Conference Papers for Security and Trust Engineering at the chair of Prof. Dr. Christoph Meinel

Here you can find all our peer-reviewed conference papers about security and trust engineering:

[ 2019 ] [ 2018 ] [ 2017 ] [ 2016 ] [ 2015 ] [ 2014 ] [ 2013 ] [ 2012 ] [ 2011 ] [ 2010 ] [ 2009 ] [ 2008 ] [ 2007 ] [ 2006 ] [ 2005 ] [ 2004 ] [ 2003 ] [ 2001 ] [ 2000 ]

2019 [ to top ]

  • Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: Towards Identifying De-anonymisation Risks in Distributed Health Data Silos. International Conference on Database and Expert Systems Applications. p. 33--43. Springer (2019).
     
  • Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. p. 109--119. ACM (2019).
     
  • Podlesny, N.J., Kayem, A.V.D.M., Meinel, C., Jungmann, S.: How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect. Proceedings of the 9th International Conference on Digital Public Health. p. 55--62. ACM (2019).
     
  • Podlesny, N.J., Kayem, A.V.D.M., Meinel, C.: Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold. 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). p. 556--563. IEEE (2019).
     
  • Grüner, A., Mühle, A., Meinel, C.: An Integration Architecture to Enable Service Providers for Self-sovereign Identity. Proceedings of the 18th. International Symposium on Network Computing and Applications. IEEE, Boston, MA (2019).
     
  • Torkura, K. .A., Sukmana, M.I.H., Cheng, F., Meinel, C.: Security Chaos Engineering for Cloud Services. The Proceedings of 18th IEEE International Symposium on Network Computing and Applications (NCA 2019). IEEE (2019).
     
  • Torkura, K. .A., Sukmana, M.I.H., Cheng, F., Meinel, C.: SlingShot: Automated Threat Detection and Incident Response in Multi-Cloud Storage Systems. The Proceedings of 18th IEEE International Symposium on Network Computing and Applications (NCA 2019). IEEE (2019).
     
  • Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A Comparative Analysis of Trust Requirements in Decentralized Identity Management. Proceedings of the 33rd. International Conference on Advanced Information Networking and Applications. Springer, Matsue, Japan (2019).
     
  • Bock, B., Matysik, J.-T., Krentz, K.-F., Meinel, C.: Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme. Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, Limerick, Ireland (2019).
     
  • Seidel, F., Krentz, K.-F., Meinel, C.: Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers. Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, Limerick, Ireland (2019).
     

2018 [ to top ]

  • Torkura, K. .A., Sukmana, M.I.H., Cheng, F., Meinel, C.: CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era. 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2018). Springer (2018).
     
  • Torkura, K.A., Sukmana, M.I.H., Meinig, M., Graupner, H., Cheng, F., Meinel, C.: A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems. 16th IEEE/IFIP Network Operations and Management Symposium (NOMS 2018). IEEE/IFIP (2018).
     
  • Krentz, K.-F., Meinel, C., Graupner, H.: Denial-of-Sleep-Resilient Session Key Establishment for IEEE 802.15.4 Security: From Adaptive to Responsive. Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN 2018). Junction, Madrid, Spain (2018).
     
  • Torkura, K. .A., Sukmana, M.I.H., Meinig, M., Kayem, A., Cheng, F., Graupner, H., Meinel, C.: Securing Cloud Storage Brokerage Systems through Threat Models. The 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2018). IEEE (2018).
     
  • Torkura, K. .A., Sukmana, M.I.H., Tim, S., Cheng, F., Graupner, H., Meinel, C.: CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. The Proceedings of 17th IEEE International Symposium on Network Computing and Applications (NCA 2018). IEEE (2018).
     
  • Torkura, K. .A., Sukmana, M.I.H., Kayem, A.V.D.M., Cheng, F., Meinel, C.: A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures. 32nd IEEE International Symposium on Parallel and Distributed Processing with Applications. IEEE (2018).
     
  • Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A Quantifiable Trust Model for Blockchain-Based Identity Management. Proceedings of the 2018 International Conference on Blockchain. IEEE, Halifax, Canada (2018).
     
  • Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: Towards a Blockchain-based Identity Provider. Proceedings of the 12th. International Conference on Emerging Security Information, Systems and Technologies. IARIA, Venice, Italy (2018).
     
  • Torkura, K. .A., Sukmana, M.I.H., Tim, S., Cheng, F., Graupner, H., Meinel, C.: Defeating Malicious Intrusions in Multi-Cloud Storage Systems. Proceedings of the 6th HPI Cloud Symposium “Operating the Cloud” 2018. Hasso Plattner Institute, Potsdam, Germany (2018).
     

2017 [ to top ]

  • Gawron, M., Cheng, F., Meinel, C.: Automatic Vulnerability Classification using Machine Learning. Proceedings of the 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017). Springer (2017).
     
  • Torkura, K.A., Sukmana, M.I.H., Meinel, C.: Integrating Continuous Security Assessments in Microservices and Cloud Native Applications. Proceedings of the10th International Conference on Utility and Cloud Computing. p. 171--180. ACM (2017).
     
  • Krentz, K.-F., Meinel, C., Graupner, H.: More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization. Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS 2017). Springer, Nancy, France (2017).
     
  • Torkura, K.A., Sukmana, M.I.H., Cheng, F., Meinel, C.: Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications. Proceedings of the 2nd IEEE International Conference on Smart Cloud (SmartCloud). IEEE (2017).
     
