Publikationsliste


2024
Buchaufsätze
Panini — Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. Computer Security – ESORICS 2023 – 28th European Symposium on Research in Computer Security : The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II. Ed.: G. Tsudik, 193 – 211, Springer, Cham. doi:10.1007/978-3-031-51476-0_10
On the Correlation Complexity of MPC with Cheater Identification
Brandt, N.; Maier, S.; Müller, T.; Müller-Quade, J.
2024. Financial Cryptography and Data Security – 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I. Ed.: F. Baldimtsi, 129 – 146, Springer Nature Switzerland. doi:10.1007/978-3-031-47754-6_8
Scalable and Precise Refinement Types for Imperative Languages
Lanzinger, F.; Bachmeier, J.; Ulbrich, M.; Dietl, W.
2024. iFM 2023 – 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, 377–383, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_20
Dissertationen
Context-based Access Control and Attack Modelling and Analysis. Dissertation
Walter, M.
2024, Januar 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166069
Proceedingsbeiträge
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050
On the Challenges of Transforming UVL to IVML
Agarwal, P.; Feichtinger, K.; Schmid, K.; Eichelberger, H.; Rabiser, R.
2024. Proceedings of the 6th International Workshop on Languages for Modelling Variability (MODEVAR’24), arxiv
A Two-Level Stochastic Model for the Lateral Movement of Vehicles Within Their Lane Under Homogeneous Traffic Conditions
Neis, N.; Beyerer, J.
2024. 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC), Bilbao, 24th-28th September 2023, 1896 – 1903, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ITSC57777.2023.10421975
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer
Architecture-based Propagation Analyses Regarding Security
Hahner, S.; Walter, M.; Heinrich, R.; Reussner, R.
2024. Software Engineering 2024 (SE 2024), Gesellschaft für Informatik e.V. doi:10.18420/sw2024_38
Explaining Edits to Variability Annotations in Evolving Software Product Lines
Güthing, L.; Bittner, P. M.; Schaefer, I.; Thüm, T.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 93–102, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634725
Kfeature: Rendering the Kconfig System into Feature Models
Yaman, K. B.; Wittler, J. W.; Gerking, C.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 134 – 138, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634731
Grammars for Feature Models
Hönig, M. F.; Eichhorn, D.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 155–157, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634735
Sampling Cardinality-Based Feature Models
Güthing, L.; Weiß, M.; Schaefer, I.; Lochau, M.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems, 46 – 55, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634719
Partial Proofs to Optimize Deductive Verification of Feature-Oriented Software Product Lines
Kodetzki, M.; Bordis, T.; Runge, T.; Schaefer, I.
2024. VaMoS ’24: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems. Ed.: T.Kehrer, 17–26, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634714
On Configuration Sequences in Feature Models
Meixner, K.; Feichtinger, K.; Greiner, S.; Rabiser, R.
2024. Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems (VaMoS 2024), Bern, 7th-9th February 2024, 146–148, Association for Computing Machinery (ACM). doi:10.1145/3634713.3634730
Obfuscation-Resilient Software Plagiarism Detection with JPlag
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. 46th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639478.3643074
Automated Detection of AI-Obfuscated Plagiarism in Modeling Assignments
Sağlam, T.; Hahner, S.; Schmid, L.; Burger, E.
2024. Proceedings of the 46th International Conference on Software Engineering: Software Engineering Education and Training, ICSE SEET ’24, Lissabon, 14th-20th April 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3639474.3640084
Detecting Automatic Software Plagiarism via Token Sequence Normalization
Sağlam, T.; Brödel, M.; Schmid, L.; Hahner, S.
2024. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, Lissabon, April 14-20, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1145/3597503.3639192
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Tiepelt, M.; Eaton, E.; Stebila, D.
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9
Panini - Anonymous Anycast and an Instantiation
Coijanovic, C.; Weis, C.; Strufe, T.
2024. 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Springer Verlag
Verify This: Memcached—A Practical Long-Term Challenge for the Integration of Formal Methods
Ernst, G.; Weigl, A.
2024. 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings. Ed.: P. Herber, A. Wijs, 82 – 89, Springer Nature Switzerland. doi:10.1007/978-3-031-47705-8_5
Recovering Trace Links Between Software Documentation And Code
Keim, J.; Corallo, S.; Fuchß, D.; Hey, T.; Telge, T.; Koziolek, A.
2024. Proceedings of 46th International Conference on Software Engineering (ICSE 2024)
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support
Schadt, D.; Coijanovic, C.; Weis, C.; Strufe, T.
2024. 2024 IEEE Symposium on Security and Privacy (SP), 44–44, IEEE Computer Society. doi:10.1109/SP54263.2024.00044
Composition in Differential Privacy for General Granularity Notions
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Strufe, T.
2024. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 8th-12th July 2024. doi:10.48550/arXiv.2308.14649
SoK: Explainable Machine Learning in Adversarial Environments
Noppel, M.; Wressnegger, C.
2024. Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P), San Francisco, 20th-22nd May 2024, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP54263.2024.00021
Zeitschriftenaufsätze
Variabilitätsartefakte vergleichen leicht gemacht
Feichtinger, K.
2024. OCG Journal, 49 (1), 28–30
Variability Modeling of Products, Processes, and Resources in Cyber-Physical Production Systems Engineering
Meixner, K.; Feichtinger, K.; Fadhlillah, H. S.; Greiner, S.; Marcher, H.; Rabiser, R.; Biffl, S.
2024. Journal of Systems and Software, Article no: 112007. doi:10.1016/j.jss.2024.112007
A data-driven active learning approach to reusing ML solutions in scientific applications
Hajiabadi, H.; Gerking, C.; Hilbert, L.; Koziolek, A.
2024. Journal of Systems and Software, 211, Article no: 111986. doi:10.1016/j.jss.2024.111986
DGRI-Jahrestagung 2023: KI, Cybersicherheit/Cyberresilienz, Datenökonomie
Dieler, P.
2024. Computer und Recht, 40 (1), R9-R11
Monitoring tools for DevOps and microservices: A systematic grey literature review
Giamattei, L.; Guerriero, A.; Pietrantuono, R.; Russo, S.; Malavolta, I.; Islam, T.; Dînga, M.; Koziolek, A.; Singh, S.; Armbruster, M.; Gutierrez-Martinez, J. M.; Caro-Alvaro, S.; Rodriguez, D.; Weber, S.; Henss, J.; Vogelin, E. F.; Panojo, F. S.
2024. Journal of Systems and Software, 208, Art.-Nr.: 111906. doi:10.1016/j.jss.2023.111906
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure
Adavoudi Jolfaei, A.; Rupp, A.; Schiffner, S.; Engel, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 232–257. doi:10.56553/popets-2024-0014
Cookie disclaimers: Dark patterns and lack of transparency
Berens, B. M.; Bohlender, M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2024. Computers & Security, 136, Art.-Nr.: 103507. doi:10.1016/j.cose.2023.103507
A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data
Hanisch, S.; Todt, J.; Patino, J.; Evans, N.; Strufe, T.
2024. Proceedings on Privacy Enhancing Technologies, 2024 (1), 116–132. doi:10.56553/popets-2024-0008
A Large-Scale Study of Cookie Banner Interaction Tools and their Impact on Users’ Privacy
Demir, N.; Urban, T.; Pohlmann, N.; Wressnegger, C.
2024. Proceedings on Privacy Enhancing Technologies, 2024
Early Attack Detection for Securing GOOSE Network Traffic
Elbez, G.; Nahrstedt, K.; Hagenmeyer, V.
2024. IEEE Transactions on Smart Grid, 15 (1), 899–910. doi:10.1109/TSG.2023.3272749
2023
Buchaufsätze
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010
Exact and Efficient Bayesian Inference for Privacy Risk Quantification
Rønneberg, R. C.; Pardo, R.; Wąsowski, A.
2023. Software Engineering and Formal Methods – 21st International Conference, SEFM 2023, Eindhoven, The Netherlands, November 6-10, 2023, Proceedings. Ed.: C. Ferreira, 263 – 281, Springer Nature Switzerland. doi:10.1007/978-3-031-47115-5_15
Engineering Self-adaptive Microservice Applications: An Experience Report
Riccio, V.; Sorrentino, G.; Camilli, M.; Mirandola, R.; Scandurra, P.
2023. Service-Oriented Computing – 21st International Conference, ICSOC 2023, Rome, Italy, November 28 – December 1, 2023, Proceedings, Part I. Ed.: F. Monti, 227–242, Springer Nature Switzerland. doi:10.1007/978-3-031-48421-6_16
§ 20: Digitalisierung, Informationsgesellschaft, Massendaten
Spiecker genannt Döhmann, I.
2023. Handbuch des Staatsrechts, Band I: Grundlagen, Wandel und Herausforderungen. Hrsg.: Uwe Kischel, Hanno Kube, 899–934, C.F. Müller
Neue alte Entwicklungen für das Verwaltungsrecht: Von Kooperation und Dreiecksverhältnissen zur Konfliktbefriedung und Vertrauensbildung im Wirtschaftsverwaltungs- und Gesundheitsrecht
Spiecker genannt Döhmann, I.
2023. Schutz des Individuums durch das Recht: Festschrift für Professor Rainer Hofmann zum 70. Geburtstag. Bd.2. Hrsg.: Philipp B. Donath, Alexnader Heger, Moritz Malkmus, Orhan Bayrak, 1135–1150, Springer. doi:10.1007/978-3-662-66978-5_73
Governance Foundations for the European Cybersecurity Community
Spiecker genannt Döhmann, I.; Ferreira, A.; Wintzingerode, C. von; Müllmann, D.; Benzekri, A.; Cros, P.-H.; Prochilo, E.
2023. Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers, 132–148, Springer Nature Switzerland. doi:10.1007/978-3-031-36096-1_9
Dienstleistungsroboter im Handel: Einsatzmöglichkeiten und verantwortungsbewusster Einsatz
Spiecker genannt Döhmann, I.; Stock-Homburg, R.; Knof, M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; David, K.; Wendt, J.; Stryk, O. von; Hannig, M.
2023. L. Binckebanck, R. Elste & A. Haas (Hrsg.), Digitalisierung im Vertrieb : Strategien zum Einsatz neuer Technologien in Vertriebsorganisationen / Lars Binckebanck, Rainer Elste, Alexander Haas, 533–568, Springer. doi:10.1007/978-3-658-38433-3_21
Zu Risiken und Anonymisierungen von Verhaltensbiometrie
Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft. doi:10.5771/9783748938743-423
Dynamic Access Control in Industry 4.0 Systems
Heinrich, R.; Seifermann, S.; Walter, M.; Hahner, S.; Reussner, R.; Bureš, T.; Hnětynka, P.; Pacovský, J.
2023. Digital Transformation. Ed.: B. Vogel-Heuser, 143–170, Springer Vieweg. doi:10.1007/978-3-662-65004-2_6
Habilitationsschriften
Dissertationen
Better Web Measurements: Enhancing Security and Privacy Research. Dissertation
Demir, N.
2023, November 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000163503
Correctness-by-Construction for Correct and Secure Software Systems. Dissertation
Runge, T.
2023. Technische Universität Braunschweig. doi:10.24355/dbbs.084-202306071046-0
A Reference Structure for Modular Model-based Analyses. Dissertation
Koch, S. G.
2023, Juli 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000160784
Decentralizing Software Identity Management. Dissertation
Stengele, O.
2023, Juni 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159237
Evaluating Architectural Safeguards for Uncertain AI Black-Box Components. Dissertation
Scheerer, M.
2023, Juni 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159170
Synergies between Numerical Methods for Kinetic Equations and Neural Networks. Dissertation
Schotthöfer, S.
2023, Juni 5. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000158838
Cyber Threat Intelligence based Holistic Risk Quantification and Management. Dissertation
Kaiser, F. K.
2023, April 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157717
On Efficient Zero-Knowledge Arguments. Dissertation
Klooß, M.
2023, Februar 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118
Formal Methods for Trustworthy Voting Systems : From Trusted Components to Reliable Software. Dissertation
Kirsten, M.
2023, Januar 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000155115
Masterarbeiten
Automated Post-Quantum Certificate Management for Industrial Internet of Things Infrastructures. Masterarbeit
Mirdha, K.
2023, Mai 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000169317
Intelligent Match Merging to Prevent Obfuscation Attacks on Software Plagiarism Detectors. Masterarbeit
Niehues, N.
2023, Dezember 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000167446
Continuous Integration of Performance Models for Lua-Based Sensor Applications. Masterarbeit
Burgey, L.
2023, April 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166032
Towards Realising Post-Quantum Secure ElectionGuard. Masterarbeit
Ludwig, J.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165945
Combined Modeling of Software and Hardware with Versions and Variants. Masterarbeit
Ochs, P.
2023, August. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165923
Hierarchical Classification of Design Decisions using pre-trained Language Models. Masterarbeit
Speit, J.
2023, Februar 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157373
Bachelorarbeiten
Using Large Language Models To Analyze Software Architecture Documentation. Bachelorarbeit
Schöppner, R.
2023, September 29. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165891
Preventing Automatic Code Plagiarism Generation Through Token String Normalization. Bachelorarbeit
Brödel, M.
2023, April 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165371
Token-based Plagiarism Detection for Statecharts. Bachelorarbeit
Strittmatter, J.
2023, April 5. doi:10.5445/IR/1000165276
Entity Recognition in Software Documentation Using Trace Links to Informal Diagrams. Bachelorarbeit
Reinbold, F.
2023, Oktober 5. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165275
A Translation Layer for Information Flow Verification Systems: Bridging Type Systems with Theorem Provers. Bachelorarbeit
Mühlenberend, F.
2023, September 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000165079
Enabling the Collaborative Collection of Uncertainty Sources Regarding Confidentiality. Bachelorarbeit
Gehrig, G.
2023, November 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164576
An Overview of Fairness Notions in Multi-Party Computation. Bachelorarbeit
Strasser, T.
2023, September 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162986
Verification of Red-Black Trees in KeY - A Case Study in Deductive Java Verification. Bachelorarbeit
Stuber, J.
2023, September 11. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162878
The Kconfig Variability Framework as a Feature Model. Bachelorarbeit
Yaman, K. B.
2023, April 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000162110
Forschungsstand der Sicherheit von implantierbaren medizinischen Geräten. Bachelorarbeit
Palkowitsch-Amberger, M.
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000159670
Optimizing Hash-Based Signatures in Java. Bachelorarbeit
Rausch, T.
2023, März 28. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157374
Implementation von Feedbackmechanismen in Onlinekursen am Beispiel Masterstudy LMS. Bachelorarbeit
Kia, E.
2023, Januar 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154768
Proceedingsbeiträge
palaestrAI: A Training Ground for Autonomous Agents
Veith, E. M. S. P.; Balduin, S.; Wenninghoff, N.; Wolgast, T.; Baumann, M.; Winkler, D.; Hammer, L.; Salman, A.; Schulz, M.; Raeiszadeh, A.; Logemann, T.; Wellßow, A.
2023. Modelling and Simulation 2023 - European Simulation and Modelling Conference 2023, ESM 2023, 199 – 204, EUROSIS-ETI
Collaborative Live Modelling by Language-Agnostic Versioning
Exelmans, J.; Teodorov, C.; Heinrich, R.; Egyed, A.; Vangheluwe, H.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st-6th October 2023, 364 – 374, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00067
How Students Plagiarize Modeling Assignments
Sağlam, T.; Schmid, L.; Hahner, S.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, 1st - 6th October 2023, 98 – 101, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00032
Identifying Performance Challenges in Consistency Preserving View-Based Environments
König, L.; Weber, T.
2023. Softwaretechnik-Trends, 14th Symposium on Software Performance 2023, Karlsruhe, 6th - 8th November 2023, 26–28, Gesellschaft für Informatik (GI)
Co-Evolving Meta-Models and View Types in View-Based Development
Muctadir, H. M.; König, L.; Weber, T.; Amrani, M.; Cleophas, L.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), 954–963, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00150
Consistency in the View-Based Development of Cyber-Physical Systems (Convide)
Reussner, R.; Schaefer, I.; Beckert, B.; Koziolek, A.; Burger, E.
2023. 2023 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Västerås, Sweden, 01-06 October 2023, 83–84, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C59198.2023.00026
Load-and-Act: Increasing Page Coverage of Web Applications
Weidmann, N.; Barber, T.; Wressnegger, C.
2023. Information Security – 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings. Ed.: E. Athanasopoulos, 163–182, Springer Nature Switzerland. doi:10.1007/978-3-031-49187-0_9
Machine Unlearning of Features and Labels
Warnecke, A.; Pirch, L.; Wressnegger, C.; Rieck, K.
2023. Network and Distributed System Security (NDSS) Symposium 2023: 27 February - 3 March 2023, San Diego, CA, USA. doi:10.14722/ndss.2023.23087
Holistic Adversarially Robust Pruning
Zhao, Q.; Wressnegger, C.
2023. 11th International Conference on Learning Representations (ICLR), Kigali, 1st-5th May 2023
Poster: Towards Practical Brainwave-based User Authentication
Fallahi, M.; Arias-Cabarcos, P.; Strufe, T.
2023. CCS’ 23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Kopenhagen, 26th-30th November 2023, 3627–3629, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624399
Evaluating the Effectiveness of Neuroevolution for Automated GUI-Based Software Testing
Zimmermann, D.; Deubel, P.; Koziolek, A.
2023. 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), Luxembourg, Luxembourg, 11-15 September 2023, 119 – 126, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ASEW60602.2023.00021
GUI-Based Software Testing: An Automated Approach Using GPT-4 and Selenium WebDriver
Zimmermann, D.; Koziolek, A.
2023. 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), Luxembourg, Luxembourg, 11-15 September 2023, 171 – 174, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ASEW60602.2023.00028
Data-Free Backbone Fine-Tuning for Pruned Neural Networks
Holzbock, A.; Hegde, A.; Dietmayer, K.; Belagiannis, V.
2023. 2023 31st European Signal Processing Conference (EUSIPCO), Helsinki, Finland, 4-8 September 2023, 1255 – 1259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/EUSIPCO58844.2023.10290102
Composable Long-Term Security with Rewinding
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19
BAZAAR: Anonymous Resource Sharing
Coijanovic, C.; Schadt, D.; Weis, C.; Strufe, T.
2023. WPES ’23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Kopenhagen, 26th November 2023, 135–139, Association for Computing Machinery (ACM). doi:10.1145/3603216.3624957
Hybrid Testbed for Security Research in Software-Defined Networks
Windisch, F.; Abedi, K.; Doan, T.; Strufe, T.; Nguyen, G. T.
2023. 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany, 07-09 November 2023, 147–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NFV-SDN59219.2023.10329614
Reducing memory footprints in purity estimations of volumetric DDoS traffic aggregates
Heseding, H.; Krack, T.; Zitterbart, M.
2023. M. Seufert, A. Blenk & O. Landsiedel (Hrsg.), 2nd Workshop on Machine Learning & Netwoking (MaLeNe) with the 5th International Conference on Networked Systems (NetSys 2023), Potsdam, 4th - 8th September 2023
Explanation-Aware Backdoors in a Nutshell
Noppel, M.; Wressnegger, C.
2023. Proc. of 46th German Conference on Artificial Intelligence (KI)
Poster: Fooling XAI with Explanation-Aware Backdoors
Noppel, M.; Wressnegger, C.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3612–3614, Association for Computing Machinery (ACM). doi:10.1145/3576915.3624379
Impact of Adaptive Packet Sampling on ML-based DDoS Detection
Kopmann, S.; Zitterbart, M.
2023. 2nd Workshop “Machine Learning & Networking” (MaLeNe) Proceedings Co-Located with the 5th International Conference on Networked Systems (NETSYS 2023) Potsdam, Germany, September 4, 2023 (MaLeNe). Ed.: M. Seufert
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150
A Toolchain for Simulation Component Specification and Identification
Koch, S.; Reiche, F.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 75–89, Springer International Publishing. doi:10.1007/978-3-031-36889-9_7
ABCperf: Performance Evaluation of Fault Tolerant State Machine Replication Made Simple: Demo Abstract
Spannagel, T.; Leinweber, M.; Castro, A.; Hartenstein, H.
2023. Proceedings of the 24th International Middleware Conference Demos, Posters and Doctoral Symposium, 35–36, Association for Computing Machinery (ACM). doi:10.1145/3626564.3629101
Welcome to the Third International Workshop on Requirements Engineering for Explainable Systems (RE4ES)
Droste, J.; Klös, V.; Sadeghi, M.; Schwarnmberger, M.; Speith, T.
2023. 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW), Hannover, Germany, 04-05 September 2023, 307 – 308, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW57809.2023.00058
Composable Oblivious Pseudo-random Functions via Garbled Circuits
Faller, S.; Ottenhues, A.; Ottenhues, J.
2023. Progress in Cryptology – LATINCRYPT 2023 – 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings. Ed.: A. Aly, 249 – 270, Springer Nature Switzerland. doi:10.1007/978-3-031-44469-2_13
Labeling NIDS Rules with MITRE ATT&CK Techniques using ChatGPT
Daniel, N.; Kaiser, F. K.; Dzega, A.; Elyashar, A.; Puzis, R.
2023. 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
Quantum Computing for Feature Model Analysis – Potentials and Challenges
Eichhorn, D.; Pett, T.; Osborne, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, Ed.: P. Arcaini, 1 – 7, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608971
The ’Choc-Machine’ - an Introduction to Algorithmic Thinking using Finite State Machines
Vielsack, A.; Klein, M.; Niesenhaus, T.; Ulbrich, M.
2023. WiPSCE ’23: Proceedings of the 18th WiPSCE Conference on Primary and Secondary Computing Education Research, Ed.: S. Sentance, Art.-Nr.: 25, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609772
Are Formal Contracts a useful Digital Twin of Software Systems?
Schiffl, J.; Weigl, A.
2023. Proceedings of the Workshop on Applications of Formal Methods and Digital Twins co-located with 25th International Symposium on Formal Methods (FM 2023), Ed.: S. Hallerstede, CEUR-WS
Universally Composable Auditable Surveillance
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14
SAFFIRRE: Selective Aggregate Filtering Through Filter Rule Refinement
Heseding, H.; Bachmann, F.; Bien, P. S.; Zitterbart, M.
2023. 2023 14th International Conference on Network of the Future (NoF), Izmir, 4th-06th October 2023, 42–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NoF58724.2023.10302813
Towards Self-learning Industrial Process Behaviour from Payload Bytes for Anomaly Detection
Meshram, A.; Karch, M.; Haas, C.; Beyerer, J.
2023. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sinaia, Romania, 12-15 September 2023, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA54631.2023.10275358
Identifying Factors Studied for Voter Trust in E-Voting – Review of Literature
Erb, Y.; Duenas-Cid, D.; Volkamer, M.
2023. E-Vote-ID 2023
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
Dörre, F.; Mechler, J.; Müller-Quade, J.
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer Verlag. doi:10.1007/978-981-99-8730-6_9
Composable Long-Term Security with Rewinding
Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer Verlag
Static Capability-Based Security for Smart Contracts
Schiffl, J.; Weigl, A.; Beckert, B.
2023. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 110 – 117, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS57946.2023.00024
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S.’i. Matsuo, 335 – 350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111
Continuous T-Wise Coverage
Pett, T.; Heß, T.; Krieter, S.; Thüm, T.; Schaefer, I.
2023. SPLC ’23: Proceedings of the 27th ACM International Systems and Software Product Line Conference. Vol. A. Ed.: P. Arcaini, 87–98, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608980
True Variability Shining Through Taxonomy Mining
König, C.; Rosiak, K.; Cleophas, L.; Schaefer, I.
2023. Proceedings of the 27th ACM International Systems and Software Product Line Conference - Volume A, 182–193, Association for Computing Machinery (ACM). doi:10.1145/3579027.3608989
A Query Language for Software Architecture Information
Ammermann, J.; Jordan, S.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture : 17th European Conference, ECSA 2023, Istanbul, Turkey, 18th – 22nd September 2023, 337 – 345, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_23
Uniform Substitution for Dynamic Logic with Communicating Hybrid Programs
Brieger, M.; Mitsch, S.; Platzer, A.
2023. Automated Deduction – CADE 29 – 29th International Conference on Automated Deduction, Rome, Italy, July 1–4, 2023, Proceedings. Ed.: B. Pientka, 96 – 115, Springer Nature Switzerland. doi:10.1007/978-3-031-38499-8_6
Automated Integration of Heteregeneous Architecture Information into a Unified Model
Jordan, S.; König, C.; Linsbauer, L.; Schaefer, I.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 83 – 99, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_6
Brief Announcement: Let It TEE: Asynchronous Byzantine Atomic Broadcast with n ≥ 2f+1
Leinweber, M.; Hartenstein, H.
2023. 37th International Symposium on Distributed Computing (DISC 2023). Ed.: R. Oshman, 43:1–43:7, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.DISC.2023.43
Investigating the Role of Computing Education for Informed Usage Decision-Making
Gebhardt, L.; Leinweber, M.; Michaeli, T.
2023. WiPSCE ’23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research Cambridge United Kingdom September 27 - 29, 2023. Ed.: S. Sentance, 1–2, Association for Computing Machinery (ACM). doi:10.1145/3605468.3609776
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
Heseding, H.; Dieing, M.; Meshram, A.; Zitterbart, M.
2023. 2023 IEEE 21st International Conference on Industrial Informatics (INDIN), Lemgo, Germany, 17-20 2023, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INDIN51400.2023.10218314
Automated Reverse Engineering of the Technology-Induced Software System Structure
Kirschner, Y. R.; Keim, J.; Peter, N.; Koziolek, A.
2023. Software Architecture – 17th European Conference, ECSA 2023, Istanbul, Turkey, September 18–22, 2023, Proceedings. Ed.: B. Tekinerdogan, 283–291, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_19
Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Architecture. Ed.: B. Tekinerdogan, 37–53, Springer Nature Switzerland. doi:10.1007/978-3-031-42592-9_3
Formally Verified Algorithmic Fairness using Information-Flow Tools (Extended Abstract)
Teuber, S.; Beckert, B.
2023. Proceedings of the 2nd European Workshop on Algorithmic Fairness, Ed.: J. Alvarez, Art.-Nr.: 21, CEUR-WS
A SAT-Benchmark Set from the Approximation of Trigonometric Functions for SAT-based Verification
Hiller, K.; Weigl, A.
2023. Proceedings of SAT Competition 2023 : Solver, Benchmark and Proof Checker Descriptions. Ed.: T. Balyo, 57–60, University of Helsinki
Disguising Attacks with Explanation-Aware Backdoors
Noppel, M.; Peter, L.; Wressnegger, C.
2023. 2023 IEEE Symposium on Security and Privacy (SP), 664 – 681, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SP46215.2023.10179308
On the Similarity of Web Measurements Under Different Experimental Setups
Demir, N.; Hörnemann, J.; Große-Kampmann, M.; Urban, T.; Holz, T.; Pohlmann, N.; Wressnegger, C.
2023. Proceedings of the 23nd ACM Internet Measurement Conference, 23nd ACM Internet Measurement Conference (2023) Montreal, Kanada, 24.10.2023–26.10.2023, 356 – 369, Association for Computing Machinery (ACM). doi:10.1145/3618257.3624795
A Classification of Software-Architectural Uncertainty Regarding Confidentiality
Hahner, S.; Seifermann, S.; Heinrich, R.; Reussner, R.
2023. E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, 139–160, Springer International Publishing. doi:10.1007/978-3-031-36840-0_8
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573
The Bandit’s States: Modeling State Selection for Stateful Network Fuzzing as Multi-armed Bandit Problem
Borcherding, A.; Giraud, M.; Fitzgerald, I.; Beyerer, J.
2023. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 345–350, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW59978.2023.00043
A Taxonomy for Design Decisions in Software Architecture Documentation
Keim, J.; Hey, T.; Sauer, B.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops – Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 439–454, Springer International Publishing. doi:10.1007/978-3-031-36889-9_29
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101
Establishing a Benchmark Dataset for Traceability Link Recovery Between Software Architecture Documentation and Models
Fuchß, D.; Corallo, S.; Keim, J.; Speit, J.; Koziolek, A.
2023. Software Architecture. ECSA 2022 Tracks and Workshops, Prague, Czech Republic, September 19–23, 2022, Revised Selected Papers. Ed.: T. Batista, 455–464, Springer International Publishing. doi:10.1007/978-3-031-36889-9_30
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality
Hahner, S.; Heinrich, R.; Reussner, R.
2023. 2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 126–132, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAMS59076.2023.00026
Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
Walter, M.; Reussner, R.
2023. Software Architecture : ECSA 2022 Tracks and Workshops. Ed.: T. Batista, 45–61, Springer International Publishing. doi:10.1007/978-3-031-36889-9_5
Automating GUI-based Software Testing with GPT-3
Zimmermann, D.; Koziolek, A.
2023. 2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 62 – 65, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSTW58534.2023.00022
Sender-binding Key Encapsulation
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26
Refinements of Hybrid Dynamical Systems Logic
Platzer, A.
