Conference Papers for Security and Trust Engineering at the chair of Prof. Dr. Christoph Meinel

Here you can find all our peer-reviewed conference papers about security and trust engineering:

[ 2017 ] [ 2016 ] [ 2015 ] [ 2014 ] [ 2013 ] [ 2012 ] [ 2011 ] [ 2010 ] [ 2009 ] [ 2008 ] [ 2007 ] [ 2006 ] [ 2005 ] [ 2004 ] [ 2003 ] [ 2001 ] [ 2000 ]

2017 [ to top ]

  • Krentz, K.-F., Meinel, C. & Graupner, H., 2017. More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization. In Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS 2017). Nancy, France: Springer.
     
  • Krentz, K.-F., Meinel, C. & Graupner, H., 2017. Secure Self-Seeding with Power-Up SRAM States. In Proceedings of the 22nd IEEE Symposium on Computers and Communications (ISCC 2017). Heraklion, Greece: IEEE.
     
  • Krentz, K.-F., Meinel, C. & Graupner, H., 2017. Countering Three Denial-of-Sleep Attacks on ContikiMAC. In Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN 2017). Uppsala, Sweden: Junction.
     
  • Seitz, K. u. a., 2017. Demo: Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages. In 15th ACM Conference on Embedded Networked Sensor Systems (SenSys 2017). Delft, The Netherlands: ACM.
     

2016 [ to top ]

  • Jaeger, D. u. a., 2016. Analysis of Publicly Leaked Credentials and the Long Story of Password (Re-)use. In Proceedings of the 11th International Conference on Passwords (PASSWORDS2016). Bochum, Germany: Springer.
     
  • Torkura, K. & Meinel, C., 2016. Towards Vulnerability Assessment as a Service in OpenStack Clouds. In Proceedings of the 41st IEEE Conference on Local Computer Networks (LCN). Dubai, UAE: IEEE.
     
  • Krentz, K.-F., Meinel, C. & Schnjakin, M., 2016. POTR: Practical On-the-fly Rejection of Injected and Replayed 802.15.4 Frames. In Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). Salzburg, Austria: IEEE.
     
  • Amirkhanyan, A. & Meinel, C., 2016. Visualization and Analysis of Public Social Geodata to Provide Situational Awareness. In Proceedings of the 8th International Conference on Advanced Computational Intelligence (ICACI2016). Chiang Mai, Thailand: IEEE.
     
  • Amirkhanyan, A. & Meinel, C., 2016. Analysis of the Value of Public Geotagged Data from Twitter from the Perspective of Providing Situational Awareness. In Proceedings of the 15th IFIP Conference on e-Business, e-Services and e-Society (I3E2016) - Social Media: The Good, the Bad, and the Ugly. Swansea, Wales, UK: Springer.
     

2015 [ to top ]

  • Jaeger, D. u. a., 2015. Normalizing Security Events with a Hierarchical Knowledge Base. In Proceedings of the 9th WISTP International Conference on Information Security Theory and Practice (WISTP'15).
     
  • Azodi, A. u. a., 2015. Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes. In Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15). Springer.
     
  • Sapegin, A. u. a., 2015. Poisson-based Anomaly Detection for Identifying Malicious User Behaviour. In Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN'15). Springer.
     
  • Torkura, K.A., Cheng, F. & Meinel, C., 2015. A Proposed Framework For Proactive Vulnerability Assessments in Cloud Deployments. In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE.
     
  • Krentz, K.-F. & Meinel, C., 2015. Handling Reboots and Mobility in 802.15.4 Security. In Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015). Los Angeles, CA, USA: ACM.
     
  • Ussath, M., Cheng, F. & Meinel, C., 2015. Concept for a Security Investigation Framework. In Proceedings of the 7th IFIP International Conference on New Technologies, Mobility, and Security (NTMS’15).
     
  • Sianipar, J.H. & Meinel, C., 2015. A verification mechanism for cloud brokerage system. In Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). Lodz, Poland: IEEE Press, , S. 143 - 148.
     
  • Torkura, K.A., Cheng, F. & Meinel, C., 2015. Application of Quantitative Security Metrics In Cloud Computing. In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST2015). IEEE.
     
  • Jaeger, D. u. a., 2015. Normalizing Security Events with a Hierarchical Knowledge Base. In Proceedings of the 9th International Conference on Information Security Theory and Practice (WISTP'15). Lecture Notes in Computer Science. Springer Internation Publishing, , S. 237-248.
     
  • Sapegin, A. u. a., 2015. High-speed Security Analytics Powered by In-memory Machine Learning Engine. In Proceedings of the 14th International Symposium on Parallel and Distributed Computing (ISPDC 2015). IEEE, , S. 74 - 81.
     
  • Torkura, K.A. & Meinel, C., 2015. Towards Cloud-Aware Vulnerability Assessments. In Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS2015). IEEE.
     
  • Cheng, F. u. a., 2015. Analyzing Boundary Device Logs on the In-Memory Platform. In Proceedings of the IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity‘15). IEEE.
     
  • Torkura, K.A., Cheng, F. & Meinel, C., 2015. Aggregating Vulnerability Information for Proactive Cloud Vulnerability Assessment. Journal of Internet Technology and Secured Transactions, 4.
     
  • Azodi, A. u. a., 2015. Passive Network Monitoring using REAMS. In Proceedings of the 6th International Conference on Information Science and Applications (ICISA 2015). LNEE. Pattaya, Thailand: Sprinter, , S. 205-215.
     
  • Gawron, M., Cheng, F. & Meinel, C., 2015. Automatic Vulnerability Detection for Weakness Visualization and Advisory Creation. In Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). ACM Press, , S. 229-236.
     
