2008 |
36 | EE | Máté J. Csorba,
Poul E. Heegaard,
Peter Herrmann:
Adaptable model-based component deployment guided by artificial ants.
Autonomics 2008: 15 |
35 | EE | Máté J. Csorba,
Poul E. Heegaard,
Peter Herrmann:
Cost-Efficient Deployment of Collaborating Components.
DAIS 2008: 253-268 |
34 | EE | Richard A. Kemmerer,
Roland Büschkes,
Ali Fessi,
Hartmut König,
Peter Herrmann,
Stephen D. Wolthusen,
Marko Jahnke,
Hervé Debar,
Ralph Holz,
Tanja Zseby,
Dirk Haage:
08102 Outcome Working Group -- Situational Awareness.
Network Attack Detection and Defense 2008 |
33 | EE | Mozhgan Tavakolifard,
Svein J. Knapskog,
Peter Herrmann:
Trust transferability among similar contexts.
Q2SWinet 2008: 91-97 |
32 | EE | Mozhgan Tavakolifard,
Svein J. Knapskog,
Peter Herrmann:
Cross-Situation Trust Reasoning.
Web Intelligence/IAT Workshops 2008: 67-71 |
2007 |
31 | EE | Frank Alexander Kraemer,
Rolv Bræk,
Peter Herrmann:
Synthesizing Components with Sessions from Collaboration-Oriented Service Specifications.
SDL Forum 2007: 166-185 |
30 | EE | Frank Alexander Kraemer,
Peter Herrmann:
Transforming Collaborative Service Specifications into Efficiently Executable State Machines.
ECEASST 6: (2007) |
2006 |
29 | EE | Frank Alexander Kraemer,
Peter Herrmann:
Service Specification by Composition of Collaborations--An Example.
IAT Workshops 2006: 129-133 |
28 | EE | Frank Alexander Kraemer,
Peter Herrmann,
Rolv Bræk:
Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services.
OTM Conferences (2) 2006: 1613-1632 |
27 | EE | Peter Herrmann:
Temporal Logic-Based Specification and Verification of Trust Models.
iTrust 2006: 105-119 |
26 | EE | Peter Herrmann,
Gaby Herrmann:
Security requirement analysis of business processes.
Electronic Commerce Research 6(3-4): 305-335 (2006) |
2005 |
25 | | Peter Herrmann,
Valérie Issarny,
Simon Shiu:
Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings
Springer 2005 |
2004 |
24 | | Peter Herrmann,
Lars Wiebusch,
Heiko Krumm:
Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software.
DIMVA 2004: 55-70 |
23 | EE | Günter Graw,
Peter Herrmann:
Generation and Enactment of Controllers for Business Architectures Using MDA.
EWSA 2004: 148-166 |
22 | EE | Günter Graw,
Peter Herrmann:
Transformation and Verification of Executable UML Models.
Electr. Notes Theor. Comput. Sci. 101: 3-24 (2004) |
21 | EE | Gaby Herrmann,
Peter Herrmann:
Introduction: Security and Trust in Electronic Commerce.
Electronic Commerce Research 4(1-2): 5-7 (2004) |
2003 |
20 | EE | Peter Herrmann:
Formal Security Policy Verification of Distributed Component-Structured Software.
FORTE 2003: 257-272 |
19 | EE | Peter Herrmann:
Trust-Based Protection of Software Component Users and Designers.
iTrust 2003: 75-90 |
2002 |
18 | | Peter Herrmann,
Lars Wiebusch,
Heiko Krumm:
State-Based Security Policy Enforcement in Component-Based E-Commerce Applications.
I3E 2002: 195-209 |
17 | | Inéz Frerichs,
Jose Hinz,
Peter Herrmann,
Gerald Weisser,
Günter Hahn,
Michael Quintel,
Gerhard Hellige:
Regional Lung Perfusion as Determined by Electrical Impedance Tomography in Comparison with Electron Beam CT Imaging.
IEEE Trans. Med. Imaging 21(6): 646-652 (2002) |
16 | | Peter Herrmann,
Heiko Krumm,
Olaf Drögehorn,
Walter Geisselhardt:
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs.
Telecommunication Systems 20(3-4): 291-310 (2002) |
2001 |
15 | EE | Peter Herrmann:
Information Flow Analysis of Component-Structured Applications.
ACSAC 2001: 45-54 |
14 | | Peter Herrmann,
Lars Wiebusch,
Heiko Krumm:
Tool-Assisted Security Assessment of Distributed Applications.
DAIS 2001: 289-294 |
13 | EE | Peter Herrmann,
Heiko Krumm:
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications.
ISCC 2001: 2-8 |
2000 |
12 | EE | Günter Graw,
Peter Herrmann,
Heiko Krumm:
Verification of UML-Based Real-Time System Designs by Means of cTLA.
ISORC 2000: 86-95 |
11 | EE | Peter Herrmann,
Heiko Krumm:
A framework for modeling transfer protocols.
Computer Networks 34(2): 317-337 (2000) |
1999 |
10 | | Günter Graw,
Peter Herrmann,
Heiko Krumm:
Constraint-oriented formal modelling of OO-systems.
DAIS 1999: 345- |
9 | | Günter Graw,
Peter Herrmann,
Heiko Krumm:
Composing Object-Oriented Specifications and Verifications with cTLA.
ECOOP Workshops 1999: 318 |
8 | | Peter Herrmann,
Manfred Noël:
Formale Verifikation eines Reglers für Fahrbahnmarkierungsmaschinen.
FBT 1999: 83-92 |
7 | EE | Peter Herrmann,
Heiko Krumm:
Formal Hazard Analysis of Hybrid Systems in cTLA.
SRDS 1999: 68-77 |
1998 |
6 | | Olaf Drögehorn,
Peter Herrmann:
Werkzeugunterstützte Protokollverifikation mit dem Transferprotokoll-Framework.
FBT 1998: 48-59 |
5 | EE | Volker Gruhn,
Peter Herrmann,
Heiko Krumm:
User-Defined Telecooperation Services.
ICPADS 1998: 590-598 |
4 | EE | Peter Herrmann,
Günter Graw,
Heiko Krumm:
Compositional Specification and Structured Verification of Hybrid Systems in cTLA.
ISORC 1998: 335- |
3 | | Peter Herrmann,
Heiko Krumm:
Modular specification and verification of XTP.
Telecommunication Systems 9(2): 207-221 (1998) |
1995 |
2 | | Peter Herrmann,
Heiko Krumm:
Re-usable verification elements for high-speed transfer protocol configurations.
PSTV 1995: 171-186 |
1994 |
1 | | Peter Herrmann,
Heiko Krumm:
Compositional specification and verification of high-speed transfer protocols.
PSTV 1994: 339-346 |