Thomas Walter

Affiliations:
  • DOCOMO Euro-Labs, Munich, Germany


According to our database1, Thomas Walter authored at least 35 papers between 1992 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
CPM: Masking Code Pointers to Prevent Code Injection Attacks.
ACM Trans. Inf. Syst. Secur., 2013

2012
Generating certification authority authenticated public keys in <i>ad hoc</i> networks.
Secur. Commun. Networks, 2012

2011
Filter-resistant code injection on ARM.
J. Comput. Virol., 2011

Code Pointer Masking: Hardening Applications against Code Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Runtime monitoring for next generation Java ME platform.
Comput. Secur., 2010

2009
Proving Reliability of Anonymous Information in VANETs.
IEEE Trans. Veh. Technol., 2009

What the heck is this application doing? - A security-by-contract architecture for pervasive services.
Comput. Secur., 2009

Usage Control Policy Enforcement in OpenOffice.org and Information Flow.
Proceedings of the Information Security South Africa Conference 2009, 2009

Breaking the memory secrecy assumption.
Proceedings of the Second European Workshop on System Security, 2009

Formal Analyses of Usage Control Policies.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Usage Control Enforcement: Present and Future.
IEEE Secur. Priv., 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
ERCIM News, 2008

Policy Evolution in Distributed Usage Control.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Evidence Gathering for Remuneration of Shared Connections.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Mechanisms for usage control.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Negotiation of Usage Control Policies - Simply the Best?
Proceedings of the The Third International Conference on Availability, 2008

2007
A Security-by-Contract Architecture for Pervasive Services.
Proceedings of the Third International Workshop on Security, 2007

DUKE - Distributed Usage Control Enforcement.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Monitors for Usage Control.
Proceedings of the Trust Management, 2007

Security in Pervasive Computing Calling for new Security Principles.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

A Policy Language for Distributed Usage Control.
Proceedings of the Computer Security, 2007

2006
Diameter-based accounting management for wireless services.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Context-Aware Access Control; Making Access Control Decisions Based on Context Information.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Accounting management for session mobility in an ubiquitous environment.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Usage Control Requirements in Mobile and Ubiquitous Computing Applications.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Identification in Infrastructureless Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Generic accounting configuration management for heterogeneous mobile networks.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005

Service-oriented Accounting Configuration Management based on Diameter.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

POSSET - Policy-Driven Secure Session Transfer.
Proceedings of the Information Security Practice and Experience, 2005

2004
Secure mobile business applications - framework, architecture and implementation.
Inf. Secur. Tech. Rep., 2004

Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

Smart Devices for Next Generation Mobile Services.
Proceedings of the Construction and Analysis of Safe, 2004

2003
Framework and Architecture for Secure Mobile Business Applications.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

1996
TTCN: Towards a Formal Semantics and Validation of Test Suites.
Comput. Networks ISDN Syst., 1996

1992
A Common Semantics Representation for SDL and TTCN.
Proceedings of the Protocol Specification, 1992


  Loading...