dblp.uni-trier.dewww.uni-trier.de

Stephen D. Wolthusen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
23EERosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65
22 Meng-Da Wu, Stephen D. Wolthusen: Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. IMF 2008: 157-172
21 Thomas Richard McEvoy, Stephen D. Wolthusen: Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments. IMF 2008: 55-72
20EERichard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage: 08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008
19EEStephen D. Wolthusen: Editorial. Computers & Security 27(1-2): 1 (2008)
18EEStephen D. Wolthusen: Editorial. Computers & Security 27(3-4): 63 (2008)
17EEStephen D. Wolthusen: From the Editor-in-Chief. Computers & Security 27(5-6): 123 (2008)
16EEStephen D. Wolthusen: Editorial. Computers & Security 27(7-8): 233-234 (2008)
2007
15EENils Kalstad Svendsen, Stephen D. Wolthusen: Graph Models of Critical Infrastructure Interdependencies. AIMS 2007: 208-211
14EENils Kalstad Svendsen, Stephen D. Wolthusen: Multigraph Dependency Models for Heterogeneous Infrastructures. Critical Infrastructure Protection 2007: 337-350
13EEStephen D. Wolthusen: The Role of Mathematics in Information Security Education. World Conference on Information Security Education 2007: 129-136
2006
12EEOle Martin Dahl, Stephen D. Wolthusen: Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. IWIA 2006: 157-168
11EEErik Hjelmås, Stephen D. Wolthusen: Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. InfoSecCD 2006: 5-12
2005
10EEFrank Graf, Stephen D. Wolthusen: A Capability-Based Transparent Cryptographic File System. CW 2005: 101-108
9 Bernhard M. Hämmerli, Stephen D. Wolthusen: Critical (Information) Infrastructure Protection. GI Jahrestagung (1) 2005: 466-467
8 Jaromir Likavec, Stephen D. Wolthusen: Enforcing Messaging Security Policies. IWIA 2005: 131-138
2004
7 John L. Cole, Stephen D. Wolthusen: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA IEEE Computer Society 2004
2003
6 John L. Cole, Stephen D. Wolthusen: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany IEEE Computer Society 2003
5EEStephen D. Wolthusen: Goalkeeper: Close-In Interface Protection. ACSAC 2003: 334-341
4 Stephen D. Wolthusen: A Distributed Multipurpose Mail Guard (Blinded). IAW 2003: 268-275
2002
3 Stephen D. Wolthusen: Access and Use Control using Externally Controlled Reference Monitors. Operating Systems Review 36(1): 58-69 (2002)
2001
2EEStephen D. Wolthusen: Security Policy Enforcement at the File System Level in the Windows NT Operating System Family. ACSAC 2001: 55-63
1 E. Rademer, Stephen D. Wolthusen: Transparent Access To Encrypted Data Using Operating System Network Stack Extensions. Communications and Multimedia Security 2001

Coauthor Index

1Roland Büschkes [20]
2John L. Cole [6] [7]
3Ole Martin Dahl [12]
4Hervé Debar [20]
5Ali Fessi [20]
6Rosario Gennaro [23]
7Frank Graf [10]
8Dirk Haage [20]
9Shai Halevi [23]
10Bernhard M. Hämmerli [9]
11Peter Herrmann [20]
12Erik Hjelmås [11]
13Ralph Holz [20]
14Marko Jahnke [20]
15Richard A. Kemmerer [20]
16Hartmut König [20]
17Hugo Krawczyk [23]
18Jaromir Likavec [8]
19Thomas Richard McEvoy [21]
20Tal Rabin [23]
21E. Rademer [1]
22Steffen Reidt [23]
23Nils Kalstad Svendsen [14] [15]
24Meng-Da Wu [22]
25Tanja Zseby [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)