  • Sianipar, J.H. & Meinel, C., 2015. A verification mechanism for cloud brokerage system. In Proceedings of the Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2015). Lodz, Poland: IEEE Press, , S. 143 - 148.
     
  • Marian Gawron, F.C. & Meinel, C., 2015. Automatic Detection of Vulnerabilities for Advanced Security Analytics. In Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium (APNOMS’15). IEEE, , S. 471-474.
     
  • Amirkhanyan, A. u. a., 2015. Simulation User Behavior on A Security Testbed Using User Behavior States Graph. In Proceedings of the 8th International Conference on Security of Information and Networks (SIN’15). ACM Press, , S. 217-223.
     
  • Amirkhanyan, A., Cheng, F. & Meinel, C., 2015. Real-Time Clustering of Massive Geodata for Online Maps to Improve Visual Analysis. In Proceedings of the 11th International Conference on Innovations in Information Technology (IIT2015). Dubai, UAE: IEEE.
     
  • Elsaid, M.E. & Meinel, C., 2015. Friendship based Storage Allocation for Online Social Networks Cloud Computing. In Proceedings of the International Conference of Cloud Computing Technologies and Applications (CloudTech 2015). Marrakesh, Morrocco: IEEE Press.
     

2014 [ to top ]

  • Sianipar, J., Saleh, E. & Meinel, C., 2014. Construction of Agent-Based Trust in Cloud Infrastructure. In Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2014, London, United Kingdom, December 8-11, 2014. London, United Kingdom: IEEE Computer Society, , S. 941--946.
     
  • Saleh, E. u. a., 2014. SecPlace: Security-Aware Placement Model for Multi-tenant SaaS Environments. In 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014. Bali, Indonesia: IEEE Computer Society, , S. 596-602.
     
  • Jaeger, D. u. a., 2014. Gathering and Analyzing Identity Leaks for Security Awareness. In Proceedings of the 7th International Conference on Passwords (PASSWORDS 2014). Lecture Notes for Computer Science (LNCS). Trondheim, Norway: Springer.
     
  • Azodi, A. u. a., 2014. Runtime Updatable and Dynamic Event Processing using Embedded ECMAScript Engines. In In Proceedings of the 4rd IEEE International Conference on IT Convergence and Security (ICITCS 2014). Beijing, China: IEEE Press.
     
  • Elsaid, M.E. & Meinel, C., 2014. Live Migration Impact on Virtual Datacenter Performance. In Proceedings of the 2nd International Conference on Future Internet of Things and Cloud (FiCloud 2014). Barcelona, Spain: IEEE Press, , S. 216 - 221.
     
  • Fleischhacker, N., Manulis, M. & Azodi, A., 2014. A Framework for Multi-Factor Authentication and Key Exchange. In In Proceedings of the the 1st International Conference on Research in Security Standardisation (SSR 2014). Lecture Notes in Computer Science (LNCS). London, UK: Springer.
     

2013 [ to top ]

  • Krentz, K.-F., Rafiee, H. & Meinel, C., 2013. 6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer. In Proceedings of the 1st ACM International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013). Zurich, Switzerland: ACM.
     
  • Schnjakin, M. u. a., 2013. Implementation of a Secure and Reliable Storage Above the Untrusted Clouds. In Proceedings of 8th International Conference on Computer Science and Education (ICCSE 2013). Colombo: IEEE, , S. 347 - 353.
     
  • Sapegin, A., Cheng, F. & Meinel, C., 2013. Catch the Spike: on the Locality of Individual BGP Update Bursts. In Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2013). Dalian, China: IEEE CS, , S. 78-83.
     
  • Azodi, A. u. a., 2013. Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems. In Proceedings of the 1st International Conference on Advanced Cloud and Big Data. Nanjing, China: IEEE CS.
     
  • Saleh, E., Takouna, I. & Meinel, C., 2013. SignedQuery: Protecting Users Data in Multi-tenant SaaS Environments. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI2013). Mysore, India: IEEE Press, , S. 213 - 218.
     
  • Saleh, E. & Meinel, C., 2013. HPISecure: Towards Data Confidentiality in Cloud Applications. In Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid2013). Delft, Netherlands: IEEE CS, , S. 605-609.
     
  • Azodi, A. u. a., 2013. A New Approach to Building a Multi-Tier Direct Access Knowledgebase For IDS/SIEM Systems. In Proceedings of the 11th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2013). Chengdu, China: IEEE CS.
     
  • Sapegin, A. u. a., 2013. Hierarchical Object Log Format for Normalisation of Security Events. In Proceedings of the 9th International Conference on Information Assurance and Security (IAS 2013). Tunis, Tunisia: IEEE CS.
     
  • Rafiee, H. u. a., 2013. A Flexible Framework For Detecting IPv6 Vulnerabilities. In Proceedings of The 6th International Conference on Security of Information and Networks (SIN 2013). Aksaray, Turkey: ACM Press.
     
  • Schnjakin, M. & Meinel, C., 2013. Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. In Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN2013). Nassau, Bahamas: IEEE, , S. 1-9.
     
  • Schnjakin, M. & Meinel, C., 2013. Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. In Proceedings of the 8th International Conference on Grid and Pervasive Computing (GPC2013). LNCS. Seoul, Korea: Springer, , S. 91-102.
     
  • Rafiee, H. & Meinel, C., 2013. A Secure, Flexible Framework for DNS Authentication in IPv6 Autoconfiguration. In Proceedings of the 12th IEEE International Symposium on Network Computing and Applications (NCA2013). MA, USA: IEEE Press, , S. 165 - 172.
     
  • Schnjakin, M. & Meinel, C., 2013. The State of Public Cloud Storage and Cloud-RAID: a Secure and Reliable Storage above the Clouds. In Proceedings of the 13. Deutscher IT-Sicherheitskongress (Sicherheit2013).
     
