Matthias Schunter

According to our database1, Matthias Schunter authored at least 54 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Editorial: Special issue on IoT security and privacy.
Computer Networks, 2019

DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019

2018
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices.
Proceedings of the Computer Security, 2018

2016
POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Intel Software Guard Extensions: Introduction and Open Research Challenges.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Data Security and Privacy in 2025?
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

2012
Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281).
Dagstuhl Reports, 2012

Secure cloud maintenance: protecting workloads against insider attacks.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Contract Signing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Certified Mail.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

TClouds - Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud.
Datenschutz und Datensicherheit, 2011

Trustworthy Clouds Underpinning the Future Internet.
Proceedings of the Future Internet, 2011

Automated Information Flow Analysis of Virtualized Infrastructures.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Towards automated security policy enforcement in multi-tenant virtual data centers.
Journal of Computer Security, 2010

Storyboard: Optimistic Deterministic Multithreading.
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010

Security audits of multi-tier virtual infrastructures in public infrastructure clouds.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Proceedings of the Trusted Systems, First International Conference, 2009

2008
Policy enforcement and compliance proofs for Xen virtual machines.
Proceedings of the 4th International Conference on Virtual Execution Environments, 2008

2007
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Architecting Dependable and Secure Systems Using Virtualization.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Towards automated provisioning of secure virtualized networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Elevating the Discussion on Security Management: The Data Centric Paradigm.
Proceedings of BDIM 2007, 2007

Enhancing Grid Security Using Trusted Virtualization.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Service-oriented Assurance - Comprehensive Security by Explicit Assurances.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Reactively Simulatable Certified Mail.
IACR Cryptology ePrint Archive, 2006

Privacy Injector - Automated Privacy Enforcement Through Aspects.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2005
Fair Exchange.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
Privacy-enabled Management of Customer Data.
IEEE Data Eng. Bull., 2004

Efficient comparison of enterprise privacy policies.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2003
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
Proceedings of the New Security Paradigms Workshop 2003, 2003

A Toolkit for Managing Enterprise Privacy Policies.
Proceedings of the Computer Security, 2003

Amending P3P for Clearer Privacy Promises.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
E-P3P privacy policies and privacy authorization.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

Private Auctions with Multiple Rounds and Multiple Items.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Privacy-Enabled Services for Enterprises.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

A Privacy Policy Model for Enterprises.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2000
Cryptographic Security of Reactive Systems.
Electr. Notes Theor. Comput. Sci., 2000

1999
The SEMPER Framework for Secure Electronic Commerce.
Wirtschaftsinformatik, 1999

The SEMPER Framework for Secure Electronic Commerce.
Proceedings of the Electronic Business Engineering, 1999

1998
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
Computer Networks, 1998

Optimal Efficiency of Optimistic Contract Signing.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

1997
Trusting Mobile User Devices and Security Modules.
IEEE Computer, 1997

Optimistic Protocols for Fair Exchange.
Proceedings of the CCS '97, 1997

1996
Asymmetric Fingerprinting (Extended Abstract).
Proceedings of the Advances in Cryptology, 1996

1995
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
Proceedings of the Verläßliche Informationssysteme, Proceedings der GI-Fachtagung VIS '95, 1995

How to Break Another Provably Secure Payment System.
Proceedings of the Advances in Cryptology, 1995

1994
The ESPRIT Project CAFE - High Security Digital Payment Systems.
Proceedings of the Computer Security, 1994


  Loading...