  • Seitz, K., Serth, S., Krentz, K.-F., Meinel, C.: Demo: Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages. 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017). ACM, Delft, The Netherlands (2017).
     
  • Seitz, K., Serth, S., Krentz, K.-F., Meinel, C.: Demo: Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages. Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017). ACM Press, New York, NY, USA (2017).
     
  • Krentz, K.-F., Meinel, C., Graupner, H.: Countering Three Denial-of-Sleep Attacks on ContikiMAC. Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN 2017). Junction, Uppsala, Sweden (2017).
     
  • Krentz, K.-F., Meinel, C., Graupner, H.: Secure Self-Seeding with Power-Up SRAM States. Proceedings of the 22nd IEEE Symposium on Computers and Communications (ISCC 2017). IEEE, Heraklion, Greece (2017).
     

2016 [ to top ]

  • Torkura, K., Meinel, C.: Towards Vulnerability Assessment as a Service in OpenStack Clouds. Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN). IEEE, Dubai, UAE (2016).
     
  • Amirkhanyan, A., Meinel, C.: Analysis of the Value of Public Geotagged Data from Twitter from the Perspective of Providing Situational Awareness. Proceedings of the 15th IFIP Conference on e-Business, e-Services and e-Society (I3E2016) - Social Media: The Good, the Bad, and the Ugly. Springer, Swansea, Wales, UK (2016).
     
  • Amirkhanyan, A., Meinel, C.: Visualization and Analysis of Public Social Geodata to Provide Situational Awareness. Proceedings of the 8th International Conference on Advanced Computational Intelligence (ICACI2016). IEEE, Chiang Mai, Thailand (2016).
     
  • Krentz, K.-F., Meinel, C., Schnjakin, M.: POTR: Practical On-the-fly Rejection of Injected and Replayed 802.15.4 Frames. Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). IEEE, Salzburg, Austria (2016).
     
  • Jaeger, D., Pelchen, C., Graupner, H., Cheng, F., Meinel, C.: Analysis of Publicly Leaked Credentials and the Long Story of Password (Re-)use. Proceedings of the 11th International Conference on Passwords (PASSWORDS2016). Springer, Bochum, Germany (2016).
     

2015 [ to top ]

  • Jaeger, D., Azodi, A., Cheng, F., Meinel, C.: Normalizing Security Events with a Hierarchical Knowledge Base. Proceedings of the 9th International Conference on Information Security Theory and Practice (WISTP'15). pp. 237-248. Springer Internation Publishing (2015).
     
  • Amirkhanyan, A., Cheng, F., Meinel, C.: Real-Time Clustering of Massive Geodata for Online Maps to Improve Visual Analysis. Proceedings of the 11th International Conference on Innovations in Information Technology (IIT2015). IEEE, Dubai, UAE (2015).
     
  • Azodi, A., Gawron, M., Sapegin, A., Cheng, F., Meinel., C.: Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes. Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15). Springer (2015).
     
  • Elsaid, M.E., Meinel, C.: Friendship based Storage Allocation for Online Social Networks Cloud Computing. Proceedings of the International Conference of Cloud Computing Technologies and Applications (CloudTech 2015). IEEE Press, Marrakesh, Morrocco (2015).
     
  • Ussath, M., Cheng, F., Meinel, C.: Concept for a Security Investigation Framework. Proceedings of the 7th IFIP International Conference on New Technologies, Mobility, and Security (NTMS’15) (2015).
     
  • Torkura, K.A., Cheng, F., Meinel, C.: Aggregating Vulnerability Information for Proactive Cloud Vulnerability Assessment. Journal of Internet Technology and Secured Transactions. 4, (2015).
     
  • Cheng, F., Sapegin, A., Gawron, M., Meinel, C.: Analyzing Boundary Device Logs on the In-Memory Platform. Proceedings of the IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity‘15). IEEE (2015).
     
  • Gawron, M., Cheng, F., Meinel, C.: Automatic Vulnerability Detection for Weakness Visualization and Advisory Creation. Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). pp. 229-236. ACM Press (2015).
     
  • Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Passive Network Monitoring using REAMS. Proceedings of the 6th International Conference on Information Science and Applications (ICISA 2015). pp. 205-215. Sprinter, Pattaya, Thailand (2015).
     
  • Gawron, M., Cheng, F., Meinel, C.: Automatic Detection of Vulnerabilities for Advanced Security Analytics. Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium (APNOMS’15). pp. 471-474. IEEE (2015).
     
  • Torkura, K.A., Cheng, F., Meinel, C.: Application of Quantitative Security Metrics In Cloud Computing. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE (2015).
     
  • Sapegin, A., Gawron, M., Jaeger, D., Cheng, F., Meinel, C.: High-speed Security Analytics Powered by In-memory Machine Learning Engine. Proceedings of the 14th International Symposium on Parallel and Distributed Computing (ISPDC 2015). pp. 74 - 81. IEEE (2015).
     
  • Torkura, K.A., Cheng, F., Meinel, C.: A Proposed Framework For Proactive Vulnerability Assessments in Cloud Deployments. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE (2015).
     
  • Krentz, K.-F., Meinel, C.: Handling Reboots and Mobility in 802.15.4 Security. Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015). ACM, Los Angeles, CA, USA (2015).
     
  • Sianipar, J.H., Meinel, C.: A verification mechanism for cloud brokerage system. Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). pp. 143 - 148. IEEE Press, Lodz, Poland (2015).
     
  • Torkura, K.A., Meinel, C.: Towards Cloud-Aware Vulnerability Assessments. Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS2015). IEEE (2015).
     