  • Schnjakin, M., Metzke, T. & Meinel, C., 2013. Applying Erasure Codes for Fault Tolerance in Cloud-RAID. In Proceedings of 16th IEEE International Conference on Computational Science and Engineering (CSE2013). Sydney, Australia: IEEE.
     
  • Cheng, F. u. a., 2013. Multi-Core Supported High Performance Security Analytics. In Proceedings of the 13th IEEE International Conference on Scalable Computing and Communication (ScalCom 2013). Chengdu, China: IEEE CS.
     
  • Cheng, F. u. a., 2013. Security Event Correlation Supported by Multi-Core Architecture. In Proceedings of the 3rd IEEE International Conference on IT Convergence and Security (ICITCS 2013). Macau, China: IEEE CS, , S. 1-5.
     
  • Rafiee, H. & Meinel, C., 2013. Privacy and Security in IPv6 Networks: Challenges and Possible Solutions. In ACM. Aksaray, Turkey: ACM press.
     
  • Rafiee, H., von Löwis, M. & Meinel, C., 2013. DNS Update Extension to IPv6 Secure Addressing. In Proceedings of the Ninth International Symposium on Frontiers of Information Systems and Network Applications (FINA2013). Barcelona, Spain: IEEE CS, , S. 896-902.
     
  • Takouna, I. u. a., 2013. A Robust Optimization for Proactive Energy Management in Virtualized Data Centers. In Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering(ICPE2013). Prague, Czech Republic: ACM Press, , S. 323-326.
     

2012 [ to top ]

  • Willems, C. & Meinel, C., 2012. Online Assessment for Hands-On Cybersecurity Training in a Virtual Lab. In Proceedings of the 3rd IEEE Global Engineering Education Conference (EDUCON 2012). Marrakesh, Morocco: IEEE Press.
     
  • Takouna, I., Dawoud, W. & Meinel, C., 2012. Analysis and Simulation of HPC Applications in Virtualized Data Centers. In Proceedings of the IEEE International Conference on Green Computing and Communications (GreenCom 2012). Besançon, France: IEEE Press.
     
  • AlSa’deh, A., Rafiee, H. & Meinel, C., 2012. IPv6 Stateless Address Autoconfiguration: Balancing Between Security, Privacy and Usability. In Proceedings of the 5th International Symposium on Foundations & Practice of Security (FPS 2012). Lecture Notes in Computer Science (LNCS). Montreal, QC, Canada: Springer.
     
  • Arulogun, T., AlSa’deh, A. & Meinel, C., 2012. IPv6 Private Networks: Security Consideration and recommendation. In Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). LAUTECH, Ogbomoso.
     
  • Rafiee, H., AlSa'deh, A. & Meinel, C., 2012. Multicore-Based Auto-Scaling SEcure Neighbor Discovery for Windows Operating Systems. In Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). Bali, Indonesia: IEEE Press.
     
  • Arulogun, T., Meinel, C. & Emuoyibofarhe, J., 2012. IPv6 Based Wireless Sensor Networks Electronic Health Monitoring System. In Proceedings of the Fourth International Conference on Mobile e-Services (ICOMeS). LAUTECH , Ogbomoso.
     
  • AlSa’deh, A., Rafiee, H. & Meinel, C., 2012. Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches. In Proceedings of the 12th IEEE International Conference on Computer and Information Technology (IEEE CIT’12). Chengdu, Sichuan, China: IEEE CS Press.
     
  • Dawoud, W., Takouna, I. & Meinel, C., 2012. Dynamic Scalability and Contention Prediction in Public Infrastructure using Internet Application Profiling. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012). Taiwan, China.
     
  • AlSa’deh, A., Rafiee, H. & Meinel, C., 2012. Stopping Time Condition for Practical IPv6 Cryptographically Generated Addresses. In Proceedings of the 26th International Conference on Information Networking (ICOIN 2012). Bali, Indonesia: IEEE CS Press.
     
  • Alnemr, R. & Meinel, C., 2012. Reputation Objects for Interoperable Reputation Exchange: Implementation and Design Decisions. In The 7th IEEE International Workshop on Trusted Collaboration (TrustCol 2012). 7th IEEE International Workshop on Trusted Collaboration. IEEE.
     
  • Neuhaus, C. u. a., 2012. InstantLab 2.0- A Platform for Operating System Experiments on Public Cloud Infrastructure.
     
  • Dawoud, W., Takouna, I. & Meinel, C., 2012. Increasing Spot Instances Reliability using Dynamic Scalability. In IEEE Fifth International Conference on Cloud Computing (CLOUD 2012). Honolulu, Hawaii, USA: IEEE CS Press, , S. 959-961.
     
  • Dawoud, W., Takouna, I. & Meinel, C., 2012. Reliable Approach to Sell the Spare Capacity in the Cloud. In Proceedings of the 3rd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2012). Nice, France, , S. 229-236.
     

2011 [ to top ]

  • Alnemr, R. & Meinel, C., 2011. Why Rating is not Enough: A Study on Online Reputation Systems. In Proceedings of the 2011, Collaborative Communities for Social Computing Workshop (CCSocialComp 2011), in conjunction with the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011). Orlando, Florida, USA: IEEE Press.
     
  • Takouna, I., Dawoud, W. & Meinel, C., 2011. Dynamic Configuration of Virtual Machine for Power-proportional Resource Provisioning. In Proceedings of 2nd International Workshop on Green Computing Middleware (GCM 2011) In conjunction with the 12th ACM/IFIP/USENIX International Middleware Conference (Middleware 2011). Lisboa, Portugal, , S. 4:1--4:6.
     
