2008 |
11 | EE | Holger Peine:
Rules of Thumb for Developing Secure Software: Analyzing and Consolidating Two Proposed Sets of Rules.
ARES 2008: 1204-1209 |
10 | EE | Holger Peine,
Marek Jawurek,
Stefan Mandel:
Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection.
HASE 2008: 9-18 |
2005 |
9 | EE | Holger Peine:
Rules of thumb for secure software engineering.
ICSE 2005: 702-703 |
2004 |
8 | EE | Holger Peine:
Laufzeitunterstützung für mobilen Code (Run-time Support for Mobile Codes).
it - Information Technology 46(5): 282-284 (2004) |
2003 |
7 | EE | Holger Peine,
Reinhard Schwarz:
A Multi-View Tool for Checking the Security Semantics of Router Configurations.
ACSAC 2003: 56-65 |
6 | | Holger Peine,
Reinhard Schwarz:
CROCODILE - Ein Werkzeug zur sichtenbasierten Sicherheitsprüfung von Router-Konfigurationen.
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 103-114 |
5 | | Holger Peine:
Run-Time Support for Mobile Code and Agents.
KI 17(2): 56- (2003) |
2002 |
4 | | Holger Peine:
Application and programming experience with the Ara mobile agent system.
Softw., Pract. Exper. 32(6): 515-541 (2002) |
1998 |
3 | EE | Holger Peine:
Security Concepts and Implementation in the Ara Mobile Agent System.
WETICE 1998: 236-242 |
1997 |
2 | | Holger Peine,
Torsten Stolpmann:
The Architecture of the Ara Platform for Mobile Agents.
Mobile Agents 1997: 50-61 |
1994 |
1 | | Holger Assenmacher,
Thomas Breitbach,
Peter Buhler,
Volker Hübsch,
Holger Peine,
Reinhard Schwarz:
Meeting the Application in User Space.
ACM SIGOPS European Workshop 1994: 82-87 |