Peter Amthor

Orcid: 0000-0001-7711-4450

Affiliations:
  • Ilmenau University of Technology, Germany (PhD 2019)


According to our database1, Peter Amthor authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung.
Proceedings of the Sixth Workshop "Automatische Bewertung von Programmieraufgaben", 2023

2021
The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

2020
Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Towards Language Support for Model-based Security Policy Engineering.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Aspect-oriented security engineering: a model-based approach.
PhD thesis, 2019

Command Dependencies in Heuristic Safety Analysis of Access Control Models.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Static Termination Analysis for Event-driven Distributed Algorithms.
Proceedings of the 13th ACM International Conference on Distributed and Event-based Systems, 2019

Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2017
Towards a Uniform Framework for Dynamic Analysis of Access Control Models.
CoRR, 2017

Efficient Heuristic Safety Analysis of Core-based Security Policies.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2015
Security Policy Synthesis in Mobile Systems.
Proceedings of the 2015 IEEE World Congress on Services, 2015

A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux.
Proceedings of the SECRYPT 2015, 2015

The Entity Labeling Pattern for Modeling Operating Systems Access Control.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

2014
WorSE: A Workbench for Model-based Security Engineering.
Comput. Secur., 2014

2013
Heuristic safety analysis of access control models.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2011
Model-based safety analysis of SELinux security policies.
Proceedings of the 5th International Conference on Network and System Security, 2011


  Loading...