  • Thomas, I. & Meinel, C., 2011. An Attribute Assurance Framework to Define and Match Trust in Identity Attributes. In Proceedings of the 2011 IEEE International Conference on Web Services (ICWS 2011). Washington DC, USA: IEEE Computer Society, , S. 580-587.
     
  • Warschofsky, R., Menzel, M. & Meinel, C., 2011. Automated Security Service Orchestration for the Identity Management in Web Service based Systems. In Proceedings of the 2011 IEEE International Conference on Web Services (ICWS 2011). Washington DC, USA: IEEE Computer Science, , S. 596-603.
     
  • Roschke, S., Cheng, F. & Meinel, C., 2011. BALG: Bypassing Application Layer Gateways Using Multi-Staged Encrypted Shellcodes. In Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). Dublin, Ireland: IEEE Press, , S. 399-406.
     
  • Dawoud, W., Takouna, I. & Meinel, C., 2011. Elastic Virtual Machine for Fine-grained Cloud Resource Provisioning. In Proceedings of the 4th International Conference on Recent Trends of Computing, Communication & Information Technologies (ObCom 2011). CCIS. Tamil Nadu, India: Springer.
     
  • Cheng, F., Roschke, S. & Meinel, C., 2011. An Integrated Network Scanning Tool for Attack Graph Construction. In Proceedings of the 6th International Conference on Advances in Grid and Pervasive Computing (GPC 2011). LNCS. Oulu, Finland: Springer, , S. 138-147.
     
  • Alnemr, R., Schnjakin, M. & Meinel, C., 2011. Towards Context-aware Service-oriented Semantic Reputation Framework. In Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). IEEE Press.
     
  • AlSa'deh, A. u. a., 2011. IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security. In Proceedings of the 4th IFIP/IEEE International Conference on New Technologies, Mobility and Seurity (NTMS 2011). Paris, France: IEEE Press, , S. 1-6.
     
  • Willems, C. & Meinel, C., 2011. Practical Network Security Teaching in an Online Virtual Laboratory. In Proceedings of the 2011 International Conference on Security & Management (SAM 2011). Las Vegas, Nevada, USA: CSREA Press.
     
  • Dawoud, W., Takouna, I. & Meinel, C., 2011. Elastic VM for Rapid and Optimum Virtualized Resources Allocation. In Proceedings of the 5th International DMTF Academic Alliance Workshop On Systems and Virtualization Management (SVM 2011). Paris, France: IEEE Press, , S. 1-4.
     
  • Roschke, S., Cheng, F. & Meinel, C., 2011. A New Correlation Algorithm based on Attack Graph. In Proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2011). LNCS. Torremolinos, Spain: Springer, , S. 58-67.
     
  • Willems, C. u. a., 2011. A Distributed Virtual Laboratory Architecture for Cybersecurity Training. In Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011). Abu Dhabi, UAE: IEEE Press.
     
  • Alnemr, R. & Meinel, C., 2011. From Reputation Models and Systems to Reputation Ontologies. In Proceedings of the 5th IFIP International Conference on Trust Management(IFIPTM 2011). IFIP. Copenhagen, Denmark: Springer, , S. 98-116.
     
  • Streibel, O. & Alnemr, R., 2011. Trend-based and Reputation-Versed Personalized News Network. In Proceedings of the 3rd International Workshop on Search and Mining User-generated Contents (SMUC 2011), in conjunction with 20th ACM Conference on Information and Knowledge Management (CIKM 2011). Glasgow, UK: ACM Press.
     
  • Schnjakin, M. & Meinel, C., 2011. Platform for a Secure Storage-Infrastructure in the Cloud. In Proceedings of the 12th Deutscher IT-Sicherheitskongress (Sicherheit 2011). Bonn, Germany.
     
  • Thomas, I., Warschofsky, R. & Meinel, C., 2011. Whom to trust? – Generating WS-Security Policies based on Assurance Information. In Proceedings of the 9th IEEE European Conference on Web Services (ECOWS 2011). Lugano, Switzerland: IEEE Computer Society, , S. 65-72.
     
  • Rafiee, H., AlSa’deh, A. & Meinel, C., 2011. WinSEND: Windows SEcure Neighbor Discovery. In Proceedings of the 4th International Conference on Security of Information and Networks (SIN 2011). Sydney, Australia: ACM Press, , S. 243-246.
     
  • Takouna, I., Dawoud, W. & Meinel, C., 2011. Accurate Multicore Processor Power Models for Power-Aware Resource Management. In Proceedings of the 2011 International Conference on Cloud and Green Computing (CGC 2011). Sydney, Australia: IEEE Press, , S. 419-426.
     
  • AlSa'deh, A., Cheng, F. & Meinel, C., 2011. CS-CGA: Compact and More Secure CGA. In Proceedings of the 17th IEEE International Conference on Networks (ICON 2011). Singapore: IEEE Press.
     
  • Dawoud, W., Takouna, I. & Meinel, C., 2011. Elastic VM for Cloud Resources Provisioning Optimization. In Proceedings of the First International Conference on Advances in Computing and Communications (ACC 2011). CCIS. Kochi, India: Springer, , S. 431-445.
     
  • Takouna, I., Dawoud, W. & Meinel, C., 2011. Efficient Virtual Machine Scheduling-policy for Virtualized heterogeneous Multicore Systems. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA2011). Las Vegas, Nevada, USA: CSREA Press.
     

2010 [ to top ]

  • Schnjakin, M., Alnemr, R. & Meinel, C., 2010. Contract-based Cloud Architecture. In Proceedings of the 2nd international workshop (in conjunction with CIKM 2010) on Cloud data management (CloudDB 2011). Toronto, Canada: ACM Press.
     
  • Warschofsky, R., Menzel, M. & Meinel, C., 2010. Transformation and Aggregation of Web Service Security Requirements. In Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010). Ayia Napa, Cyprus: IEEE Computer Society, , S. 43-50.
     