2023. Rigorous State-Based Methods – 9th International Conference, ABZ 2023, Nancy, France, May 30–June 2, 2023, Proceedings. Ed.: U. Glässer, 3 – 14, Springer Nature Switzerland. doi:10.1007/978-3-031-33163-3_1
Exploring Effects of Online and Face-to-Face Teaching Formats on Students’ Interest and Engagement
Marquardt, K.; Happe, L.
2023. Proceedings of The 18th WiPSCE Conference on Primary and Secondary Computing Education Research (WiPSCE ’23), ACM, Association for Computing Machinery (ACM). doi:10.1145/3605468.3605499
Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects
Matthies, C.; Heinrich, R.; Wohlrab, R.
2023. EASE ’23: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 12–21, Association for Computing Machinery (ACM). doi:10.1145/3593434.3593441
Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots
Hemken, N.; Jacob, F.; Peller-Konrad, F.; Kartmann, R.; Asfour, T.; Hartenstein, H.
2023. Proceedings of the 28th ACM Symposium on Access Control Models and Technologies. Ed.: Silvio Ranise, 55–57, Association for Computing Machinery (ACM). doi:10.1145/3589608.3595078
BrainNet: Improving Brainwave-based Biometric Recognition with Siamese Networks
Fallahi, M.; Strufe, T.; Arias-Cabarcos, P.
2023. 2023 IEEE International Conference on Pervasive Computing and Communications (PerCom), 53–60, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PERCOM56429.2023.10099367
Design-time Performability Evaluation of Runtime Adaptation Strategies (Work In Progress Paper)
Rapp, M.; Scheerer, M.; Reussner, R.
2023. Companion of the 2023 ACM/SPEC International Conference on Performance Engineering, 9–15, Association for Computing Machinery (ACM). doi:10.1145/3578245.3585028
Model-based Confidentiality Analysis under Uncertainty
Hahner, S.; Bitschi, T.; Walter, M.; Bureš, T.; Hnětynka, P.; Heinrich, R.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 256–263, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00062
On Extend-Only Directed Posets and Derived Byzantine-Tolerant Replicated Data Types
Jacob, F.; Hartenstein, H.
2023. PaPoC ’23: 10th Workshop on Principles and Practice of Consistency for Distributed Data Rome Italy 8 May 2023.Ed.: E. Gonzalez Boix, 63–69, Association for Computing Machinery (ACM). doi:10.1145/3578358.3591333
Automatic Derivation of Vulnerability Models for Software Architectures
Kirschner, Y. R.; Walter, M.; Bossert, F.; Heinrich, R.; Koziolek, A.
2023. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy, 13-17 March 2023, 276–283, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C57050.2023.00065
Detecting Inconsistencies in Software Architecture Documentation Using Traceability Link Recovery
Keim, J.; Corallo, S.; Fuchß, D.; Koziolek, A.
2023. 20th IEEE International Conference on Software Architecture (ICSA), 141–152, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA56044.2023.00021
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34
VarCorC: Developing Object-Oriented Software Product Lines Using Correctness-by-Construction
Bordis, T.; Kodetzki, M.; Runge, T.; Schaefer, I.
2023. Software Engineering and Formal Methods. SEFM 2022 Collocated Workshops – AI4EA, F-IDE, CoSim-CPS, CIFMA, Berlin, Germany, September 26–30, 2022, Revised Selected Papers. Ed.: P. Masci, 156–163, Springer International Publishing. doi:10.1007/978-3-031-26236-4_13
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kühn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2023. Software Engineering 2023 : Fachtagung des GI-Fachbereichs Softwaretechnik : 20.-24. Februar 2023 Paderborn. Ed.: G. Engels; M. Tichy, 75–76, Gesellschaft für Informatik (GI)
SoK: Differentially Private Publication of Trajectory Data
Miranda-Pascual, À.; Guerra-Balboa, P.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies, 496–516, De Gruyter. doi:10.56553/popets-2023-0065
Randomness is the Root of All Evil: More Reliable Evaluation of Deep Active Learning
Ji, Y.; Kaestner, D.; Wirth, O.; Wressnegger, C.
2023. 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 3932–3941, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WACV56688.2023.00393
Saving Bees with Computer Science: A Way to Spark Enthusiasm and Interest through Interdisciplinary Online Courses
Marquardt, K.; Happe, L.
2023. Proceedings of the 28th ACM Conference on Innovation and Technology in Computer Science Education. doi:10.1145/3587102.3588835
Coverage-Driven Test Automation for Highly-Configurable Railway Systems
Eichhorn, D.; Pett, T.; Przigoda, N.; Kindsvater, J.; Seidl, C.; Schaefer, I.
2023. VaMoS ’23: Proceedings of the 17th International Working Conference on Variability Modelling of Software-Intensive, 23–30, Association for Computing Machinery (ACM). doi:10.1145/3571788.3571794
SWaTEval: An Evaluation Framework for Stateful Web Application Testing
Borcherding, A.; Penkov, N.; Giraud, M.; Beyerer, J.
2023. Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, 430–441, SciTePress. doi:10.5220/0011652200003405
RockStartIT: Authentic and Inclusive Interdisciplinary Software Engineering Courses
Happe, L.; Marquardt, K.
2023. Proceedings of the ACM/IEEE 45th International Conference on Software Engineering: Workshops Proceedings
Promoting Long-Lasting Interest in Computer Science: An Analysis of High School Teachers’ Perspectives
Happe, L.; Steidlinger, I.; Wagner, I.; Marquardt, K.
2023. Proceedings of the 15th International Conference on Computer Supported Education, April 21-23, 2023, in Prague, Czech Republic. Ed.: J. Jovanovic. Vol.: 1, 337–344, SciTePress. doi:10.5220/0011986000003470
A First Complete Algorithm for Real Quantifier Elimination in Isabelle/HOL
Kosaian, K.; Tan, Y. K.; Platzer, A.
2023. Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 211–224, Association for Computing Machinery (ACM). doi:10.1145/3573105.3575672
Engaging Girls in Computer Science: Do Single-Gender Interdisciplinary Classes Help?
Marquardt, K.; Wagner, I.; Happe, L.
2023. ICSE ’23: Proceedings of the 45th International Conference on Software Engineering Association for Computing Machinery, New York, NY, United States
Identifizierung von Vertraulichkeitsproblemen mithilfe von Angriffsausbreitung auf Architektur
Walter, M.; Heinrich, R.; Reussner, R.
2023. Software Engineering 2023. Hrsg.: R. Engels, 123–124, Gesellschaft für Informatik (GI)
Understanding Person Identification through Gait
Hanisch, S.; Muschter, E.; Hatzipanayioti, A.; Li, S.-C.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), 177–189. doi:10.56553/popets-2023-0011
"Surprised, Shocked, Worried": User Reactions to Facebook Data Collection from Third Parties
Arias-Cabarcos, P.; Kjalili, S.; Strufe, T.
2023. Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open. doi:10.56553/popets-2023-0023
Bücher
General Data Protection Regulation. Article-by-Article Commentary
Papakonstantinou, V.; Hornung, G.
2023. (P. De Hert & I. Spiecker genannt Döhmann, Hrsg.), Nomos
Die Zukunft der Gesundheitsberufe in Bildung und Migration
Spiecker gen. Döhmann, I.; Lehner, R.
2023. Lang
Zeitschriftenaufsätze
A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems
Adavoudi Jolfaei, A.; Boualouache, A.; Rupp, A.; Schiffner, S.; Engel, T.
2023. IEEE Transactions on Intelligent Transportation Systems, 24 (9), 8945–8962. doi:10.1109/TITS.2023.3266828
Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht. Auswirkungen auf betroffene Personen
Spiecker genannt Döhmann, I.; Büscher, M.; Gutjahr, A.; Hornung, G.; Schindler, S.; Selzer, A.; Stummer, S.; Wilmer, T.; Zurawski, P.
2023. Datenschutz und Datensicherheit, 503–512. doi:10.1007/s11623-023-1807-8
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Noti-fication Study Reveals Diverse Circumstances and Challenges
Spiecker genannt Döhmann, I.; Stöver, A.; Gerber, N.; Pridöhl, H.; Maass, M.; Bretthauer, S.; Hollick, M.; Herrmann, D.
2023. Proceedings on privacy enhancing technologies, 2023, 251–264. doi:10.56553/popets-2023-0051
Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches
Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53. doi:10.1145/3589958
Formal Specification and Verification of JDK’s Identity Hash Map Implementation
De Boer, M.; De Gouw, S.; Klamroth, J.; Jung, C.; Ulbrich, M.; Weigl, A.
2023. Formal Aspects of Computing, 35 (3), 1–26. doi:10.1145/3594729
Generating adaptation rule-specific neural networks
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2023. International Journal on Software Tools for Technology Transfer, 25, 733–746. doi:10.1007/s10009-023-00725-y
Lessons Learned on Machine Learning for Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2023. IEEE Security & Privacy, 21 (5), 72–77. doi:10.1109/MSEC.2023.3287207
Roboter im Supermarkt - Eine Betrachtung haftungs- und datenschutzrechtlicher Probleme beim Einsatz von Robotern im Einzelhandel
Ebert, A.; Busch, P.; Spiecker genannt Döhmann, I.; Wendt, J.
2023. Zeitschrift für Product Compliance, (1), 16–29
The Future of Enterprise Information Systems
Sunyaev, A.; Dehling, T.; Strahringer, S.; Da Xu, L.; Heinig, M.; Perscheid, M.; Alt, R.; Rossi, M.
2023. Business & Information Systems Engineering, 65, 731–751. doi:10.1007/s12599-023-00839-2
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 2
Sterz, L.; Werner, C.; Raabe, O.
2023. Recht der Datenverarbeitung, 39 (2), 97–105
Correctness-by-Construction: An Overview of the CorC Ecosystem
Bordis, T.; Runge, T.; Kittelmann, A.; Schaefer, I.
2023. Ada User Journal, 44 (1), 59 – 62
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models
Borcherding, A.; Morawetz, M.; Pfrang, S.
2023. Sensors, 23 (18), Art.-Nr.: 7864. doi:10.3390/s23187864
Areas of Tension in the Application of AI and Data Protection Law
Winau, M.
2023. European Data Protection Law Review, 9 (2), 123 – 135. doi:10.21552/edpl/2023/2/7
Evaluating Model Differencing for the Consistency Preservation of State-based Views
Wittler, J. W.; Saglam, T.; Kühn, T.
2023. The Journal of Object Technology, 22 (2), 2:1–14. doi:10.5381/jot.2023.22.2.a4
Weiterleitungs-URLs in E-Mails – Technische und rechtliche Aspekte
Müllmann, D.; Veit, M. F.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 275–282. doi:10.1007/s11623-023-1761-5
Flexible Correct-by-Construction Programming
Runge, T.; Bordis, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2023. Logical Methods in Computer Science, Volume 19, Issue 2 (2), 16:1 – 16:36. doi:10.46298/lmcs-19(2:16)2023
Systems and software product lines of the future
ter Beek, M. H.; Schaefer, I.
2023. Journal of Systems and Software, 199, Art.-Nr.: 111622. doi:10.1016/j.jss.2023.111622
Cryptographic protocol for privacy-preserving integration of HAZOPs in modular process plants
Chokparova, Z.; Becher, K.; Klose, A.; Strufe, T.; Urbas, L.
2023. Computers & Chemical Engineering, 176, Art.-Nr.: 108295. doi:10.1016/j.compchemeng.2023.108295
Combining rule- and SMT-based reasoning for verifying floating-point Java programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2023. International Journal on Software Tools for Technology Transfer, 25 (2), 185–204. doi:10.1007/s10009-022-00691-x
Methods, approaches and applications in software-driven manufacturing
Vogel-Heuser, B.; Kleinert, T.; Schaefer, I.
2023. at - Automatisierungstechnik, 71 (5), 327–329. doi:10.1515/auto-2023-0033
Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0
Walter, M.; Hahner, S.; Bureš, T.; Hnětynka, P.; Heinrich, R.; Reussner, R.
2023. at - Automatisierungstechnik, 71 (6), 443–452. doi:10.1515/auto-2022-0135
A model-based mutation framework for IEC61131-3 manufacturing systems [Modellbasiertes Mutation-Framework für IEC61131-3 Fertigungssysteme]
Rosiak, K.; Linsbauer, L.; Vogel-Heuser, B.; Schaefer, I.
2023. at - Automatisierungstechnik, 71 (5), 380–390. doi:10.1515/auto-2022-0125
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
Caballero, J.; Gomez, G.; Matic, S.; Sánchez, G.; Sebastián, S.; Villacañas, A.
2023. Future Generation Computer Systems, 144, 74–89. doi:10.1016/j.future.2023.02.012
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
Kaiser, F. K.; Dardik, U.; Elitzur, A.; Zilberman, P.; Daniel, N.; Wiens, M.; Schultmann, F.; Elovici, Y.; Puzis, R.
2023. IEEE transactions on dependable and secure computing, 1–17. doi:10.1109/TDSC.2022.3233703
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices
Arias-Cabarcos, P.; Fallahi, M.; Habrich, T.; Schulze, K.; Becker, C.; Strufe, T.
2023. ACM Transactions on Privacy and Security, 26 (3), Art.-Nr.: 26. doi:10.1145/3579356
2022
Buchaufsätze
Panorama-Abbildungen im Internet unter der DSGVO: Google Street View und Co revisited
Spiecker genannt Döhmann, I.
2022. Gestaltung der Informationsrechtsordnung: Festschrift für Thomas Dreier. Hrsg.: V. Fischer/G. Nolte/M. Senftleben/L. Specht-Riemenschneider, 427–444, Verlag C.H.Beck
Artificial Intelligence and Data Protection
Spiecker genannt Döhmann, I.
2022. The Cambridge Handbook of Artificial Intelligence - Global Perspectives on Law and Ethics. Hrsg.: L. DiMatteo/Chr. Poncibo/M. Cannarsa, 132–145, Cambridge Univ. Press. doi:10.1017/9781009072168.015
Data Protection: The more the merrier - a dynamic approach learning from prior misgovernance
Spiecker genannt Döhmann, I.
2022. The Law of Global Digitality. Hrsg.: M. Kettemann, 77–95, Taylor and Francis. doi:10.4324/9781003283881-6
§ 71: Grundrechte der Digitalisierung
Spiecker genannt Döhmann, I.
2022. Handbuch des Verwaltungsrechts, Band 3. Hrsg.: W. Kahl/M. Ludwigs, 535–564, C.F. Müller
§ 24: Europäisches Datenschutzverwaltungsrecht
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Verwaltungsrecht der Europäischen Union. Hrsg.: J.P. Terhechte, 997–1040, Nomos
Challenges in Data Protection in Business Transactions: An Overview Over Civil Law Approaches to Data Protection and Data Ownership
Spiecker genannt Döhmann, I.; Benecke, A.
2022. Handbook Industry 4.0 – Law, Technology, Society, 159–178, Springer Verlag. doi:10.1007/978-3-662-64448-5_9
Weighted attack graphs and behavioral cyber game theory for cyber risk quantification
Kaiser, F. K.; Wiens, M.; Schultmann, F.
2022. Advances in Cyber Security and Intelligent Analytics. Ed.: A. Verma, 27–42, CRC Press-Taylor & Francis Group
Re-CorC-ing KeY: Correct-by-Construction Software Development Based on KeY
Bordis, T.; Cleophas, L.; Kittelmann, A.; Runge, T.; Schaefer, I.; Watson, B. W.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 80–104, Springer International Publishing. doi:10.1007/978-3-031-08166-8_5
The Karlsruhe Java Verification Suite
Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. doi:10.1007/978-3-031-08166-8_14
Die Regulierungsperspektive von KI/BigData in der Wissenschaft
Spiecker genannt Döhmann, I.
2022. Künstliche Intelligenz in der Forschung. Hrsg.: C.F. Gethmann, 147–172, Springer Verlag. doi:10.1007/978-3-662-63449-3_6
Dissertationen
Sublinear-Time Cellular Automata and Connections to Complexity Theory. Dissertation
Casagrande Viapiana Modanese, A.
2022, November 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153071
Self-learning Anomaly Detection in Industrial Production. Dissertation
Meshram, A.
2022, November 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152361
On Security Notions for Multi-Party Computation. Dissertation
Maier, S.
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
Consistent View-Based Management of Variability in Space and Time. Dissertation
Ananieva, S.
2022, Juli 26. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148819
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. Dissertation
Seifermann, S.
2022, Juli 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148748
Formal Foundations for Anonymous Communication. Dissertation
Kuhn, C.
2022, April 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144491
Masterarbeiten
Oblivious Pseudo-Random Functions via Garbled Circuits. Masterarbeit
Faller, S. H.
2022, September 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000158426
Ein Ansatz zu anwendungsorientierten Web Analytics für Learning Analytics im Bildungsbereich. Masterarbeit
Rink, P.
2022, November 16. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156283
LiquidRust: Refinement Types for Imperative Languages with Ownership. Masterarbeit
Csiky, C.
2022, Oktober 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152005
Universally Composable Verifiable Random Oracles. Masterarbeit
Scheurer, T.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151607
Property Types for Mutable Data Structures in Java. Masterarbeit
Bachmeier, J.
2022, August 1. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000150318
Provably Quantum-Secure Message Authentication Code. Masterarbeit
Nguyen, J.
2022, März 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149514
Anomaly Detection in 3D Space for Autonomous Driving. Masterarbeit
Schilling, M.
2022, Juni 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148848
Architectural Generation of Context-based Attack Paths. Masterarbeit
Schenkenberger, J.
2022, Mai 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148755
Dynamic Extraction of Multi-Round Knowledge Argument Systems. Masterarbeit
Fickel, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146729
Modelling and Enforcing Access Control Requirements for Smart Contracts. Masterarbeit
Töberg, J.-P.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144204
Bachelorarbeiten
Preventing Code Insertion Attacks on Token-Based Software Plagiarism Detectors. Bachelorarbeit
Krieg, P.
2022, Oktober 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154301
A Mobility Case Study Framework for Validating Uncertainty Impact Analyses regarding Confidentiality. Bachelorarbeit
Priss, D.
2022, Oktober 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153083
Uncertainty-aware Confidentiality Analysis Using Architectural Variations. Bachelorarbeit
Bitschi, T.
2022, Oktober 21. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153079
A Mobility Case Study for Validating Attack Propagation Analyses. Bachelorarbeit
Evli, Y. E.
2022, November. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000152514
Coreference Resolution for Software Architecture Documentation. Bachelorarbeit
Dao, Q. N.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148262
Assessing Word Similarity Metrics For Traceability Link Recovery. Bachelorarbeit
Werber, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148261
Konsistenzerhaltung von Feature-Modellen durch externe Sichten. Bachelorarbeit
Ateş, A.
2022, Februar 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143212
Proceedingsbeiträge
Beauty and the Beast – A Case Study on Performance Prototyping of Data-Intensive Containerized Cloud Applications
Klinaku, F.; Rapp, M.; Henss, J.; Rhode, S.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 53–60, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527482
Learning to Find Proofs and Theorems by Learning to Refine Search Strategies The Case of Loop Invariant Synthesis
Laurent, J.; Platzer, A.
2022. 36th Conference on Neural Information Processing Systems (NeurIPS 2022), Neural information processing systems foundation
Towards Understanding First-Party Cookie Tracking in the Field
Demir, N.; Theis, D.; Urban, T.; Pohlmann, N.; Pohlmann, N.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 19–34, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_01
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
Doerner, D.; Mechler, J.; Müller-Quade, J.
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Model-Based Fault Classification for Automotive Software
Becker, M.; Meyer, R.; Runge, T.; Schaefer, I.; van der Wall, S.; Wolff, S.
2022. Programming Languages and Systems: 20th Asian Symposium, APLAS 2022, Auckland, New Zealand, December 5, 2022, Proceedings. Ed.: I. Sergey, 110–131, Springer Nature Switzerland. doi:10.1007/978-3-031-21037-2_6
Suppress with a Patch: Revisiting Universal Adversarial Patch Attacks against Object Detection
Pavlitskaya, S.; Hendl, J.; Kleim, S.; Muller, L. J.; Wylczoch, F.; Zollner, J. M.
2022. 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICECCME55909.2022.9988313
Handling Environmental Uncertainty in Design Time Access Control Analysis
Boltz, N.; Hahner, S.; Walter, M.; Seifermann, S.; Heinrich, R.; Bures, T.; Hnetynka, P.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Gran Canaria, Spain, 31 August 2022 - 02 September 2022, 382–389, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00067
How to Protect the Public Opinion Against New Types of Bots?
Reubold, J. L.; Escher, S. C.; Wressnegger, C.; Strufe, T.
2022. IEEE International Conference on Big Data, 1671–1680, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BigData55660.2022.10020758
Responsible Human-Robot Interaction with Anthropomorphic Service Robots: State of the Art of an Interdisciplinary Research Challenge
Stock-Homburg, R. M.; Kirchhoff, J.; Heinisch, J. S.; Ebert, A.; Busch, P.; Rawal, N.; David, K.; Wendt, J.; Spiecker genannt Döhmann, I.; Stryk, O. von; Hannig, M.; Knof, M.
2022. Proceedings of the 55th Annual Hawaii International Conference on System Sciences : January 3-7, 2022. Ed.: T. X. Bui, 2065–2074, University of Hawaii. doi:10.24251/HICSS.2022.260
Fiat-Shamir Transformation of Multi-round Interactive Proofs
Attema, T.; Fehr, S.; Klooß, M.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5
Anonymous Whistleblowing over Authenticated Channels
Agrikola, T.; Couteau, G.; Maier, S.
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24
Efficient Public Verification of Confidential Supply-Chain Transactions
Becher, K.; Schäfer, M.; Schröpfer, A.; Strufe, T.
2022. 2022 IEEE Conference on Communications and Network Security (CNS), 308–316, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS56114.2022.9947231
Uncertainty in coupled models of cyber-physical systems
Acosta, M.; Hahner, S.; Koziolek, A.; Kühn, T.; Mirandola, R.; Reussner, R.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 569–578, Association for Computing Machinery (ACM). doi:10.1145/3550356.3561539
Token-based plagiarism detection for metamodels
Sağlam, T.; Hahner, S.; Wittler, J. W.; Kühn, T.
2022. MODELS ’22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsOctober 2022, 138–141, Association for Computing Machinery (ACM). doi:10.1145/3550356.3556508
Towards a Usable and Sustainable Deductive Verification Tool
Beckert, B.; Bubel, R.; Hähnle, R.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 281–300, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_16
Runtime Verification of Correct-by-Construction Driving Maneuvers
Kittelmann, A.; Runge, T.; Bordis, T.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 242–263, Springer International Publishing. doi:10.1007/978-3-031-19849-6_15
SpecifyThis – Bridging Gaps Between Program Specification Paradigms
Ahrendt, W.; Herber, P.; Huisman, M.; Ulbrich, M.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 3–6, Springer International Publishing. doi:10.1007/978-3-031-19849-6_1
X-by-Construction Meets Runtime Verification
ter Beek, M. H.; Cleophas, L.; Leucker, M.; Schaefer, I.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 141–148, Springer International Publishing. doi:10.1007/978-3-031-19849-6_9
An Efficient VCGen-Based Modular Verification of Relational Properties
Blatter, L.; Kosmatov, N.; Prevosto, V.; Le Gall, P.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part I. Ed.: T. Margaria, 498–516, Springer International Publishing. doi:10.1007/978-3-031-19849-6_28
Decentralizing Watchtowers for Payment Channels using IPFS
Bonisch, H.; Grundmann, M.
2022. 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), 27–32, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW56584.2022.00015
La Publicación de Trayectorias: un Estudio sobre la Protección de la Privacidad
Guerra-Balboa, P.; Miranda-Pascual, À.; Parra-Arnau, J.; Forné, J.; Strufe, T.
2022. Proceedings of the XVII Spanish Meeting on Cryptology and Information Security (RECSI), Santader, 19th - 21st October, 2022. doi:10.22429/Euc2022.028
Quantifying the variability mismatch between problem and solution space
Hentze, M.; Sundermann, C.; Thüm, T.; Schaefer, I.
2022. Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, 322–333, Association for Computing Machinery (ACM). doi:10.1145/3550355.3552411
Easing the Reuse of ML Solutions by Interactive Clustering-based Autotuning in Scientific Applications
Hajiabadi, H.; Hilbert, L.; Koziolek, A.
2022. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) : Aug. 31th – Sept. 2nd, 2022, ExpoMeloneras, Maspalomas, Gran Canaria, Spain, 5–12, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA56994.2022.00011
Sharp: Short Relaxed Range Proofs
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Modeling and Enforcing Access Control Policies for Smart Contracts
Töberg, J.-P.; Schiffl, J.; Reiche, F.; Beckert, B.; Heinrich, R.; Reussner, R.
2022. Conference Proceedings: 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 38–47, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/DAPPS55202.2022.00013
Cyber threat intelligence enabled automated attack incident response
Kaiser, F. K.; Andris, L.; Tenning, T.; Iser, J.; Wiens, M.; Schultmann, F.
2022. 2022 3rd International Conference on Next Generation Computing Applications (NextComp), IEEE, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/NextComp55567.2022.9932254
Attuning Adaptation Rules via a Rule-Specific Neural Network
Bureš, T.; Hnětynka, P.; Kruliš, M.; Plášil, F.; Khalyeyev, D.; Hahner, S.; Seifermann, S.; Walter, M.; Heinrich, R.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Proceedings. Vol. 3. Ed.: T. Margaria, 215–230, Springer Nature Switzerland. doi:10.1007/978-3-031-19759-8_14
A Specification Logic for Programs in the Probabilistic Guarded Command Language
Pardo, R.; Johnsen, E. B.; Schaefer, I.; Wąsowski, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 369–387, Springer International Publishing. doi:10.1007/978-3-031-17715-6_24
Generalized Test Tables: A Domain-Specific Specification Language for Automated Production Systems
Beckert, B.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2022. Theoretical Aspects of Computing – ICTAC 2022 – 19th International Colloquium, Tbilisi, Georgia, September 27–29, 2022, Proceedings. Ed.: H. Seidl, 7–13, Springer International Publishing. doi:10.1007/978-3-031-17715-6_2
Information Flow Control-by-Construction for an Object-Oriented Language
Runge, T.; Kittelmann, A.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. Software Engineering and Formal Methods – 20th International Conference, SEFM 2022, Berlin, Germany, September 26–30, 2022, Proceedings. Ed.: B.-H. Schlingloff, 209–226, Springer International Publishing. doi:10.1007/978-3-031-17108-6_13
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments
Boltz, N.; Sterz, L.; Gerking, C.; Raabe, O.
2022. INFORMATIK 2022, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Ed.: D. Demmler, 521–532, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_44
Toward Accurate Online Multi-target Multi-camera Tracking in Real-time
Specker, A.; Beyerer, J.
2022. 30th European Signal Processing Conference (EUSIPCO), 533–537
Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network
Grundmann, M.; Amberg, H.; Baumstark, M.; Hartenstein, H.
2022. Financial Cryptography and Data Security – 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers. Ed.: I. Eyal, 694–704, Springer International Publishing. doi:10.1007/978-3-031-18283-9_35
A Refactoring for Data Minimisation Using Formal Verification
Lanzinger, F.; Ulbrich, M.; Weigl, A.
2022. Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering – 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22–30, 2022, Proceedings, Part II. Ed.: T. Margaria, 345–364, Springer Nature Switzerland. doi:10.1007/978-3-031-19756-7_19
AutoArx: Digital Twins of Living Architectures
Jordan, S.; Linsbauer, L.; Schaefer, I.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 205–212, Springer International Publishing. doi:10.1007/978-3-031-16697-6_15
Accurate Performance Predictions with Component-Based Models of Data Streaming Applications
Werle, D.; Seifermann, S.; Koziolek, A.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 83–98, Springer International Publishing. doi:10.1007/978-3-031-16697-6_6
Feasibility of Inconspicuous GAN-generated Adversarial Patches against Object Detection
Pavlitskaya, S.; Codău, B.-M.; Zöllner, J. M.
2022. Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022) Ed.: G. Pedroza, CEUR-WS.org
Derivation of subset product lines in FeatureIDE
Linsbauer, L.; Westphal, P.; Bittner, P. M.; Krieter, S.; Thüm, T.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B, 38–41, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547033
Towards an integrated approach for managing the variability and evolution of both software and hardware components
Wittler, J. W.; Kühn, T.; Reussner, R.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume B Ed.: A. Felfernig, 94–98, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547059
Membership Inference Attack Against Principal Component Analysis
Zari, O.; Parra-Arnau, J.; Ünsal, A.; Strufe, T.; Önen, M.
2022. Privacy in Statistical Databases – International Conference, PSD 2022, Paris, France, September 21–23, 2022, Proceedings. Ed.: J. Domingo-Ferrer, 269–282, Springer International Publishing. doi:10.1007/978-3-031-13945-1_19
ARCHI4MOM: Using Tracing Information to Extract the Architecture of Microservice-Based Systems from Message-Oriented Middleware
Singh, S.; Werle, D.; Koziolek, A.
