Volkmar Lotz

According to our database1, Volkmar Lotz authored at least 30 papers between 1997 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


SES-14: Sichere und zuverlässliche Systeme: Datensouveränität.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020

Cybersecurity Certification for Agile and Dynamic Software Systems - a Process-Based Approach.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152).
Dagstuhl Reports, 2018

Security Certification for Service-Based Business Ecosystems.
Comput. J., 2015

Control as a Means towards Accountable Services in the Cloud.
Comput. Syst. Sci. Eng., 2013

Panel on granularity in access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

DOA-Trusted Cloud 2013 PC Co-Chairs Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Towards a Secure and Trusted Business Web.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Towards Accountable Services in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

Towards Security Certification Schemas for the Internet of Services.
Proceedings of the 5th International Conference on New Technologies, 2012

Towards a Trustworthy Service Marketplace for the Future Internet.
Proceedings of the Future Internet, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

Towards Validating Security Protocol Deployment in the Wild.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Towards Adaptive Security for Ubiquitous Computing Systems.
Proceedings of the Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, 2008

Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach.
Wirtschaftsinf., 2008

Electron. Notes Theor. Comput. Sci., 2008

SOA-Sicherheit für moderne Unternehmen - Anforderungen an SOA-Sicherheit auf dem Weg zum virtuellen Unternehmen.
Datenschutz und Datensicherheit, 2007

Formal Verification of Business Workflows and Role Based Access Control Systems.
Proceedings of the First International Conference on Emerging Security Information, 2007

Efficient Access Control for Composite Applications.
Proceedings of the Datenbanksysteme in Business, 2007

A model-checking approach to analysing organisational controls in a loan origination process.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Consolidating the Access Control of Composite Applications and Workflows.
Proceedings of the Data and Applications Security XX, 2006

Developing ambient intelligence - proceedings of the first international conference on ambient intelligence developments.
Springer, ISBN: 978-2-287-47469-9, 2006

Analyzing SLE 88 memory management security using Interacting State Machines.
Int. J. Inf. Sec., 2005

Generic Interacting State Machines and Their Instantiation with Dynamic Features.
Proceedings of the Formal Methods and Software Engineering, 2003

A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment.
Proceedings of the Computer Security, 2003

Formal Security Analysis with Interacting State Machines.
Proceedings of the Computer Security, 2002

A Formal Security Model for Microprocessor Hardware.
IEEE Trans. Software Eng., 2000

Threat Scenarios as a Means to Formally Develop Secure Systems.
J. Comput. Secur., 1997