  • Roschke, S., Cheng, F. & Meinel, C., 2010. Using Vulnerability Information and Attack Graphs for Intrusion Detection. In Proceedings of the 6th International Conference on Information Assurance and Security (IAS 2010). Atlanta, USA: IEEE Press, , S. 104-109.
     
  • Paschke, A., Alnemr, R. & Meinel, C., 2010. Rule Responder Distributed Reputation Management System for the Semantic Web. In Proceedings of the 4th International Rule Challenges (RuleML 2010). CEUR Workshop Proceedings. Washington, DC, USA.
     
  • Roschke, S. u. a., 2010. Secure Communication Using Identity Based Encryption. In Proceedings of the 11th IFIP Conference on Communications and Multimedia Security (CMS 2010). LNCS 6109. Linz, Austria: Springer, , S. 256-267.
     
  • Menzel, M. & Meinel, C., 2010. SecureSOA - Modelling Security Requirements for Service-oriented Architectures. In Proceedings of the 2010 IEEE International Conference on Services Computing (SCC 2010). Miami, Florida, USA: IEEE Computer Society, , S. 146-153.
     
  • Cheng, F. u. a., 2010. A Specialized Tool for Simulating Lock-Keeper Data Transfer. In Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010). Perth, Australia: IEEE Press, , S. 182-189.
     
  • Roschke, S., Willems, C. & Meinel, C., 2010. A Security Laboratory for CTF Scenarios and Teaching IDS. In Proceedings of the 2nd IEEE International Conference on in: Education Technology and Computer (ICETC 2010). Shanghai, China: IEEE Press, , S. 433-437.
     
  • Roschke, S., Cheng, F. & Meinel, C., 2010. A Flexible and Efficient Alert Correlation Platform for Distributed IDS. In Proceedings of the 4th International Conference on Network and System Security (NSS 2010). Melbourne, Australia: IEEE Press, , S. 24-31.
     
  • Schnjakin, M., Alnemr, R. & Meinel, C., 2010. A Security and High-Availability Layer for Cloud Storage. In Proceedings of the 1st International Workshop (In conjunction with WISE 2010) on Cloud Information System Engineering (CISE 2010). LNCS. Hong Kong, China: Springer, , S. 449-462.
     
  • Menzel, M. u. a., 2010. The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud. In Proceedings of the 6th IEEE World Congress on Services (SERVICES 2010). Miami, Florida, USA: IEEE Computer Society, , S. 115-122.
     
  • Thomas, I. & Meinel, C., 2010. An Identity Provider to manage Reliable Digital Identities for SOA and the Web. In Proceedings of the 9th Symposium on Identity and Trust on the Internet (IDTrust 2010). Gaithersburg, MD, USA: ACM Press, , S. 26-36.
     
  • Alnemr, R., Paschke, A. & Meinel, C., 2010. Enabling Reputation Interoperability through Semantic Technologies. In Proceedings of the 7th International Conference on Semantic Systems (I-Semantics 2010). Graz, Austria: ACM Press, , S. No.13.
     
  • Dawoud, W., Takounah, I. & Meinel, C., 2010. Infrastructure as a Service Security: Challenges and Solutions. In Proceedings of the 7th International Conference on Informatics and Systems (INFOS 2010). Cairo, Egypt: IEEE Press, , S. 1-8.
     
  • Menzel, M., Warschofsky, R. & Meinel, C., 2010. A Pattern-driven Generation of Security Policies for Service-oriented Architectures. In Proceedings of the 2010 IEEE International Conference on Web Services (ICWS 2010). Miami, Florida, USA: IEEE Computer Society, , S. 243-250.
     

2009 [ to top ]

  • Thomas, I. & Meinel, C., 2009. Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims. In Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). Bangalore, India: IEEE Press, , S. 243-250.
     
  • Haq, I.U. u. a., 2009. Distributed Trust Management for Validating SLA Choreographies. In Proceedings of Workshop SLAs in Grids (in conjunction with Grid'09) on SERVICE LEVEL AGREEMENTS (SLAs 2009). CoreGRID. Banff, Canada: Springer.
     
  • Cheng, F. u. a., 2009. Remodeling Vulnerability Information. In Proceedings of the 10th International Conference on Information Security and Cryptology (Inscrypt 2009). LNCS 6151. Beijing, China: Springer, , S. 324-336.
     
  • Roschke, S. u. a., 2009. Towards Unifying Vulnerability Information for Attack Graph Construction. In Proceedings of the 12th International Conference on Information Security (ISC 2009). LNCS 5735. Pisa, Italy: Springer, , S. 218-233.
     
  • Wolter, C., Weiß, C. & Meinel, C., 2009. An XACML Extension for Business Process-Centric Access Control Policies. In Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (Policy 2009). London, UK: IEEE Press, , S. 166-169.
     
  • Hebig, R.N. u. a., 2009. A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control. In Proceedings of the 2009 IEEE International Conference on Web Services (ICWS 2009), Application and Industry Track. Los Alamitos, CA, USA: IEEE Computer Society, , S. 551--558.
     
  • Cheng, F. & Meinel, C., 2009. Design of Lock-Keeper Federated Authentication Gateway. In Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT 2009). Phoenix Park, Korea: IEEE Press, , S. 1041-1046.
     
  • Cheng, F., Roschke, S. & Meinel, C., 2009. Implementing IDS Management on Lock-Keeper. In Proceedings of the 5th International Conference on Information Security Practice and Experience (ISPEC 2009). LNCS. Xi'an, China: Springer Press, , S. 360-371.
     