2022. Software Architecture : 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 189–204, Springer International Publishing. doi:10.1007/978-3-031-16697-6_14
On the Applicability of Payment Channel Networks for Allocation of Transport Ticket Revenues
Grundmann, M.; von Zastrow-Marcks, O.; Hartenstein, H.
2022. Proceedings - International Conference on Computer Communications and Networks, ICCCN : 31st International Conference on Computer Communications and Networks, ICCCN 2022, Virtual, Online, 25 - 28 July 2022, 7 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCCN54977.2022.9868881
Toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective
Corallo, S.; Mazkatli, M.; Rapp, M.; Hajiabadi, H.; Kaplan, A.; Kuehn, R.; Schmid, L.; Singh, S.
2022. Software Architecture – 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021, Revised Selected Papers. Ed.: P. Scandurra, 47–62, Springer International Publishing. doi:10.1007/978-3-031-15116-3_3
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security
Synchronizing software variants: A two-dimensional approach
König, C.; Rosiak, K.; Linsbauer, L.; Schaefer, I.
2022. Proceedings of the 26th ACM International Systems and Software Product Line Conference (SPLC ’22), Graz, A, 12.-16. September 2022. Ed.: A. Felfernig. Vol. B, 82–89, Association for Computing Machinery (ACM). doi:10.1145/3503229.3547053
Architectural Optimization for Confidentiality Under Structural Uncertainty
Walter, M.; Hahner, S.; Seifermann, S.; Bures, T.; Hnetynka, P.; Pacovský, J.; Heinrich, R.
2022. Software Architecture : 15th European Conference, ECSA 2021 Tracks and Workshops; Växjö, Sweden, September 13–17, 2021 : Revised Selected Papers. Ed.: P. Scandurra, 309–332, Springer Nature Switzerland. doi:10.1007/978-3-031-15116-3_14
Design-time Performability Optimization of Runtime Adaptation Strategies
Rapp, M.; Scheerer, M.; Reussner, R.
2022. ICPE ’22: Companion of the 2022 ACM/SPEC International Conference on Performance Engineering, 113–120, Association for Computing Machinery (ACM). doi:10.1145/3491204.3527471
Grasping the Concept of Decentralized Systems for Instant Messaging
Gebhardt, L.; Leinweber, M.; Jacob, F.; Hartenstein, H.
2022. Proceedings of the 17th Workshop in Primary and Secondary Computing Education, Art.-Nr. 10, Association for Computing Machinery (ACM). doi:10.1145/3556787.3556864
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association
Feature-based Investigation of Simulation Structure and Behaviour
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. Software Architecture – 16th European Conference, ECSA 2022, Prague, Czech Republic, September 19–23, 2022, Proceedings. Ed.: I. Gerostathopoulos, 178–185, Springer. doi:10.1007/978-3-031-16697-6_13
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding, A.; Feldmann, L.; Karch, M.; Meshram, A.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120
A Comprehensive Study of k-Portfolios of Recent SAT Solvers
Bach, J.; Iser, M.; Böhm, K.
2022. 25th International Conference on Theory and Applications of Satisfiability Testing (SAT 2022). Hrsg.: Kuldeep S. Meel, 2:1–2:18, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.SAT.2022.2
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association
Anonymizing Trajectory Data: Limitations and Opportunities
Guerra-Balboa, P.; Miranda-Pascual, À.; Strufe, T.; Parra-Arnau, J.; Forné, J.
2022. AAAI Workshop on Privacy-Preserving Artificial Intelligence
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484
Traits: Correctness-by-Construction for Free
Runge, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2022. Formal Techniques for Distributed Objects, Components, and Systems – 42nd IFIP WG 6.1 International Conference, FORTE 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 13–17, 2022, Proceedings. Ed.: M. Mousavi, 131–150, Springer International Publishing. doi:10.1007/978-3-031-08679-3_9
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility : Technische und betriebswirtschaftliche Aspekte. Hrsg.: H. Proff, 547–567, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-39438-7_32
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML)
Certified Verification of Relational Properties
Blatter, L.; Kosmatov, N.; Prevosto, V.; Le Gall, P.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 86–105, Springer International Publishing. doi:10.1007/978-3-031-07727-2_6
Formal Specification and Verification of JDK’s Identity Hash Map Implementation
Boer, M. de; Gouw, S. de; Klamroth, J.; Jung, C.; Ulbrich, M.; Weigl, A.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 45–62, Springer International Publishing. doi:10.1007/978-3-031-07727-2_4
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer Verlag. doi:10.1007/978-3-031-12172-2_17
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association
Transparency for Bystanders in IoT regarding audiovisual Recordings
Escher, S.; Etzrodt, K.; Weller, B.; Kopsell, S.; Strufe, T.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops): 21–25 March 2022, Pisa, Italy, 649–654, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767212
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchß, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
Performance-Detective: Automatic Deduction of Cheap and Accurate Performance Models
Schmid, L.; Copik, M.; Calotoiu, A.; Werle, D.; Reiter, A.; Selzer, M.; Koziolek, A.; Hoefler, T.
2022. ACM International Conference on Supercomputing (ICS ’22), Virtual Event, June 28-30, 2022, Association for Computing Machinery (ACM). doi:10.1145/3524059.3532391
On CRDTs in Byzantine Environments : Conflict Freedom, Equivocation Tolerance, and the Matrix Replicated Data Type
Jacob, F.; Bayreuther, S.; Hartenstein, H.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_07
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305
Inferring Interval-Valued Floating-Point Preconditions
Krämer, J.; Blatter, L.; Darulova, E.; Ulbrich, M.
2022. Tools and Algorithms for the Construction and Analysis of Systems – 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part I. Ed.: D. Fisman, 303–321, Springer International Publishing. doi:10.1007/978-3-030-99524-9_16
PREUNN: Protocol Reverse Engineering using Neural Networks
Kiechle, V.; Börsig, M.; Nitzsche, S.; Baumgart, I.; Becker, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy. Ed.: P. Mori. Vol. 1, 345–356, SciTePress. doi:10.5220/0010813500003120
Enhancing Girls’ Feeling of Belonging to Computer Science : Possibilities of Interdisciplinary Online Courses to Increase Diversity of Learning
Marquardt, K.
2022. Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2022). Vol. 2, Association for Computing Machinery (ACM). doi:10.1145/3502717.3532108
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen
Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings
Byrenheid, M.; Roos, S.; Strufe, T.
2022. ICDCN ’22: Proceedings of the 2022 International Conference on Distributed Computing and Networking ; Jan 4th-7th, 2022, Virtual Conference, 107–116, Association for Computing Machinery (ACM). doi:10.1145/3491003.3491020
German voters’ attitudes towards voting online with a verifiable system
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2022. Workshop on Advances in Secure Electronic Voting (VOTING), Grenada, February 18, 2022
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075
Your website has been hijacked: Raising awareness for an invisible problem
Hennig, A.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Ed.: C. Wressnegger, 1–6, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_18
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Proceedings of the 55th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, 03.01.2022-07.01.2022, 7585–7594. doi:10.24251/HICSS.2022.911
Bücher
The Law of Global Digitality
Kettemann, M. C.; Peukert, A.; Spiecker genannt Döhmann, I.
2022. Routledge. doi:10.4324/9781003283881
Demokratie und Öffentlichkeit im 21. Jahrhundert – zur Macht des Digitalen
Spiecker genannt Döhmann, I.; Westland, M.; Campos, R. (Hrsg.)
2022. Nomos Verlagsgesellschaft. doi:10.5771/9783748932741
Künstliche Intelligenz in der Forschung – Neue Möglichkeiten und Herausforderungen für die Wissenschaft
Gethmann, C. F.; Buxmann, P.; Distelrath, J.; Humm, B. G.; Lingner, S.; Nitsch, V.; Schmidt, J. C.; Spiecker genannt Döhmann, I.
2022. Springer Verlag. doi:10.1007/978-3-662-63449-3
Zeitschriftenaufsätze
Gewährleistung effektiven Grundrechtsschutzes auf Grundlage des Kommissionsentwurfs für eine KI-Verordnung?
Winau, M.
2022. Zeitschrift für das Recht der digitalen Wirtschaft (ZdiW), 3 (1), 14–19
Intelligente Verkehrssysteme – IT-Sicherheit in offenen Infrastrukturen Teil 1
Sterz, L.; Werner, C.; Raabe, O.
2022. Recht der Datenverarbeitung, 2022 (6), 291–299
Immutability and Encapsulation for Sound OO Information Flow Control
Runge, T.; Servetto, M.; Potanin, A.; Schaefer, I.
2022. ACM Transactions on Programming Languages and Systems, 45 (1), Art.Nr. 3. doi:10.1145/3573270
Privacy and Utility of Private Synthetic Data for Medical Data Analyses
Appenzeller, A.; Leitner, M.; Philipp, P.; Krempel, E.; Beyerer, J.
2022. Applied Sciences, 12 (23), Article no: 12320. doi:10.3390/app122312320
On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification
Wunderlich, D.; Bernau, D.; Aldà, F.; Parra-Arnau, J.; Strufe, T.
2022. Applied Sciences, 12 (21), Art.-Nr.: 11177. doi:10.3390/app122111177
Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest
Reubold, J. L.; Escher, S.; Pflugmacher, J.; Strufe, T.
2022. Online Social Networks and Media, 31, Art.-Nr.: 100228. doi:10.1016/j.osnem.2022.100228
Scalability testing automation using multivariate characterization and detection of software performance antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, 193, Art.-Nr.: 111446. doi:10.1016/j.jss.2022.111446
Deep-learning microscopy image reconstruction with quality control reveals second-scale rearrangements in RNA polymerase II clusters
Hajiabadi, H.; Mamontova, I.; Prizak, R.; Pancholi, A.; Koziolek, A.; Hilbert, L.
2022. (K. E. Nelson, Hrsg.) PNAS Nexus, 1 (3), 1–12. doi:10.1093/pnasnexus/pgac065
Decentralized Review and Attestation of Software Attribute Claims
Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access, 10, 66694–66710. doi:10.1109/ACCESS.2022.3185046
Family-Based and Product-Based Development of Correct-by-Construction Software Product Lines
Bordis, T.; Runge, T.; Schultz, D.; Schaefer, I.
2022. Journal of Computer Languages, 70, Art.-Nr.: 101119. doi:10.1016/j.cola.2022.101119
Agiles Produktionssystem mittels lernender Roboter bei ungewissen Produktzuständen am Beispiel der Anlasser-Demontage = Concept of an agile production system based on learning robots applied to disassembly
Lanza, G.; Asfour, T.; Beyerer, J.; Deml, B.; Fleischer, J.; Heizmann, M.; Furmans, K.; Hofmann, C.; Cebulla, A.; Dreher, C.; Kaiser, J.-P.; Klein, J.-F.; Leven, F.; Mangold, S.; Mitschke, N.; Stricker, N.; Pfrommer, J.; Wu, C.; Wurster, M.; Zaremski, M.
2022. at - Automatisierungstechnik, 70 (6), 504–516. doi:10.1515/auto-2021-0158
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
Private Function Evaluation with Cards
Koch, A.; Walzer, S.
2022. New Generation Computing, 40, 115–147. doi:10.1007/s00354-021-00149-9
Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2022. The journal of systems and software, 184, Art.-Nr. 111138. doi:10.1016/j.jss.2021.111138
Challenges and Common Solutions in Smart Contract Development
Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2022. IEEE transactions on software engineering, 48 (11), 4291–4318. doi:10.1109/TSE.2021.3116808
2021
Buchaufsätze
Challenges in the Evolution of Palladio—Refactoring Design Smells in a Historically-Grown Approach to Software Architecture Analysis
Heinrich, R.; Henss, J.; Koch, S.; Reussner, R.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 235–257, Springer International Publishing. doi:10.1007/978-3-030-81915-6_11
Integration and Orchestration of Analysis Tools
Heinrich, R.; Bousse, E.; Koch, S.; Rensink, A.; Riccobene, E.; Ratiu, D.; Sirjani, M.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 71–95, Springer International Publishing. doi:10.1007/978-3-030-81915-6_5
Security
Sengupta, S.; Goethem, T. V.; Demir, N.
2021. The 2021 Web Almanac, 775 S., HTTP Archive
Tactile computing: Essential building blocks for the Tactile Internet
Aßmann, U.; Baier, C.; Dubslaff, C.; Grzelak, D.; Hanisch, S.; Hartono, A. P. P.; Köpsell, S.; Lin, T.; Strufe, T.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 293–317, Academic Press. doi:10.1016/B978-0-12-821343-8.00025-3
Intelligent networks
Cabrera G., J. A.; Fitzek, F. H. P.; Hanisch, S.; Itting, S. A. W.; Zhang, J.; Zimmermann, S.; Strufe, T.; Simsek, M.; Fetzer, C. W.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 131–149, Academic Press. doi:10.1016/B978-0-12-821343-8.00017-4
Befugnisse des Staates nach dem Infektionsschutzgesetz
Bretthauer, S.
2021. Religionsfreiheit in Seuchenzeiten. Hrsg.: S. Mückl, 61–83, Duncker & Humblot
§ 23: Informationsverwaltung
Spiecker gen. Döhmann, I.
2021. Handbuch des Verwaltungsrechts. Hrsg.: W. Kahl. Bd. 1, 891–938, C.F. Müller
The legal framework for access to data from a data protection viewpoint - especially under GDPR
Spiecker gen. Döhmann, I.
2021. Data Access, Consumer Interests and Public Welfare, 175–208, Nomos Verlagsgesellschaft. doi:10.5771/9783748924999-175
Governance im lernenden Gesundheitssystem : Anforderungen an eine gesamtheitliche Steuerung von Plattformen
Spiecker gen. Döhmann, I.
2021. Perspektive Gesundheit 2030. Hrsg.: J. Baas, 45–53, Medizinisch Wissenschaftliche Verlagsgesellschaft mbH & Co. KG (MWV)
Staatliche oder private Algorithmenregulierung?
Spiecker gen. Döhmann, I.
2021. Bitburger Gespräche : Jahrbuch 2020. Hrsg. von der Stiftung Gesellschaft für Rechtspolitik, Trier und dem Institut für Rechtspolitik an der Universität Trier, 37–57, Beck
Section II: Health protection and personal data protection in selected Member States, The impact of EU Regulation 2016/679 on the German health system
Spiecker gen. Döhmann, I.
2021. The protection of personal data concerning health at the European level: a comparative analysis. Ed.: G. Fares, 83–100, G. Giapichelli
§ 4 HDSIG - Videoüberwachung öffentlich zugänglicher Räume
Spiecker gen. Döhmann, I.
2021. Hessisches Datenschutz- und Informationsfreiheitsgesetz. Hrsg.: A. Roßnagel, 107–117, Nomos Verlagsgesellschaft
§ 24 Europäisches Datenschutzrecht
Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft
Dynamic Model Based Detection of Cyberattacks in Industrial Facilities
Reibelt, K.; Keller, H. B.; Hagenmeyer, V.; Matthes, J.
2021. 31st European Symposium on Computer Aided Process Engineering: ESCAPE-31. Ed.: M. Türkay, 1339–1344, Elsevier. doi:10.1016/B978-0-323-88506-5.50206-0
Human Factors in Security
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-32795-8_5
Information Management
Spiecker gen. Döhmann, I.
2021. Oxford Handbook on Comparative Law. Ed.: P. Cane, Oxford Univ. Pr
Dissertationen
Formal Specification and Verification for Automated Production Systems. Dissertation
Weigl, A. S.
2021, Dezember 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140942
Architectural Alignment of Access Control Requirements Extracted from Business Processes. Dissertation
Pilipchuk, R.
2021, Dezember 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140856
On Foundations of Protecting Computations. Dissertation
Agrikola, T.
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Building Transformation Networks for Consistent Evolution of Interrelated Models. Dissertation
Klare, H.
2021, Juni 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133724
QoS-Based Optimization of Runtime Management of Sensing Cloud Applications. Dissertation
Gotin, M.
2021, Juni 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133328
Masterarbeiten
Composable Definitions of Long-Term Security for Commitment Schemes and their Applications. Masterarbeit
Eilebrecht, S.
2021, Februar 28. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000157596
Commit-Based Continuous Integration of Performance Models. Masterarbeit
Armbruster, M.
2021, September 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000154588
Estimating the Cost of Superposition Attacks on Lightweight Cryptography on Fault-Tolerant Quantum Systems. Masterarbeit
Hägele, F.
2021, Dezember 23. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000149513
Ein Rahmenwerk für Evaluierung von Interdisziplinären Lerneinheiten für den Informatikunterricht. Masterarbeit
Marquardt, K.
2021, Dezember 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143548
Derivation of Change Sequences from State-Based File Differences for Delta-Based Model Consistency. Masterarbeit
Wittler, J. W.
2021, Juni 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000141972
Verifiable Random Oracles. Masterarbeit
Diekhoff, K.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000135426
FortifiedIPS: Increasing the Security of Multi-Party Computation by Diverse Redundancy. Masterarbeit
Vogl, J.
2021, Februar 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131909
Bachelorarbeiten
Ein Datensatz handgezeichneter UML-Klassendiagramme für maschinelle Lernverfahren. Bachelorarbeit
Schumacher, P. N.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146736
Enabling the Information Transfer between Architecture and Source Code for Security Analysis. Bachelorarbeit
Häring, J.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000142571
Analyse von Entwurfsentscheidungen in natürlichsprachiger Softwarearchitekturdokumentation. Bachelorarbeit
Sauer, B.
2021, Oktober 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139681
Komposition von Trace Link Recovery Ansätzen. Bachelorarbeit
Winter, I.
2021, Oktober 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139680
Einfluss dynamischer Kontexterweiterungen auf die Schlussfolgerungsfähigkeiten neuronaler Sprachmodelle. Bachelorarbeit
Schmitt, S.
2021, August 23. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139679
Design Space Evaluation for Confidentiality under Architectural Uncertainty. Bachelorarbeit
Liu, O.
2021, September 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139590
On the Impossibility of Unconditionally Secure Quantum Bit Commitment. Bachelorarbeit
Haizmann, F.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000132586
The Feasibility of Limiting Access to Fingerprintable Surfaces in Web Browsers. Bachelorarbeit
Gretenkort, J.
2021, März 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131038
Proceedingsbeiträge
Datenschutz durch Technikgestaltung und unternehmerische Strategie in der Digitalwirtschaft : Verhaltenssteuernde Elemente der DSGVO im Licht einer spieltheoretischen Analyse am Beispiel von Art. 25 Abs. 1
Winau, M.; Kaiser, F. K.; Wiens, M.; Schultmann, F.; Spiecker genannt Döhmann, I.
2021. INFORMATIK 2021 : Computer Science and Sustainability: Proceedings, Berlin, 27.09.-01.10.2021, Gesellschaft für Informatik (GI)
Towards Managing and Organizing Research Activities
Kaplan, A.; Rapp, M.; Ananieva, S.; Hajiabad, H.; Kühn, R.; Mazkatli, M.; Schmid, L.; Singh, S.
2021. 8th ACM Celebration of Women in Computing: womENcourage 2021
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054
Consistent management of variability in space and time
Ananieva, S.
2021. Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume B, 7–12, Association for Computing Machinery (ACM). doi:10.1145/3461002.3473067
Preface to the 3rd Multi-Paradigm Modeling for Cyber-Physical Systems (MPM4CPS 2021)
Amrani, M.; Blouin, D.; Challenger, M.; Deantoni, J.; Heinrich, R.; Wimmer, M.
2021. 24th International Conference on Model-Driven Engineering Languages and Systems: MODELS 2021 ; 10-15 October 2021, Virtual Event, 284–285, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C53483.2021.00049
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Gerking, C.; Schubert, D.
2021. A. Koziolek, I. Schaefer & C. Seidl (Hrsg.), Software Engineering 2021 : Fachtagung 22.-26. Februar 2020 Braunschweig/Virtuell / Anne Koziolek, Ina Schaefer, Christoph Seidl, 43–44, Gesellschaft für Informatik (GI). doi:10.18420/SE2021_10
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064
Attack Forecast and Prediction
Kaiser, F.; Budig, T.; Goebel, E.; Fischer, T.; Muff, J.; Wiens, M.; Schultmann, F.
2021. C&ESAR 2021: Automation in Cybersecurity ; Proceedings of the 28th Computer & Electronics Security Application Rendezvous co-located with the 6th European Cyber Week (ECW 2021) ; Rennes, France, November 16-17, 2021. Ed.: G. Le Guernic, 77–97, CEUR-WS.org
Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on Security
Demir, N.; Urban, T.; Wittek, K.; Pohlmann, N.
2021. Passive and active measurement : 22nd international conference, PAM 2021, virtual event, March 29 - April 1, 2021 : proceedings . Ed.: O. Hohlfeld, 76–92, Springer International Publishing. doi:10.1007/978-3-030-72582-2_5
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer Verlag. doi:10.1007/978-3-030-92075-3_23
Upper Bound Computation of Information Leakages for Unbounded Recursion
Bechberger, J.; Weigl, A.
2021. Software Engineering and Formal Methods: 19th International Conference, SEFM 2021, Virtual Event, December 6–10, 2021, Proceedings. Ed.: R. Calinescu, 160–177, Springer Verlag. doi:10.1007/978-3-030-92124-8_10
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, K. M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Mitigating Internal, Stealthy DoS Attacks in Microservice Networks
Osman, A.; Born, J.; Strufe, T.
2021. Stabilization, Safety, and Security of Distributed Systems : 23rd International Symposium, SSS 2021, Virtual Event, November 17–20, 2021, Proceedings. Ed.: C. Johnen, 500–504, Springer. doi:10.1007/978-3-030-91081-5_37
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Frontiers of transdisciplinary research in tactile Internet with Human-in-the-Loop
Fitzek, F. H. P.; Li, S.-C.; Speidel, S.; Strufe, T.; Seeling, P.
2021. 2021 17th International Symposium on Wireless Communication Systems (ISWCS): 6-9 September 2021, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISWCS49558.2021.9562223
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Hrsg.), 15th European Conference on Software Architecture - Companion, ECSA-C 2021, Virtual, Online, 13 September 2021 through 17 September 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13
Knowledge-based Sense Disambiguation of Multiword Expressions in Requirements Documents
Hey, T.; Keim, J.; Tichy, W. F.
2021. 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW), Notre Dame, IN, USA, 20-24 Sept. 2021, 70–76, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW53955.2021.00017
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_72
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830
Sketches and Natural Language in Agile Modeling
Fuchß, D.
2021. ECSA-C 2021 : Companion Proceedings of the 15th European Conference on Software Architecture, Virtual (originally: Växjö, Sweden), 13-17 September, 2021. ECSA 2021 Companion Volume. Ed.: R. Heinrich, Paper-ID: 94
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. Companion Proceedings of the 15th European Conference on Software Architecture, RWTH Aachen
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI)
Quantifying Software Reliability via Model-Counting
Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer Verlag. doi:10.1007/978-3-030-85172-9_4
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture: 15th European Conference, ECSA 2021, Virtual Event, Sweden, September 13-17, 2021, Proceedings. Ed.: S. Biffl, 101–116, Springer Verlag. doi:10.1007/978-3-030-86044-8_7
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS)
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Roy, A.; Andreeva, E.; Sauer, J. F.
2021. Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Ed.: O. Dunkelman, 273–300, Springer International Publishing. doi:10.1007/978-3-030-81652-0_11
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024
Lower Bounds and Hardness Magnification for Sublinear-Time Shrinking Cellular Automata
Modanese, A.
2021. Computer Science – Theory and Applications : 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28–July 2, 2021, Proceedings. Ed.: R. Santhanam, 296–320, Springer Verlag. doi:10.1007/978-3-030-79416-3_18
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037
Runtime Verification of Generalized Test Tables
Weigl, A.; Ulbrich, M.; Tyszberowicz, S.; Klamroth, J.
2021. NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24–28, 2021, Proceedings. Ed.: A. Dutle, 358–374, Springer Verlag. doi:10.1007/978-3-030-76384-8_22
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357
Towards an automated classification approach for software engineering research
Kaplan, A.; Keim, J.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 347–352, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463358
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719
A Multivariate Characterization and Detection of Software Performance Antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Russo, B.; Janes, A.; Camilli, M.; Van Hoorn, A.; Heinrich, R.; Rapp, M.; Henß, J.
2021. ICPE ’21: Proceedings of the ACM/SPEC International Conference on Performance Engineering, 19-23 April 2021, Rennes, France (virtual), 61–72, Association for Computing Machinery (ACM). doi:10.1145/3427921.3450246
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5
Automatically extracting business level access control requirements from BPMN Models to align RBAC policies
Pilipchuk, R.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Ed.: P. Mori, 300–307, SciTePress. doi:10.5220/0010184403000307
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74
Bücher
Tactile Internet : with Human-in-the-Loop
Fitzek, F. H. P.; Speidel, S.; Simsek, M.; Li, S.-C.; Strufe, T.; Reisslein, M. (Hrsg.)
2021. Academic Press. doi:10.1016/C2019-0-01386-6
Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Hrsg.)
2021. Springer Nature. doi:10.1007/978-3-030-86942-7
Datenschutzrechtliche Aspekte neuer Mobilitätskonzepte im Öffentlichen Nahverkehr
Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Motivation-based Attacker Modelling for Cyber Risk Management: A Quantitative Content Analysis and a Natural Experiment
Kaiser, F.-K.; Wiens, M.; Schultmann, F.
2021. Journal of Information Security & Cybercrimes Research, 4 (2), 132–147. doi:10.26735/NMMD9869
Private Stream Aggregation with Labels in the Standard Model
Ernst, J.; Koch, A.
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430. doi:10.17705/1thci.00155
NoPhish-Challenge-Karten – Evaluation in der Praxis
Aldag, L.; Berens, B.; Burgdorf, M.; Lorenz, A.; Thiery, M.-C.; Volkamer, M.
2021. Datenschutz und Datensicherheit - DuD, 45 (11), 721–726. doi:10.1007/s11623-021-1523-1
On the Security of IIoT Deployments: An Investigation of Secure Provisioning Solutions for OPC UA
Kohnhäuser, F.; Meier, D.; Patzer, F.; Finster, S.
2021. IEEE access, 9, 99299–99311. doi:10.1109/ACCESS.2021.3096062
Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review
Yari, I. A.; Dehling, T.; Kluge, F.; Geck, J.; Sunyaev, A.; Eskofier, B.
2021. Journal of Medical Internet Research, 23 (11), e24460. doi:10.2196/24460
Online-Wahlen zu Parlamenten als modernes Instrument demokratischer Partizipation in Zeiten von Pandemie und Digitalisierung
Bretthauer, S.
2021. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 104 (1), 3–33. doi:10.5771/2193-7869-2021-1-3
Scalability and Precision by Combining Expressive Type Systems and Deductive Verification
Lanzinger, F.; Weigl, A.; Ulbrich, M.; Dietl, W.
2021. Proceedings of the ACM on programming languages, 5 (OOPSLA), Article no: 143. doi:10.1145/3485520
A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search
Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110. doi:10.54364/aaiml.2021.1107
Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU
Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193
Ein Netzwerk für Europas Cybersicherheit
Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695
Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15. doi:10.9785/cri-2021-220103
Secure and privacy-respecting documentation for interactive manufacturing and quality assurance
Wagner, P. G.; Lengenfelder, C.; Holzbach, G.; Becker, M.; Birnstill, P.; Voit, M.; Bejhad, A.; Samorei, T.; Beyerer, J.
2021. Applied Sciences (Switzerland), 11 (16), Art.-Nr.: 7339. doi:10.3390/app11167339
A Hitchhiker’s Guide to Model-Driven Engineering for Data-Centric Systems
Combemale, B.; Kienzle, J.; Mussbacher, G.; Ali, H.; Amyot, D.; Bagherzadeh, M.; Batot, E.; Bencomo, N.; Benni, B.; Bruel, J.-M.; Cabot, J.; Cheng, B. H. C.; Collet, P.; Engels, G.; Heinrich, R.; Jezequel, J.-M.; Koziolek, A.; Mosser, S.; Reussner, R.; Sahraoui, H.; Saini, R.; Sallou, J.; Stinckwich, S.; Syriani, E.; Wimmer, M.
2021. IEEE software, 38 (4), 71–84. doi:10.1109/MS.2020.2995125
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Card-Based Cryptography Meets Formal Verification
Koch, A.; Schrempp, M.; Kirsten, M.
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Multi-paradigm modelling for cyber–physical systems: a descriptive framework
Amrani, M.; Blouin, D.; Heinrich, R.; Rensink, A.; Vangheluwe, H.; Wortmann, A.
2021. Software and Systems Modeling, 20, 611–639. doi:10.1007/s10270-021-00876-z
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?
Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13
When Data Fly: An Open Data Trading System in Vehicular Ad Hoc Networks
Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654. doi:10.3390/electronics10060654
Analysis of the Matrix Event Graph Replicated Data Type
Jacob, F.; Beer, C.; Henze, N.; Hartenstein, H.
