Cornelius Diekmann

Orcid: 0000-0002-3026-2621

Affiliations:
  • Technical University Munich, Germany


According to our database1, Cornelius Diekmann authored at least 20 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Hello World.
Arch. Formal Proofs, 2020

2019
Agile Network Access Control in the Container Age.
IEEE Trans. Netw. Serv. Manag., 2019

2018
Verified iptables Firewall Analysis and Verification.
J. Autom. Reason., 2018

2017
Provably Secure Networks: Methodology and Toolset for Configuration Management.
PhD thesis, 2017

Provably Secure Networks: Methodology and Toolset for Configuration Management.
CoRR, 2017

Privacy Assessment Using Static Taint Analysis (Tool Paper).
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2017

2016
Taint Analysis for System-Wide Privacy Audits: A Framework and Real-World Case Studies.
CoRR, 2016

LOFT - Verified Migration of Linux Firewalls to SDN.
Arch. Formal Proofs, 2016

Routing.
Arch. Formal Proofs, 2016

Simple Firewall.
Arch. Formal Proofs, 2016

IP Addresses.
Arch. Formal Proofs, 2016

Iptables_Semantics.
Arch. Formal Proofs, 2016

Verified iptables firewall analysis.
Proceedings of the 2016 IFIP Networking Conference, 2016

2015
Semantics-Preserving Simplification of Real-World Firewall Rule Sets.
Proceedings of the FM 2015: Formal Methods, 2015

Certifying spoofing-protection of firewalls.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations.
Proceedings of the 11th International Conference on Network and Service Management, 2015

2014
Directed Security Policies: A Stateful Network Implementation.
Proceedings of the Proceedings Third International Workshop on Engineering Safety and Security Systems, 2014

Network Security Policy Verification.
Arch. Formal Proofs, 2014

Verifying Security Policies Using Host Attributes.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

2013
Adaptive load-aware sampling for network monitoring on multicore commodity hardware.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013


  Loading...