2008 |
45 | EE | S. Sitharama Iyengar,
Richard R. Brooks,
Günter Karjoth:
International Journal of Distributed Sensor Networks.
IJDSN 4(1): 1-3 (2008) |
2007 |
44 | | Günter Karjoth,
Ketil Stølen:
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007
ACM 2007 |
2006 |
43 | | Günter Karjoth,
Fabio Massacci:
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006
ACM 2006 |
2005 |
42 | EE | Günter Karjoth,
Paul A. Moskowitz:
Disabling RFID tags with visible confirmation: clipped tags are silenced.
WPES 2005: 27-30 |
2004 |
41 | EE | Michael Backes,
Markus Dürmuth,
Günter Karjoth:
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog.
POLICY 2004: 185-188 |
40 | EE | Michael Backes,
Günter Karjoth,
Walid Bagga,
Matthias Schunter:
Efficient comparison of enterprise privacy policies.
SAC 2004: 375-382 |
39 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Privacy-enabled Management of Customer Data.
IEEE Data Eng. Bull. 27(1): 3-9 (2004) |
2003 |
38 | EE | Günter Karjoth,
Matthias Schunter,
Els Van Herreweghen,
Michael Waidner:
Amending P3P for Clearer Privacy Promises.
DEXA Workshops 2003: 445-449 |
37 | EE | Günter Karjoth,
Matthias Schunter,
Els Van Herreweghen:
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep.
POLICY 2003: 135-146 |
36 | EE | Günter Karjoth:
Access control with IBM Tivoli access manager.
ACM Trans. Inf. Syst. Secur. 6(2): 232-257 (2003) |
2002 |
35 | | Dieter Gollmann,
Günter Karjoth,
Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings
Springer 2002 |
34 | EE | Günter Karjoth,
Matthias Schunter:
A Privacy Policy Model for Enterprises.
CSFW 2002: 271-281 |
33 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Privacy-Enabled Services for Enterprises.
DEXA Workshops 2002: 483-487 |
32 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Privacy Enhancing Technologies 2002: 69-84 |
31 | EE | Paul Ashley,
Satoshi Hada,
Günter Karjoth,
Matthias Schunter:
E-P3P privacy policies and privacy authorization.
WPES 2002: 103-109 |
2001 |
30 | EE | Günter Karjoth:
The Authorization Service of Tivoli Policy Director.
ACSAC 2001: 319-328 |
29 | EE | Joy Algesheimer,
Christian Cachin,
Jan Camenisch,
Günter Karjoth:
Cryptographic Security for Mobile Code.
IEEE Symposium on Security and Privacy 2001: 2-11 |
28 | | Jürgen Bohn,
Günter Karjoth:
Sicherheitsdienste für mobile Agentenanwendungen.
Kommunikation in Verteilten Systemen 2001: 305-314 |
27 | EE | Jürgen Bohn,
Günter Karjoth:
Generische Sicherheitsdienste für mobile Anwendungen.
HMD - Praxis Wirtschaftsinform. 220: (2001) |
2000 |
26 | | Günter Karjoth:
Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces.
ASA/MA 2000: 44-56 |
25 | | Luke O'Connor,
Günter Karjoth:
Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees.
CARDIS 2000: 327-344 |
24 | EE | Günter Karjoth:
An Operational Semantics of Java 2 Access Control.
CSFW 2000: 224-232 |
23 | | Günter Karjoth:
Authorization in CORBA Security.
Journal of Computer Security 8(2/3): (2000) |
1998 |
22 | EE | Peter Y. A. Ryan,
Dieter Gollmann,
Li Gong,
Günter Karjoth,
Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies.
CSFW 1998: 164-166 |
21 | EE | Günter Karjoth:
Authorization in CORBA Security.
ESORICS 1998: 143-158 |
20 | EE | Günter Karjoth,
N. Asokan,
Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents.
Mobile Agents 1998: 195-207 |
19 | EE | Günter Karjoth,
Danny B. Lange,
Mitsuru Oshima:
A Security Model for Aglets.
Mobile Agents and Security 1998: 188-205 |
18 | | Günter Karjoth,
N. Asokan,
Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents.
Personal and Ubiquitous Computing 2(2): (1998) |
1997 |
17 | | Danny B. Lange,
Mitsuru Oshima,
Günter Karjoth,
Kazuya Kosaka:
Aglets: Programming Mobile Agents in Java.
WWCA 1997: 253-266 |
16 | | Günter Karjoth,
Danny B. Lange,
Mitsuru Oshima:
A Security Model for Aglets.
IEEE Internet Computing 1(4): 68-77 (1997) |
15 | EE | Willibald A. Doeringer,
Günter Karjoth,
Mehdi Nassehi:
Corrections to ``Routing on longest-matching prefixes''.
IEEE/ACM Trans. Netw. 5(4): 600 (1997) |
1996 |
14 | EE | Willibald A. Doeringer,
Günter Karjoth,
Mehdi Nassehi:
Routing on longest-matching prefixes.
IEEE/ACM Trans. Netw. 4(1): 86-97 (1996) |
1995 |
13 | | Günter Karjoth:
Integrated Access Control Management.
IS&N 1995: 64-74 |
1993 |
12 | | Günter Karjoth:
Dynamic State Machines with Multiway Synchronization, Channels and Shared Variables.
PSTV 1993: 61-76 |
11 | | Günter Karjoth,
Carl Binding,
Jan Gustafsson:
LOEWE: A LOTOS Engineering Workbench.
Computer Networks and ISDN Systems 25(7): 853-874 (1993) |
1992 |
10 | | Günter Karjoth:
Implementing LOTOS Specifications by Communicating State Machines.
CONCUR 1992: 386-400 |
9 | | Günter Karjoth:
Generating transition graphs from LOTOS specifications.
FORTE 1992: 281-294 |
8 | | Günter Karjoth:
XFSM: A Format Model of Communicating State Machines for Implementation Specification.
PARLE 1992: 979-980 |
7 | | Carl Binding,
Wiet Bouma,
Michel Dauphin,
Günter Karjoth,
Yan Yang:
A Common Compiler for LOTOS and SDL Specifications.
IBM Systems Journal 31(4): 668-690 (1992) |
1990 |
6 | | Günter Karjoth:
A Compilation of Algebraic Processes Based on Extended-Action Derivation.
FORTE 1990: 127-140 |
1988 |
5 | | Günter Karjoth:
A LISP-Based LOTOS Environment.
FORTE 1988: 73-77 |
1986 |
4 | | Günter Karjoth:
On the Formal Specification of Protocols in Distributed Databases.
ICCC 1986: 479-484 |
1985 |
3 | | Günter Karjoth:
An interactive system for the analysis of communicating processes.
PSTV 1985: 91-102 |
1984 |
2 | | Ed Brinksma,
Günter Karjoth:
A Specification of the OSI Transport Service in LOTOS.
PSTV 1984: 227-251 |
1983 |
1 | | Günter Karjoth:
A Behavioural Description Language for the Formal Treatment of Protocols in Distributed Systems.
Protocol Specification, Testing, and Verification 1983: 125-136 |