2021. IEEE access, 9, 28317–28333. doi:10.1109/ACCESS.2021.3058576
Datensouveränität für Patienten im Gesundheitswesen
Bretthauer, S.; Appenzeller, A.; Birnstill, P.
2021. Datenschutz und Datensicherheit, 45 (3), 173–179. doi:10.1007/s11623-021-1413-6
Token Economy
Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478. doi:10.1007/s12599-021-00684-1
Efficient communication protection of many-core systems against active attackers
Moriam, S.; Franz, E.; Walther, P.; Kumar, A.; Strufe, T.; Fettweis, G.
2021. Electronics, 10 (3), Art.-Nr.: 238. doi:10.3390/electronics10030238
Enabling consistency in view-based system development - The Vitruvius approach
Klare, H.; Kramer, M. E.; Langhammer, M.; Werle, D.; Burger, E.; Reussner, R.
2021. The journal of systems and software, 171, Article no: 110815. doi:10.1016/j.jss.2020.110815
A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis
Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2021. IEEE transactions on software engineering, 47 (4), 775–800. doi:10.1109/TSE.2019.2903797
2020
Buchaufsätze
Industrial Security by Design – Nachverfolgbare Informationssicherheit für Cyber-Physische Produktionssysteme
Gerking, C.; Bodden, E.; Schäfer, W.
2020. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 139–162, Springer. doi:10.1007/978-3-662-52979-9_8
Security for mobile edge cloud
Hanisch, S.; Osman, A.; Li, T.; Strufe, T.
2020. Computing in Communication Networks. Ed.: F.H.P. Fitzek, 371–385, Academic Press. doi:10.1016/B978-0-12-820488-7.00038-4
jhgjg
Test
2020. Test
Fundamental Properties of the Layer Below a Payment Channel Network
Grundmann, M.; Hartenstein, H.
2020. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 409–420, Springer International Publishing. doi:10.1007/978-3-030-66172-4_26
Integration of Static and Dynamic Analysis Techniques for Checking Noninterference
Beckert, B.; Herda, M.; Kirsten, M.; Tyszberowicz, S.
2020. Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY. Ed.: W. Ahrendt, 287–312, Springer. doi:10.1007/978-3-030-64354-6_12
Ein europäisches Netzwerk für Cybersicherheit
Müllmann, D.; Wintzingerode, C. von
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 475–492, OlWIR Verlag für Wirtschaft
Homeland Security Act vs. BSIG - Eine rechtsvergleichende Betrachtung der IT-Sicherheit kritischer Infrastrukturen in den USA und Deutschland
Müllmann, D.; Ebert, A.; Reißner, L.
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 459–473, OlWIR Verlag für Wirtschaft
Herausforderungen im Datenschutz von Unternehmen
Spiecker gen. Döhmann, I.; Benecke, A.
2020. Handbuch Industrie 4.0 : Recht, Technik, Gesellschaft. Hrsg.: W. Frenz, 181–200, Springer
Perspektiven des Europäischen Katastrophenschutzrechts - Herausforderungen eines vernachlässigten Rechtsgebiets
Bretthauer, S.
2020. Zehn Jahre Vertrag von Lissabon. Hrsg.: S. Martini, 133–150, Nomos Verlag
A European and German Perspective on data protection law in a digitalized world
Bretthauer, S.
2020. Comparative Privacy and Defamation. Ed.: A. Koltay, 199–215, Edward Elgar Publishing
Audio CAPTCHA with a Few Cocktails: It’s so Noisy I Can’t Hear You
Reinheimer, B. M.; Islam, F.; Shumailov, I.
2020. Security Protocols XXVII – 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers. Ed.: J. Anderson, 20–40, Springer International Publishing. doi:10.1007/978-3-030-57043-9_3
Dissertationen
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
Hartung, G. R.
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Secure and Usable User Authentication. Dissertation
Mayer, P.
2020, März 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117445
Masterarbeiten
Enabling Consistency between Software Artefacts for Software Adaption and Evolution. Masterarbeit
Monschein, D.
2020, Oktober 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000166031
Bachelorarbeiten
Optimizations of Isogeny-based Key Exchange. Bachelorarbeit
Reichert, P.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133155
Proceedingsbeiträge
Performance Modelling of Message-Oriented Middleware with Priority Queues
Singh, S.; Schmid, L.; Koziolek, A.
2020. 11th Symposium on Software Performance 2020, 12.–13. November 2020, Leipzig, Germany
Architektur-basierte Analyse von Änderungsausbreitung in Software-intensiven Systemen
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R. H.; Vogel-Heuser, B.
2020. Software Engineering 2020, Fachtagung des GI-Fachbereichs Softwaretechnik. Hrsg.: Felderer, Michael; Hasselbring, Wilhelm; Rabiser, Rick; Jung, Reiner, 45–46, Gesellschaft für Informatik (GI). doi:10.18420/SE2020_10
Third International Workshop on Variability and Evolution of Software-Intensive Systems (VariVolution 2020)
Krüger, J.; Ananieva, S.; Gerling, L.; Walkingshaw, E.
2020. Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A, 1, Association for Computing Machinery (ACM). doi:10.1145/3382025.3414944
SoK on Performance Bounds in Anonymous Communication
Kuhn, C.; Kitzing, F.; Strufe, T.
2020. Proceedings of the 19th Workshop on Privacy in the Electronic Society, 21–39, Association for Computing Machinery (ACM). doi:10.1145/3411497.3420218
Transparent Microsegmentation in Smart Home IoT Networks
Osman, A.; Wasicek, A.; Köpsell, S.; Strufe, T.
2020. 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 20), USENIX Association
Inference Attacks on Physical Layer Channel State Information
Walther, P.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 935–942, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00125
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing
Becher, K.; Lagodzinski, J. A. G.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 998–1005, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00133
Practical Trade-Offs in Integrity Protection for Binaries via Ethereum
Stengele, O.; Droll, J.; Hartenstein, H.
2020. Middleware ’20 Demos and Posters: Proceedings of the 21st International Middleware Conference Demos and Posters, 9–10, Association for Computing Machinery (ACM). doi:10.1145/3429358.3429374
On Pseudorandom Encodings
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Tiepelt, M.; D’Anvers, J.-P.
2020. 7th ACM Workshop on Asia Public-Key Cryptography, APKC 2020, held in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security, ACM ASIACCS 2020, Taipei, Taiwan, 6 October 2020 (05.-09.2020). Ed.: K. Emura; N. Yanai, 45–54. doi:10.1145/3384940.3388957
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption
Becher, K.; Strufe, T.
2020. 2020 IEEE Symposium on Computers and Communications (ISCC), 7-10 July 2020, Rennes, France, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISCC50000.2020.9219588
Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation
Walther, P.; Strufe, T.
2020. 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 31 August - 3 September 2020, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PIMRC48278.2020.9217278
Modular Verification of JML Contracts Using Bounded Model Checking
Beckert, B.; Kirsten, M.; Klamroth, J.; Ulbrich, M.
2020. ISoLA 2020: Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium (ISoLA 2020), 60–80, Springer. doi:10.1007/978-3-030-61362-4_4
Browsing unicity: On the limits of anonymizing web tracking data
Deuser, C.; Passmann, S.; Strufe, T.
2020. Proceedings 2020 IEEE Symposium on Security and Privacy SP 2020, San Francisco, California, USA, 18-21 May 2020. Ed.: P. Kellenberger, 777–790. doi:10.1109/SP40000.2020.00018
The german-speaking twitter community reference data set
Pflugmacher, J.; Escher, S.; Reubold, J.; Strufe, T.
2020. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 6-9 July 2020, online, 1172–1177, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFOCOMWKSHPS50562.2020.9162728
Multi-user authorization for simultaneous collaborative situation analysis workspaces using XACML
Appenzeller, A.; Krempel, E.; Birnstill, P.; Beyerer, J.
2020. Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies IV, 21-25 September 2020 (Teilkonferenz von SPIE Security + Defence Digital Forum 2020). Ed.: H. Bouma, Art.-Nr.: 1154207, SPIE. doi:10.1117/12.2570824
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems
Borcherding, A.; Pfrang, S.; Haas, C.; Weiche, A.; Beyerer, J.
2020. SECRYPT 2020 : proceedings of the 17th International Conference on Security and Cryptography : July 8-10, 2020 (SECRYPT is part of ICETE, the 17th International Joint Conference on e-Business and Telecommunications). Vol. 3. Ed.: P. Samarati, 27–38, SciTePress. doi:10.5220/0009517800270038
Context-Based Confidentiality Analysis for Industrial IoT
Boltz, N.; Walter, M.; Heinrich, R.
2020. Proceedings - 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). Ed.: A. Martini, 589–596, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA51224.2020.00096
A Taxonomy of Dynamic Changes Affecting Confidentiality
Walter, M.; Seifermann, S.; Heinrich, R.
2020. 11th Workshop Design For Future – Langlebige Softwaresysteme
Dynamische personale Identitäten als Schutzgegenstand der DSGVO und technische Gestaltungsvorgabe
Steinbrück, A.
2020. Den Wandel begleiten - IT-rechtliche Herausforderung der Digitalisierung : DSRI-Tagungsband Herbstakademie 2020. Hrsg.: J. Taeger, 73–86, OIWIR
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2020. Security and Trust Management. Ed.: K. Markantonakis, 73–89, Springer Nature. doi:10.1007/978-3-030-59817-4_5
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
Mossano, M.; Vaniea, K.; Aldag, L.; Düzgün, R.; Mayer, P.; Volkamer, M.
2020. IEEE European Symposium on Security and Privacy 2020, (EuroS&PW) - The 5th European Workshop on Usable Security, September 7, 2020, Online (ursprünglich: June 15, 2020, Genova, Italy), 130–139, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW51379.2020.00026
Identification and Localization of Cyber-Attacks in Industrial Facilities
Reibelt, K.; Matthes, J.; Keller, H. B.; Hagenmeyer, V.
2020. ESCAPE 30, 30th European Symposium on Computer Aided Process Engineering, Milan, Italy, 30 August 2020 – 2 September 2020. Ed.: S. Pierucci, 1747–1752, Elsevier
Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks
Patzer, F.; Lüdtke, P.; Meshram, A.; Beyerer, J.
2020. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 137–161, Springer Verlag. doi:10.1007/978-3-030-49443-8_7
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools
Grashöfer, J.; Titze, C.; Hartenstein, H.
2020. 2020 IEEE Conference on Communications and Network Security (CNS), 9 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS48642.2020.9162332
An investigation of phishing awareness and education over time: When and how to best remind users
Reinheimer, B. M.; Aldag, L.; Mayer, P.; Mossano, M.; Düzgün, R.; Lofthouse, B.; Landesberger, T. von; Volkamer, M.
2020. Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) : August 10-11, 2020, 259–284, Advanced Computing Systems Association (USENIX)
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays
Düzgün, R.; Mayer, P.; Das, S.; Volkamer, M.
2020. Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2020), August 7–11, 2020
Enabling Data Sovereignty for Patients through Digital Consent Enforcement
Appenzeller, A.; Rode, E.; Krempel, E.; Beyerer, J.
2020. PETRA ’20: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 30 June - 3 July 2020, Article No.: 33, Association for Computing Machinery (ACM). doi:10.1145/3389189.3393745
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Agrikola, T.; Couteau, G.; Hofheinz, D.
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Agrikola, T.; Hofheinz, D.; Kastner, J.
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Smart Contracts: Application Scenarios for Deductive Program Verification
Beckert, B.; Schiffl, J.; Ulbrich, M.
2020. Formal Methods. FM 2019 International Workshops : Porto, Portugal, October 7–11, 2019, Revised Selected Papers, Part I. Ed.: Emil Sekerinski, 293–298, Springer. doi:10.1007/978-3-030-54994-7_21
Verified Construction of Fair Voting Rules
Diekhoff, K.; Kirsten, M.; Krämer, J.
2020. Logic-Based Program Synthesis and Transformation : 29th International Symposium, LOPSTR 2019, Porto, Portugal, October 8–10, 2019, Revised Selected Papers. Ed.: M. Gabbrielli, 90–104, Springer International Publishing. doi:10.1007/978-3-030-45260-5_6
Towards Improving the Efficacy of Code-Based Verification in Internet Voting
Kulyk, O.; Volkamer, M.; Müller, M.; Renaud, K.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, [1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020; Kota Kinabalu; Malaysia; 14 February 2020 through 14 February 2020], Revised Selected Papers. Ed.: Matthew Bernhard, 291–309, Springer. doi:10.1007/978-3-030-54455-3_21
A meta model for a comprehensive description of network protocols improving security tests
Pfrang, S.; Meier, D.; Fleig, A.; Beyerer, J.
2020. Proceedings of the 6th International Conference on Information Systems Security and Privacy. Ed.: S. Furnell, 671–682, SciTePress
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, O.; Reinheimer, B.; Aldag, L.; Mayer, P.; Gerber, N.; Volkamer, M.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Ed.: Matthew Bernhard, 84–101, Springer. doi:10.1007/978-3-030-54455-3_7
Bücher
40 Klausuren aus dem Verwaltungsrecht
Bretthauer, S.; Collin, P.; Egidy, S.; Spiecker gen. Döhmann, I.
2020. Vahlen
Zeitschriftenaufsätze
IT-Sicherheit im Wettstreit um die erste autonome Fahrzeugflotte: Ein Diffusionsmodell
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. TATuP-Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis/Journal for Technology Assessment in Theory and Practice, 29 (1), 16–22
Resiliente soziotechnische Prozesse im industriellen Internet der Dinge
Henrich, V.; Struwe, S.; Koch, S.; Hansert, J.; Schlegel, T.
2020. Zeitschrift für wirtschaftlichen Fabrikbetrieb, 115 (3), 131–135. doi:10.3139/104.112243
Comparing the Perception of Privacy for Medical Devices and Devices With Medical Functionality
Kaiser, F.; Wiens, M.; Schultmann, F.
2020. International journal of privacy and health information management, 8 (1), 52–69. doi:10.4018/IJPHIM.2020010103
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2020. Journal of Cybersecurity, 6 (1), Article: tyaa022. doi:10.1093/cybsec/tyaa022
IT Sicherheitsgesetz 2.0 und das Vorbild USA
Müllmann, D.; Ebert, A.; Reissner, L.
2020. Computer und Recht, 36 (9), 584–592
Privatsphärengerechte intelligente Mobilitätssteuerung
Bretthauer, S.; Schmitt, A. A.
2020. Zeitschrift für Datenschutz : ZD, (7), 341–347
Die rechtliche Zulässigkeit einer Onlinewahl zur Sozialwahl
Bretthauer, S.; Spiecker gen. Döhmann, I.
2020. Neue Zeitschrift für Sozialrecht, 2020 (7), 241–247
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit
Mayer, P.; Ballreich, F.; Düzgün, R.; Schwarz, C.; Volkamer, M.
2020. Datenschutz und Datensicherheit, 44 (8), 522–527. doi:10.1007/s11623-020-1318-9
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
IT-Sicherheit im Wettstreit um die erste autonome Fahrzeugflotte
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. Technikfolgenabschätzung, Theorie und Praxis, 29 (1), 16–22. doi:10.14512/tatup.29.1.16
Biggest Failures in Security (Dagstuhl Seminar 19451)
Armknecht, F.; Verbauwhede, I.; Volkamer, M.; Yung, M.
2020. Dagstuhl Reports, 9 (11), 1–23. doi:10.4230/DagRep.9.11.1
2019
Buchaufsätze
Formal Verification of Evolutionary Changes
Beckert, B.; Mund, J.; Ulbrich, M.; Weigl, A.
2019. Managed Software Evolution. Hrsg.: Ralf H. Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin, 309–332, Springer. doi:10.1007/978-3-030-13499-0_11
Challenges of Using Trusted Computing for Collaborative Data Processing
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2019. Security and Trust Management – 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings. Ed.: S. Mauw, 107–123, Springer. doi:10.1007/978-3-030-31511-5_7
TEE-based distributed watchtowers for fraud protection in the Lightning Network
Leinweber, M.; Grundmann, M.; Schönborn, L.; Hartenstein, H.
2019. Data privacy management, cryptocurrencies and blockchain technology. Ed.: C. Pérez-Solà, 177–194, Springer Nature. doi:10.1007/978-3-030-31500-9_11
Verfassungsrechtliche Grundlagen des Europäischen und nationalen Datenschutzrechts
Bretthauer, S.
2019. Handbuch europäisches und deutsches Datenschutzrecht. Hrsg.: L. Specht, 7–37, Verlag C.H.Beck
Dissertationen
Cryptographic Protocols from Physical Assumptions. Dissertation
Koch, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Security and Anonymity Aspects of the Network Layer of Permissionless Blockchains. Dissertation
Neudecker, T.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000089033
Masterarbeiten
Incentivized Privacy-Preserving Participatory Sensing. Masterarbeit
Lauser, T.
2019, Dezember 18. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000124803
Modular Verification of JML Contracts Using Bounded Model Checking. Masterarbeit
Klamroth, J.
2019, März 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000122228
UC-sichere private Schnittmengenberechnung mit transparenten Enklaven. Masterarbeit
Zinkina, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000099120
Proceedingsbeiträge
A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems
Lackorzynski, T.; Kopsell, S.; Strufe, T.
2019. 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27-29 May 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WFCS.2019.8758010
Towards a Correspondence Model for the Reuse of Software in Multiple Domains
Koch, S.; Reiche, F.
2019. 10. Workshop „Design For Future – Langlebige Softwaresysteme“, 41–42, Softwaretechnik-Trends
Towards Reverse Engineering for Component-Based Systemswith Domain Knowledge of the Technologies Used
Schneider, Y. R.; Koziolek, A.
2019. Proceedings of the 10th Symposium on Software Performance (SSP), 35–37, Gesellschaft für Informatik (GI)
Towards a conceptual model for unifying variability in space and time
Ananieva, S.; Kehrer, T.; Klare, H.; Koziolek, A.; Lönn, H.; Ramesh, S.; Burger, A.; Taentzer, G.; Westfechtel, B.
2019. Proceedings of the 23rd International Systems and Software Product Line Conference volume B - SPLC ’19, 1–5, ACM Digital Library. doi:10.1145/3307630.3342412
Detecting Parametric Dependencies for Performance Models Using Feature Selection Techniques
Grohmann, J.; Eismann, S.; Elflein, S.; Kistowski, J. V.; Kounev, S.; Mazkatli, M.
2019. 2019 IEEE 27th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 309–322, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MASCOTS.2019.00042
Heuristic Inference of Model Transformation Definitions from Type Mappings
Gerking, C.; Budde, I.
2019. 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems companion : 15-20 September 2019, Munich, Germany : proceedings. Ed.: L. Burgueño, 182–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C.2019.00031
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Gerking, C.; Schubert, D.
2019. IEEE International Conference on Software Architecture : ICSA 2019 : 25-29 March 2019, Hamburg, Germany : proceedings. Ed.: Matthias Riebisch, 61–70, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00015
Physical Layer Privacy in Broadcast Channels
Lin, P.-H.; Kuhn, C.; Strufe, T.; Jorswieck, E. A.
2019. 2019 IEEE International Workshop on Information Forensics and Security (WIFS), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WIFS47025.2019.9035093
SeCoNetBench: A modular framework for Secure Container Networking Benchmarks
Osman, A.; Hanisch, S.; Strufe, T.
2019. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17-19 June 2019, 21–28, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00009
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Osman, A.; Bruckner, P.; Salah, H.; Fitzek, F. H. P.; Strufe, T.; Fischer, M.
2019. ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20-24 May 2019, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICC.2019.8761171
Detasyr: Decentralized Ticket-based Authorization with Sybil Resistance
Friebe, S.; Martinat, P.; Zitterbart, M.
2019. 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 14-17 Oct. 2019, 60–68, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN44214.2019.8990773
Unpatchable? - Der gesetzliche Umgang mit von menschlichem Verhalten ausgehenden Risiken für die IT-Sicherheit kritischer Infrastrukturen
Müllmann, D.
2019. Die Macht der Daten und der Algorithmen - Regulierung von IT, IoT und KI : Tagungsband Herbstakademie 2019. Hrsg.: J. Taeger, 245–260, OlWIR
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
The Industrie 4.0 Asset Administration Shell as Information Source for Security Analysis
Patzer, F.; Volz, F.; Usländer, T.; Blöcher, I.; Beyerer, J.
2019. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) : Paraninfo Building, University of Zaragoza, Zaragoza, Spain, 10-13 September, 2019 : proceedings, 420–427, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2019.8869059
Formal Property-Oriented Design of Voting Rules Using Composable Modules
Diekhoff, K.; Kirsten, M.; Krämer, J.
2019. Algorithmic Decision Theory - 6th International Conference, ADT 2019, Durham, NC, USA, October 25–27, 2019, Proceedings. Ed.: S. Pekeč, 164–166, Springer. doi:10.1007/978-3-030-31489-7
Card-Based Cryptography Meets Formal Verification
Koch, A.; Schrempp, M.; Kirsten, M.
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations
Kulyk, O.; Henzel, J.; Renaud, K.; Volkamer, M.
2019. Human-Computer Interaction – INTERACT 2019. Part I. Ed.: D. Lamas, 519–538, Springer International Publishing. doi:10.1007/978-3-030-29381-9_32
Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin
Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 84–92, Springer International Publishing. doi:10.1007/978-3-030-32101-7_6
Quantum LLL with an application to mersenne number cryptosystems
Tiepelt, M.; Szepieniec, A.
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
Using Relational Verification for Program Slicing
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2019. Software Engineering and Formal Methods – 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ed.: P. Ölveczky, 353–372, Springer. doi:10.1007/978-3-030-30446-1_19
Understanding Counterexamples for Relational Properties with DIbugger
Herda, M.; Kirsten, M.; Brunner, E.; Plewnia, J.; Scheler, U.; Staudenmaier, C.; Wagner, B.; Zwick, P.; Beckert, B.
2019. Proceedings of the Sixth Workshop on Horn Clauses for Verification and Synthesis and Third Workshop on Program Equivalence and Relational Reasoning (EPTCS), Prague, Czech Republic, 6-7th April 2019. Ed.: E. De Angelis, 6–13, Open Publishing Association. doi:10.4204/EPTCS.296.4
Why Johnny Fails to Protect his Privacy
Gerber, N.; Zimmermann, V.; Volkamer, M.
2019. 4th IEEE European Symposium on Security and Privacy Workshops : proceedings : 17-19 June 2019, Stockholm, Sweden, 109–118, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00019
Erklärvideo “Online-Betrug” – Nach nur fünf Minuten Phishing E-Mails nachweislich signifikant besser erkennen
Volkamer, M.; Renaud, K.; Reinheimer, B.; Rack, P.; Ghiglieri, M.; Gerber, N.; Mayer, P.; Kunz, A.
2019. IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung : Tagungsband zum 16. Deutschen IT-Sicherheitskongress, 307–318, SecuMedia Verlag
Towards Consistency Checking Between Software Architecture and Informal Documentation
Keim, J.; Koziolek, A.
2019. 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), Hamburg, 25.-29. März 2019, 250–253, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C.2019.00052
PerOpteryx: Automated Improvement of Software Architectures
Busch, A.; Fuchß, D.; Koziolek, A.
2019. IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019. Tool Demo Track, 162–165. doi:10.1109/ICSA-C.2019.00036
Access Control for Binary Integrity Protection using Ethereum
Stengele, O.; Baumeister, A.; Birnstill, P.; Hartenstein, H.
2019. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT ’19), Toronto, CDN, June 4-6, 2019, 3–12, Association for Computing Machinery (ACM). doi:10.1145/3322431.3325108
Data-driven software architecture for analyzing confidentiality
Seifermann, S.; Heinrich, R.; Reussner, R.
2019. 2019 IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019, Art. Nr.: 8703910, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00009
Verification-based test case generation for information-flow properties
Herda, M.; Müssig, J.; Tyszberowicz, S.; Beckert, B.
2019. 34th Annual ACM Symposium on Applied Computing, SAC 2019; Limassol; Cyprus; 8 April 2019 through 12 April 2019, 2231–2238, Association for Computing Machinery (ACM). doi:10.1145/3297280.3297500
On Tightly Secure Primitives in the Multi-instance Setting
Hofheinz, D.; Nguyen, N. K.
2019. 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019; Beijing; China; 14 April 2019 through 17 April 2019. Ed.: D. Lin, 581–611, Springer. doi:10.1007/978-3-030-17253-4_20
Single underlying models for projectional, multi-view environments
Meier, J.; Klare, H.; Tunjic, C.; Atkinson, C.; Burger, E.; Reussner, R.; Winter, A.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 119–130, SciTePress. doi:10.5220/0007396401190130
Automated incident response for industrial control systems leveraging software-defined networking
Patzer, F.; Meshram, A.; Heß, M.
2019. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 319–327, SciTePress
Applying metamodel-based tooling to object-oriented code
Klare, H.; Saglam, T.; Burger, E.; Reussner, R.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 219–230, SciTePress. doi:10.5220/0007246202190230
Balancing Performance Characteristics of Hierarchical Heavy Hitters
Heseding, H.; Glöckle, J.; Bauer, R.; Zitterbart, M.
2019. IFIP NETWORKING 2019, Warsaw, Poland, May 20-22, 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/IFIPNetworking.2019.8816832
Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin
Grundmann, M.; Leinweber, M.; Hartenstein, H.
2019. Proceedings of 1st IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019), Seoul, Südkorea, 14 - 17 Mai 2019, 268–276, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BLOC.2019.8751394
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
Kulyk, O.; Gerber, P.; Marky, K.; Beckmann, C.; Volkamer, M.
2019. Proceedings 2019 Workshop on Usable Security. Ed.: M.F. Theofanos. doi:10.14722/usec.2019.23029
Towards computer-aided security life cycle management for critical industrial control systems
Patzer, F.; Meshram, A.; Birnstill, P.; Haas, C.; Beyerer, J.
2019. 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018; Kaunas; Lithuania; 24 September 2018 through 26 September 2018. Ed.: E. Luiijf, 45–56, Springer. doi:10.1007/978-3-030-05849-4_4
I (don’t) see what you typed there! Shoulder-surfing resistant password entry on gamepads
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, Association for Computing Machinery (ACM). doi:10.1145/3290605.3300779
Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
Grundmann, M.; Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security : FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, (FC 2018), Nieuwpoort, CU, March 2, 2018. Ed.: A. Zohar, 113–126, Springer Verlag. doi:10.1007/978-3-662-58820-8_9
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness
Kulyk, O.; Volkamer, M.
2019. Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. Ed.: Tung X. Bui, 2842–2851, University of Hawaii at Manoa, Hamilton Library, ScholarSpace. doi:10.24251/HICSS.2019.343
Bücher
Managed Software Evolution
Reussner, R.; Goedicke, M.; Hasselbring, W.; Vogel-Heuser, B.; Keim, J.; Märtin, L. (Hrsg.)
2019. Springer Nature. doi:10.1007/978-3-030-13499-0
Gesundheitsversorgung in Zeiten der DSGVO
Spiecker gen. Döhmann, I.; Wallrabenstein, A. (Hrsg.)
2019. Lang. doi:10.3726/b15795
Datenschutzrecht DSGVO mit BDSG
Simitis, S.; Albrecht, J. P.
2019. (Spiecker gen. Döhmann & G. Hornung, Hrsg.), Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Digitale Mobilität
Spiecker gen. Döhmann, I.
2019. Gewerblicher Rechtsschutz und Urheberrecht, 341–352
Können Algorithmen diskriminieren
Spiecker gen. Döhmann, I.; Fröhlich, W.
2019. Zeitschrift des Deutschen Juristinnenbundes : djbZ, 22, 91–93
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Game-theoretical model on the GDPR: Market for lemons?
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Journal of intellectual property, information technology and electronic commerce law, 10 (2), 200–208
Modeling and control of multimodal and hybrid energy systems (Editorial)
Wolter, M.; Hagenmeyer, V.
2019. Automatisierungstechnik, 67 (11), 891–892. doi:10.1515/auto-2019-0112
Web Application Security (Dagstuhl Seminar 18321)
Johns, M.; Nikiforakis, N.; Volkamer, M.; Wilander, J.
2019. Dagstuhl Reports, 8 (8), 1–17. doi:10.4230/DagRep.8.8.1
Investigating People’s Privacy Risk Perception
Gerber, N.; Reinheimer, B.; Volkamer, M.
2019. Proceedings on privacy enhancing technologies, 2019 (3), 267–288. doi:10.2478/popets-2019-0047
Spieltheoretische Modellierung der Verarbeitung personenbezogener Daten
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Datenschutz und Datensicherheit, 43 (5), 270–275. doi:10.1007/s11623-019-1106-6
Sichere Instant Messaging Apps
Brendel, J.; Gerber, N.
2019. Datenschutz und Datensicherheit, 43 (5), 276–280. doi:10.1007/s11623-019-1107-5
The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Ralf Reussner
2019. Communications in computer and information science, 977, 109–124. doi:10.1007/978-3-030-25109-3_6
Mehr als nur Whistleblowing: das Gesetz zum Schutz von Geschäftsgeheimnissen
Müllmann, D.
