS 2007: 53-62 | |
35 | EE | Tomás L. Flanagan, Claudia Eckert, P. John Clarkson: Externalizing tacit overview knowledge: A model-based approach to supporting design teams. AI EDAM 21(3): 227-242 (2007) |
2006 | ||
34 | EE | Thomas Stibor, Jonathan Timmis, Claudia Eckert: On Permutation Masks in Hamming Negative Selection. ICARIS 2006: 122-135 |
33 | EE | Thomas Stibor, Jonathan Timmis, Claudia Eckert: On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions. ICARIS 2006: 215-228 |
32 | EE | René Keller, Tomás L. Flanagan, Claudia M. Eckert, P. John Clarkson: Two sides of the story: Visualising Products and Processes in Engineering Design. IV 2006: 362-367 |
31 | EE | Claudia M. Eckert, Ellen Yi-Luen Do: Special Issue: Understanding, representing, and reasoning about style. AI EDAM 20(3): 163-165 (2006) |
30 | EE | Anja M. Maier, Claudia M. Eckert, P. John Clarkson: Identifying requirements for communication support: A maturity grid-inspired approach. Expert Syst. Appl. 31(4): 663-672 (2006) |
29 | EE | René Keller, Claudia Eckert, P. John Clarkson: Matrices or node-link diagrams: which visual representation is better for visualising connectivity models? Information Visualization 5(1): 62-76 (2006) |
28 | EE | Thomas Stibor, Claudia Eckert, Jonathan Timmis: Artificial Immune Systems for IT-Security (Künstliche Immunsysteme für IT-Sicherheit). it - Information Technology 48(3): 168-173 (2006) |
2005 | ||
27 | EE | Thomas Stibor, Jonathan Timmis, Claudia M. Eckert: On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system. Congress on Evolutionary Computation 2005: 995-1002 |
26 | EE | Taufiq Rochaeli, Claudia Eckert: Attack Goal Generation Using Description Logic-based Knowledge Representation. Description Logics 2005 |
25 | EE | Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, Claudia Eckert: Is negative selection appropriate for anomaly detection? GECCO 2005: 321-328 |
24 | EE | Thomas Stibor, Jonathan Timmis, Claudia Eckert: A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques. ICARIS 2005: 262-275 |
23 | EE | Claudia Eckert: Security Issues of Mobile Devices. SPC 2005: 163 |
2004 | ||
22 | Kpatcha M. Bayarou, Sebastian Rohr, Claudia Eckert: Interworking von UMTS und LAN: Eine sicherheitstechnische Betrachtung. DFN-Arbeitstagung über Kommunikationsnetze 2004: 413-432 | |
21 | Claudia Eckert: Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net. DFN-Arbeitstagung über Kommunikationsnetze 2004: 433-450 | |
20 | EE | Timothy Jarratt, René Keller, Seena Nair, Claudia Eckert, P. John Clarkson: Visualization Techniques for Product Change and Product Modelling in Complex Design. Diagrams 2004: 388-391 |
19 | EE | Thomas Stibor, Kpatcha M. Bayarou, Claudia Eckert: An Investigation of R-Chunk Detector Generation on Higher Alphabets. GECCO (1) 2004: 299-307 |
18 | EE | Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert: Protected transmission of biometric user authentication data for oncard-matching. SAC 2004: 425-430 |
17 | EE | Claudia Eckert, Kpatcha M. Bayarou, Sebastian Rohr: NGN, All-IP, B3G: Enabler für das Future Net?!: Überblick über Entwicklungen im Bereich zukünftiger Netze. Informatik Spektrum 27(1): 12-34 (2004) |
2003 | ||
16 | EE | David Wynn, Claudia Eckert, P. John Clarkson: Planning Business Processes in Product Development Organizations. CAiSE Workshops 2003 |
15 | EE | Claudia Eckert, Jean-François Boujut: The Role of Objects in Design Co-Operation: Communication through Physical or Virtual Objects. Computer Supported Cooperative Work 12(2): 145-151 (2003) |
14 | EE | Martin Stacey, Claudia Eckert: Against Ambiguity. Computer Supported Cooperative Work 12(2): 153-183 (2003) |
2001 | ||
13 | Claudia Eckert, A. Pircher: Internet Anonymity: Problems and Solutions. SEC 2001: 35-50 | |
12 | Claudia Eckert: The Communication Bottleneck in Knitwear Design: Analysis and Computing Solutions. Computer Supported Cooperative Work 10(1): 29-74 (2001) | |
2000 | ||
11 | EE | Uwe Baumgarten, Claudia Eckert, Harald Görl: Trust and confidence in open systems: does security harmonize with mobility? ACM SIGOPS European Workshop 2000: 133-138 |
10 | EE | P. John Clarkson, Andres Melo, Claudia Eckert: Visualization of Routes in Design Process Planning. IV 2000: 155-164 |
9 | Claudia Eckert, Florian Erhard, Johannes Geiger: GSFS - A New Group-Aware Cryptographic File System. SEC 2000: 221-230 | |
1999 | ||
8 | EE | Claudia Eckert, Ian Kelly, Martin Stacey: Interactive generative systems for conceptual design: An empirical perspective. AI EDAM 13(4): 303-320 (1999) |
7 | EE | Claudia Eckert, Markus Pizka: Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts. The Journal of Supercomputing 13(1): 33-55 (1999) |
1997 | ||
6 | EE | Markus Pizka, Claudia Eckert: A Language-Based Approach to Construct Structured and Efficient. HICSS (1) 1997: 130-139 |
5 | Markus Pizka, Claudia Eckert, Sascha Groh: Evolving Software Tools for New Distributed Computing Environments. PDPTA 1997: 87-96 | |
4 | Claudia Eckert, D. Marek: Developing secure applications: a systematic approach. SEC 1997: 267-279 | |
3 | Claudia Eckert, Th. Stoesslein: MVS-SAT: a security administration tool to support SMF protocol data evaluation. SEC 1997: 363-374 | |
1996 | ||
2 | Claudia Eckert: On security models. SEC 1996: 485-486 | |
1994 | ||
1 | Claudia Eckert, Martin Stacey: CAD Systems and the Division of Labour in Knitwear Design. Woman, Work and Computerization 1994: 409-422 |