  • Schnjakin, M., Menzel, M. & Meinel, C., 2009. A Pattern-driven Security Advisor for Service-oriented Architectures. In Proceedings of the 6th SWS workshop (in conjunction with 16th ACM CCS) on Secure web services (SWS 2009). Chicago, USA: ACM Press, , S. 13-20.
     
  • Kylau, U. u. a., 2009. Trust Requirements in Identity Federation Topologies. In Proceedings of the 23rd International Conference on Advanced Information Networking and Applications (AINA 2009). Bradford, UK: IEEE Computer Society, , S. 137-145.
     
  • Roschke, S., Cheng, F. & Meinel, C., 2009. An Extensible and Virtualization-Compatible IDS Management Architecture. In Proceedings of the 5th International Conference on Information Assurance and Security (IAS 2009). Xi'an, China: IEEE Press, , S. 130-134.
     
  • Teymourian, K. u. a., 2009. Towards Semantic Event-driven Systems. In Proceedings of the 3th International Conference on New Technologies, Mobility and Security (NTMS 2009). Cairo, Egypt: IEEE Press, , S. 1-6.
     
  • Menzel, M. & Meinel, C., 2009. A Security Meta-Model for Service-oriented Architectures. In Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). Bangalore, India: IEEE Computer Society, , S. 251-259.
     
  • Roschke, S., Cheng, F. & Meinel, C., 2009. Intrusion Detection in the Cloud. In Proceedings of the 2009 SCC workshop (in conjunction with 8th PICom) on Services Computing (SCC 2009). Chengdu, China: IEEE Press, , S. 729-734.
     
  • Willems, C. u. a., 2009. Security in Tele-Lab – Protecting an Online Virtual Lab for Security Training. In Proceedings of the 2009 ELS workshop (in conjunction with 4th ICITST) on E-Learning Security (ELS 2009). London, UK: IEEE Press, , S. 1-7.
     
  • Menzel, M., Thomas, I. & Meinel, C., 2009. Security Requirements Specification in Service-oriented Business Process Management. In Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES 2009). Fukuoka, Japan: IEEE Computer Science, , S. 41-48.
     
  • Wolter, C., Miseldine, P. & Meinel, C., 2009. Verification of Business Process Entailment Constraints Using SPIN. In Proceedings of the 1st International Symposium on Engineering Secure Software and Systems (ESSoS 2009). LNCS. Leuven, Belgium: Springer Press, , S. 1-15.
     
  • Wolf, M. u. a., 2009. A Message Meta Model for Federated Authentication in Service-oriented Architectures. In Proceedings of IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2009). Taiwan, China: IEEE Press, , S. 1 - 8.
     
  • Roschke, S. u. a., 2009. A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification. In Proceedings of the 6th IFIP International Conference on Network and Parallel Computing (NPC 2009). Gold Coast, Australia: IEEE Press, , S. 190-196.
     
  • Alnemr, R., Bross, J. & Meinel, C., 2009. Constructing a Context-aware Service-Oriented Reputation Model using Attention Allocation Points. In Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009). Bangalore, India: IEEE Press, , S. 451-457.
     

2008 [ to top ]

  • Thomas, I., Michael, M. & Meinel, C., 2008. Quantified Trust Levels for Authentication. In Proceedings of the 2008 ACM workshop on Secure web services (ISSE 2008). Madrid, Spain: ACM Press, , S. 71-80.
     
  • Willems, C. & Meinel, C., 2008. Awareness Creation mit Tele-Lab IT-Security: praktisches IT-Sicherheitstraining am Beispiel Trojanischer Pferde. In Proceedings of GI 2008 International Conference on Sicherheit (Sicherheit 2008). LNI. Saarbrücken, Germany: GI Press, , S. 513 - 532.
     
  • Zhang, G., Cheng, F. & Meinel, C., 2008. Towards Secure Mobile Payment Based on SIP. In Proceedings of the 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2008). Belfast, Northern Ireland, UK: IEEE Press, , S. 96 - 104.
     
  • Zhang, G., Cheng, F. & Meinel, C., 2008. SIMPA: A SIP-based Mobile Payment Architecture. In Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2008). Portland, Oregon: IEEE Press, , S. 287 - 292.
     
  • Zhou, W. & Meinel, C., 2008. Enforcing Information Flow Constraints in RBAC Environments. In Proceedings of the 1st International Symposium on Electronic Commerce and Security (ISECS 2008). Guangzhou, China: IEEE Press, , S. 153 - 158.
     
  • Cheng, F. & Meinel, C., 2008. Strong Authentication over Lock-Keeper. In Proceedings of the 34th conference on Current trends in theory and practice of computer science (SOFSEM 2008). LNCS. High Tatras, Slovakia: Springer, , S. 572 - 584.
     
  • Thomas, I., Menzel, M. & Meinel, C., 2008. Using Quantified Trust Level to Describe Authentication Requirements in Federated Identity Management. In Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2008), in conjunction with the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, VA, USA: ACM Press, , S. 71-80.
     
  • Menzel, M., Wolter, C. & Meinel, C., 2008. Towards the Aggregation of Security Requirements in Cross-Organisational Service Compositions. In Proceedings of the 11th International Conference on Business Information Systems (BIS 2008). LNBIP. Innsbruck, Austria: Springer, , S. 297--308.
     
  • Wolter, C., Schaad, A. & Meinel, C., 2008. Task-Based Entailment Constraints For Basic Workflow Patterns. In Proceedings of the 13th ACM symposium on Access control models and technologies (SACMAT 2008). Colorado, USA: ACM Press, , S. 51 - 60.
     
  • Wolter, C., Schaad, A. & Meinel, C., 2008. A Transformation Approach for Security Enhanced Business Processes. In Proceedings of the IASTED International Conference on Software Engineering (SE 2008). Innsbruck, Austria: ACTA Press, , S. 14-19.
     
