Joerg Abendroth

According to our database1, Joerg Abendroth authored at least 8 papers between 2003 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Mobile Guard Demo: Network Based Malware Detection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Privacy-ABC Usage Scenarios.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2010
A Formal P3P Semantics for Composite Services.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

2008
A Mechanism for Requesting Hierarchical documetns in XACML.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Trust for Location-Based Authorisation.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2004
Aktive Strategien zur Schutzzielverletzungserkennung durch eine kontrollierte Machtteilung in der Zugriffskontrollarchitektur.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2003
Partial outsourcing: a new paradigm for access control.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Unified Security Framework for Networked Applications.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003


  Loading...