  • Jaeger, D., Azodi, A., Cheng, F., Meinel, C.: Normalizing Security Events with a Hierarchical Knowledge Base. Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP'15) (2015).
     
  • Sianipar, J.H., Meinel, C.: A verification mechanism for cloud brokerage system. Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). pp. 143 - 148. IEEE Press, Lodz, Poland (2015).
     
  • Amirkhanyan, A., Sapegin, A., Cheng, F., Meinel, C.: Simulation User Behavior on A Security Testbed Using User Behavior States Graph. Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). pp. 217-223. ACM Press (2015).
     
  • Sapegin, A., Amirkhanyan, A., Gawron, M., Cheng, F., Meinel, C.: Poisson-based Anomaly Detection for Identifying Malicious User Behaviour. Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15). Springer (2015).
     

2014 [ to top ]

  • Sianipar, J., Saleh, E., Meinel, C.: Construction of Agent-Based Trust in Cloud Infrastructure. Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2014, London, United Kingdom, December 8-11, 2014. p. 941--946. IEEE Computer Society, London, United Kingdom (2014).
     
  • Elsaid, M.E., Meinel, C.: Live Migration Impact on Virtual Datacenter Performance. Proceedings of the 2nd International Conference on Future Internet of Things and Cloud (FiCloud 2014). pp. 216 - 221. IEEE Press, Barcelona, Spain (2014).
     
  • Jaeger, D., Graupner, H., Sapegin, A., Cheng, F., Meinel, C.: Gathering and Analyzing Identity Leaks for Security Awareness. Proceedings of the 7th International Conference on Passwords (PASSWORDS 2014). Springer, Trondheim, Norway (2014).
     
  • Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Runtime Updatable and Dynamic Event Processing using Embedded ECMAScript Engines. In Proceedings of the 4rd IEEE International Conference on IT Convergence and Security (ICITCS 2014). IEEE Press, Beijing, China (2014).
     
  • Saleh, E., Sianipar, J., Takouna, I., Meinel, C.: SecPlace: Security-Aware Placement Model for Multi-tenant SaaS Environments. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014. pp. 596-602. IEEE Computer Society, Bali, Indonesia (2014).
     

2013 [ to top ]

  • Schnjakin, M., Korsch, D., Schoenberg, M., Meinel, C.: Implementation of a Secure and Reliable Storage Above the Untrusted Clouds. Proceedings of 8th International Conference on Computer Science and Education (ICCSE 2013). pp. 347 - 353. IEEE, Colombo (2013).
     
  • Krentz, K.-F., Rafiee, H., Meinel, C.: 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer. Proceedings of the 1st ACM International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013). ACM, Zurich, Switzerland (2013).
     
  • Sapegin, A., Cheng, F., Meinel, C.: Catch the Spike: on the Locality of Individual BGP Update Bursts. Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2013). pp. 78-83. IEEE CS, Dalian, China (2013).
     
  • Sapegin, A., Jaeger, D., Azodi, A., Gawron, M., Cheng, F., Meinel, C.: Hierarchical Object Log Format for Normalisation of Security Events. Proceedings of the 9th International Conference on Information Assurance and Security (IAS 2013). IEEE CS, Tunis, Tunisia (2013).
     
  • Takouna, I., Dawoud, W., Sachs, K., Meinel, C.: A Robust Optimization for Proactive Energy Management in Virtualized Data Centers. Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering(ICPE2013). pp. 323-326. ACM Press, Prague, Czech Republic (2013).
     
  • Saleh, E., Takouna, I., Meinel, C.: SignedQuery: Protecting Users Data in Multi-tenant SaaS Environments. Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI2013). pp. 213 - 218. IEEE Press, Mysore, India (2013).
     
  • Schnjakin, M., Meinel, C.: Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN2013). pp. 1-9. IEEE, Nassau, Bahamas (2013).
     
  • Schnjakin, M., Meinel, C.: Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. Proceedings of the 8th International Conference on Grid and Pervasive Computing (GPC2013). pp. 91-102. Springer, Seoul, Korea (2013).
     
  • Cheng, F., Azodi, A., Jaeger, D., Meinel, C.: Security Event Correlation Supported by Multi-Core Architecture. Proceedings of the 3rd IEEE International Conference on IT Convergence and Security (ICITCS 2013). pp. 1-5. IEEE CS, Macau, China (2013).
     
  • Rafiee, H., von Löwis, M., Meinel, C.: DNS Update Extension to IPv6 Secure Addressing. Proceedings of the Ninth International Symposium on Frontiers of Information Systems and Network Applications (FINA2013). pp. 896-902. IEEE CS, Barcelona, Spain (2013).
     
  • Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: A New Approach to Building a Multi-Tier Direct Access Knowledgebase For IDS/SIEM Systems. Proceedings of the 11th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2013). IEEE CS, Chengdu, China (2013).
     
  • Saleh, E., Meinel, C.: HPISecure: Towards Data Confidentiality in Cloud Applications. Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid2013). pp. 605-609. IEEE CS, Delft, Netherlands (2013).
     
  • Schnjakin, M., Metzke, T., Meinel, C.: Applying Erasure Codes for Fault Tolerance in Cloud-RAID. Proceedings of 16th IEEE International Conference on Computational Science and Engineering (CSE2013). IEEE, Sydney, Australia (2013).
     
  • Rafiee, H., Meinel, C.: Privacy and Security in IPv6 Networks: Challenges and Possible Solutions. ACM. ACM press, Aksaray, Turkey (2013).
     
