| 2008 |
| 14 | EE | Luca Compagna,
Volkmar Lotz,
Fabio Massacci:
Preface.
Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008) |
| 2007 |
| 13 | | Volkmar Lotz,
Bhavani M. Thuraisingham:
SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, Proceedings
ACM 2007 |
| 12 | EE | Martin Wimmer,
Martina-Cezara Albutiu,
Alfons Kemper,
Maarten Rits,
Volkmar Lotz:
Efficient Access Control for Composite Applications.
BTW 2007: 613-616 |
| 11 | EE | Arnaud Dury,
Sergiy Boroday,
Alexandre Petrenko,
Volkmar Lotz:
Formal Verification of Business Workflows and Role Based Access Control Systems.
SECURWARE 2007: 201-210 |
| 2006 |
| 10 | EE | Martin Wimmer,
Alfons Kemper,
Maarten Rits,
Volkmar Lotz:
Consolidating the Access Control of Composite Applications and Workflows.
DBSec 2006: 44-59 |
| 9 | EE | Andreas Schaad,
Volkmar Lotz,
Karsten Sohr:
A model-checking approach to analysing organisational controls in a loan origination process.
SACMAT 2006: 139-149 |
| 2005 |
| 8 | EE | David von Oheimb,
Volkmar Lotz,
Georg Walter:
Analyzing SLE 88 memory management security using Interacting State Machines.
Int. J. Inf. Sec. 4(3): 155-171 (2005) |
| 2003 |
| 7 | EE | David von Oheimb,
Georg Walter,
Volkmar Lotz:
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment.
ESORICS 2003: 217-234 |
| 6 | EE | David von Oheimb,
Volkmar Lotz:
Generic Interacting State Machines and Their Instantiation with Dynamic Features.
ICFEM 2003: 144-166 |
| 2002 |
| 5 | EE | David von Oheimb,
Volkmar Lotz:
Formal Security Analysis with Interacting State Machines.
ESORICS 2002: 212-228 |
| 2000 |
| 4 | EE | Volkmar Lotz,
Volker Kessler,
Georg Walter:
A Formal Security Model for Microprocessor Hardware.
IEEE Trans. Software Eng. 26(8): 702-712 (2000) |
| 1999 |
| 3 | EE | Volkmar Lotz,
Volker Kessler,
Georg Walter:
A Formal Security Model for Microprocessor Hardware.
World Congress on Formal Methods 1999: 718-737 |
| 1997 |
| 2 | | Volkmar Lotz:
Threat Scenarios as a Means to Formally Develop Secure Systems.
Journal of Computer Security 5(1): 31-68 (1997) |
| 1996 |
| 1 | EE | Volkmar Lotz:
Threat Scenarios as a Means to Formally Develop Secure Systems.
ESORICS 1996: 242-265 |