2019. Zeitschrift für Rechtspolitik, (1), 25–26
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen “Diese Webseite verwendet Cookies”
Oksana Kulyk; Nina Gerber; Melanie Volkamer; Annika Hilt
2019. Datenschutz und Datensicherheit, 43 (2), 81–85. doi:10.1007/s11623-019-1068-8
An extensible approach to implicit incremental model analyses
Hinkel, G.; Heinrich, R.; Reussner, R.
2019. Software and systems modeling, 18 (5), 3151–3187. doi:10.1007/s10270-019-00719-y
2018
Buchaufsätze
Industrial Security by Design : Nachverfolgbare Informationssicherheit für Cyber-Physische Produktionssysteme
Gerking, C.; Bodden, E.; Schäfer, W.
2018. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 1–24, Springer. doi:10.1007/978-3-662-52903-4_8-1
Schutz von Betriebs- und Geschäftsgeheimnissen in Industrie 4.0-Umgebungen
Müllmann, D.
2018. Rechtsfragen digitaler Transformation - Gestaltung digitaler Veränderungsprozesse durch Recht. Tagungsband der Deutsche Stiftung für Recht und Informatik (DSRI). Hrsg.: J. Taeger, 697–711, OlWIR
Illi Isabellistes Se Custodes Egregios Praestabant
Bischof, S.; Breitner, J.; Lohner, D.; Snelting, G.
2018. Principled Software Development – Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday. Ed.: P. Müller, 267–282, Springer International Publishing. doi:10.1007/978-3-319-98047-8_17
Reusing Tamper-Proof Hardware in UC-Secure Protocols
Mechler, J.; Müller-Quade, J.; Nilges, T.
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Human Factors in Security
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Vieweg Verlag. doi:10.1007/978-3-658-19523-6_5
Dissertationen
A Framework for Non-Interference in Component-Based Systems. Dissertation
Greiner, S.
2018. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000082042
Proceedingsbeiträge
Towards Semantic Composition of Event-Based Simulation
Koch, S.
2018. Softwaretechnik-Trends. Berichte aus den Fachgruppen und Arbeitskreisen FG SRE: 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) und 9. Workshop "Design for Future" des GI-Arbeitskreises "Langlebige Softwaresysteme" (L2S2), Bad-Honnef, 59–50, Softwaretechnik-Trends
Specification of Information Flow Security Policies in Model-Based Systems Engineering
Gerking, C.
2018. M. Mazzara, I. Ober & G. Salaün (Hrsg.), Software technologies: applications and foundations: STAF 2018 collocated workshops, Toulouse, France, June 25-29, 2018 : revised selected papers. Ed.: Manuel Mazzara, 617–632, Springer. doi:10.1007/978-3-030-04771-9_47
Towards ensuring security by design in cyber-physical systems engineering processes
Geismann, J.; Gerking, C.; Bodden, E.
2018. M. Kuhrmann, R. V. O’Connor & D. Houston (Hrsg.), Proceedings of the 2018 International Conference on Software and System Process (ICSSP ’18) : Gothenburg, Sweden, May 26 - 27, 2018. Ed.: Marco Kuhrmann, 123–127, Association for Computing Machinery (ACM). doi:10.1145/3202710.3203159
Model Checking the Information Flow Security of Real-Time Systems
Gerking, C.; Schubert, D.; Bodden, E.
2018. M. Payer, A. Rashid & J. M. Such (Hrsg.), Engineering Secure Software and Systems : 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings. Ed.: Mathias Payer, 27–43, Springer. doi:10.1007/978-3-319-94496-8_3
Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems
Gerking, C.; Schubert, D.
2018. C. E. Cuesta, D. Garlan & J. Pérez (Hrsg.), Software Architecture : 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018, Proceedings. Ed. by Carlos E. Cuesta, David Garlan, Jennifer Pérez, 147–155, Springer. doi:10.1007/978-3-030-00761-4_10
Interactively Secure Groups from Obfuscation
Agrikola, T.; Hofheinz, D.
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Tailored quality modeling and analysis of software-intensive systems
Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 336–341, Knowledge Systems Institute. doi:10.18293/SEKE2018-020
Modeling and Simulation of Load Balancing Strategies for Computing in High Energy Physics
Caspart, R.; Firnkes, P.; Giffels, M.; Koziolek, A.; Quast, G.; Reussner, R.; Stemmer-Grabow, M.
2018. CHEP 2018 - 23rd International Conference on Computing in High Energy and Nuclear Physics, Sofia, BG, July 9-13,2018. Ed.: P. Hristov, EDP Sciences
Considering Not-quantified Quality Attributes in an Automated Design Space Exploration
Busch, A.; Koziolek, A.
2018. Software Engineering 2018 - Fachtagung des GI-Fachbereichs Softwaretechnik (SE 20108), Ulm, 06.-09. März 2018, Gesellschaft für Informatik (GI)
A Cross-Disciplinary Language for Change Propagation Rules
Busch, K.; Werle, D.; Loper, M.; Heinrich, R.; Reussner, R.; Vogel-Heuser, B.
2018. IEEE 14th International Conference on Automation Science and Engineering (CASE 2018), München, 20.-24. August 2018, 1099–1104, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560364
Automated Analysis of the Co-evolution of Software Systems and Business Processes
Busch, K.; Heinrich, R.; Busch, A.; Reussner, R. H.
2018. Software Engineering und Software Management 2018, Ulm, 5.-9. März 2018. Hrsg.:M. Tichy, 159–160, Gesellschaft für Informatik (GI)
Rapid Testing of IaaS Resource Management Algorithms via Cloud Middleware Simulation
Stier, C.; Domaschka, J.; Koziolek, A.; Krach, S.; Krzywda, J.; Reussner, R.
2018. Proceedings of the 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 184–191, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184428
An approach to requirement analysis in automated production systems
Maier, T.; Busch, K.; Reussner, R.
2018. 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) - 9. Workshop „Design for Future“des GI-Arbeitskreises „Langlebige Softwaresysteme“ (L2S2), Bad-Honnef, 02.-04. Mai 2018
Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Reussner, R.
2018. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, P, January 22-24, 2018. Ed.: P. Mori. Vol. 1, 74–82, SciTePress. doi:10.5220/0006606200740082
A Methodology for Domain-Spanning Change Impact Analysis
Heinrich, R.; Busch, K.; Koch, S.
2018. 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA 2018), Prague, CZ, August 29-31, 2018, 326–330, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00060
Investigating Performance Metrics for Scaling Microservices in CloudIoT-Environments
Gotin, M.; Lösch, F.; Heinrich, R.; Reussner, R.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 09.-13. April 2018, 157–167, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184430
A Model-Based Approach to Calculate Maintainability Task Lists of PLC Programs for Factory Automation
Busch, K.; Rätz, J.; Koch, S.; Heinrich, R.; Reussner, R.; Cha, S.; Seitz, M.; Vogel-Heuser, B.
2018. 44th Annual Conference of the IEEE Industrial Electronics Society (IECON 2018), Washington DC, October 20-23, 2018, 2949–2954, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2018.8591302
Predicting the Perceived Modularity of MOF-based Metamodels
Hinkel, G.; Strittmatter, M.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 48–58, SciTePress
Automated Consistency Preservation in Electronics Development of Cyber-Physical Systems
Zimmermann, D.; Reussner, R. H.
2018. Software Technologies: Applications and Foundations - STAF 2018 Collocated Workshops,Toulouse, France, June 25–29, 2018. Ed.: M. Mazzara, 506–511, Springer Nature. doi:10.1007/978-3-030-04771-9_36
Formal Specification and Verification of Hyperledger Fabric Chaincode
Beckert, B.; Herda, M.; Kirsten, M.; Schiffl, J.
2018. 3rd Symposium on Distributed Ledger Technology (SDLT-2018) co-located with ICFEM 2018: the 20th International Conference on Formal Engineering Methods, Gold Coast, Australia, November 12, 2018, 44–48, Institute for Integrated and Intelligent Systems
Towards automatic argumentation about voting rules
Kirsten, M.; Cailloux, O.
2018. 4ème conférence sur les Applications Pratiques de l’Intelligence Artificielle, APIA 2018, Nancy, France, July 2-3, 2018., Ed.: S. Bringay, J. Mattioli
Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems
Birnstill, P.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, (PETRA), Corfu, Greece, June 26-29, 2018, 292–296, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201563
Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2018. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, 85–91, Association for Computing Machinery (ACM). doi:10.1145/3205977.3205990
The EU General Data Protection Regulation and its Effects on Designing Assistive Environments
Krempel, E.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018, Corfu, Greece, June 26-29, 2018, 327–330, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201567
Achieving delta description of the control software for an automated production system evolution
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. 14th IEEE International Conference on Automation Science and Engineering, CASE 2018; Technical University MunichMunich; Germany; 20 August 2018 through 24 August 2018, 1170–1176, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560588
Assistance in Daily Password Generation Tasks
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. 2018 Joint ACM International Conference on Pervasive and Ubiquitous Computing, UbiComp 2018 and 2018 ACM International Symposium on Wearable Computers, ISWC 2018; Singapore; Singapore; 8 October 2018 through 12 October 2018, 786–793, Association for Computing Machinery (ACM). doi:10.1145/3267305.3274127
Towards Application of Cuckoo Filters in Network Security Monitoring
Grashöfer, J.; Jacob, F.; Hartenstein, H.
2018. 14th International Conference on Network and Service Management (CNSM), Rome, Italy, Nov. 5 - Nov. 9, 2018, 373–377, Institute of Electrical and Electronics Engineers (IEEE)
Using dependence graphs to assist verification and testing of information-flow properties
Herda, M.; Tyszberowicz, S.; Beckert, B.
2018. Tests and Proofs : 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings. Ed. by Catherine Dubois, Burkhart Wolff, 83–102, Springer. doi:10.1007/978-3-319-92994-1_5
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode
Hamann, T.; Herda, M.; Mantel, H.; Mohr, M.; Schneider, D.; Tasch, M.
2018. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018; Proceedings. Ed.: N. Gruschka, 437–453, Springer Nature. doi:10.1007/978-3-030-03638-6_27
Relational Equivalence Proofs Between Imperative and MapReduce Algorithms
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. Verified Software: Theories, Tools, and Experiments; 10th International Conference, VSTTE 2018; Oxford, UK, July 18–19, 2018; Revised Selected Papers. Ed.: R. Piskac, 248–266, Springer Nature. doi:10.1007/978-3-030-03592-1_14
Guidance of architectural changes in technical systems with varying operational modes
Märtin, L.; Forjahn, N.-A.; Koziolek, A.; Reussner, R.
2018. Software Architecture: 12th European Conference on Software Architecture (ECSA 2018), Madrid, E, September 24-28, 2018; Proceedings. Ed.: C.E. Cuesta, 37–45, Springer Nature. doi:10.1007/978-3-030-00761-4_3
Using informal knowledge for improving software quality trade-off decisions
Schneider, Y.; Busch, A.; Koziolek, A.
2018. Software Architecture: 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018; Proceedings, 265–283, Springer Nature. doi:10.1007/978-3-030-00761-4_18
Categories of change triggers in business processes
Kaplan, A.; Busch, K.; Koziolek, A.; Heinrich, R.
2018. Euromicro Conference on Software Engineering and Advanced Applications 2018 (SEAA 2018), Prague, CZ, August 29-31, 2018. Ed.: T. Bures, 252–259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00049
A model-based approach for build avoidance
Neumann, M.; Busch, K.; Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 104–109, KSI. doi:10.18293/SEKE2018-030
Using theorem provers to increase the precision of dependence analysis for information flow control
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2018. 20th International Conference on Formal Engineering Methods, ICFEM 2018; Gold Coast; Australia; 12 November 2018 through 16 November 2018. Ed.: J. Sun, 284–300, Springer. doi:10.1007/978-3-030-02450-5_17
Modularizing and layering metamodels with the modular EMF designer
Kechaou, A.; Strittmatter, M.
2018. 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS 2018), Copenhagen, DK, October 14-19, 2018, 32–36, Association for Computing Machinery (ACM). doi:10.1145/3270112.3270119
Towards a notion of coverage for incomplete program-correctness proofs
Beckert, B.; Herda, M.; Kobischke, S.; Ulbrich, M.
2018. 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018; Limassol; Cyprus; 5 November 2018 through 9 November 2018. Ed.: T. Margaria, 53–63, Springer. doi:10.1007/978-3-030-03421-4_4
Aligning Business Process Access Control Policies with Enterprise Architecture
Pilipchuk, R.; Seifermann, S.; Heinrich, R.
2018. Proceedings of the Central European Cybersecurity Conference 2018 (CECC 2018), Ljubljana, SLO, November 15-16, 2018, Article no 17, Association for Computing Machinery (ACM). doi:10.1145/3277570.3277588
Modeling of dynamic trust contracts for industry 4.0 systems
Al-Ali, R.; Heinrich, R.; Hnetynka, P.; Juan-Verdejo, A.; Seifermann, S.; Walter, M.
2018. Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings (ECSA 2018), Madrid, E, September 24-28, 2018, 45:1–45:4, Association for Computing Machinery (ACM). doi:10.1145/3241403.3241450
Towards a metamodel for modular simulation environments
Koch, S.; Reiche, F.; Heinrich, R.
2018. ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS), Kopenhagen, DK, October 14-19, 2018. Ed.: R. Hebig
Integrating semantically-related legacy models in vitruvius
Mazkatli, M.; Burger, E.; Quante, J.; Koziolek, A.
2018. 10th ACM/IEEE International Workshop on Modelling in Software Engineering, MiSE 2018; Gothenburg; Sweden; 27 May 2018 through 28 May 2018, 41–48, Association for Computing Machinery (ACM). doi:10.1145/3193954.3193961
Identifying Microservices Using Functional Decomposition
Tyszberowicz, S.; Heinrich, R.; Liu, B.; Liu, Z.
2018. 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2018), Beijing, CHN, September 4-6, 2018, 50–65, Springer. doi:10.1007/978-3-319-99933-3_4
Refinements and structural decompositions in generated code
Hinkel, G.; Busch, K.; Heinrich, R.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 303–310, SciTePress
Continuous integration of performance model
Mazkatli, M.; Koziolek, A.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018) Berlin, 9.-13. April 2018, 153–158, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186285
Diagnosis of privacy and performance problems in the context of mobile applications
Monschein, D.; Heinrich, R.; Heger, C.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 167–172, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186283
Branchenreport UX/Usability 2018
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-up-0142
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC ’18 Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA — December 03 - 07, 2018, 733–748, Association for Computing Machinery (ACM). doi:10.1145/3274694.3274747
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Non-malleability vs. CCA-Security: The Case of Commitments
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-ws08-0542
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
Stengele, O.; Hartenstein, H.
2018. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Ed.: J. Garcia-Alfaro, 85–93, Springer International Publishing. doi:10.1007/978-3-030-00305-0_7
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security
Motivating Users to Consider Recommendations on Password Management Strategies
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37, University of Plymouth
Usability is not Enough: Lessons Learned from ’Human Factors in Security’ Research for Verifiability
Kulyk, O.; Volkamer, M.
2018. Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press
The palladio-bench for modeling and simulating software architectures
Heinrich, R.; Werle, D.; Klare, H.; Reussner, R.; Kramer, M.; Becker, S.; Happe, J.; Koziolek, H.; Krogmann, K.
2018. 40th ACM/IEEE International Conference on Software Engineering (ICSE 2018), Gothenburg, S, May 27 June 3, 2018, 37–40, Association for Computing Machinery (ACM). doi:10.1145/3183440.3183474
Developing and Evaluating a Five Minute Phishing Awareness Video
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer
Proving equivalence between imperative and MapReduce implementations using program transformations
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. 3rd Workshop on Models for Formal Analysis of Real Systems and 6th International Workshop on Verification and Program Transformation, MARSVPT 2018; Thessaloniki; Greece; 20 April 2018. Ed.: R. van Glabbeek, 185–199, Open Publishing Association. doi:10.4204/EPTCS.268.7
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
Kulyk, O.; Mayer, P.; Käfer O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom/BigDataSE.2018.00148
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, Association for Computing Machinery (ACM). doi:10.1145/3230833.3230859
Helping John to Make Informed Decisions on Using Social Login
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, Association for Computing Machinery (ACM)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen Druck+Verlag. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, Association for Computing Machinery (ACM). doi:10.1145/3173574.3173750
FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2018. Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST ’17), Orlando, Florida, December 05, 2017, 53–63, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167999
Variants and Versions Management for Models with Integrated Consistency Preservation
Ananieva, S.; Klare, H.; Burger, E.; Reussner, R.
2018. Proceedings of the 12th International Workshop on Variability Modelling of Software-Intensive Systems (VAMOS 2018), Madrid, E, February 7-9, 2018, 3–10, Association for Computing Machinery (ACM). doi:10.1145/3168365.3168377
Bücher
Dokumentation zum Datenschutzrecht mit Informationsfreiheitsrecht
Spiecker gen. Döhmann, I.; Bretthauer, S. (Hrsg.)
2018. Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Auswirkungen der Industrie 4.0 auf den Schutz von Betriebs- und Geschäftsgeheimnissen
Müllmann, D.
2018. Wettbewerb in Recht und Praxis, (10), 1177–1183
Schutz von Geschäftsgeheimnissen
Müllmann, D.
2018. Neue juristische Wochenschrift, (39), 14
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer; Hilt, T.
2018. Datenschutz und Datensicherheit, 42 (11), 680–685. doi:10.1007/s11623-018-1024-z
Systematisierung des IT-Sicherheitsrechts
Raabe, O.; Schallbruch, M.; Steinbrück, A.
2018. Computer und Recht / International, 34 (11), 706–715. doi:10.9785/cr-2018-341105
Der Arbeitnehmer 4.0? Automatisierte Arbeitgeberentscheidungen durch Sensorik am smarten Arbeitsplatz
Brecht, C.; Steinbrück, A.; Wagner, M.
2018. Privacy in Germany : PinG ; Datenschutz und Compliance, 2018 (1), 10–15
Applicability of generalized test tables: a case study using the manufacturing system demonstrator xPPU
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. Automatisierungstechnik, 66 (10), 834–848. doi:10.1515/auto-2018-0028
Enhancing neural non-intrusive load monitoring with generative adversarial networks
Bao, K.; Ibrahimov, K.; Wagner, M.; Schmeck, H.
2018. Energy Informatics, S1 (18), 295–302. doi:10.1186/s42162-018-0038-y
The influence of differential privacy on short term electric load forecasting
Eibl, G.; Bao, K.; Grassal, P.-W.; Bernau, D.; Schmeck, H.
2018. Energy Informatics, S1 (48), 93–113. doi:10.1186/s42162-018-0025-3
Modeling flexibility using artificial neural networks
Förderer, K.; Ahrens, M.; Bao, K.; Mauser, I.; Schmeck, H.
2018. Energy Informatics, S1 (21), 73–91. doi:10.1186/s42162-018-0024-4
Architecture-based change impact analysis in cross-disciplinary automated production systems
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R.; Vogel-Heuser, B.
2018. The journal of systems and software, 146, 167–185. doi:10.1016/j.jss.2018.08.058
IT-Sicherheit - ein rechtsfreier Raum?
Hackenjos, T.; Mechler, J.; Rill, J.
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Network Layer Aspects of Permissionless Blockchains
Neudecker, T.; Hartenstein, H.
2018. IEEE communications surveys & tutorials, 21 (1), 838–857. doi:10.1109/COMST.2018.2852480
Low-deterministic security for low-nondeterministic programs
Bischof, S.; Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2018. Journal of computer security, 26, 335–366. doi:10.3233/JCS-17984
Concern-oriented language development (COLD): Fostering reuse in language engineering
Combemalee, B.; Kienzle, J.; Mussbacher, G.; Barais, O.; Bousse, E.; Cazzola, W.; Collet, P.; Degueule, T.; Heinrich, R.; Jézéquel, J.-M.; Leduc, M.; Mayerhofer, T.; Mosser, S.; Schöttle, M.; Strittmatter, M.; Wortmann, A.
2018. Computer languages, systems and structures, 54, 139–155. doi:10.1016/j.cl.2018.05.004
2017
Buchaufsätze
Reference Scenarios for Self-aware Computing
Kephart, J. O.; Maggio, M.; Diaconescu, A.; Giese, H.; Hoffmann, H.; Kounev, S.; Koziolek, A.; Lewis, P.; Robertsson, A.; Spinner, S.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 87–106, Springer International Publishing. doi:10.1007/978-3-319-47474-8_4
Assessing Self-awareness
Esterle, L.; Bellman, K. L.; Becker, S.; Koziolek, A.; Landauer, C.; Lewis, P.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 465–481, Springer International Publishing. doi:10.1007/978-3-319-47474-8_15
An Architectural Model-Based Approach to Quality-Aware DevOps in Cloud Applicationsc
Heinrich, R.; Jung, R.; Zirkelbach, C.; Hasselbring, W.; Reussner, R.
2017. Software Architecture for Big Data and the Cloud. Ed.: I. Mistrik, 69–89, Elsevier
An Introduction to Voting Rule Verification
Beckert, B.; Bormer, T.; Goré, R.; Kirsten, M.; Schürmann, C.
2017. Trends in Computational Social Choice. Ed by.: Ulle Endriss, 269–287, AI Access
Automatic Margin Computation for Risk-Limiting Audits
Beckert, B.; Kirsten, M.; Klebanov, V.; Schürmann, C.
2017. Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Ed.: R. Krimmer, M. Volkamer, J. Barrat, J. Benaloh, N. J. Goodman, P. Y. A. Ryan, V. Teague, 18–35, Springer International Publishing. doi:10.1007/978-3-319-52240-1_2
Guided Information Markets by the latest European Court of Justice decisions - the Google Spain, Weltimmo and Schrems (Safe Harbor) Decisions
Spiecker gen. Döhmann, I.
2017. Privacy in a Digital Age: Perspectives from Two Continents. Ed.: R. L. Weaver; S. I. Friedland, W. Gilles; I. Bouhadana, 17–46, Carolina Academic Press
Security by Delegation für Industrie 4.0
Jung, M.
2017. Kommunikation und Bildverarbeitung in der Automation. Ed.: J. Jasperneite, Lohweg V., 73–84, Springer Verlag. doi:10.1007/978-3-662-55232-2_6
Smart Home, Smart Grid, Smart Meter - digitale Konzepte und das Recht an Daten
Spiecker gen. Döhmann, I.
2017. Herausforderung Utility 4.0 - Wie sich die Energiewirtschaft im Zeitalter der Digitalisierung verändert. Hrsg.: O. Doleski, 285–300, Springer Verlag. doi:10.1007/978-3-658-15737-1_15
Die technischen Grenzen des Rechts: Recht durch Technik und Technik durch Recht
Spiecker gen. Döhmann, I.
2017. Formate der Rechtswissenschaft. Hrsg.: A. Funke, 181–207, Velbrück Wissenschaft
Kommentierung zu §§ 49, 50 MsbG
Raabe, O.
2017. Berliner Kommentar zum Energierecht : Messstellenbetriebsgesetz (MsbG), Band 5. Hrsg.: F. J. Säcker, 896 S., Deutscher Fachverlag GmbH
Dissertationen
Specification Languages for Preserving Consistency between Models of Different Languages. Dissertation
Kramer, M. E.
2017. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000069284
Proceedingsbeiträge
How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach
Schivo, S.; Yildiz, B. M.; Ruijters, E.; Gerking, C.; Kumar, R.; Dziwok, S.; Rensink, A.; Stoelinga, M.
2017. Dependable software engineering : theories, tools, and applications$dThird International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017 : proceedings. Ed.: K. G. Larsen, 319–336, Springer. doi:10.1007/978-3-319-69483-2_19
Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities
Gerking, C.; Schubert, D.; Budde, I.
2017. E. Guerra & M. van den Brand (Hrsg.), 10th International Conference, ICMT 2017, held as part of STAF 2017, Marburg, Germany, July 17-18, 2017 : proceedings, 19–34, Springer. doi:10.1007/978-3-319-61473-1_2
Towards the modelling of complex communication networks in AutomationML
Patzer, F.; Sarkar, A.; Birnstill, P.; Schleipen, M.; Beyerer, J.
2017. 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12-15 Sept. 2017, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2017.8247571
Automotive Systems Modelling with Vitruvius
Mazkatli, M.; Burger, E.; Koziolek, A.; Reussner, R. H.
2017. INFORMATIK 2017. Tagung, Chemnitz, 25.- 29. September 2017. Hrsg.: M. Eibl, 1487–1498, Gesellschaft für Informatik (GI). doi:10.18420/in2017_148
Reconstructing Development Artifacts for Change Impact Analysis
Rostami, K.; Langhammer, M.; Busch, A.; Gleitze, J.; Heinrich, R.; Reussner, R.
2017. 19. Workshop Software-Reengineering & Evolution, Bad Honnef, 08.-10.05.2017
Considering Transient Effects of Self-Adaptations in Model-Driven Performance Analyses
Stier, C.; Koziolek, A.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 99–100, Gesellschaft für Informatik (GI)
Change Impact Analysis by Ar chitectur e-based Assessment and Planning
Rostami, K.; Stammel, J.; Heinrich, R.; Reussner, R.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 69–70, Gesellschaft für Informatik (GI)
Welthandel mit Daten
Spiecker gen. Döhmann, I.
2017. Globalisierung und Datenschutz. 22. Wiesbadener Forum Datenschutz, 23.10.2017, Wiesbaden. Hrsg.: M. Ronellenfitsch
Defining a Security-Oriented Evolution Scenario for the CoCoME Case Study
Pilipchuk, R.; Seifermann, S.; Taspolatoglu, E.
2017. 4nd Collaborative Workshop on Evolution and Maintenance of Long-Living Software Systems (EMLS’17), Hannover, 21. Februar 2017, 70–73, Universität Duisburg-Essen
Supporting software architecture evolution by functional decomposition
Faitelson, D.; Heinrich, R.; Tyszberowicz, S. S.
2017. MODELSWARD 2017 : Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, Porto, P, February 19-21, 2017. Ed.: L. Pires. Vol. 1, 435–442, SciTePress. doi:10.5220/0006206204350442
On using sarkar metrics to evaluate the modularity of metamodels
Hinkel, G.; Strittmatter, M.
2017. MODELSWARD 2017 : proceedings of the 5th International Conference on Model-Driven Engineering and Software Development : Porto, P, February 19-21, 2017. Ed.: L. Pires, 253–260, SciTePress. doi:10.5220/0006105502530260
Branchenreport UX/Usability 2017
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-up-0207
Addressing Misconceptions About Password Security Effectively
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167998
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer. doi:10.1007/978-3-319-58460-7_18
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer. doi:10.1007/978-3-319-58460-7_44
Security vs. privacy? User preferences regarding text passwords and biometric authentication
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0405
Promoting secure Email communication and authentication
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0404
Reliable Behavioural Factors in the Information Security Context
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc
Don’t be Deceived: The Message Might be Fake
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Gabler Verlag. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer
Election-Dependent Security Evaluation of Internet Voting Schemes
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer. doi:10.1007/978-3-319-58469-0_25
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien
Architecture-driven reduction of specification overhead for verifying confidentiality in component-based software systems
Yurchenko, K.; Behr, M.; Klare, H.; Kramer, M.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017. Ed.: L. Burgueño, 321–323, RWTH Aachen
Proving JDK’s Dual Pivot Quicksort Correct
Beckert, B.; Schiffl, J.; Schmitt, P. H.; Ulbrich, M.
2017. Verified Software : Theories, Tools, and Experiments, Proceedings of the 9th International Conference, VSTTE 2017, Revised Selected Papers, Heidelberg, Germany, 22nd - 23th July 2017. Ed.: A. Paskevich, 35–48, Springer. doi:10.1007/978-3-319-72308-2_3
Ecoreification: Making Arbitrary Java Code Accessible to Metamodel-Based Tools
Klare, H.; Burger, E.; Kramer, M.; Langhammer, M.; Saglam, T.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017, 221–228, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS.2017.30
User-Centric Secure Data Sharing: Exploration of Concepts and Values
Grashöfer, J.; Degitz, A.; Raabe, O.
2017. Informatik 2017 : 25.-29. September 2017 Chemnitz, Deutschland. Bd. 2. Hrsg.: M. Eibl, 1243–1258, Gesellschaft für Informatik (GI). doi:10.18420/in2017_126
The Minimum Number of Cards in Practical Card-Based Protocols
Kastner, J.; Koch, A.; Walzer, S.; Miyahara, D.; Hayashi, Y.- ichi; Mizuki, T.; Sone, H.
2017. Advances in Cryptology - ASIACRYPT 2017 : Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Part III, Hong Kong, China, 3rd - 7th December 2017. Ed.: T. Takagi, 126–155, Springer. doi:10.1007/978-3-319-70700-6_5
A Non-Invasive Cyberrisk in Cooperative Driving
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Attacks on Secure Logging Schemes
Hartung, G.