  • Schnjakin, M., Meinel, C.: The State of Public Cloud Storage and Cloud-RAID: a Secure and Reliable Storage above the Clouds. Proceedings of the 13. Deutscher IT-Sicherheitskongress (Sicherheit2013) (2013).
     
  • Rafiee, H., Meinel, C.: A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration. Proceedings of the 12th IEEE International Symposium on Network Computing and Applications (NCA2013). pp. 165 - 172. IEEE Press, MA, USA (2013).
     
  • Rafiee, H., Mueller, C., Niemeier, L., Streek, J., Sterz, C., Meinel, C.: A Flexible Framework For Detecting IPv6 Vulnerabilities. Proceedings of The 6th International Conference on Security of Information and Networks (SIN 2013). ACM Press, Aksaray, Turkey (2013).
     
  • Cheng, F., Azodi, A., Jaeger, D., Meinel, C.: Multi-Core Supported High Performance Security Analytics. Proceedings of the 13th IEEE International Conference on Scalable Computing and Communication (ScalCom 2013). IEEE CS, Chengdu, China (2013).
     
  • Azodi, A., Jaeger, D., Cheng, F., Meinel, C.: Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems. Proceedings of the 1st International Conference on Advanced Cloud and Big Data. IEEE CS, Nanjing, China (2013).
     

2012 [ to top ]

  • Dawoud, W., Takouna, I., Meinel, C.: Increasing Spot Instances Reliability using Dynamic Scalability. IEEE Fifth International Conference on Cloud Computing (CLOUD 2012). pp. 959-961. IEEE CS Press, Honolulu, Hawaii, USA (2012).
     
  • AlSa’deh, A., Rafiee, H., Meinel, C.: IPv6 Stateless Address Autoconfiguration: Balancing Between Security, Privacy and Usability. Proceedings of the 5th International Symposium on Foundations & Practice of Security (FPS 2012). Springer, Montreal, QC, Canada (2012).
     
  • AlSa’deh, A., Rafiee, H., Meinel, C.: Stopping Time Condition for Practical IPv6 Cryptographically Generated Addresses. Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). IEEE CS Press, Bali, Indonesia (2012).
     
  • Arulogun, T., Meinel, C., Emuoyibofarhe, J.: IPv6 Based Wireless Sensor Networks Electronic Health Monitoring System. Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). , LAUTECH , Ogbomoso (2012).
     
  • Willems, C., Meinel, C.: Online Assessment for Hands-On Cybersecurity Training in a Virtual Lab. Proceedings of the 3rd IEEE Global Engineering Education Conference (EDUCON 2012). IEEE Press, Marrakesh, Morocco (2012).
     
  • Rafiee, H., AlSa'deh, A., Meinel, C.: Multicore-Based Auto-Scaling SEcure Neighbor Discovery for Windows Operating Systems. Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). IEEE Press, Bali, Indonesia (2012).
     
  • Alnemr, R., Meinel, C.: Reputation Objects for Interoperable Reputation Exchange: Implementation and Design Decisions. The 7th IEEE International Workshop on Trusted Collaboration (TrustCol 2012). IEEE (2012).
     
  • Takouna, I., Dawoud, W., Meinel, C.: Analysis and Simulation of HPC Applications in Virtualized Data Centers. Proceedings of the IEEE International Conference on Green Computing and Communications (GreenCom 2012). IEEE Press, Besançon, France (2012).
     
  • AlSa’deh, A., Rafiee, H., Meinel, C.: Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches. Proceedings of the 12th IEEE International Conference on Computer and Information Technology (IEEE CIT’12). IEEE CS Press, Chengdu, Sichuan, China (2012).
     
  • Dawoud, W., Takouna, I., Meinel, C.: Reliable Approach to Sell the Spare Capacity in the Cloud. Proceedings of the 3rd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2012). pp. 229-236. , Nice, France (2012).
     
  • Arulogun, T., AlSa’deh, A., Meinel, C.: IPv6 Private Networks: Security Consideration and recommendation. Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). , LAUTECH, Ogbomoso (2012).
     
  • Dawoud, W., Takouna, I., Meinel, C.: Dynamic Scalability and Contention Prediction in Public Infrastructure using Internet Application Profiling. Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012). , Taiwan, China (2012).
     

2011 [ to top ]

  • AlSa'deh, A., Cheng, F., Roschke, S., Meinel, C.: IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security. Proceedings of the 4th IFIP/IEEE International Conference on New Technologies, Mobility and Seurity (NTMS 2011). pp. 1-6. IEEE Press, Paris, France (2011).
     
  • Roschke, S., Cheng, F., Meinel, C.: A New Correlation Algorithm based on Attack Graph. Proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2011). pp. 58-67. Springer, Torremolinos, Spain (2011).
     
  • Roschke, S., Cheng, F., Meinel, C.: BALG: Bypassing Application Layer Gateways Using Multi-Staged Encrypted Shellcodes. Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). pp. 399-406. IEEE Press, Dublin, Ireland (2011).
     
  • Dawoud, W., Takouna, I., Meinel, C.: Elastic VM for Rapid and Optimum Virtualized Resources Allocation. Proceedings of the 5th International DMTF Academic Alliance Workshop On Systems and Virtualization Management (SVM 2011). pp. 1-4. IEEE Press, Paris, France (2011).
     
  • Thomas, I., Meinel, C.: An Attribute Assurance Framework to Define and Match Trust in Identity Attributes. Proceedings of the 2011 IEEE International Conference on Web Services (ICWS 2011). pp. 580-587. IEEE Computer Society, Washington DC, USA (2011).
     