  • Willems, C., 2008. Tele-Lab IT-Security: an architecture for an online virtual IT security lab. In Proceedings of 2nd International Workshop on E-Learning and Virtual and Remote Laboratories 2008 (VIRTUAL-LAB). Potsdam, Germany: Universitätsverlag Potsdam.
     
  • Wolter, C., Menzel, M. & Meinel, C., 2008. Modelling Security Goals in Business Processes. In Proceedings of GI 2008 International Conference on Modellierung (Modellierung 2008). LNI. Berlin, Germany: GI Press, , S. 197 - 212.
     
  • Alnemr, R. & Meinel, C., 2008. Getting more from Reputation Systems: A Context–aware Reputation Framework based on Trust Centers and Agent Lists. In Proceedings of the 3rd International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008). Athens, Greece: IEEE Press, , S. 137 - 142.
     

2007 [ to top ]

  • Menzel, M., Cheng, F. & Meinel, C., 2007. Providing Secure Web Services Using Physical Separation. In Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007). Zhengzhou, China: Springer.
     
  • Zhou, W. & Meinel, C., 2007. Team and Task Based RBAC Access Control Model. In Proceedings of the 5th International Conference on Network Operations and Management Symposium (LANOMS 2007). Petrópolis, Brazil: IEEE Press, , S. 84 - 94.
     
  • Zhou, W. & Meinel, C., 2007. A Policy Language for Integrating Heterogeneous Authorization Policies. In Proceedings of the 4th International Conference on Grid Service Engineering and Management (GSEM 2007). Leipzig, Germany, , S. 9 - 23.
     
  • Menzel, M. u. a., 2007. SOA Security - Secure Cross-Organizational Service Composition. In Proceedings of the Stuttgarter Softwaretechnik Forum 2007 (SSF 2007). Stuttgart, Germany: Fraunhofer IRB-Verlag, , S. 41 - 53.
     
  • Cheng, F., Menzel, M. & Meinel, C., 2007. A Secure Web Services Providing Framework based on Lock-Keeper. In Proceedings of the 10th International Conference on Managing Next Generation Networks and Services (APNOMS 2007). LNCS. Sapporo, Japan: Springer, , S. 375 - 384.
     
  • Zhou, W. & Meinel, C., 2007. Function-Based Authorization Constraints Specification and Enforcement. In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS 2007). Manchester, United Kingdom: IEEE Press, , S. 119-124.
     
  • Wolter, C., Schaad, A. & Meinel, C., 2007. Deriving XACML Policies from Business Process Models. In Proceedings of International Workshops on Web Information Systems Engineering (WISE 2007). LNCS. Nancy, France: Springer, , S. 142 - 153.
     
  • Cheng, F., Wolter, C. & Meinel, C., 2007. A Simple, Smart and Extensible Framework for Network Security Measurement. In Proceedings of the 3rd International Conference on Information Security and Cryptology (Inscrypt 2007). LNCS. Xining, China: Springer, , S. 517 - 531.
     
  • Menzel, M., Wolter, C. & Meinel, C., 2007. Access Control for Cross-Organisational Web Service Composition. In Information Assurance and Security 2 (2007) 155–160., , S. 701 - 711.
     

2006 [ to top ]

  • Cheng, F. & Meinel, C., 2006. Deployment of Virtual Machines in Lock-Keeper. In Proceedings of the 7th International Conference on Information Security Applications (WISA 2006). LNCS. Jeju Island, South Korea: Springer, , S. 339-351.
     
  • Zhou, W. u. a., 2006. Label-Based Access Control Policy Enforcement and Management. In Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2006). Las Vegas, Nevada: IEEE Press, , S. 395-400.
     
  • Cheng, F. & Meinel, C., 2006. Lock-Keeper: A New Implementation of Physical Separation Technology. In Proceedings of International Conference on Securing Electronic Busines Processes (ISSE 2006). Rome, Italy: Springer, , S. 275-286.
     
  • Hu, J., Cordel, D. & Meinel, C., 2006. New Media for Teaching Applied Cryptography and Network Security. In Proceedings of the 1st European Conference on Technology Enhanced Learning (EC-TEL 2006). LNCS. Crete, Greece: Springer, , S. 488-493.
     

2005 [ to top ]

  • Zhang, X. u. a., 2005. A XML Format Secure Protocal - OpenSST. In Proceedings of the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2005). Cairo, Egypt: IEEE Press, , S. 89.
     
  • Cordel, D., Hu, J. & Meinel, C., 2005. Tele-Lab IT-Security - IT Sicherheitstraining im Internet. In Proceedings of International Symposium one-Lecturing und tele-TASK: Grenzenloses elektronisches Lernen für alle (D-A-C-H Security 2005). Darmstadt, Germany: syssec Verlag.
     
  • Hu, J., Cordel, D. & Meinel, C., 2005. Virtual Machine Management for Tele-Lab "IT-Security" Server. In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005). Cartagena, Spain: IEEE Press, , S. 448- 453.
     
  • Ghasemzadeh, M., Klotz, V. & Meinel, C., 2005. Splitting Versus Unfolding. In Proceedings of the 7th International Symposium on Representations and Methodology of Future Computing Technology (RM 2005)., , S. 30-34.
     
  • Zhou, W. u. a., 2005. A Framework for Cross-Institutional Authentication and Authorisation. In Proceedings of the 6th Annual Conferences on eBusiness, eGovernment, eWork, eEurope 2005 (eChallenges 2005). Ljubljana, Slovenia: IEEE Press, , S. 1259-1266.
     
  • Zhou, W., Raja, V.H. & Meinel, C., 2005. An Authentication and Authorization System for Virtual Organizations. In Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2005). Florida, USA: INT INST INFORMATICS & SYSTEMICS, , S. 150-155.
     