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Automatic Evaluation of Complex Design Decisions in Component-based Software Architectures
Scheerer, M.; Busch, A.; Koziolek, A.
2017. MEMOCODE ’17 : Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, Vienna, Austria, 29th September - 2nd October 2017, 67–76, Association for Computing Machinery (ACM). doi:10.1145/3127041.3127059
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Herold, G.; Hoffmann, M.; Klooß, M.; Ràfols, C.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1547–1564, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134068
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
Could Network Information Facilitate Address Clustering in Bitcoin?
Neudecker, T.; Hartenstein, H.
2017. Financial Cryptography and Data Security : FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, 7th April 2017. Ed.: M. Brenner, 155–169, Springer. doi:10.1007/978-3-319-70278-0_9
An interaction concept for program verification systems with explicit proof object
Beckert, B.; Grebing, S.; Ulbrich, M.
2017. Hardware and Software : Verification and Testing, 13th International Haifa Verification Conference, Haifa, Israel, 13th - 15th November 2017. Ed.: O. Strichman, 163–178, Springer. doi:10.1007/978-3-319-70389-3_11
Towards Realising Oblivious Voting
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
Computing Exact Loop Bounds for Bounded Program Verification
Liu, T.; Tyszberowicz, S.; Beckert, B. ..; Taghdiri, M.
2017. Dependable Software Engineering : Theories, Tools, and Applications, 3rd International Symposium, SETTA 2017, Proceedings, Changsha, China, 23rd - 25th October. Ed.: O. Sokolsky, 147–163, Springer. doi:10.1007/978-3-319-69483-2_9
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Anonymous coinjoin transactions with arbitrary values
Maurer, F. K.; Neudecker, T.; Florian, M.
2017. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017; Sydney; Australia; 1 August 2017 through 4 August 2017, 522–529, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.280
Generalised Test Tables : A Practical Specification Language for Reactive Systems
Beckert, B.; Cha, S.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 129–144, Springer. doi:10.1007/978-3-319-66845-1_9
SemSlice : Exploiting Relational Verification for Automatic Program Slicing
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 312–319, Springer. doi:10.1007/978-3-319-66845-1_20
Deriving Power Models for Architecture-Level Energy Efficiency Analyses
Stier, C.; Werle, D.; Koziolek, A.
2017. Computer Performance Engineering : 14th European Workshop, EPEW 2017, Berlin, Germany, 7th - 8th September 2017. Ed.: P. Reinecke, 214–229, Springer International Publishing. doi:10.1007/978-3-319-66583-2_14
Modular verification of information flow security in component-based systems
Greiner, S.; Mohr, M.; Beckert, B.
2017. 15th IEEE International Conference on Software Engineering and Formal Methods, Trento, Italy, 4th - 8th September 2017. Ed.: A. Cimatti, 300–315, Springer. doi:10.1007/978-3-319-66197-1_19
CASPA : A platform for comparability of architecture-based software performance engineering approaches
Dullmann, T. F.; Heinrich, R.; Van Hoorn, A.; Pitakrat, T.; Walter, J.; Willnecker, F.
2017. 2017 IEEE International Conference on Software Architecture Workshops (ICSAW 2017), Gothenburg, S, Apriel 3-7, 2017, 294–297, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSAW.2017.26
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Generalized Test Tables: A Powerful and Intuitive Specification Language for Reactive Systems
Weigl, A.; Wiebe, F.; Ulbrich, M.; Ulewicz, S.; Cha, S.; Kirsten, M.; Beckert, B.; Birgit Vogel-Heuser
2017. 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, July 24-26 2017, Institute of Electrical and Electronics Engineers (IEEE)
Architecture-Based Change Impact Analysis in Information Systems and Business Processes
Rostami, K.; Heinrich, R.; Busch, A.; Reussner, R.
2017. ICSA 2017 : 2017 IEEE International Conference on Software Architecture : proceedings : 3-7 April 2017, Gothenburg, Sweden, 179–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2017.17
Anomaly Detection in Industrial Networks using Machine Learning : A Roadmap
Meshram, A.; Haas, C.
2017. Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2016. Ed.: J. Beyerer, 65–72, Springer Verlag. doi:10.1007/978-3-662-53806-7_8
Combining Graph-Based and Deduction-Based Information-Flow Analysis
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2017. ETAPS 2017: 5th Workshop on Hot Issues in Security Principles and Trust : Hotspot 2017, Uppsala, Sweden, 22-29 April 2017, 6–25, Theoretical Foundations of Security Analysis and Design (IFIP WG 1.7)
Performance Engineering for Microservices: Research Challenges and Directions
Heinrich, R.; Van Hoorn, A.; Knoche, H.; Li, F.; Lwakatare, L. E.; Pahl, C.; Schulte, S.; Wettinger, J.
2017. 8th ACM/SPEC on International Conference on Performance Engineering (ICPE 2017), L’Aquila, I, April 22-26, 2017, 223–226, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053653
A Generic Platform for Transforming Monitoring Data into Performance Models
Kunz, J.; Heger, C.; Heinrich, R.
2017. 8th ACM/SPEC International Conference on Performance Engineering, L’Aquila, I, April 22-26, 2017, 151–156, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053635
Concurrently composable security with shielded super-polynomial simulators
Broadnax, B.; Döttling, N.; Hartung, G.; Müller-Quade, J.; Nagel, M.
2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017; Paris; France; 30 April 2017 through 4 May 2017. Ed.: J. B. Nielsen, 351–381, Springer. doi:10.1007/978-3-319-56620-7_13
Adaptive partitioning
Hofheinz, D.
2017. Advances in Cryptology – EUROCRYPT 2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017. Ed.: J.-S. Coron, 489–518, Springer. doi:10.1007/978-3-319-56617-7_17
Capturing ambiguity in artifacts to support requirements engineering for self-adaptive systems
Muñoz-Fernández, J. C.; Knauss, A.; Castañeda, L.; Derakhshanmanesh, M.; Heinrich, R.; Becker, M.; Taherimakhsousi, N.
2017. Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, 27. Februar 2017. Ed.: E. Knauss, RWTH Aachen
A database adapter for secure outsourcing
Dowsley, R.; Gabel, M.; Yurchenko, K.; Zipf, V.
2017. 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, L, December 12-15, 2016, 503–508, IEEE Computer Society. doi:10.1109/CloudCom.2016.0088
Zeitschriftenaufsätze
Supporting the Development of Interdisciplinary Product Lines in the Manufacturing Domain
Kowal, M.; Ananieva, S.; Thüm, T.; Schaefer, I.
2017. IFAC-PapersOnLine, 50 (1), 4336–4341. doi:10.1016/j.ifacol.2017.08.870
Auf dem Weg zu datenschutzfreundlichen Dashcams - Technische Maßnahmen zur Erhögung des Datenschutzes
Bretthauer, S.; Wagner, P. G.; Birnstill, P.; Krempel, E.
2017. Datenschutz und Datensicherheit, 41 (3), 159–164
Coercion-resistant proxy voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Maintenance effort estimation with KAMP4aPS for cross-disciplinary automated PLC-based Production Systems - a collaborative approach
Vogel-Heuser, B.; Heinrich, R.; Cha, S.; Rostami, K.; Ocker, F.; Koch, S.; Reussner, R.; Ziegltrum, S.
2017. IFAC-PapersOnLine, 50 (1), 4360–4367. doi:10.1016/j.ifacol.2017.08.877
Automating regression verification of pointer programs by predicate abstraction
Klebanov, V.; Rümmer, P.; Ulbrich, M.
2017. Formal methods in system design, 1–31. doi:10.1007/s10703-017-0293-8
A survey on design and implementation of protected searchable data in the cloud
Dowsley, R.; Michalas, A.; Nagel, M.; Paladi, N.
2017. Computer science review, 26, 17–30. doi:10.1016/j.cosrev.2017.08.001
A threat analysis of the vehicle-to-grid charging protocol ISO 15118
Bao, K.; Valev, H.; Wagner, M.; Schmeck, H.
2017. Computer science - research and development, 33 (1-2), 3–12. doi:10.1007/s00450-017-0342-y
Sicherheit relativ definieren
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Smart Meter im Spannungsfeld zwischen Europäischer Datenschutzgrundverordnung und Messstellenbetriebsgesetz
Bretthauer, S.
2017. Zeitschrift für das gesamte Recht der Energiewirtschaft, (3), 56–61
Big und Smart Data: Zweckbindung zwecklos?
Spiecker gen. Döhmann, I.
2017. Spektrum der Wissenschaft, 2017 (1), 56–62
A Privacy-Aware Fall Detection System for Hospitals and Nursing Facilities
Krempel, E.; Birnstill, P.; Beyerer, J.
2017. European Journal for Security Research. doi:10.1007/s41125-017-0016-6
Using internal domain-specific languages to inherit tool support and modularity for model transformations
Hinkel, G.; Goldschmidt, T.; Burger, E.; Reussner, R.
2017. Software and systems modeling, 18 (1), 129–155. doi:10.1007/s10270-017-0578-9
Integrating business process simulation and information system simulation for performance prediction
Heinrich, R.; Merkle, P.; Henss, J.; Paech, B.
2017. Software and systems modeling, 16 (1), 257–277. doi:10.1007/s10270-015-0457-1
2016
Buchaufsätze
Praxis der Forschung. Eine Lehrveranstaltung des forschungsnahen Lehrens und Lernens in der Informatik am KIT
Beckert, B.; Beigl, M.; Budde, M.; Burger, E.; Grebing, S.; Kramer, M.; Reussner, R.
2016. Neues Handbuch Hochschullehre. Lehren und Lernen effizient gestalten. Hrsg.: B. Berendt, 55–79, Raabe, Fachverl. für Wiss.-Information
Verantwortung bei begrenztem Wissen in der vernetzten Welt
Spiecker Döhmann, I.
2016. Neue Macht- und Verantwortungsstrukturen in der digitalen Welt. Hrsg.: M. Fehling; U. Schliesky, 53–72, Nomos Verlagsgesellschaft
Datenschutzrecht im Internet in der Kollision
Spiecker gen. Döhmann, I.
2016. Zukunft der informationellen Selbstbestimmung, 137–150, Erich Schmidt Verlag GmbH & Co. KG (ESV)
Gegenrechte – Datenschutz/Schutz von Betriebs- und Geschäftsgeheimnissen, Geistiges Eigentum
Dreier, T.; Spiecker gen. Döhmann, I.
2016. Informationen der öffentlichen Hand - Zugang und Nutzung. Hrsg.: T. Dreier, V. Fischer, A. van Raay, I. Spiecker gen. Döhmann, 165–192, Nomos Verlagsgesellschaft. doi:10.5771/9783845251653-165
A Study on Corporate Compliance with Transparency Requirements of Data Protection Law
Bier, C.; Kömpf, S.; Beyerer, J.
2016. Data protection and privacy : (in)visibilities and infrastructures. Ed.: Ronald Leenes, 271–289, Springer. doi:10.1007/978-3-319-50796-5_10
Technische und organisatorische Umsetzung - Technische Rahmenbedingungen
Bretthauer, S.; Bräuchle, T.
2016. Informationen der öffentlichen Hand : Zugang und Nutzung. Hrsg.: T. Dreier, 395–408, Nomos Verlagsgesellschaft
Proceedingsbeiträge
Implicit Constraints in Partial Feature Models
Ananieva, S.; Kowal, M.; Thüm, T.; Schaefer, I.
2016. Proceedings of the 7th International Workshop on Feature-Oriented Software Development, 18–27, Association for Computing Machinery (ACM). doi:10.1145/3001867.3001870
Explaining anomalies in feature models
Kowal, M.; Ananieva, S.; Thüm, T.
2016. Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 132–143, Association for Computing Machinery (ACM). doi:10.1145/2993236.2993248
Traceability of Information Flow Requirements in Cyber-Physical Systems Engineering
Gerking, C.
2016. S. Nejati & R. Salay (Hrsg.), Proceedings of the Doctoral Symposium at the 19th ACM/IEEE International Conference of Model-Driven Engineering Languages and Systems 2016 (MoDELS 2016), 7 S., Universität Paderborn
Towards Safe Execution of Reconfigurations in Cyber-Physical Systems
Schubert, D.; Heinzemann, C.; Gerking, C.
2016. 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering, CBSE 2016, 33–38, IEEE Computer Society. doi:10.1109/CBSE.2016.10
Automated Verification for Functional and Relational Properties of Voting Rules
Beckert, B.; Bormer, T.; Kirsten, M.; Neuber, T.; Ulbrich, M.
2016. Sixth International Workshop on Computational Social Choice, COMSOC-2016, Toulouse, France, 22–24 June 2016, 16 S
Recht und Technik - Datenschutz im Diskurs
Spiecker gen. Döhmann, I.; Sorge, C.; Grimm, R.
2016. Informatik 2016, Klagenfurt, Österreich, 26.-30. September 2016. Hrsg.: H. C. Mayr; M. Pinzger, 411–412, Gesellschaft für Informatik (GI)
Architectural Data Flow Analysis
Seifermann, S.
2016. 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016, Venice, I, April 5-8, 2016, 270–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.49
Branchenreport UX/Usability 2016
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V. doi:10.18420/muc2016-up-0044
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-mci-0075
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-ws03-0001
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik (GI)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, Association for Computing Machinery (ACM). doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer
Understanding information security compliance - Why goal setting and rewards might be a bad idea
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth
Introducing Proxy Voting to Helios
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth
Memorable And Secure: How Do You Choose Your PIN?
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth
Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH Aachen
Teaching Phishing-Security: Which Way is Best?
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society
Efficiency Comparison of Various Approaches in E-Voting Protocols
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer Verlag
Access Pattern Confidentiality-Preserving Relational Databases: Deployment Concept and Efficiency Evaluation
Degitz, A.; Köhler, J.; Hartenstein, H.
2016. Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, Bordeaux, France, 15th - 16th March 2016
Consideration of values in the design of access control systems
Neudecker, T.; Hayrapetyan, A.; Degitz, A.; Andelfinger, P.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016; Klagenfurt; Austria; 26 September 2016 through 30 September 2016. Ed.: H. C. Mayr, 275–288, Gesellschaft für Informatik (GI)
Security by Delegation für Industrie 4.0
Jung, M.
2016. 7. Jahreskolloquium "Kommunikation in der Automation" : 30.11.2016 : KommA 2016 Kommunikation in der Automation. Hrsg.: Jürgen Jasperneite KommA - Kommunikation in der Automation Hochschule Ostwestfalen-Lippe Institut für Industrielle Informationstechnik - inIT, 2 S., Institut für Industrielle Informationstechnik (inIT)
Automated Inversion of Attribute Mappings in Bidirectional Model Transformations
Kramer, M. E.; Rakhman, K.
2016. 5th International Workshop on Bidirectional Transformations, Bx 2016, Eindhoven, Netherlands, 8 April 2016. Hrsg.: Anthony Anjorin, 61–76, RWTH Aachen
Unabhängigkeit von Datenschutzbehörden als Voraussetzung von Effektivität
Spiecker gen. Döhmann, I.
2016. Unabhängiges Verwalten in der Europäischen Union - Unabhängiges Verwalten in Europa, Hamburg, Germany, 18. August 2014. Hrsg.: M. Kröger, 97–120, Mohr Siebeck
Datenschutzziele im Konflikt: Eine Metrik für Unverkettbarkeit als Hilfestellung für den Betroffenen
Bier, C.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 455–468, Gesellschaft für Informatik (GI)
Privacy-Dashcam - Datenschutzfreundliche Dashcams durch Erzwingen externer Anonymisierung
Wagner, P.; Birnstill, P.; Krempel, E.; Bretthauer, S.; Beyerer, J.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 427–440, Gesellschaft für Informatik (GI)
Sicherheitsanalyse mit JOANA
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI), Bonn, Deutschland, 5. - 7. April 2016. Hrsg.: M. Meier, 11–21, Gesellschaft für Informatik (GI)
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
Birnstill, P.; Bier, C.; Wagner, P.; Beyerer, J.
2016. SAM 2016 : proceedings of the 2016 International Conference on Security & Management : WORLDCOMP ’16, July 25-28, 2016, Las Vegas, Nevada, USA. Ed.: Kevin Daimi, 185–191, CSREA Press
PrivacyInsight: The Next Generation Privacy Dashboard
Bier, C.; Beyerer, J.; Kühne, K.
2016. Privacy Technologies and Policy : 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016 ; Proceedings. Ed.: Stefan, Schiffner, 135–152, Springer. doi:10.1007/978-3-319-44760-5_9
Towards Measuring The Linkage Risk In Information Flows
Bier, C.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13-14, 2016 : proceedings / Fraunhofer VVS. Ed.: Oliver Ambacher, 293–298, Fraunhofer Verlag
Working And Living In Interaktive Environments - Requirements For Security And Privacy
Krempel, E.; Birnstill, P.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13 - 14, 2016 : proceedings / Fraunhofer VVS Hrsg.: Oliver Ambacher, Rüdiger Quay, Joachim Wagner, 315–322, Fraunhofer Verlag
’Smart Regulation for Smart Industry’ - DatenschutDatenschutz Aspekte des Aktionsplanes der europäischen Kommission zur Digitalisierung der europäischen Industrie
Müllmann, D.
2016. Smart World - Smart Law? : weltweite Netze mit regionaler Regulierung : Tagungsband Herbstakademie 2016. Hrsg.: Jürgen Taeger, 603–619, OlWIR Oldenburger Verlag für Wirtschaft
Multilinear Maps from Obfuscation
Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; Paterson, K. G.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 446–473, Springer Verlag. doi:10.1007/978-3-662-49096-9_19
Tightly CCA-Secure Encryption Without Pairings
Gay, R.; Hofheinz, D.; Kiltz, E.; Wee, H.
2016. 35th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016; Vienna; Austria; 8 May 2016 through 12 May 2016. Ed.: M. Fischlin, 1–27, Springer Verlag. doi:10.1007/978-3-662-49890-3_1
Tool Demonstration: JOANA
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 89–93, Springer Verlag. doi:10.1007/978-3-662-49635-0_5
Algebraic Partitioning : Fully Compact and (almost) Tightly Secure Cryptography
Hofheinz, D.
2016. 13th International Conference on Theory of Cryptography, TCC 2016-A, Proceedings Part I, Tel Aviv, Israel; 10th - 13th January 2016. Ed.: E. Kushilevitz, 251–281, Springer Verlag. doi:10.1007/978-3-662-49096-9_11
On Improvements of Low-Deterministic Security
Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 68–88, Springer Verlag. doi:10.1007/978-3-662-49635-0_4
Secure Audit Logs with Verifiable Excerpts
Hartung, G.
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing. doi:10.1007/978-3-319-29485-8_11
Fault-Tolerant Aggregate Signatures
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Rupp, A.
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer Verlag. doi:10.1007/978-3-662-49384-7_13
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security
Hesse, J.; Hofheinz, D.; Rupp, A.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 416–445, Springer Verlag. doi:10.1007/978-3-662-49096-9_18
Context-Based Architectural Security Analysis
Taspolatoglu, E.; Heinrich, R.
2016. 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 5–8 April 2016, 281–282, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.55
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2016. The 13th IEEE International Conference on Ubiquitous Intelligence and Computing, The 13th IEEE International Conference on Advanced and Trusted Computing, The 16th IEEE International Conference on Scalable Computing and Communications, The IEEE International Conference on Cloud and Big Data Computing, The IEEE International Conference on Internet of People, The IEEE Smart World Congress and Workshops, Toulouse, F, July 18-21, 2016. Ed.: D. El Baz, 358–367, IEEE Computer Society. doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070
ZeTA-zero-trust authentication: Relying on innate human ability, not technology
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
How to Generate and Use Universal Samplers
Hofheinz, D.; Jager, T.; Khurana, D.; Sahai, A.; Waters, B.; Zhandry, M.
2016. 22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016; Hanoi; Viet Nam; 4 December 2016 through 8 December 2016. Ed. : J. H. Cheon, 715–744, Springer Verlag. doi:10.1007/978-3-662-53890-6_24
A Distributed Key Management Approach
Dowsley, R.; Gabel, M.; Hübsch, G.; Schiefer, G.; Schwichtenberg, A.
2016. IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, 12–15 December 2016, 509–514, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2016.0089
Oblivious Voting - Hiding Votes from the Voting Machine in Bingo Voting
Achenbach, D.; Löwe, B.; Müller-Quade, J.; Rill, J.
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SciTePress. doi:10.5220/0005964300850096
A Microservice Architecture for the Intranet of Things and Energy in Smart Buildings
Bao, K.; Mauser, I.; Kochanneck, S.; Xu, H.; Schmeck, H.
2016. Proceedings of the Article17th Annual Middleware Conference (ACM/IFIP/USENIX Middleware) - First International Workshop on Mashups of Things and APIs (MOTA) - Trento, Italy, December 12-16, 2016, Article No.3, Association for Computing Machinery (ACM). doi:10.1145/3007203.3007215
Smarter Energy by an Intranet of Things in Buildings
Bao, K.; Fiebig, F.; Frank, L.; Kochanneck, S.; Mauser, I.; Schmeck, H.
2016. VDE-Kongress : Internet der Dinge : Technologien, Anwendungen, Perspektiven - Mannheim, 7.-8. November 2016, CD-ROM, VDE Verlag
Standard security does not imply indistinguishability under selective opening
Hofheinz, D.; Rao, V.; Wichs, D.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016. Ed. : A. Smith, 121–145, Springer Verlag. doi:10.1007/978-3-662-53644-5_5
Public-key encryption with simulation-based selective-opening security and compact ciphertexts
Hofheinz, D.; Jager, T.; Rupp, A.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016, 146–168, Springer Verlag. doi:10.1007/978-3-662-53644-5_6
A Formal Treatment of Privacy in Video Data
Fetzer, V.; Müller-Quade, J.; Nilges, T.
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing. doi:10.1007/978-3-319-45741-3_21
Eliciting and refining requirements for comprehensible security
Broadnax, B.; Birnstill, P.; Müller-Quade, J.; Beyerer, J.
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verlag
Pseudo-Random Number Generator Verification: A Case Study
Dörre, F.; Klebanov, V.
2016. Proceedings, Verified Software: Theories, Tools, and Experiments (VSTTE) : 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Hrsg.: A. Gurfinkel, 61–72, Springer International Publishing. doi:10.1007/978-3-319-29613-5_4
Bücher
Modeling and Simulating Software Architectures – The Palladio Approach
Reussner, R. H.; Becker, S.; Happe, J.; Heinrich, R.; Koziolek, A.; Koziolek, H.; Kramer, M.; Krogmann, K. (Hrsg.)
2016. MIT Press
Zeitschriftenaufsätze
Challenges in Secure Software Evolution - The Role of Software Architecture
Seifermann, S.; Taspolatoglu, E.; Reussner, R. H.; Heinrich, R.
2016. Softwaretechnik-Trends, 36 (1)
Challenges to Trading-Off Performance and Privacy of Component-Based Systems
Seifermann, S.; Yurchenko, K.; Kramer, M. E.
2016. Softwaretechnik-Trends, 36 (4)
Spot the phish by checking the pruned URL
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Untersuchung des Sicherheitsbewusstseins im Kontext von "E-Mail made in Germany“
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
A Framework for a Uniform Quantitative Description of Risk with Respect to Safety and Security
Beyerer, J.; Geisler, J.
2016. European Journal for Security Research, 1 (2), 135–150. doi:10.1007/s41125-016-0008-y
Zweckkonforme und zweckändernde Weiternutzung
Müllmann, D.
2016. Neue Zeitschrift für Verwaltungsrecht, 35 (23), 1692–1696
The regulation of commercial profiling - a comparative analysis
Spiecker gen. Döhmann, I.; Tambou, O.; Bernal, P.; Hu, M.; Molinaro, C.; Negre, E.; Sarlet, I.; Schertel Mendes, L.; Witzleb, N.; Yger, F.
2016. European Data Protection Law Review, 2 (4), 535–554
Industry 4.0: Legal Systems, the Social Contract and Health Care
Spiecker gen. Döhmann, I.
2016. Society for Computers and Law, (6/7), 26–28
7 Irrtümer zum Datenschutz im Kontext von Smart Data
Wagner, M.; Raabe, O.
2016. Datenbank-Spektrum, 16 (2), 173–178. doi:10.1007/s13222-016-0218-5
Datenschutz und Datenanalyse
Steinbach, M.; Krempel, E.; Jung, C.; Hoffmann, M.
2016. Datenschutz und Datensicherheit, 40 (7), 440–445
Establishing location privacy in decentralized long-distance geocast services
Florian, M.; Pieper, F.; Baumgart, I.
2016. Ad hoc Networks, 37, Part 1, SI (February), 110–121. doi:10.1016/j.adhoc.2015.07.015
Architectural run-time models for performance and privacy analysis in dynamic cloud applications
Heinrich, R.
2016. ACM SIGMETRICS performance evaluation review, 43 (4), 13–22. doi:10.1145/2897356.2897359
Zuverlässige und sichere Software offener Automatisierungssysteme der Zukunft – Herausforderungen und Lösungswege
Keller, H. B.; Schneider, O.; Matthes, J.; Hagenmeyer, V.
2016. Automatisierungstechnik, 64 (12), 930–947. doi:10.1515/auto-2016-0060
Integrierte Entwicklung zuverlässiger Software
Schneider, O.; Keller, H. B.
2016. Softwaretechnik-Trends, 36 (3), 12–16
Software-based smart factory networking
Bauer, R.; Bless, R.; Haas, C.; Jung, M.; Zitterbart, M.
2016. Automatisierungstechnik, 64 (9), 765–773. doi:10.1515/auto-2016-0072
Tightly secure signatures and public-key encryption
Hofheinz, D.; Jager, T.
2016. Designs, Codes and Cryptography, 80 (1), 29–61. doi:10.1007/s10623-015-0062-x
Information and communication technology in energy lab 2.0: Smart energies system simulation and control center with an open-street-map-based power flow simulation example
Hagenmeyer, V.; Cakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Waczowicz, S.; Mikut, R.
2016. Energy Technology, 4 (1), 145–162. doi:10.1002/ente.201500304
2015
Buchaufsätze
Kooperation als Lösungsansatz in Dreiecksbeziehungen des Verwaltungsrechts
Spiecker genannt Döhmann, I.
2015. 100 Jahre Rechtswissenschaft in Frankfurt. Hrsg.: Fachbereich Rechtswissenschaft der Goethe-Universität Frankfurt am Main, 201–215, Klostermann
Recht und Verhaltenssteuerung
Spiecker genannt Döhmann, I.
2015. Recht, Kultur, Normativität. Hrsg.: Jan-Christoph Marschelke, 49–75, transcript Verlag
Staatliche Instrumente zur Bewältigung von Nicht-Wissens-Szenarien
Spiecker genannt Döhmann, I.
2015. Die Herausforderungen des Rechts in der globalen Risikogesellschaft, Barcelona, 2011. Hrsg.: Merce Darnaculleta Gardella, 43–63
Datenschutz in der Globalisierung - Mission Impossible in einer Welt der Technikzukünfte unter Einwirkung einer neuen europäischen Datenschutz-Grundverordnung?
Spiecker gen. Döhmann, I.
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 63–95, KIT Scientific Publishing
Dissertationen
Tunable Security for Deployable Data Outsourcing. Dissertation
Köhler, J.
2015. KIT Scientific Publishing. doi:10.5445/KSP/1000048084
Magisterarbeiten
Konzeption und Leistungsbewertung von Database-as-a-Service Ansätzen zur Zugriffsmusterverschleierung. Magisterarbeit
Degitz, A.
2015. Karlsruher Institut für Technologie (KIT)
Masterarbeiten
Funktions- und Performancebewertung von Exploit Mitigation Techniques. Masterarbeit
Laschinger, M.
2015. Karlsruher Institut für Technologie (KIT)
Modellierung und Simulation des Bitcoin Peer-to-Peer Netzwerkes. Masterarbeit
Bittner, J.
2015. Karlsruher Institut für Technologie (KIT)
Application agnostic confidentiality enforcement for database-centric SaaS offerings. Masterarbeit
Fuhry, B.
2015. Karlsruher Institut für Technologie (KIT)
Realitätsnahe Emulation drahtloser Sensornetze in OMNeT++. Masterarbeit
Jung, M.
2015. Karlsruher Institut für Technologie (KIT)
Bachelorarbeiten
Evaluierung der Kryptographie Bibliothek NaCl zur Anwendung in drahtlosen Sensornetzen. Bachelorarbeit
Männle, K.
2015. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
Model-driven test case design for model-to-model semantics preservation
Gerking, C.; Ladleif, J.; Schäfer, W.
2015. A-TEST 2015: Proceedings of the 6th International Workshop on Automating Test Case Design, Selection and Evaluation. Ed.: T. E. J. Vos, 1–7, Association for Computing Machinery (ACM). doi:10.1145/2804322.2804323
Domain-Specific Model Checking for Cyber-Physical Systems
Gerking, C.; Schäfer, W.; Dziwok, S.; Heinzemann, C.