  • Cheng, F., Roschke, S., Meinel, C.: An Integrated Network Scanning Tool for Attack Graph Construction. Proceedings of the 6th International Conference on Advances in Grid and Pervasive Computing (GPC 2011). pp. 138-147. Springer, Oulu, Finland (2011).
     
  • Warschofsky, R., Menzel, M., Meinel, C.: Automated Security Service Orchestration for the Identity Management in Web Service based Systems. Proceedings of the 2011 IEEE International Conference on Web Services (ICWS 2011). pp. 596-603. IEEE Computer Science, Washington DC, USA (2011).
     
  • Alnemr, R., Meinel, C.: From Reputation Models and Systems to Reputation Ontologies. Proceedings of the 5th IFIP International Conference on Trust Management(IFIPTM 2011). pp. 98-116. Springer, Copenhagen, Denmark (2011).
     
  • Willems, C., Meinel, C.: Practical Network Security Teaching in an Online Virtual Laboratory. Proceedings of the 2011 International Conference on Security & Management (SAM 2011). CSREA Press, Las Vegas, Nevada, USA (2011).
     
  • Dawoud, W., Takouna, I., Meinel, C.: Elastic Virtual Machine for Fine-grained Cloud Resource Provisioning. Proceedings of the 4th International Conference on Recent Trends of Computing, Communication & Information Technologies (ObCom 2011). Springer, Tamil Nadu, India (2011).
     
  • Alnemr, R., Schnjakin, M., Meinel, C.: Towards Context-aware Service-oriented Semantic Reputation Framework. Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). IEEE Press (2011).
     
  • AlSa'deh, A., Cheng, F., Meinel, C.: CS-CGA: Compact and More Secure CGA. Proceedings of the 17th IEEE International Conference on Networks (ICON 2011). IEEE Press, Singapore (2011).
     
  • Takouna, I., Dawoud, W., Meinel, C.: Accurate Multicore Processor Power Models for Power-Aware Resource Management. Proceedings of the 2011 International Conference on Cloud and Green Computing (CGC 2011). pp. 419-426. IEEE Press, Sydney, Australia (2011).
     
  • Alnemr, R., Meinel, C.: Why Rating is not Enough: A Study on Online Reputation Systems. Proceedings of the 2011, Collaborative Communities for Social Computing Workshop (CCSocialComp 2011), in conjunction with the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011). IEEE Press, Orlando, Florida, USA (2011).
     
  • Dawoud, W., Takouna, I., Meinel, C.: Elastic VM for Cloud Resources Provisioning Optimization. Proceedings of the First International Conference on Advances in Computing and Communications (ACC 2011). pp. 431-445. Springer, Kochi, India (2011).
     
  • Schnjakin, M., Meinel, C.: Platform for a Secure Storage-Infrastructure in the Cloud. Proceedings of the 12th Deutscher IT-Sicherheitskongress (Sicherheit 2011). , Bonn, Germany (2011).
     
  • Takouna, I., Dawoud, W., Meinel, C.: Efficient Virtual Machine Scheduling-policy for Virtualized heterogeneous Multicore Systems. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA2011). CSREA Press, Las Vegas, Nevada, USA (2011).
     
  • Takouna, I., Dawoud, W., Meinel, C.: Dynamic Configuration of Virtual Machine for Power-proportional Resource Provisioning. Proceedings of 2nd International Workshop on Green Computing Middleware (GCM 2011) In conjunction with the 12th ACM/IFIP/USENIX International Middleware Conference (Middleware 2011). p. 4:1--4:6. , Lisboa, Portugal (2011).
     
  • Willems, C., Klingbeil, T., Radvilavicius, L., Cenys, A., Meinel, C.: A Distributed Virtual Laboratory Architecture for Cybersecurity Training. Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011). IEEE Press, Abu Dhabi, UAE (2011).
     
  • Thomas, I., Warschofsky, R., Meinel, C.: Whom to trust? – Generating WS-Security Policies based on Assurance Information. Proceedings of the 9th IEEE European Conference on Web Services (ECOWS 2011). pp. 65-72. IEEE Computer Society, Lugano, Switzerland (2011).
     
  • Rafiee, H., AlSa’deh, A., Meinel, C.: WinSEND: Windows SEcure Neighbor Discovery. Proceedings of the 4th International Conference on Security of Information and Networks (SIN 2011). pp. 243-246. ACM Press, Sydney, Australia (2011).
     

2010 [ to top ]

  • Menzel, M., Meinel, C.: SecureSOA - Modelling Security Requirements for Service-oriented Architectures. Proceedings of the 2010 IEEE International Conference on Services Computing (SCC 2010). pp. 146-153. IEEE Computer Society, Miami, Florida, USA (2010).
     
  • Warschofsky, R., Menzel, M., Meinel, C.: Transformation and Aggregation of Web Service Security Requirements. Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010). pp. 43-50. IEEE Computer Society, Ayia Napa, Cyprus (2010).
     
  • Paschke, A., Alnemr, R., Meinel, C.: Rule Responder Distributed Reputation Management System for the Semantic Web. Proceedings of the 4th International Rule Challenges (RuleML 2010). , Washington, DC, USA (2010).
     
  • Alnemr, R., Paschke, A., Meinel, C.: Enabling Reputation Interoperability through Semantic Technologies. Proceedings of the 7th International Conference on Semantic Systems (I-Semantics 2010). p. No.13. ACM Press, Graz, Austria (2010).
     
