Günter Karjoth

Affiliations:
  • IBM Research Zurich, Switzerland


According to our database1, Günter Karjoth authored at least 55 papers between 1983 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Die Bordkarte als Authentifikationsmittel bei Flugreisen.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

2015
Aligning Security and Business Objectives for Process-Aware Information Systems.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Obstruction-free authorization enforcement: Aligning security and business objectives.
J. Comput. Secur., 2014

2013
Anonymously sharing Flickr pictures with facebook friends.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

2012
Dynamic enforcement of abstract separation of duty constraints.
ACM Trans. Inf. Syst. Secur., 2012

Optimal workflow-aware authorizations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

2011
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Separation of duties as a service.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Flexible Scoping of Authorization Constraints on Business Processes with Loops and Parallelism.
Proceedings of the Business Process Management Workshops, 2011

2010
Social networking and the risk to companies and institutions.
Inf. Secur. Tech. Rep., 2010

Towards an integrated approach to role engineering.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

2008
International Journal of Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2008

Implementing ACL-Based Policies in XACML.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Clipped RFID Tags Protect Consumer Privacy.
ERCIM News, 2007

2006
Service-oriented Assurance - Comprehensive Security by Explicit Assurances.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

2005
Disabling RFID tags with visible confirmation: clipped tags are silenced.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

2004
Privacy-enabled Management of Customer Data.
IEEE Data Eng. Bull., 2004

Efficient comparison of enterprise privacy policies.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Unification in Privacy Policy Evaluation - Translating EPAL into Prolog.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Access control with IBM Tivoli access manager.
ACM Trans. Inf. Syst. Secur., 2003

Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Amending P3P for Clearer Privacy Promises.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
E-P3P privacy policies and privacy authorization.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Privacy-Enabled Services for Enterprises.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

A Privacy Policy Model for Enterprises.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Generische Sicherheitsdienste für mobile Anwendungen.
HMD Prax. Wirtsch., 2001

Cryptographic Security for Mobile Code.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Sicherheitsdienste für mobile Agentenanwendungen.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2001

The Authorization Service of Tivoli Policy Director.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Authorization in CORBA Security.
J. Comput. Secur., 2000

Mobile agents and telcos' nightmares.
Ann. des Télécommunications, 2000

Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces.
Proceedings of the Agent Systems, 2000

An Operational Semantics of Java 2 Access Control.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1998
Protecting the Computation Results of Free-Roaming Agents.
Pers. Ubiquitous Comput., 1998

Panel Introduction: The Security Impact of Distributed Computing Technologies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Corrections to "Routing on longest-matching prefixes".
IEEE/ACM Trans. Netw., 1997

A Security Model for Aglets.
IEEE Internet Comput., 1997

Aglets: Programming Mobile Agents in Java.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1997

1996
Routing on longest-matching prefixes.
IEEE/ACM Trans. Netw., 1996

1995
Integrated Access Control Management.
Proceedings of the Bringing Telecommunication Services to the People, 1995

1993
LOEWE: A LOTOS Engineering Workbench.
Comput. Networks ISDN Syst., 1993

Dynamic State Machines with Multiway Synchronization, Channels and Shared Variables.
Proceedings of the Protocol Specification, 1993

1992
A Common Compiler for LOTOS and SDL Specifications.
IBM Syst. J., 1992

XFSM: A Format Model of Communicating State Machines for Implementation Specification.
Proceedings of the PARLE '92: Parallel Architectures and Languages Europe, 1992

Generating transition graphs from LOTOS specifications.
Proceedings of the Formal Description Techniques, 1992

Implementing LOTOS Specifications by Communicating State Machines.
Proceedings of the CONCUR '92, 1992

1990
A Compilation of Algebraic Processes Based on Extended-Action Derivation.
Proceedings of the Formal Description Techniques, 1990

1988
A LISP-Based LOTOS Environment.
Proceedings of the Formal Description Techniques, 1988

1987
Prozessalgebra und temporale Logik: angewandt zur Spezifikation u. Analyse von komplexen Protokollen.
PhD thesis, 1987

1986
On the Formal Specification of Protocols in Distributed Databases.
Proceedings of the New Communication Services: A Challenge to Computer Technology, 1986

1985
An interactive system for the analysis of communicating processes.
Proceedings of the Protocol Specification, 1985

1984
A Specification of the OSI Transport Service in LOTOS.
Proceedings of the Protocol Specification, 1984

1983
A Behavioural Description Language for the Formal Treatment of Protocols in Distributed Systems.
Proceedings of the Protocol Specification, Testing, and Verification, III, Proceedings of the IFIP WG 6.1 Third International Workshop on Protocol Specification, Testing and Verification, organized by IBM Research, Rüschlikon, Switzerland, 31 May, 1983


  Loading...