2015. M. Famelis, D. Ratiu, M. Seidl & G. M. K. Selim (Hrsg.), Proceedings of the 12th Workshop on Model-Driven Engineering, Verification and Validation co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, MoDeVVa@MoDELS 2015, 18–27, RWTH Aachen
Security overlay for distributed encrypted containers
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. SAM2015 : proceedings of the 2015 International Conference on Security & Management : Worldcomp’15 : July 27-30, 2015, Las Vegas, Nevada, USA. Ed.: K. Daimi, 130–136, CSREA Press
Protecting sensitive data in a distributed and mobile environment
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. ICCWS 2015, 10th International Conference on Cyber Warfare and Security. Proceedings : Kruger National Park, South Africa, 24-25 March 2015. Ed.: J. Zaaiman, 519–524, Academic Conferences and Publishing International Limited
Exploring Mental Models Underlying PIN Management Strategies
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, Association for Computing Machinery (ACM). doi:10.1145/2818000.2818043
Branchenreport UX/Usability 2015
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, Oldenbourg Verlag
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der "Mental Model Diagramm"-Methode
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, Oldenbourg Verlag
A Socio-Technical Investigation into Smartphone Security
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. Mensch und Computer 2015 Workshopband. Ed. A. Weisbecker, 647–655, Oldenbourg Verlag
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer. doi:10.1007/978-3-319-18500-2_8
Zertifizierte Apps
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl
NoPhish App Evaluation: Lab and Retention Study
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society
A quantitative risk model for a uniform description of safety and security
Beyerer, J.; Geisler, J.
2015. Proceedings of the 10th Future Security - Security Research Conference "Future Security", Berlin, 10, 2015, 317–324, Fraunhofer Verlag
Executive Summary
Hutchison, D.; Nahrstedt, K.; Schöller, M.; Spiecker gen. Döhmann, I.; Tauber, M.
2015. Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations - Report from Dagstuhl (Seminar 15151), Wadern, Germany, 07. – 10. April 2015, 1–4, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI)
On the Security of Public Cloud Storage
Müller, S.; Pallas, F.; Balaban, S.
2015. 10th Future Security Conference 2015 (Future Security 2015). Ed.: J. Beyerer, Fraunhofer Verlag
Idealizing Identity-Based Encryption
Hofheinz, D.; Matt, C.; Maurer, U.
2015. Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security (Proceedings Part 1), Auckland, New Zealand, 29th November - 3rd December 2015. Ed.: T. Iwata, 495–520, Springer Verlag. doi:10.1007/978-3-662-48797-6_21
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
Hofheinz, D.; Koch, J.; Striecks, C.
2015. PKC 2015 : Public-Key Cryptography : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, Maryland, USA, 30th March - 1st April 2015. Ed.: J. Katz Public key cryptography - PKC 2015 ; 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015 . Ed.: J. Katz, 799–822, Springer Verlag. doi:10.1007/978-3-662-46447-2
Tightly-Secure Authenticated Key Exchange
Bader, C.; Hofheinz, D.; Jager, T.; Kiltz, E.; Li, Y.
2015. Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Proceedings Part I, Warsaw, Poland, 23th - 25th March 2015. Ed.: Y. Dodis, 629–658, Springer Verlag. doi:10.1007/978-3-662-46494-6_26
Privacy Score: Making privacy aspects of surveillance systems comparable
Krempel, E.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Hrsg.: Jürgen Beyerer, 65–72, Fraunhofer Verlag
Graphical Model-based Privacy Policy Editing for Smart Video Surveillance
Birnstill, P.; Burkert, C.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Ed.: Jürgen Beyerer, 81–811, Fraunhofer Verlag
A user study on anonymization techniques for smart video surveillance
Birnstill, P.; Ren, D.; Beyerer, J.
2015. 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS 2015) : Karlsruhe, Germany, 25 - 28 August 2015 : [including workshop papers], 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2015.7301805
SECURUS : A Provably Secure Database Outsourcing Scheme
Nilges, T.; Köhler, J.
2015. Security Research Conference : 10th Future Security, Proceedings, Berlin, Germany, 15th - 17th September 2015. Ed.: J. Beyerer, 57–67, Fraunhofer Verlag
Zur Architektonik des europäischen und deutschen Datenschutzes im Zeitalter von Vorratsdatenspeicherung, Big Data und IT-Enhancement im Lichte der Google-Spain-Entscheidung des Europäischen Gerichtshofs
Spiecker genannt Döhmann, I.
2015. Datenschutz im digitalen Zeitalter - global, europäisch, national, Vortragsveranstaltung des Instituts für Rundfunkrecht an der Universität zu Köln vom 16. Mai 2014., 61–91, Verlag C.H.Beck
Evaluation der Kryptografiebibliothek NaCl im Kontext drahtloser Sensornetze
Jung, M.; Hergenröder, A.; Männle, K.
2015. 14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme (FGSN), Erlangen, 23.-24. September 2015. Hrsg.: J. Eckert, 37–40, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)
A Usability Evaluation of Interactive Theorem Provers Using Focus Groups
Beckert, B.; Grebing, S.; Böhl, F.
2015. International Conference on Software Engineering and Formal Methods : SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS - Workshop on Human-Oriented Formal Methods (HOFM), Grenoble, France, September 1-2, 2014. Ed.: C. Canal, 3–19, Springer Verlag. doi:10.1007/978-3-319-15201-1_1
Security of electricity supply in 2030
Raskob, W.; Bertsch, V.; Ruppert, M.; Strittmatter, M.; Happe, L.; Broadnax, B.; Wandler, S.; Deines, E.
2015. Critical Infrastructure Protection and Resilience Europe, Den Haag, Netherlands, 4th - 5th March 2015
Informed Schema Design for Column Store-based Database Services
Bermbach, D.; Müller, S.; Eberhardt, J.; Tai, S.
2015. 8th IEEE International Conference on Service Oriented Computing & Applications (SOCA), Rome, Italy, 19-21 October, 2015, 163–172, IEEE Computer Society. doi:10.1109/SOCA.2015.29
Sybil-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties
Florian, M.; Walter, J.; Baumgart, I.
2015. ACM 14th Workshop on Privacy in the Electronic Society, WPES 2015; Denver; United States; 12 October 2015, 65–74, Association for Computing Machinery (ACM). doi:10.1145/2808138.2808145
OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous Networks
Jung, M.; Hergenröder, A.
2015. Q2SWinet ’15 Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Cancun, Mexico; 2 November 2015 through 6 November 2015, 75–82, Association for Computing Machinery (ACM). doi:10.1145/2815317.2815331
Regression Verification for Java Using a Secure Information Flow Calculus
Beckert, B.; Klebanov, V.; Ulbrich, M.
2015. Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP ’15) , Prague, Czech Republic, July 7th, 2015, Art.Nr.: a6, Association for Computing Machinery (ACM). doi:10.1145/2786536.2786544
Change-Driven Consistency for Component Code, Architectural Models, and Contracts
Kramer, M. E.; Langhammer, M.; Messinger, D.; Seifermann, S.; Burger, E.
2015. Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE’15), Montreal, QC, Canada, May 04 - 08, 2015, 21–26, Association for Computing Machinery (ACM). doi:10.1145/2737166.2737177
JoDroid: Adding Android Support to a Static Information Flow Control Tool
Mohr, M.; Graf, J.; Hecker, M.
2015. Software Engineering Workshops 2015 - Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, Dresden, 17.-18. März 2015. Beiträge zur 8. Arbeitstagung Programmiersprachen (ATPS 2015). Hrsg.: W. Zimmermann, 140–145, RWTH Aachen
SHRIFT System-Wide HybRid Information Flow Tracking
Lovat, E.; Fromm, A.; Mohr, M.; Pretschner, A.
2015. ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. Proceedings. Ed.: H. Federrath, 371–385, Springer. doi:10.1007/978-3-319-18467-8_25
A Hybrid Approach for Proving Noninterference of Java Programs
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Kirsten, M.; Mohr, M.
2015. 28th IEEE Computer Security Foundations Symposium, 13 Jul - 17 Jul 2015, Verona, Italy. Ed.: P. Kellenberger, 305–319, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2015.28
Towards Privacy in Monitored Shared Environments
Bao, K.; Bräuchle, T.; Schmeck, H.
2015. 10th Future Security, Security Research Conference, September 15 - 17, 2015, Berlin. Ed.: J. Beyerer, 469–472, Fraunhofer Verlag
A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2015. 1st IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), 15th May 2015, Ottawa, Canada. Ed.: R. Badonnel, 1327–1332, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INM.2015.7140490
Information and Communication Technology in Energy Lab 2.0
Hagenmeyer, V.; Çakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Mikut, R.
2015. Energy, Science and Technology 2015. The energy conference for scientists and researchers. Book of Abstracts, EST, Energy Science Technology, International Conference & Exhibition, 20-22 May 2015, Karlsruhe, Germany, 57, Karlsruher Institut für Technologie (KIT)
Index Optimization for L-Diversified Database-as-a-Service
Köhler, J.; Hartenstein, H.
2015. 9th International Workshop on Data Privacy Management, DPM 2014, 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014 and 3rd International Workshop on Quantitative Aspects in Security Assurance, QASA 2014 held in conjunction with 19th Annual European Research Event in Computer Security Symposium, ESORICS 2014; Wroclaw; Poland; 10 September 2014 through 11 September 2014. Ed.: J. Posegga, 114–132, Springer. doi:10.1007/978-3-319-17016-9_8
Bücher
Certification of ICTs in Elections
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreno, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance
Zeitschriftenaufsätze
Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. Journal of Internet Technology and Secured Transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0048
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
Tonicelli, R.; Nascimento, A. C. A.; Dowsley, R.; Müller-Quade, J.; Imai, H.; Hanaoka, G.; Otsuka, A.
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8
Daten verschlüsselt speichern und verarbeiten in der Cloud
Müller-Quade, J.; Huber, M.; Nilges, T.
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Intelligente Videoüberwachung in Kranken- und Pflegeeinrichtungen von morgen: eine Analyse der Bedingungen nach den Entwürfen der EU-Kommission und des EU-Parlaments für eine DS-GVO
Bretthauer, S.; Krempel, E.; Birnstill, P.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 31, 239–245. doi:10.9785/cr-2015-0406
A new framework for information markets - The ECJ Google Spain decision
Spiecker gen. Döhmann, I.
2015. Common market law review, 52 (4), 1033–1057
Intelligente Videoueberwachung in Kranken- und Pflegeeinrichtungen von morgen
Bretthauer, S.; Birnstill, P.; Krempel, E.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 2015 (4), 239–245
GNUC: A New Universal Composability Framework
Hofheinz, D.; Shoup, V.
2015. Journal of cryptology, 28 (3), 423–508. doi:10.1007/s00145-013-9160-y
Cryptographic theory meets practice: Efficient and privacy-preserving payments for public transport
Rupp, A.; Baldimtsi, F.; Hinterwaelder, G.; Paar, C.
2015. ACM transactions on information and system security, 17 (3), Art. Nr.: 10. doi:10.1145/2699904
Privacy-preserving surveillance: an interdisciplinary approach
Birnstill, P.; Bretthauer, S.; Greiner, S.; Krempel, E.
2015. International Data Privacy Law, 5 (4), 298–308. doi:10.1093/idpl/ipv021
An extensive systematic review on the Model-Driven Development of secure systems
Nguyen, P. H.; Kramer, M.; Klein, J.; Le Traon, Y.
2015. Information & software technology, 68, 62–81. doi:10.1016/j.infsof.2015.08.006
A new algorithm for low-deterministic security
Giffhorn, D.; Snelting, G.
2015. International journal of information security, 14 (3), 263–287. doi:10.1007/s10207-014-0257-6
Implementation-level Verification of Algorithms with KeY
Bruns, D.; Mostowski, W.; Ulbrich, M.
2015. International journal on software tools for technology transfer, 17 (6), 729–744. doi:10.1007/s10009-013-0293-y
Understanding probabilistic software leaks
Snelting, G.
2015. Science of computer programming, 97 (P1), 122–126. doi:10.1016/j.scico.2013.11.008
Confidential database-as-a-service approaches: taxonomy and survey
Köhler, J.; Jünemann, K.; Hartenstein, H.
2015. Journal of Cloud Computing, 4 (1), 1–14. doi:10.1186/s13677-014-0025-1
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
Bellare, M.; Hofheinz, D.; Kiltz, E.
2015. Journal of cryptology, 28 (1), 29–48. doi:10.1007/s00145-013-9167-4
Confined Guessing: New Signatures From Standard Assumptions
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Striecks, C.
2015. Journal of Cryptology, 28 (1), 176–208. doi:10.1007/s00145-014-9183-z
2014
Buchaufsätze
A holistic framework for the evaluation of internet voting systems
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global. doi:10.4018/978-1-4666-5820-2.ch002
Side Channels in Secure Database Outsourcing on the Example of the MimoSecco Scheme
Huber, M.; Hartung, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar, 35–48, Springer. doi:10.1007/978-3-319-12718-7_3
Soziologie der Verfassung – ein Kommentar
Spiecker genannt Döhmann, I.
2014. Soziologie der Verfassung, (Fundamenta Juris Publici). Hrsg.: M. Morlok, 87–120, Mohr Siebeck
Kommentierung zu § 21g, h EnWG
Raabe, O.; Lorenz, M.
2014. Berliner Kommentar zum Energierecht ; Energierecht, Band 1, Halbband 1. Hrsg.: Franz Jürgen Säcker, 1716, Dt. Fachverl
Diplomarbeiten
Formal Verification of Voting Schemes. Diplomarbeit
Kirsten, M.
2014. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000092716
Privatheit, Smart-Metering und Sensornetze. Diplomarbeit
Munz, S.
2014. Karlsruher Institut für Technologie (KIT)
Bachelorarbeiten
Proceedingsbeiträge
Integrating Run-Time Observations and Design Component Models for Cloud System Analysis
Heinrich, R.; Schmieders, E.; Jung, R.; Rostami, K.; Metzger, A.; Hasselbring, W.; Reussner, R.; Pohl, K.
2014. MRT 2014, Models@run.time 2014 : Proceedings of the 9th Workshop on Models@run.time co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014). Ed.: S. Götz, 41–46, RWTH Aachen
Deriving Work Plans for Solving Performance and Scalability Problems
Heger, C.; Heinrich, R.
2014. Computer Performance Engineering : 11th European Workshop, EPEW 2014, Florence, Italy, September 11-12, 2014, Proceedings. Ed.: A. Horváth, 104–118, Springer International Publishing. doi:10.1007/978-3-319-10885-8_8
A Method for Aspect-oriented Meta-Model Evolution
Jung, R.; Heinrich, R.; Schmieders, E.; Strittmatter, M.; Hasselbring, W.
2014. VAO ’14 : Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, 19–22, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631681
Evolution of the Palladio Component Model: Process and Modeling Methods
Jung, R.; Strittmatter, M.; Merkle, P.; Heinrich, R.
2014. SOSP ’14 : Symposium on Software Performance Joint Descartes/Kieker/Palladio Days 2014, Stuttgart, Germany, November 26–28, 2014, Proceedings. Ed.: S. Becker ; R. Reussner, 13, Universität Stuttgart
Solving the Movie Database Case with QVTo
Gerking, C.; Heinzemann, C.
2014. TTC 2014 - Transformation Tool Contest : Proceedings of the 7th Transformation Tool Contest part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences, York, United Kingdom, July 25, 2014. Ed.: L.M. Rose, 98–102, RWTH Aachen
A tool suite for the model-driven software engineering of cyber-physical systems
Dziwok, S.; Gerking, C.; Becker, S.; Thiele, S.; Heinzemann, C.; Pohlmann, U.
2014. S.-C. Cheung, A. Orso & M.-A. D. Storey (Hrsg.), Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE-22, 715–718, Association for Computing Machinery (ACM). doi:10.1145/2635868.2661665
The MechatronicUML method: model-driven software engineering of self-adaptive mechatronic systems
Becker, S.; Dziwok, S.; Gerking, C.; Heinzemann, C.; Schäfer, W.; Meyer, M.; Pohlmann, U.
2014. P. Jalote, L. C. Briand & A. van der Hoek (Hrsg.), 36th International Conference on Software Engineering, ICSE ’14, Companion Proceedings, 614–615, Association for Computing Machinery (ACM). doi:10.1145/2591062.2591142
Generating Modelica Models from Software Specifications for the Simulation of Cyber-Physical Systems
Pohlmann, U.; Holtmann, J.; Meyer, M.; Gerking, C.
2014. 40th EUROMICRO Conference on Software Engineering and Advanced Applications, Verona, Italy, 27-29 Aug. 2014, 191–198, IEEE Computer Society. doi:10.1109/SEAA.2014.18
The ‘Hedonic’ in Human-Computer Interaction – History, Contributions, and Future Research Directions
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, Association for Computing Machinery (ACM). doi:10.1145/2598510.2598549
Unterstützung für ein risikobewusstes Verhalten im Internet
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität
Authentication Schemes - Comparison and Effective Password Spaces
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001140
Pretty Understandable Democracy 2.0
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
What Deters Jane from Preventing Identification and Tracking on the Web?
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, Association for Computing Machinery (ACM). doi:10.1145/2665943.2665963
NoPhish: An Anti-Phishing Education App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing
Shake hands to bedevil: Securing email with wearable technology
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag
Coercion-Resistant Internet Voting in Practice
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik (GI)
Why doesn’t Jane protect her privacy?
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer. doi:10.1007/978-3-319-08506-7_13
A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik (GI)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer. doi:10.1007/978-3-319-10178-1_20
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik (GI)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität
Building castles in quicksand: blueprint for a crowdsourced study
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, Association for Computing Machinery (ACM). doi:10.1145/2559206.2578861
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society. doi:10.14722/usec.2014.23037
ACCESS: Describing and Contrasting Authentication Mechanisms
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer. doi:10.1007/978-3-319-07620-1_35
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer. doi:10.1007/978-3-319-07620-1_16
An Agency Perspective to Cloud Computing
Pallas, F.
2014. GECON 2014 : 11th International Conference on Economics of Grids, Clouds, Systems, and Services (Revised Selected Papers), Cardiff, UK, 16-18 September 2014. Ed.: J. Altmann, 36–51, Springer International Publishing. doi:10.1007/978-3-319-14609-6_3
Establishing location-privacy in decentralized long-distance geocast services
Florian, M.; Pieper, F.; Baumgart, I.
2014. 2014 IEEE Vehicular Networking Conference (VNC), Paderborn, Germany, 3–5 December 2014. Ed.: B. Scheuermann, 151–158, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/VNC.2014.7013334
The European Approach towards Data Protection in a Global World of Data Transfer
Spiecker genannt Döhmann, I.
2014. Privacy in the Internet Age: Proceedings of the 8th Privacy Discussion Forum, 46–70
„Offlinetags – A Novel Privacy Approach to Online Photo Sharing“
Pallas, F.; Ulbricht, M.-R.; Jaume-Palasí L.; Höppner U.
2014. CHI EA 2014, CHI EA ’14: CHI ’14, Toronto, ON, Canada, 26.4. - 1.5. 2014, Extended Abstracts on Human Factors in Computing Systems, Work-in-Progress, 2179–2184, Association for Computing Machinery (ACM). doi:10.1145/2559206.2581195
Extending and Applying a Framework for the Cryptographic Verification of Java Programs
Küsters, R.; Scapin, E.; Truderung, T.; Graf, J.
2014. Principles of Security and Trust, POST 2014, Part of ETAPS 2014, Grenoble, France, April 5-13, 2014, 220–239, Springer Verlag. doi:10.1007/978-3-642-54792-8_12
Big Data und der Grundsatz der Zweckbindung
Kring, M.
2014. Informatik 2014, Big Data – Komplexität meistern, 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, 22. – 26. September 2014. Hrsg.: E. Plödereder, 1–12
Proposal for a Multi-View Modelling Case Study: Component-Based Software Engineering with UML, Plug-ins, and Java
Kramer, M. E.; Langhammer, M.
2014. Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, VAO ’14, York, United Kingdom, 22 July 2014, 7:7–7:10, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631676
Poster Abstract: Secure Metering Communication in the Energy Smart Home Lab
Hergenröder, A.; Bao, K.; Bräuchle, T.
2014. Poster and Demo Session of the 11th European Conference on Wireless Sensor Networks (EWSN), Oxford, U.K., 17 - 19 Februar 2014. Ed.: A. Cerpa, 32–33, EWSN
Secure Database Outsourcing to the Cloud using the MimoSecco Middleware
Gabel, M.; Hübsch, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar. Part III, 187–202, Springer Verlag. doi:10.1007/978-3-319-12718-7_12
SMART-ER: peer-based privacy for smart metering
Finster, S.; Baumgart, I.
2014. IEEE Conference on Computer Communications workshops (INFOCOM WKSHPS 2014) - INFOCOM Workshop on Communications and Control for Smart Energy Systems - Toronto, ON, Canada, 27 April-2 May 2014, 652–657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2014.6849308
Videomonitoring zur Sturzdetektion und Alarmierung – Eine technische und rechtliche Analyse
Bretthauer, S.; Krempel, E.
2014. Transparenz IRIS 2014 : Tagungsband des 17. Internationalen Rechtsinformatik Symposions, Salzburg, 20. - 22. Februar 2014. Hrsg.: E. Schweighofer, 525–534, Österreichische Computer-Ges
Energiemanagementsysteme der Zukunft : Anforderungen an eine datenschutzkonforme Verbrauchsvisualisierung
Bräuchle, T.
2014. Big Data & Co : Neue Herausforderungen für das Informationsrecht - 15. Herbstakademie 2014 / DSRI, Deutsche Stiftung für Recht und Informatik; 10-13 September 2014, Mainz. Hrsg.: J. Taeger, 455–469, Oldenburger Verl. für Wirtschaft
Die datenschutzrechtliche Einwilligung in Smart Metering Systemen : Kollisionslagen zwischen Datenschutz- und Energiewirtschaftsrecht = The legal data protection consent in Smart Metering Systems : Situations involving conflicts between data protection act and energy industry legislation
Bräuchle, T.
2014. Informatik 2014 : Big Data - Komplexität meistern : 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26. September 2014. Hrsg.: E. Plödereder, 515–526, Köllen Druck+Verlag
Enhancing Privacy by Design From a Developer’s Perspective
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2014. Privacy technologies and policy : revised selected papers - First Annual Privacy Forum (APF), Limassol, Cyprus, October 10 - 11, 2012. Ed.: B. Preneel, 73–85, Springer Verlag
Lessons Learned From Microkernel Verification
Beckert, B.; Bormer, T.
2014. International Workshop on Automated Verification of Critical Systems (AVoCS), Bamberg, Germany, Sep 18 - 20, 2012. Eds.: G. Lüttgen, Elsevier
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
Böhl, F.; Greiner, S.; Scheidecker, P.
2014. 13th International Conference on Cryptology and Network Security (CANS) - Heraklion, Crete, Greece, October 22-24, 2014. Ed.: D. Gritzalis, 175–190, Springer Verlag
Automating Regression Verification
Felsing, D.; Grebing, S.; Klebanov, V.; Rümmer, P.; Ulbrich, M.
2014. ASE ’14 : proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering : September 15-19, 2014, Västerås, Sweden, 349–359, Association for Computing Machinery (ACM). doi:10.1145/2642937.2642987
Benchmarking the Performance Impact of Transport Layer Security in Cloud Database Systems
Müller, S.; Bermbach, D.; Tai, S.; Pallas, F.
2014. 2nd IEEE International Conference on Cloud Engineering, IC2E 2014; Boston; United States; 10 March 2014 through 14 March 2014, 27–36, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IC2E.2014.48
Gesellschaftliche Relevanz der Informatik als Strukturtechnologie
Keller, H. B.
2014. Chancen und Risiken der Wagnisgesellschaft : Dokumentation der Veranstaltung am 15.Oktober 2014 in der Bundesanstalt für Materialforschung und -prüfung (BAM), 16–39, FORUM46 - Interdisziplinäres Forum für Europa e.V
Automated Modeling of I/O Performance and Interference Effects in Virtualized Storage Systems
Noorshams, Q.; Busch, A.; Rentschler, A.; Bruhn, D.; Kounev, S.; Tuma, P.; Reussner, R.
2014. IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW’14), Madrid, Spain, June 30 - July 3, 2014, 88–93, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW.2014.26
JKelloy: A Proof Assistant for Relational Specifications of Java Programs
El Ghazi, A. A.; Ulbrich, M.; Gladisch, C.; Tyszberowicz, S.; Taghdiri, M.
2014. NASA Formal Methods - 6th International Symposium (NFM’14), Houston, Texas/USA, April 29 - May 1, 2014. Ed.: J. M. Badger, 173–187, Springer US. doi:10.1007/978-3-319-06200-6_13
Standard versus Selective Opening Security: Separation and Equivalence Results
Hofheinz, D.; Rupp, A.
2014. Theory of Cryptography - 11th Theory of Cryptography Conference (TCC’14), San Diego, California/USA, February 24-26, 2014. Ed.: Y. Lindell, 591–615, Springer Verlag. doi:10.1007/978-3-642-54242-8_25
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
Hofheinz, D.; Striecks, C.
2014. Topics in Cryptology - The Cryptographer’s Track at the RSA Conference (CT-RSA’14), San Francisco, California/USA, February 25-28, 2014. Ed.: J. Benaloh, 48–63, Springer US. doi:10.1007/978-3-319-04852-9_3
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
Böhl, F.; Davies, G. T.; Hofheinz, D.
2014. Public-Key Cryptography - 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC’14), Buenos Aires, Argentina, March 26-28, 2014. Ed.: H. Krawczyk, 483–500, Springer Verlag. doi:10.1007/978-3-642-54631-0_28
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Herold, G.; Hesse, J.; Hofheinz, D.; Rafols, C.; Rupp, A.
2014. Advances in Cryptology - 34th Annual Cryptology Conference (CRYPTO’14), Santa Barbara, California/USA, August 17-21, 2014. Ed.: J. A. Garay, 261–279, Springer Verlag. doi:10.1007/978-3-662-44371-2_15
Universally Composable Non-Interactive Key Exchange
Freire, E. S. V.; Hesse, J.; Hofheinz, D.
2014. 9th International Conference on Security and Cryptography for Networks, SCN 2014; Amalfi; Italy; 3 September 2014 through 5 September 2014. Ed.: M. Abdalla, 1–20, Springer US. doi:10.1007/978-3-319-10879-7_1
Reasoning About Vote Counting Schemes Using Light-weight and Heavy-weight Methods
Beckert, B.; Bormer, T.; Gore, R.; Kirsten, M.; Meumann, T.
2014. 8th International Verification Workshop (VERIFY´14), Wien, Österreich, July 23-24, 2014
TAM-VS: A Technology Acceptance Model for Video Surveillance
Krempel, E.; Beyerer, J.
2014. Privacy Technologies and Policy - 2nd Annual Privacy Forum (APF’14), Athens, Greece, May 20-21, 2014. Ed.: B. Preneel, 86–100, Springer US. doi:10.1007/978-3-319-06749-0_6
Privacy-aware smart video surveillance revisited
Fischer, Y.; Krempel, E.; Birnstill, P.; Unmüßig, G.; Monari, E.; Moßgraber, J.; Schenk, M.; Beyerer, J.
2014. 9th Security Research Conference ’Future Security’, Berlin, September 16-18, 2014. Ed.: K. Thoma, 91–99, Fraunhofer Verlag
Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions
Köhler, J.; Jünemann, K.
2014. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013. [Konferenz]. Ed.: M. Hansen, 139–149, Springer Verlag
Zeitschriftenaufsätze
Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
A specious unlinking strategy
Friedl, S.; Nagel, M.; Powell, M.
2014. Periodica mathematica Hungarica, 69 (2), 207–210. doi:10.1007/s109980140063y
Überschussdaten in Retinabildern : Ein Beitrag zum datenschutzfreundlichen Entwurf biometrischer Systeme
Friedewald, M.; Wawrzyniak, S.; Pallas, F.
2014. Datenschutz und Datensicherheit - DuD, 2014 (7)
Datenschutz im "SmartHome"
Raabe, O.
2014. Recht der Datenverarbeitung, 2014 (5), 177–186
Steuerung im Datenschutzrecht: Ein Recht auf Vergessen wider Vollzugsdefizite und Typisierung
Spiecker genannt Döhmann, I.
2014. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 97 (1), 28–43. doi:10.5771/2193-7869-2014-1-28
Editorial: Big Brother unter der Motorhaube
Spiecker genannt Döhmann, I.
2014. Neue juristische Wochenschrift, 10, 1 S
Big Data intelligent genutzt: Rechtskonforme Videoüberwachung im öffentlichen Raum
Spiecker gen. Döhmann, I.
2014. Kommunikation & Recht, 17, 549–555
Anmerkung zu EuGH Rs. C-293/12 und C-594/12 – Vorratsdatenspeicherung
Spiecker genannt Döhmann, I.
2014. Juristenzeitung, 69, 1109–1113
Ich sehe ‘was, was Du nicht siehst - Rechtliche Probleme intelligenter Videoüberwachung
Spiecker genannt Döhmann, I.