  • Thomas, I., Meinel, C.: An Identity Provider to manage Reliable Digital Identities for SOA and the Web. Proceedings of the 9th Symposium on Identity and Trust on the Internet (IDTrust 2010). pp. 26-36. ACM Press, Gaithersburg, MD, USA (2010).
     
  • Cheng, F., Tran, T.-D., Roschke, S., Meinel, C.: A Specialized Tool for Simulating Lock-Keeper Data Transfer. Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010). pp. 182-189. IEEE Press, Perth, Australia (2010).
     
  • Roschke, S., Cheng, F., Meinel, C.: A Flexible and Efficient Alert Correlation Platform for Distributed IDS. Proceedings of the 4th International Conference on Network and System Security (NSS 2010). pp. 24-31. IEEE Press, Melbourne, Australia (2010).
     
  • Roschke, S., Ibraimi, L., Cheng, F., Meinel, C.: Secure Communication Using Identity Based Encryption. Proceedings of the 11th IFIP Conference on Communications and Multimedia Security (CMS 2010). pp. 256-267. Springer, Linz, Austria (2010).
     
  • Dawoud, W., Takounah, I., Meinel, C.: Infrastructure as a Service Security: Challenges and Solutions. Proceedings of the 7th International Conference on Informatics and Systems (INFOS 2010). pp. 1-8. IEEE Press, Cairo, Egypt (2010).
     
  • Menzel, M., Warschofsky, R., Meinel, C.: A Pattern-driven Generation of Security Policies for Service-oriented Architectures. Proceedings of the 2010 IEEE International Conference on Web Services (ICWS 2010). pp. 243-250. IEEE Computer Society, Miami, Florida, USA (2010).
     
  • Menzel, M., Warschofsky, R., Thomas, I., Willems, C., Meinel, C.: The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud. Proceedings of the 6th IEEE World Congress on Services (SERVICES 2010). pp. 115-122. IEEE Computer Society, Miami, Florida, USA (2010).
     
  • Schnjakin, M., Alnemr, R., Meinel, C.: Contract-based Cloud Architecture. Proceedings of the 2nd international workshop (in conjunction with CIKM 2010) on Cloud data management (CloudDB 2011). ACM Press, Toronto, Canada (2010).
     
  • Roschke, S., Cheng, F., Meinel, C.: Using Vulnerability Information and Attack Graphs for Intrusion Detection. Proceedings of the 6th International Conference on Information Assurance and Security (IAS 2010). pp. 104-109. IEEE Press, Atlanta, USA (2010).
     
  • Schnjakin, M., Alnemr, R., Meinel, C.: A Security and High-Availability Layer for Cloud Storage. Proceedings of the 1st International Workshop (In conjunction with WISE 2010) on Cloud Information System Engineering (CISE 2010). pp. 449-462. Springer, Hong Kong, China (2010).
     
  • Roschke, S., Willems, C., Meinel, C.: A Security Laboratory for CTF Scenarios and Teaching IDS. Proceedings of the 2nd IEEE International Conference on in: Education Technology and Computer (ICETC 2010). pp. 433-437. IEEE Press, Shanghai, China (2010).
     

2009 [ to top ]

  • Haq, I.U., Alnemr, R., Paschke, A., Schikuta, E., Boley, H., Meinel, C.: Distributed Trust Management for Validating SLA Choreographies. Proceedings of Workshop SLAs in Grids (in conjunction with Grid'09) on SERVICE LEVEL AGREEMENTS (SLAs 2009). Springer, Banff, Canada (2009).
     
  • Cheng, F., Roschke, S., Meinel, C.: Implementing IDS Management on Lock-Keeper. Proceedings of the 5th International Conference on Information Security Practice and Experience (ISPEC 2009). pp. 360-371. Springer Press, Xi'an, China (2009).
     
  • Cheng, F., Roschke, S., Schuppenies, R., Meinel, C.: Remodeling Vulnerability Information. Proceedings of the 10th International Conference on Information Security and Cryptology (Inscrypt 2009). pp. 324-336. Springer, Beijing, China (2009).
     
  • Kylau, U., Thomas, I., Menzel, M., Meinel, C.: Trust Requirements in Identity Federation Topologies. Proceedings of the 23rd International Conference on Advanced Information Networking and Applications (AINA 2009). pp. 137-145. IEEE Computer Society, Bradford, UK (2009).
     
  • Wolf, M., Thomas, I., Menzel, M., Meinel, C.: A Message Meta Model for Federated Authentication in Service-oriented Architectures. Proceedings of IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2009). pp. 1 - 8. IEEE Press, Taiwan, China (2009).
     
  • Thomas, I., Meinel, C.: Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims. Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). pp. 243-250. IEEE Press, Bangalore, India (2009).
     
  • Hebig, R.N., Meinel, C., Menzel, M., Thomas, I., Warschofsky, R.: A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control. Proceedings of the 2009 IEEE International Conference on Web Services (ICWS 2009), Application and Industry Track. p. 551--558. IEEE Computer Society, Los Alamitos, CA, USA (2009).
     
  • Cheng, F., Meinel, C.: Design of Lock-Keeper Federated Authentication Gateway. Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT 2009). pp. 1041-1046. IEEE Press, Phoenix Park, Korea (2009).
     
  • Roschke, S., Cheng, F., Tran, T.-D., Meinel, C.: A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification. Proceedings of the 6th IFIP International Conference on Network and Parallel Computing (NPC 2009). pp. 190-196. IEEE Press, Gold Coast, Australia (2009).
     
