Konstantin Knorr

Affiliations:
  • Hochschule Trier


According to our database1, Konstantin Knorr authored at least 20 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Analyzing Error Rates in Cryptological Programming Assignments.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022

Automatisierte Überprüfung von Webauftritten auf Fremdinhalte.
Proceedings of the 52. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2022, Informatik in den Naturwissenschaften, 26., 2022

2021
Messung der Schwierigkeiten von Programmieraufgaben zur Kryptologie in Java.
Proceedings of the Fifth Workshop "Automatische Bewertung von Programmieraufgaben", 2021

2020
Learning and Grading Cryptology via Automated Test Driven Software Development.
Proceedings of the Information Security Education. Information Security in Action, 2020

2016
Einbettung von Drittinhalten im Web.
Datenschutz und Datensicherheit, 2016

2015
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Security testing for Android mHealth apps.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

2010
A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components.
Proceedings of the Critical Infrastructure Protection IV, 2010

2009
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components.
Proceedings of the Emerging Challenges for Security, 2009

2004
Security Analysis of Electronic Business Processes.
Electron. Commer. Res., 2004

2001
AWA - Eine Architektur eines agentenbasierten Workflow-Systems.
Proceedings of the Information Age Economy: 5. Internationale Tagung Wirtschaftsinformatik 2001, 2001

Modeling and Analyzing Separation of Duties in Workflow Environments.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Analyzing Separation of Duties in Petri Net Workflows.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Security Requirements of E-Business Processes.
Proceedings of the Towards The E-Society: E-Commerce, 2001

PDA- and Agent-based Execution of Work of Tasks.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
Sicherheit von E-Business-Anwendungen - Struktur und Quantifizierung.
Wirtschaftsinf., 2000

Security of Electronic Business Applications - Structure and Quantification.
Proceedings of the Electronic Commerce and Web Technologies, 2000

Towards a Secure Web-Based Health Care Application.
Proceedings of the 8th European Conference on Information Systems, 2000

Dynamic Access Control through Petri Net Workflows.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Prozeßmodellierung im Krankenhaus.
Proceedings of the Electronic Business Engineering, 1999


  Loading...