Christian Banse

Orcid: 0000-0002-4874-0273

According to our database1, Christian Banse authored at least 27 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis.
Proc. Priv. Enhancing Technol., April, 2023

A Semantic Evidence-based Approach to Continuous Cloud Service Certification.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

A Uniform Representation of Classical and Quantum Source Code for Static Code Analysis.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

2022
A Language-Independent Analysis Platform for Source Code.
CoRR, 2022

Representing LLVM-IR in a Code Property Graph.
Proceedings of the Information Security - 25th International Conference, 2022

Poster: Patient Community - A Test Bed for Privacy Threat Analysis.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Continuous Risk Assessment Methodology for Cloud Infrastructures.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
Data Sovereignty in the Cloud - Wishful Thinking or Reality?
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
Privacy Smells: Detecting Privacy Problems in Cloud Architectures.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Selecting Privacy Enhancing Technologies for IoT-Based Services.
Proceedings of the Security and Privacy in Communication Networks, 2020

An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Towards Tracking Data Flows in Cloud Architectures.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit API.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Enhancing NFV Orchestration with Security Policies.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A taxonomy-based approach for security in software-defined networking.
Proceedings of the IEEE International Conference on Communications, 2017

Continuous Location Validation of Cloud Service Components.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

Evaluating the performance of continuous test-based cloud service certification.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Generating Threat Profiles for Cloud Service Certification Systems.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Managing and Presenting User Attributes over a Decentralized Secure Name System.
Proceedings of the Data Privacy Management and Security Assurance, 2016

2015
A Secure Northbound Interface for SDN Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

2013
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic.
Comput. Secur., 2013

2012
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility.
Proceedings of the Information Security and Privacy Research, 2012

2010
Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions.
Proceedings of the Information Security Technology for Applications, 2010


  Loading...