  • Roschke, S., Cheng, F., Schuppenies, R., Meinel, C.: Towards Unifying Vulnerability Information for Attack Graph Construction. Proceedings of the 12th International Conference on Information Security (ISC 2009). pp. 218-233. Springer, Pisa, Italy (2009).
     
  • Menzel, M., Meinel, C.: A Security Meta-Model for Service-oriented Architectures. Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). pp. 251-259. IEEE Computer Society, Bangalore, India (2009).
     
  • Menzel, M., Thomas, I., Meinel, C.: Security Requirements Specification in Service-oriented Business Process Management. Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES 2009). pp. 41-48. IEEE Computer Science, Fukuoka, Japan (2009).
     
  • Wolter, C., Weiß, C., Meinel, C.: An XACML Extension for Business Process-Centric Access Control Policies. Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (Policy 2009). pp. 166-169. IEEE Press, London, UK (2009).
     
  • Teymourian, K., Streibel, O., Paschke, A., Alnemr, R., Meinel, C.: Towards Semantic Event-driven Systems. Proceedings of the 3th International Conference on New Technologies, Mobility and Security (NTMS 2009). pp. 1-6. IEEE Press, Cairo, Egypt (2009).
     
  • Schnjakin, M., Menzel, M., Meinel, C.: A Pattern-driven Security Advisor for Service-oriented Architectures. Proceedings of the 6th SWS workshop (in conjunction with 16th ACM CCS) on Secure web services (SWS 2009). pp. 13-20. ACM Press, Chicago, USA (2009).
     
  • Roschke, S., Cheng, F., Meinel, C.: An Extensible and Virtualization-Compatible IDS Management Architecture. Proceedings of the 5th International Conference on Information Assurance and Security (IAS 2009). pp. 130-134. IEEE Press, Xi'an, China (2009).
     
  • Wolter, C., Miseldine, P., Meinel, C.: Verification of Business Process Entailment Constraints Using SPIN. Proceedings of the 1st International Symposium on Engineering Secure Software and Systems (ESSoS 2009). pp. 1-15. Springer Press, Leuven, Belgium (2009).
     
  • Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. Proceedings of the 2009 SCC workshop (in conjunction with 8th PICom) on Services Computing (SCC 2009). pp. 729-734. IEEE Press, Chengdu, China (2009).
     
  • Willems, C., Dawoud, W., Klingbeil, T., Meinel, C.: Security in Tele-Lab – Protecting an Online Virtual Lab for Security Training. Proceedings of the 2009 ELS workshop (in conjunction with 4th ICITST) on E-Learning Security (ELS 2009). pp. 1-7. IEEE Press, London, UK (2009).
     
  • Alnemr, R., Bross, J., Meinel, C.: Constructing a Context-aware Service-Oriented Reputation Model using Attention Allocation Points. Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). pp. 451-457. IEEE Press, Bangalore, India (2009).
     

2008 [ to top ]

  • Alnemr, R., Meinel, C.: Getting more from Reputation Systems: A Context–aware Reputation Framework based on Trust Centers and Agent Lists. Proceedings of the 3rd International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008). pp. 137 - 142. IEEE Press, Athens, Greece (2008).
     
  • Thomas, I., Michael, M., Meinel, C.: Quantified Trust Levels for Authentication. Proceedings of the 2008 ACM workshop on Secure web services (ISSE 2008). pp. 71-80. ACM Press, Madrid, Spain (2008).
     
  • Wolter, C., Schaad, A., Meinel, C.: A Transformation Approach for Security Enhanced Business Processes. Proceedings of the IASTED International Conference on Software Engineering (SE 2008). pp. 14-19. ACTA Press, Innsbruck, Austria (2008).
     
  • Menzel, M., Wolter, C., Meinel, C.: Towards the Aggregation of Security Requirements in Cross-Organisational Service Compositions. Proceedings of the 11th International Conference on Business Information Systems (BIS 2008). p. 297--308. Springer, Innsbruck, Austria (2008).
     
  • Zhang, G., Cheng, F., Meinel, C.: SIMPA: A SIP-based Mobile Payment Architecture. Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2008). pp. 287 - 292. IEEE Press, Portland, Oregon (2008).
     
  • Zhang, G., Cheng, F., Meinel, C.: Towards Secure Mobile Payment Based on SIP. Proceedings of the 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2008). pp. 96 - 104. IEEE Press, Belfast, Northern Ireland, UK (2008).
     
  • Willems, C., Meinel, C.: Awareness Creation mit Tele-Lab IT-Security: praktisches IT-Sicherheitstraining am Beispiel Trojanischer Pferde. Proceedings of GI 2008 International Conference on Sicherheit (Sicherheit 2008). pp. 513 - 532. GI Press, Saarbrücken, Germany (2008).
     
  • Thomas, I., Menzel, M., Meinel, C.: Using Quantified Trust Level to Describe Authentication Requirements in Federated Identity Management. Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2008), in conjunction with the 15th ACM Conference on Computer and Communications Security (CCS 2008). pp. 71-80. ACM Press, Alexandria, VA, USA (2008).
     
  • Wolter, C., Menzel, M., Meinel, C.: Modelling Security Goals in Business Processes. Proceedings of GI 2008 International Conference on Modellierung (Modellierung 2008). pp. 197 - 212. GI Press, Berlin, Germany (2008).
     
