2008 |
14 | EE | Luca Compagna,
Volkmar Lotz,
Fabio Massacci:
Preface.
Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008) |
2007 |
13 | | Volkmar Lotz,
Bhavani M. Thuraisingham:
SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, Proceedings
ACM 2007 |
12 | EE | Martin Wimmer,
Martina-Cezara Albutiu,
Alfons Kemper,
Maarten Rits,
Volkmar Lotz:
Efficient Access Control for Composite Applications.
BTW 2007: 613-616 |
11 | EE | Arnaud Dury,
Sergiy Boroday,
Alexandre Petrenko,
Volkmar Lotz:
Formal Verification of Business Workflows and Role Based Access Control Systems.
SECURWARE 2007: 201-210 |
2006 |
10 | EE | Martin Wimmer,
Alfons Kemper,
Maarten Rits,
Volkmar Lotz:
Consolidating the Access Control of Composite Applications and Workflows.
DBSec 2006: 44-59 |
9 | EE | Andreas Schaad,
Volkmar Lotz,
Karsten Sohr:
A model-checking approach to analysing organisational controls in a loan origination process.
SACMAT 2006: 139-149 |
2005 |
8 | EE | David von Oheimb,
Volkmar Lotz,
Georg Walter:
Analyzing SLE 88 memory management security using Interacting State Machines.
Int. J. Inf. Sec. 4(3): 155-171 (2005) |
2003 |
7 | EE | David von Oheimb,
Georg Walter,
Volkmar Lotz:
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment.
ESORICS 2003: 217-234 |
6 | EE | David von Oheimb,
Volkmar Lotz:
Generic Interacting State Machines and Their Instantiation with Dynamic Features.
ICFEM 2003: 144-166 |
2002 |
5 | EE | David von Oheimb,
Volkmar Lotz:
Formal Security Analysis with Interacting State Machines.
ESORICS 2002: 212-228 |
2000 |
4 | EE | Volkmar Lotz,
Volker Kessler,
Georg Walter:
A Formal Security Model for Microprocessor Hardware.
IEEE Trans. Software Eng. 26(8): 702-712 (2000) |
1999 |
3 | EE | Volkmar Lotz,
Volker Kessler,
Georg Walter:
A Formal Security Model for Microprocessor Hardware.
World Congress on Formal Methods 1999: 718-737 |
1997 |
2 | | Volkmar Lotz:
Threat Scenarios as a Means to Formally Develop Secure Systems.
Journal of Computer Security 5(1): 31-68 (1997) |
1996 |
1 | EE | Volkmar Lotz:
Threat Scenarios as a Means to Formally Develop Secure Systems.
ESORICS 1996: 242-265 |