  • Zhou, W., Meinel, C. & Raja, V.H., 2005. A Framework for Supporting Distributed Access Control Policies. In Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005). Cartagena, Spain: IEEE Press, , S. 442- 447.
     

2004 [ to top ]

  • Hu, J., Meinel, C. & Schmitt, M., 2004. Tele-Lab IT Security: An Architecture for Interactive Lessons for Security Education. In Proceedings of the 35th SIGCSE technical symposium on Computer science education (SIGCSE 2004). Norfolk, Virginia, USA: ACM Press, , S. 412-416.
     
  • Hu, J. & Meinel, C., 2004. A Virtual Laboratory for IT Security Education. In Proceedings of EMISA International Conference on Informationssysteme im E-Business und E-Government (EMISA 2004). LNI. Luxemburg: GI Press, , S. 60-71.
     
  • Zhou, W. & Meinel, C., 2004. Implement Role based Access Control with Attribute Certificates. In Proceedings of the 6th International Conference Advanced Communication Technology (ICACT 2004). Phoenix Park, Republic of Korea: IEEE Press, , S. 536-541.
     
  • Zhang, X. u. a., 2004. An Http-based implementation of OpenSST. In Proceedings of International Conference on Computer Communication (ICCC 2004). Beijing, China.
     
  • Hu, J. & Meinel, C., 2004. Tele-Lab IT-Security: A Means to Build Security Laboratories on the Web. In Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004). Fukuoka, Japan: IEEE Press, , S. 285-288.
     

2003 [ to top ]

  • Zhang, X., Dulaunoy, A. & Meinel, C., 2003. Enhance opensst Protocol´s Security with Smart Card. In Proceedings of the IADIS International Conference WWW/Internet (WWW/Internet 2003). Algarve, Portugal: IADIS Press, , S. 565-571.
     
  • Cheng, F. u. a., 2003. The DualGate Lock-Keeper: A Highly Efficient Flexible and Applicable Network Security Solution. In Proceedings of the 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003). Lübeck, Germany: ACIS Press, , S. 152-159.
     
  • Hu, J. u. a., 2003. A Tutoring System for IT-Security. In Proceedings of the 3rd World Conference in Information Security Education (WISE 2003). IFIP Conference Proceedings. Monterey, California, USA: Kluwer Press, , S. 51-60.
     
  • Zhang, X., Meinel, C. & Dulaunoy, A., 2003. A Security Improved opensst Prototype combining with Smart Card. In Proceedings of International Conference on Computer Networks and Mobile Computing (ICCNMC 2003). Shanghai, China: IEEE Press, , S. 358-361.
     
  • Cheng, F. u. a., 2003. A Complete Solution for Highly Secure Data Exchange: Lock-Keeper and its Advancements. In Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003). Chengdu, China: IEEE Press, , S. 201-205.
     
  • Becker, T. & Meinel, C., 2003. Sicherheit: Der entscheidende Erfolgsfaktor für E-Commerce und M-Commerce. In Düsseldorf, Germany, , S. C421.03-C421.08.
     

2001 [ to top ]

  • Haffner, E.-G. u. a., 2001. Managing Distributed Personal Firewalls with Smart Data Servers. In Proceedings of World Conference on the WWW and Internet (WebNet 2001). Orlando, Florida, USA: AACE Press, , S. 466-471.
     
  • Roth, U. u. a., 2001. How Much Middle-Tier Do You Need? In Proceedings of World Conference on the WWW and Internet (WebNet 2001). Orlando, Florida, USA: AACE Press, , S. 1053-1056.
     
  • Vorwerk, L., Losemann, F. & Meinel, C., 2001. Suggestion for an Alternative of watermarking and digital Signatures. In Proceedings of SPIE Conference on Photonics West (PhotonicsWest 2001). San Jose, California, USA: SPIE Press, , S. 158-165.
     
  • Gollan, L. & Meinel, C., 2001. Elektronische Signaturen - eine amerikanische und europäische Perspektive. In Proceedings of the 7th Deutsche IT-Sicherheitskongress des BSI (BSI 2001). Bonn, Germany: SecuMedia Press, , S. 97-112.
     

2000 [ to top ]

  • Vorwerk, L. & Meinel, C., 2000. Integration of TLS in an Intern/Intranet/based Application. In Proceedings of the International Conference on Emerging Technologies and Life Sciences: Medicine and Communication (MEDICOM 2000). Remagen, Germany: Books Express, , S. 143-149.
     
  • Haffner, E.-G., Engel, T. & Meinel, C., 2000. Integration der Schleusentechnologie "Lock-Keeper" in moderne Sicherheitsarchitekturen. In Proceedings GI-Workshop "Internet-Datenbanken" (GI Jahrestagung 2000). Berlin, Germany.
     
  • Haffner, E.G., Engel, T. & Meinel, C., 2000. Techniques for Securing Networks Against Criminal Attacks. In Proceedings of the International Conference on Internet Computing (IC 2000). Las Vegas, Nevada, USA: CSREA Press, , S. 365-369.
     
  • Lüpken, B. u. a., 2000. Functional Integration Test of Mass Processes with Electronic Signatures in Public Administrations. In Proceedings of the 8th European Conference on Information Systems (ECIS 2000). Wien, Österreich.
     

 

You can find other sub-lists of our conference papers focusing on 

Go back to the complete list of peer-reviewed conference papers.

Other Links

... to our Research
              Security Engineering - Learning & Knowledge Tech - Design Thinking - former
... to our Teaching
              Tele-Lectures - MOOCs - Labs - Systems 
... to our Publications
              Books - Journals - Conference-Papers - Patents
... and to our Annual Reports.