  • Wolter, C., Schaad, A., Meinel, C.: Task-Based Entailment Constraints For Basic Workflow Patterns. Proceedings of the 13th ACM symposium on Access control models and technologies (SACMAT 2008). pp. 51 - 60. ACM Press, Colorado, USA (2008).
     
  • Cheng, F., Meinel, C.: Strong Authentication over Lock-Keeper. Proceedings of the 34th conference on Current trends in theory and practice of computer science (SOFSEM 2008). pp. 572 - 584. Springer, High Tatras, Slovakia (2008).
     
  • Zhou, W., Meinel, C.: Enforcing Information Flow Constraints in RBAC Environments. Proceedings of the 1st International Symposium on Electronic Commerce and Security (ISECS 2008). pp. 153 - 158. IEEE Press, Guangzhou, China (2008).
     

2007 [ to top ]

  • Menzel, M., Thomas, I., Wolter, C., Meinel, C.: SOA Security - Secure Cross-Organizational Service Composition. Proceedings of the Stuttgarter Softwaretechnik Forum 2007 (SSF 2007). pp. 41 - 53. Fraunhofer IRB-Verlag, Stuttgart, Germany (2007).
     
  • Zhou, W., Meinel, C.: Function-Based Authorization Constraints Specification and Enforcement. Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS 2007). pp. 119-124. IEEE Press, Manchester, United Kingdom (2007).
     
  • Cheng, F., Wolter, C., Meinel, C.: A Simple, Smart and Extensible Framework for Network Security Measurement. Proceedings of the 3rd International Conference on Information Security and Cryptology (Inscrypt 2007). pp. 517 - 531. Springer, Xining, China (2007).
     
  • Zhou, W., Meinel, C.: A Policy Language for Integrating Heterogeneous Authorization Policies. Proceedings of the 4th International Conference on Grid Service Engineering and Management (GSEM 2007). pp. 9 - 23. , Leipzig, Germany (2007).
     
  • Wolter, C., Schaad, A., Meinel, C.: Deriving XACML Policies from Business Process Models. Proceedings of International Workshops on Web Information Systems Engineering (WISE 2007). pp. 142 - 153. Springer, Nancy, France (2007).
     
  • Cheng, F., Menzel, M., Meinel, C.: A Secure Web Services Providing Framework based on Lock-Keeper. Proceedings of the 10th International Conference on Managing Next Generation Networks and Services (APNOMS 2007). pp. 375 - 384. Springer, Sapporo, Japan (2007).
     
  • Menzel, M., Wolter, C., Meinel, C.: Access Control for Cross-Organisational Web Service Composition. Information Assurance and Security 2 (2007) 155–160. pp. 701 - 711 (2007).
     
  • Menzel, M., Cheng, F., Meinel, C.: Providing Secure Web Services Using Physical Separation. Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007). Springer, Zhengzhou, China (2007).
     
  • Zhou, W., Meinel, C.: Team and Task Based RBAC Access Control Model. Proceedings of the 5th International Conference on Network Operations and Management Symposium (LANOMS 2007). pp. 84 - 94. IEEE Press, Petrópolis, Brazil (2007).
     

2006 [ to top ]

  • Zhou, W., Raja, V.H., Meinel, C., Ahmad, M.: Label-Based Access Control Policy Enforcement and Management. Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2006). pp. 395-400. IEEE Press, Las Vegas, Nevada (2006).
     
  • Hu, J., Cordel, D., Meinel, C.: New Media for Teaching Applied Cryptography and Network Security. Proceedings of the 1st European Conference on Technology Enhanced Learning (EC-TEL 2006). pp. 488-493. Springer, Crete, Greece (2006).
     
  • Cheng, F., Meinel, C.: Lock-Keeper: A New Implementation of Physical Separation Technology. Proceedings of International Conference on Securing Electronic Busines Processes (ISSE 2006). pp. 275-286. Springer, Rome, Italy (2006).
     
  • Cheng, F., Meinel, C.: Deployment of Virtual Machines in Lock-Keeper. Proceedings of the 7th International Conference on Information Security Applications (WISA 2006). pp. 339-351. Springer, Jeju Island, South Korea (2006).
     

2005 [ to top ]

  • Zhou, W., Raja, V.H., Meinel, C., Ahmad, M.: A Framework for Cross-Institutional Authentication and Authorisation. Proceedings of the 6th Annual Conferences on eBusiness, eGovernment, eWork, eEurope 2005 (eChallenges 2005). pp. 1259-1266. IEEE Press, Ljubljana, Slovenia (2005).
     
  • Zhou, W., Raja, V.H., Meinel, C.: An Authentication and Authorization System for Virtual Organizations. Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2005). pp. 150-155. INT INST INFORMATICS & SYSTEMICS, Florida, USA (2005).
     
  • Ghasemzadeh, M., Klotz, V., Meinel, C.: Splitting Versus Unfolding. Proceedings of the 7th International Symposium on Representations and Methodology of Future Computing Technology (RM 2005). pp. 30-34 (2005).
     
  • Cordel, D., Hu, J., Meinel, C.: Tele-Lab IT-Security - IT Sicherheitstraining im Internet. Proceedings of International Symposium one-Lecturing und tele-TASK: Grenzenloses elektronisches Lernen für alle (D-A-C-H Security 2005). syssec Verlag, Darmstadt, Germany (2005).
     
  • Zhou, W., Meinel, C., Raja, V.H.: A Framework for Supporting Distributed Access Control Policies. Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005). pp. 442- 447. IEEE Press, Cartagena, Spain (2005).