Manuel Koch

According to our database1, Manuel Koch authored at least 36 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Telematikinfrastruktur 2.0 - Verhindern von missbräuchlicher Profilbildung durch PET.
Datenschutz und Datensicherheit, 2022

Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context.
CoRR, 2022

Impact of Mechanically-Induced Fibrosis on Atrial Electromechanical Function.
Proceedings of the Computing in Cardiology, 2022

2020
Das Standard-Datenschutzmodell in der Telematikinfrastruktur.
Datenschutz und Datensicherheit, 2020

2013
Informationelle Selbstbestimmung und Patientensouveränität in einem vernetzten Gesundheitswesen.
Datenschutz und Datensicherheit, 2013

2012
Elektronische Signaturen in der Telematikinfrastruktur.
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012

2006
UML specification of access control policies and their formal verification.
Softw. Syst. Model., 2006

Engineering Self-protection for Autonomous Systems.
Proceedings of the Fundamental Approaches to Software Engineering, 2006

SecTOOL - Supporting Requirements Engineering for Access Control.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Graph-based specification of access control policies.
J. Comput. Syst. Sci., 2005

Model-driven development of access control aspects.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

An Access Control Language for Dynamic Systems - Model-Driven Development and Verification.
Proceedings of the SDL 2005: Model Driven, 2005

2004
An MDA approach to Access Control Specifications Using MOF and UML Profiles.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Termination of High-Level Replacement Units with Application to Model Transformation.
Proceedings of the Workshop on Visual Languages and Formal Methods, 2004

Administrative scope in the graph-based framework.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

2003
Entwicklung und Verwaltung von Zugriffsschutz in verteilten Objektsystemen - eine Krankenhausfallstudie.
Prax. Inf.verarb. Kommun., 2003

Specification and Enforcement of Access Control in Heterogeneous Distributed Applications.
Proceedings of the Web Services, 2003

Visual Specifications of Policies and Their Verification.
Proceedings of the Fundamental Approaches to Software Engineering, 2003

Formal access control analysis in the software development process.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
A graph-based formalism for RBAC.
ACM Trans. Inf. Syst. Secur., 2002

Describing Policies with Graph Constraints and Rules.
Proceedings of the Graph Transformation, First International Conference, 2002

Conflict Detection and Resolution in Access Control Policy Specifications.
Proceedings of the Foundations of Software Science and Computation Structures, 2002

Decidability of Safety in Graph-Based Models for Access Control.
Proceedings of the Computer Security, 2002

2001
Graph Transformations for the Specification of Access Control Policies.
Proceedings of the GETGRATS Closing Workshop 2001, Bordeaux, France, June 22-23, 2001, 2001

A graph-based approach to the compositional specification of distributed systems.
Proceedings of the GETGRATS Closing Workshop 2001, Bordeaux, France, June 22-23, 2001, 2001

A Visualization of OCL Using Collaborations.
Proceedings of the «UML» 2001, 2001

On the specification and evolution of access control policies.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Foundations for a Graph-Based Approach to the Specification of Access Control Policies.
Proceedings of the Foundations of Software Science and Computation Structures, 2001

2000
Integration of graph transformation and temporal logic for the specification of distributed systems.
PhD thesis, 2000

Consistency Checking and Visualization of OCL Constraints.
Proceedings of the «UML» 2000, 2000

A Formal Model for Role-Based Access Control Using Graph Transformation.
Proceedings of the Computer Security, 2000

1999
Learning and Rewriting in Fuzzy Rule Graphs.
Proceedings of the Applications of Graph Transformations with Industrial Relevance, 1999

1998
Graphtransformationen zur visuellen Beschreibung einer transaktionsgesteuerten Konfigurationskontrolle.
Datenbank Rundbr., 1998

A Fully Abstract Model for Graph-Interpreted Temporal Logic.
Proceedings of the Theory and Application of Graph Transformations, 1998

Local Views on Distributed Systems and Their Communication.
Proceedings of the Theory and Application of Graph Transformations, 1998

1997
Graphtransformation als universelles Beschreibungs- und Ausführungsmodell für Transaktionen.
Datenbank Rundbr., 1997


  Loading...