Sigrid Gürgens

Orcid: 0000-0003-0708-991X

According to our database1, Sigrid Gürgens authored at least 30 papers between 1997 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2016
Security patterns modeling and formalization for pattern-based development of secure software systems.
Innov. Syst. Softw. Eng., 2016

2014
Generating Secure Service Compositions.
Proceedings of the Cloud Computing and Services Sciences, 2014

Discovering Secure Service Compositions.
Proceedings of the CLOSER 2014, 2014

2013
Preserving Confidentiality in Component Compositions.
Proceedings of the Software Composition - 12th International Conference, 2013

2011
Editorial.
J. Syst. Archit., 2011

Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security.
J. Inf. Process., 2011

Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches.
Proceedings of the Model Driven Engineering Languages and Systems, 2011

2010
ASSERT4SOA: Toward Security Certification of Service-Oriented Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

A Formal Notion of Trust - Enabling Reasoning about Security Properties.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2009
Specification of Security and Dependability Properties.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Security and Dependability Solutions for Networks and Devices.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

On the Security Validation of Integrated Security Solutions.
Proceedings of the Emerging Challenges for Security, 2009

Towards a Generic Process for Security Pattern Integration.
Proceedings of the Database and Expert Systems Applications, 2009

2007
Security Evaluation of Scenarios Based on the TCG's TPM Specification.
Proceedings of the Computer Security, 2007

Facilitating the Use of TPM Technologies through S&D Patterns.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2005
On the security of fair non-repudiation protocols.
Int. J. Inf. Sec., 2005

Security analysis of efficient (Un-)fair non-repudiation protocols.
Formal Aspects Comput., 2005

On a formal framework for security properties.
Comput. Stand. Interfaces, 2005

Abstractions Preserving Parameter Confidentiality.
Proceedings of the Computer Security, 2005

2003
Analysis of e-commerce protocols: Adapting a traditional technique.
Int. J. Inf. Sec., 2003

Parameter-Confidentiality.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

2002
Authenticity and Provability - A Formal Framework.
Proceedings of the Infrastructure Security, International Conference, 2002

Security Analysis of (Un-) Fair Non-repudiation Protocols.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Suitability of a Classical Analysis Method for E-commerce Protocols.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Validation of Cryptographic Protocols by Efficient Automated Testing.
Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, 2000

1999
Efficient Detection of Failure Modes in Electronic Commerce Protocols.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1997
SG Logic- A Formal Analysis Technique for Authentication Protocols.
Proceedings of the Security Protocols, 1997


  Loading...