dblp.uni-trier.dewww.uni-trier.de

Volkmar Lotz

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
14EELuca Compagna, Volkmar Lotz, Fabio Massacci: Preface. Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008)
2007
13 Volkmar Lotz, Bhavani M. Thuraisingham: SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, Proceedings ACM 2007
12EEMartin Wimmer, Martina-Cezara Albutiu, Alfons Kemper, Maarten Rits, Volkmar Lotz: Efficient Access Control for Composite Applications. BTW 2007: 613-616
11EEArnaud Dury, Sergiy Boroday, Alexandre Petrenko, Volkmar Lotz: Formal Verification of Business Workflows and Role Based Access Control Systems. SECURWARE 2007: 201-210
2006
10EEMartin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz: Consolidating the Access Control of Composite Applications and Workflows. DBSec 2006: 44-59
9EEAndreas Schaad, Volkmar Lotz, Karsten Sohr: A model-checking approach to analysing organisational controls in a loan origination process. SACMAT 2006: 139-149
2005
8EEDavid von Oheimb, Volkmar Lotz, Georg Walter: Analyzing SLE 88 memory management security using Interacting State Machines. Int. J. Inf. Sec. 4(3): 155-171 (2005)
2003
7EEDavid von Oheimb, Georg Walter, Volkmar Lotz: A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. ESORICS 2003: 217-234
6EEDavid von Oheimb, Volkmar Lotz: Generic Interacting State Machines and Their Instantiation with Dynamic Features. ICFEM 2003: 144-166
2002
5EEDavid von Oheimb, Volkmar Lotz: Formal Security Analysis with Interacting State Machines. ESORICS 2002: 212-228
2000
4EEVolkmar Lotz, Volker Kessler, Georg Walter: A Formal Security Model for Microprocessor Hardware. IEEE Trans. Software Eng. 26(8): 702-712 (2000)
1999
3EEVolkmar Lotz, Volker Kessler, Georg Walter: A Formal Security Model for Microprocessor Hardware. World Congress on Formal Methods 1999: 718-737
1997
2 Volkmar Lotz: Threat Scenarios as a Means to Formally Develop Secure Systems. Journal of Computer Security 5(1): 31-68 (1997)
1996
1EEVolkmar Lotz: Threat Scenarios as a Means to Formally Develop Secure Systems. ESORICS 1996: 242-265

Coauthor Index

1Martina-Cezara Albutiu [12]
2Sergiy Boroday [11]
3Luca Compagna [14]
4Arnaud Dury [11]
5Alfons Kemper [10] [12]
6Volker Kessler [3] [4]
7Fabio Massacci [14]
8David von Oheimb [5] [6] [7] [8]
9Alexandre Petrenko [11]
10Maarten Rits [10] [12]
11Andreas Schaad [9]
12Karsten Sohr [9]
13Bhavani M. Thuraisingham [13]
14Georg Walter [3] [4] [7] [8]
15Martin Wimmer [10] [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)