2014. DGRI-Jahrbuch, 147–163
Precise Quantitative Information Flow Analysis – A Symbolic Approach
Klebanov, V.
2014. Theoretical computer science, 538 (C), 124–139. doi:10.1016/j.tcs.2014.04.022
Tagungsbericht DGRI Jahrestagung 2013
Haase, S.; Kring, M.; Pieper, F.
2014. Kommunikation & Recht, 2, 5
Energy Informatics - Current and Future Research Directions
Goebel, C.; Jacobsen, H.-A.; Razo, V. del; Doblander, C.; Rivera, J.; Ilg, J.; Flath, C.; Schmeck, H.; Weinhardt, C.; Pathmaperuma, D.; Appelrath, H.-J.; Sonnenschein, M.; Lehnhoff, S.; Kramer, O.; Staake, T.; Fleisch, E.; Neumann, D.; Strüker, J.; Erek, K.; Zarnekow, R.; Ziekow, H.; Lässig, J.
2014. Business & information systems engineering, 6 (1), 25–31. doi:10.1007/s12599-013-0304-2
Die Zukunft des europäischen Datenschutzes nach der Europawahl
Bretthauer, S.; Kring, M.
2014. Deutsches Verwaltungsblatt, 2014 (15), 977–978
A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks
Horneber, J.; Hergenröder, A.
2014. IEEE communications surveys & tutorials, 16 (4), 1820–1838. doi:10.1109/COMST.2014.2320051
Privacy-Preserving Cooperative Route Planning
Florian, M.; Finster, S.; Baumgart, I.
2014. IEEE Internet of Things Journal, 1 (6), 590–599. doi:10.1109/JIOT.2014.2361016
Checking probabilistic noninterference using JOANA
Snelting, G.; Giffhorn, D.; Graf, J.; Hammer, C.; Hecker, M.; Mohr, M.; Wasserab, D.
2014. Information technology, 56 (6), 280–287. doi:10.1515/itit-2014-1051
Reasoning and Verification: State of the Art and Current Trends
Beckert, B.; Hahnle, R.
2014. IEEE intelligent systems & their applications, 29 (1), 20–29. doi:10.1109/MIS.2014.3
How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers
Beckert, B.; Grebing, S.; Böhl, F.
2014. Electronic proceedings in theoretical computer science, 167, 4–13. doi:10.4204/EPTCS.167.3
Verifying voting schemes
Beckert, B.; Gore, R.; Schürmann, C.; Bormer, T.; Wang, J.
2014. Journal of information security and applications, 19 (2), 115–129. doi:10.1016/j.jisa.2014.04.005
Optimization of data life cycles
Jung, C.; Gasthuber, M.; Giesler, A.; Hardt, M.; Meyer, J.; Rigoll, F.; Schwarz, K.; Stotzka, R.; Streit, A.
2014. Journal of physics / Conference Series, 513 (TRACK 3), Art. Nr.: 032047. doi:10.1088/1742-6596/513/3/032047
SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service
Köhler, J.; Jünemann, K.; Hartenstein, H.
2014. Praxis der Informationsverarbeitung und Kommunikation, 37 (2), 149–155. doi:10.1515/pik-2014-0011
2013
Buchaufsätze
Mental Models: General Introduction and Review of Their Application to Human-Centred Security
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer Verlag. doi:10.1007/978-3-642-42001-6_18
Towards A Practical JCJ / Civitas Implementation
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference. doi:10.4018/978-1-4666-3640-8.ch011
The Difference between Online and Offline Communication as a Factor in the Balancing of Interests with Freedom of Speech
Döhmann, I. S. genannt
2013. Free Speech in the Internet Era. Ed.: C. Walker, 91–106, Carolina Academic Press
Kommentierung von §§ 1, 46, 63, 64 KrWAbfG
Spiecker genannt Döhmann, I.
2013. GK-KrWG : Gemeinschaftskommentar zum Kreislaufwirtschaftsgesetz (KrWG) sowie zur Verpackungsverordnung (VerpackV), zur Altfahrzeugverordnung (AltfahrzeugV), zum Elektro- und Elektronikgesetz (ElektroG), zum Batteriegesetz (BattG), Bioabfallverordnung (BioAbfV), zur Abfallverzeichnisverordnung (AVV) und zur EU-Abfallverbringungsverordnung (VVA). Hrsg. Arndt Schmehl, Carl Heymanns Verlag GmbH
Die Online-Durchsuchung als Instrument der Sicherheitsgewährleistung
Spiecker genannt Döhmann, I.
2013. Verfassungsstaatlichkeit im Wandel, Festschrift für Thomas Würtenberger zum 70. Geburtstag Hrsg.: D. Heckmann, 803–821, Duncker & Humblot
Datenschutz und Elektromobilität
Raabe, O.; Weis, E.; Pallas, F.; Lorenz, M.
2013. Berliner Handbuch zur Elektromobilität, 297–324, Verlag C.H.Beck
Programmiersprachen
Abke, J.; Braun, O.; Brune, P.; Hagel, G.; Keller, H.; Mottok, J.; Niemetz, M.; Pfeiffer, V.
2013. Perfekte Softwareentwicklung : Prozesse, Technologien und Methoden für erfolgreiche Softwareprojekte. Hrsg.: M. Lang, 247–294, Symposion Publishing
Diplomarbeiten
Entwurf einer BSI-Schutzprofil-konformen Smart Meter Gateway Softwarearchitektur. Diplomarbeit
Smirek, L. D.
2013. Karlsruher Institut für Technologie (KIT)
Evaluierung der Energie-effizienz von Schlüsselaustauschprotokollen in Concast-Szenarien. Diplomarbeit
Klock, T.
2013. Karlsruher Institut für Technologie (KIT)
Kommunikation in drahtlosen Sensornetzen - Vergleich zwischen Realität und Simulation. Diplomarbeit
Benisch, S.
2013. Karlsruher Institut für Technologie (KIT)
Masterarbeiten
Workload Characterization for I/O Performance Analysis on IBM SYSTEM Z. Masterarbeit
Busch, A.
2013. Karlsruher Institut für Technologie (KIT)
Impact of Erasure Coding Algorithms on the Availability of Federated Cloud Storage Systems. Masterarbeit
Wolf, P.
2013. Karlsruher Institut für Technologie (KIT)
Implementing Smart Meter SpeedDating. Masterarbeit
Beelmann, P.
2013
Bachelorarbeiten
Implementierung und Evaluierung eines Random-Key-Distribution Verfahren in WSNs. Bachelorarbeit
Zickner, V.
2013. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
On the Prediction of the Mutual Impact of Business Processes and Enterprise Information Systems
Heinrich, R.; Paech, B.
2013. Software Engineering 2013 : Fachtagung des GI-Fachbereichs Softwaretechnik; 26. Februar - 1. März 2013 in Aachen. Ed.: S. Kowalewski, 157–170, Gesellschaft für Informatik (GI)
Towards automated software project planning extending palladio for the simulation of software processes
Hummel, O.; Heinrich, R.
2013. KPDAYS 2013 : Symposium on Software Performance: Joint Kieker/Palladio Days 2013 ; Proceedings of the Symposium on Software Performance: Joint Kieker/Palladio Days 2013. Ed.: S. Becker; R. Reussner, 20–29
Model-driven Instrumentation with Kieker and Palladio to Forecast Dynamic Applications
Jung, R.; Heinrich, R.; Schmieders, E.
2013. Proceedings of the Symposium on Software Performance: Joint Kieker/Palladio Days 2013, Karlsruhe, Germany, November 27-29, 2013. Ed.: S. Becker ; R. Reussner, 99–108, CEUR-WS.org
An Architectural Model for Deploying Critical Infrastructure Services in the Cloud
Schöller, M.; Bless, R.; Pallas, F.; Horneber, J.; Smith, P.
2013. IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), 2013 : 2 - 5 December 2013, Bristol, United Kingdom. Vol. 1, 458–465, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.67
Branchenreport UX/Usability 2013
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V
Are Graphical Authentication Mechanisms As Strong As Passwords?
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, Institute of Electrical and Electronics Engineers (IEEE)
Modeling the German Legal Latitude Principles
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer Verlag
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEEXplore. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik (GI)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik (GI)
Mental Models of Verifiability in Voting
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer Verlag. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer Verlag. doi:10.1007/978-3-642-39185-9_4
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer Verlag. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer Verlag. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer Verlag. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security
Developing and Testing a Visual Hash Scheme
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft
P4R : Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
Rupp, A.; Hinterwälder, G.; Baldimtsi, F.; Paar, C.
2013. FC 2013 : 17th International Conference on Financial Cryptography and Data Security : Revised Selected Papers, Okinawa, Japan, 1st - 5th April 2013. Ed.: A.-R. Sadeghi, 205–212, Springer Verlag. doi:10.1007/978364239884117
Symbolic Universal Composability
Bohl, F.; Unruh, D.
2013. 2013 IEEE 26th Computer Security Foundations Symposium, CSF 2013; New Orleans, LA; United States; 26 June 2013 through 28 June 2013, 257–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2013.24
Die Durchsetzung datenschutzrechtlicher Mindestanforderungen bei Facebook und anderen sozialen Netzwerken
Spiecker genannt Döhmann, I.
2013. Der Schutz der Persönlichkeit im Internet ; [Vorträge, die während des 12. @kit-Kongresses, der zugleich das 2. Forum "Kommunikation & Recht" war und am 21./22. Juni 2012 in Hamburg unter dem Generalthema "Der Schutz der Persönlichkeit im Internet" stattfand, gehalten wurden]. Hrsg.: Stefan Leible, 33–54, Boorberg
Systemdienstleistungen und Elektromobilität im Verteilnetz : Rollen und Regulierung
Raabe, O.; Weis, E.; Ullmer, J.
2013. Informatik 2013: Informatik angepasst an Mensch, Organisation und Umwelt, Koblenz, Deutschland, 16. - 20. September 2013, 1485–1499, Köllen Druck+Verlag
Privacy Impact Assessment als besondere Form der Technikfolgenabschätzung
Pallas, F.; Rettke, A.
2013. 13. Österreichische Konferenz zur Technikfolgenabschätzung, Wien, 3. Juni 2013
Modeling Quality Attributes of Cloud-Standby-Systems : A Long-Term Cost and Availability Model
Pallas, F.; Lenk, A.
2013. ESOCC 2013 : Second European Conference on Service-Oriented and Cloud Computing, Málaga, Spain, 1st - 3rd September 2013. Ed.: K.-K. Lau, 49–63, Springer Verlag. doi:10.1007/978-3-642-40651-5_5
Structural Composition Attacks on Anonymized Data
Nilges, T.; Müller-Quade, J.; Huber, M.
2013. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien, 443–460, Ges. für Informatik
A Systematic Review of Model-Driven Security
Nguyen, P. H.; Klein, J.; Kramer, M. E.; Traon, Y. L.
2013. 20th Asia-Pacific Software Engineering Conference (APSEC 2013) : Bangkok, Thailand, 2 - 5 December 2013, [proceedings], 432–441, IEEE Computer Society. doi:10.1109/APSEC.2013.64
SAT-based Analysis and Quantification of Information Flow in Programs
Klebanov, V.; Manthey, N.; Muise, C.
2013. Quantitative Evaluation of Systems : 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013, Proceedings. Ed.: K. Joshi, 177–192, Springer Verlag. doi:10.1007/978-3-642-40196-1_16
Defining Privacy Based on Distributions of Privacy Breaches
Huber, M.; Müller-Quade, J.; Nilges, T.
2013. Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Ed.: M. Fischlin, 211–225, Springer Verlag. doi:10.1007/978-3-642-42001-6_15
Cumulus4j: A Provably Secure Database Abstraction Layer
Huber, M.; Gabel, M.; Schulze, M.; Bieber, A.
2013. Security engineering and intelligence informatics : proceedings / CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2 - 6, 2013. Ed.: A. Cuzzocrea, 180–193, Springer Verlag. doi:10.1007/978-3-642-40588-4_13
Energy-Efficient Security in Smart Metering Scenarios
Hergenröder, A.; Haas, C.
2013. IEEE 38th Conference on Local Computer Networks (LCN), Sydney, Australia, 21 Oct - 24 Oct 2013, 1–3, Institute of Electrical and Electronics Engineers (IEEE)
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs
Haynberg, R.; Rill, J.; Achenbach, D.; Jörn Müller-Quade
2013. 10th International Conference on Security and Cryptography (SECRYPT), Reykjavík, Iceland, 29 - 31 July, 2013 : [part of ICETE 2013, 10th International Joint Conference on e-Business and Telecommunications]. Ed.: P. Samarati, 403–410, SciTePress
Using JOANA for Information Flow Control in Java Programs – A Practical Guide
Graf, J.; Hecker, M.; Mohr, M.
2013. Software Engineering 2013 : Workshopband (inkl. Doktorandensymposium) : Fachtagung des GI-Fachbereichs Softwaretechnik , Aachen, 26.02. - 01.03.2013. Hrsg.: S. Wagner, 123–138, Ges. für Informatik
On the Detectability of Weak DoS Attacks in Wireless Sensor Networks
Dudek, D.
2013. Data Privacy Management and Autonomous Spontaneous Security : 7th International Workshop (DPM 2012) and 5th International Workshop (SETOP 2012) : Revised Selected Papers, Pisa, Italy, 13th - 14th September 2012. Ed.: R. Di Pietro, 243–257, Springer Verlag. doi:10.1007/978-3-642-35890-6_18
Datensicherheit in intelligenten Infrastrukturen
Bretthauer, S.; Bräuchle, T.
2013. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, 2104–2118, Ges. für Informatik
Enforcing privacy through usage-controlled video surveillance
Birnstill, P.; Pretschner, A.
2013. 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) : Krakow, Poland ; 27 - 30 Aug. 2013, 318–323, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2013.6636659
Usage-controlled Video Surveillance – Revealing its Potentials for Privacy
Birnstill, P.
2013. 8th future security : Security Research Conference, Berlin, September 17 - 19, 2013. Ed.: M. Lauster, 502–503, Fraunhofer Verlag
How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective
Bier, C.
2013. 4th International Workshop on Data Usage Management (DUMA) ; co-located with the IEEE Symposium on Security and Privacy (SP) - San Francisco, Calif., USA; 23 May 2013, 13–17, Institute of Electrical and Electronics Engineers (IEEE)
Analysing Vote Counting Algorithms Via Logic. And its Application to the CADE Election System
Beckert, B.; Goré, R.; Schürmann, C.
2013. Proceedings, 24th International Conference on Automated Deduction (CADE), Lake Placid, NY, USA Hrsg.: Maria Paola Bonacina, 135–144, Springer Verlag. doi:10.1007/978-3-642-38574-2_9
Non simplificate nubes! Ein rechtlicher Blick hinter die Kulissen informatischer Cloud-Forschung
Balaban, S.; Pallas, F.
2013. Law as a service (LaaS) : Recht im Internet- und Cloud-Zeitalter ; Tagungsband Herbstakademie / DSRI, Deutsche Stiftung für Recht und Informatik ; Oldenburg : 2013.09. Hrsg.: J. Taeger. Bd.: 1, 325–342, Oldenburger Verl. für Wirtschaft
Deduction soundness: prove one, get five for free
Böhl, F.; Cortier, V.; Warinschi, B.
2013. CCS ’13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany — November 04 - 08, 2013. Ed.: A.-R. Sadeghi, 1261–1272, Association for Computing Machinery (ACM). doi:10.1145/2508859.2516711
Compliance-preserving Cloud Storage Federation based on Data-driven Usage Control
Wüchner, T.; Müller, S.; Fischer, R.
2013. 2013 IEEE Fifth International Conference on Cloud Computing Technology and Science, Bristol, United Kingdom, 2-5 December 2013 (CloudCom 2013). Proceedings, 285–288, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.149
Web technologies and privacy policies for the Smart Grid
Speiser, S.; Wagner, A.; Raabe, O.; Harth, A.
2013. IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society : Austria Center Vienna, Vienna, Austria, 10 - 14 November, 2013. Proceedings, 4809–4814, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2013.6699913
Smart Grid-Ready Communication Protocols And Services For A Customer-Friendly Electromobility Experience
Mültin, M.; Gitte, C.; Schmeck, H.
2013. Informatik 2013 : 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz. [Konferenz]. Hrsg.: M. Horbach, 1470–1484, Gesellschaft für Informatik (GI)
Eine Bestandsaufnahme von Standardisierungspotentialen und -lücken im Cloud Computing
Fischer, R.; Janiesch, C.; Strach, J.; Bieber, N.; Zink, W.; Tai, S.
2013. Proceedings of the 11th International Conference on Wirtschaftsinformatik (WI2013), Feb 27 - Mar 01 2013 University Leipzig, Germany. Vol. 2. Hrsg. R. Alt, 1359–1373, Merkur
On the Specification and Verification of Voting Schemes
Beckert, B.; Gore, R.; Schürmann, C.
2013. E-Voting and Identify - 4th International Conference, Guildford, United Kingdom, July 17-19, 2013 - Proceedings. Ed.: J. Heather, 25–40, Springer Verlag. doi:10.1007/978-3-642-39185-9_2
Demo: Overdrive - An overlay-based geocast service for smart traffic applications
Florian, M.; Andreev, S.; Baumgart, I.
2013. 19th Annual International Conference on Mobile Computing & Networking (MobiCom’13), Miami, Florida/USA, September 30 - October 4, 2013, 147–150, Association for Computing Machinery (ACM). doi:10.1145/2500423.2505297
Evaluating energy-efficiency of hardware-based security mechanisms
Haas, C.; Munz, S.; Wilke, J.; Hergenroder, A.
2013. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’13), San Diego, California/USA, March 18-22, 2013, 560–565, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComW.2013.6529559
Overdrive an overlay-based geocast service for smart traffic applications
Heep, B.; Florian, M.; Volz, J.; Baumgart, I.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578313
Energy-efficiency of concast communication in Wireless Sensor Networks
Wilke, J.; Haas, C.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 34–38, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578318
Elderberry: A peer-to-peer, privacy-aware smart metering protocol
Finster, S.; Baumgart, I.
2013. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’13), Turin, Italy, April 14-19, 2013, 37–42, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2013.6562905
Pseudonymous Smart Metering without a Trusted Third Party
Finster, S.; Baumgart, I.
2013. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13), Melbourne, Australia, July 16-18, 2013, 1723–1728, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom.2013.234
Smart Meter Speed Dating, short-term relationships for improved privacy in Smart Metering
Finster, S.
2013. IEEE International Conference on Smart Grid Communications (SmartGridComm’13), Vancouver, Canada, October 21-24, 2013, 426–431, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2013.6687995
Evaluating the Energy-Efficiency of the Rich Uncle Key Exchange Protocol in WSNs
Haas, C.; Wilke, J.; Knittel, F.
2013. 38th Annual IEEE Conference on Local Computer Networks, LCN 2013; Sydney, NSW; Australia; 21 October 2013 through 24 October 2013, 336–339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN.2013.6761263
Privacy in Overlay-based Smart Traffic Systems
Florian, M.; Baumgart, I.
2013. IEEE Workshop on Privacy and Anonymity for the Digital Economy (PADE’13), Sydney, Australia, October 24, 2013, 912–917, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCNW.2013.6758531
Reuse and configuration for code generating architectural refinement transformations
Langhammer, M.; Lehrig, S.; Kramer, M. E.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 6, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489866
View-centric engineering with synchronized heterogeneous models
Kramer, M. E.; Burger, E.; Langhammer, M.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 5, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489864
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Token
Döttling, N.; Mie, T.; Müller-Quade, J.; Nilges, T.
2013. Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Ed.: A. Sahai, 642–661, Springer Verlag. doi:10.1007/978-3-642-36594-2_36
Lossy Codes and a New Variant of the Learning-With-Errors Problem
Döttling, N.; Müller-Quade, J.
2013. Advances in cryptology : proceedings, EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26 - 30, 2013. Ed.: Th. Johansson, 18–34, Springer Verlag. doi:10.1007/978-3-642-38348-9_2
Non-Interactive Key Exchange
Freire, E. S. V.; Hofheinz, D.; Kiltz, E.; Paterson, K. G.
2013. Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013 - Proceedings. Ed.: K. Kurosawa, 254–271, Springer Verlag. doi:10.1007/978-3-642-36362-7_17
Practical Signatures from Standard Assumptions
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Seo, J. H.; Striecks, C.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 461–485, Springer Verlag. doi:10.1007/978-3-642-38348-9_28
Circular Chosen-Ciphertext Security with Compact Ciphertexts
Hofheinz, D.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 520–536, Springer Verlag. doi:10.1007/978-3-642-38348-9_31
Programable Hash Functions in the Multilinear Setting
Freire, E. S. V.; Hofheinz, D.; Paterson, K. G.; Striecks, C.
2013. Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, California/USA, August 18-22, 2013 - Proceedings Part I. Ed.: R. Canetti, 513–530, Springer Verlag. doi:10.1007/978-3-642-40041-4_28
Privacy Preserving Surveillance and the Tracking-Paradox
Greiner, S.; Birnstill, P.; Krempel, E.; Beckert, B.; Beyerer, J.
2013. 8th Future Security - Security Research Conference, Berlin, September 17-19, 2013 - Proceedings. Ed.: M. Lauster, 296–302, Fraunhofer Verlag
Information Flow in Object-Oriented Software
Beckert, B.; Bruns, D.; Klebanov, V.; Scheben, C.; Schmitt, P. H.; Ulbrich, M.
2013. Logic-Based Program Synthesis and Transformation, LOPSTR 2013, Madrid, Spain, September 16-18, 2013 [Konferenz]. Ed.: G. Gupta, 15–32, Universidad
A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Graf, J.; Scheben, C.
2013. Grande Region Security and Reliability Day 2013. April 12, 2013, University of Luxembourg. Ed.: Ch. Hammer, Luxembourg
Dynamic Logic with Trace Semantics
Beckert, B.; Bruns, D.
2013. Automated Deduction - CADE-24 : 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013, Proceedings. Ed.: M.P. Bonacina, 315–329, Springer Verlag
Zeitschriftenaufsätze
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Smart Energy Systems
Schmeck, H.
2013. Information technology, 55 (2), 43–44. doi:10.1524/itit.2013.9002
Legal Aspects of Demand Side Management in Germany
Raabe, O.; Ullmer, J.
2013. Information technology, 55 (2), 63–69. doi:10.1524/itit.2013.0008
Sicherheit, Resilienz und rechtliche Herausforderungen in Bezug auf Cloud Computing und kritische Infrastruktur-IT
Pallas, F.; Tauber, M.; Wagner, C.
2013. Elektrotechnik und Informationstechnik, 130 (12), 33–36
Informationszugang im Recht der Europäischen Union
Bretthauer, S.
2013. Die öffentliche Verwaltung, 677–685
Haftung und Beweis bei geschachtelt komponierten Cloud-Services
Balaban, S.; Pallas, F.
2013. InTeR, 173 (4), 193–198
Cloud Standby System and Quality Model
Lenk, A.; Pallas, F.
2013. Journal of Cloud Computing, 1 (2), 48–59
Technische Sicherheit und Informationssicherheit
Freiling, F.; Grimm, R.; Großpietsch, K. E.; Keller, H. B.; Mottok, J.; Münch, I.; Rannenberg, K.; Saglietti, F.
2013. Informatik-Spektrum, 24, 343–353. doi:10.1007/s00287-013-0748-2
Polynomial Runtime and Composability
Hofheinz, D.; Unruh, D.; Müller-Quade, J.
2013. Journal of Cryptology, 26 (3), 375–441. doi:10.1007/s00145-012-9127-4
Practical Chosen Ciphertext Secure Encryption from Factoring
Hofheinz, D.; Kiltz, D.; Shoup, V.
2013. Journal of cryptology, 26 (1), 102–118. doi:10.1007/s00145-011-9115-0
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
Jager, T.; Schwenk, J.
2013. Journal of cryptology, 26 (2), 225–245. doi:10.1007/s00145-012-9120-y
2012
Buchaufsätze
C4PS - Helping Facebookers Manage Their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer Verlag. doi:10.1007/978-3-642-35386-4_15
Staatliche Informationen des Verbrauchers – Risiken und Nebenwirkungen
Spiecker gen. Döhmann, I.
2012. Jahrbuch der Juristischen Studiengesellschaft Bremen, 110–136, Bremen
Rechtliche Begleitung der Technikentwicklung im Bereich moderner Infrastrukturen und Informationstechnologien
Spiecker genannt Döhmann, I.
2012. Die Vermessung des virtuellen Raums. Hrsg.: H. Hill, 137–161, Nomos Verlagsgesellschaft
Beyond Gut Level – Some critical remarks on the German Privacy Approach to Smart Metering
Pallas, F.
2012. Computers, Privacy and Data Protection (CPDP). Hrsg.: Serge Gutwirth ..., 313–345, Springer Netherlands. doi:10.1007/978-94-007-5170-5_14
Dissertationen
Slicing of Concurrent Programs and its Application to Information Flow Control. Dissertation
Giffhorn, D.
2012. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000028814
Diplomarbeiten
Evaluierung der Energieeffizienz des Rich Uncle Protokolls. Diplomarbeit
Knittel, F.
2012. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
Developing a Process Quality Improvement Questionnaire – A Case Study on Writing Discharge Letters
Heinrich, R.; Paech, B.; Brandner, A.; Kutscha, U.; Bergh, B.
2012. Business Process Management Workshops : BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II. Ed.: F. Daniel, 261–272, Springer Verlag. doi:10.1007/978-3-642-28115-0_25
Answering a Request for Proposal – Challenges and Proposed Solutions
Paech, B.; Heinrich, R.; Zorn-Pauli, G.; Jung, A.; Tadjiky, S.
2012. Requirements Engineering: Foundation for Software Quality – 18th International Working Conference, REFSQ 2012, Essen, Germany, March 19-22, 2012. Proceedings. Ed.: B. Regnell, 16–29, Springer Verlag. doi:10.1007/978-3-642-28714-5_2
Formal Treatment of Distributed Trust in Electronic Voting
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA
Branchenreport Usability 2012
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA
C4PS - Helping Facebookers Manage their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer Verlag
The notary based PKI a lightweight PKI for long-term signatures on documents
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer Verlag
Towards the Systematic Development of Contextualized Security Interventions
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot
Partial Verifiability in POLYAS for the GI Elections
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik (GI)
Security versus Trust Indicators in 2011 in Germany
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer Verlag. doi:10.1007/978-3-642-32747-6_2
Introduction
Spiecker gen. Döhmann, I.
2012. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, Gesellschaft für Informatik (GI)
User-centric Protection and Privacy in Smart Surveillance Systems
Vagts, H.; Krempel, E.; Beyerer, J.
2012. 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4 - 6, 2012, 237–248, Springer Verlag. doi:10.1007/978-3-642-33161-9_36
Privacy-aware access control for video data in intelligent surveillance systems
Vagts, H.; Jakoby, A.
2012. Mobile multimedia/image processing, security, and applications 2012 : 23 - 24 April 2012, Baltimore, Maryland, United States ; [at SPIE Defense, Security + Sensing], SPIE. doi:10.1117/12.920623
Data Protection and Smart Grid Communication: The European Perspective
Pallas, F.
2012. IEEE PES Innovative Smart Grid Technologies, ISGT 2012, Washington, DC, United States, 16.1. - 20.1.2012, Art. Nr.: 6175695, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175695
Integration of electric vehicles in smart homes - an ICT-based solution for V2G scenarios
Multin, M.; Allerding, F.; Schmeck, H.
2012. IEEE PES innovative smart grid technologies (ISGT 2012) : [conference], Washington, DC, USA, 16 - 20 January 2012, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175624
A Framework for the Cryptographic Verification of Java-like Programs
Küsters, R.; Truderung, T.; Graf, J.
2012. IEEE 25th Computer Security Foundations Symposium (CSF), 2012, 198–212, IEEE Computer Society. doi:10.1109/CSF.2012.9
Precise Quantitative Information Flow Analysis Using Symbolic Model Counting
Klebanov, V.
2012. QASA 2012 International Workshop on Quantitative Aspects in Security Assurance Affiliated workshop with ESORICS Pisa, Italy - September 14, 2012. Hrsg.: F. Martinelli
Coercion-Resistant Electronic Elections with Write-In Candidates
Kempka, C.
2012. EVT/WOTE ’12 : 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012, Bellevue, WA, August 6 - 7, Advanced Computing Systems Association (USENIX)
Evaluating the Energy-Efficiency of Key Exchange Protocols in Wireless Sensor Networks
Haas, C.; Wilke, J.
2012. 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (PM2HW2N) , Paphos, Cyprus — October 21 - 22, 2012, 133–140, Association for Computing Machinery (ACM). doi:10.1145/2387191.2387210
Collaborative Detection of Traffic Anomalies Using First Order Markov Chains
Dudek, D.
2012. 2012 Ninth International Conference on Networked Sensing Systems (INSS) - Antwerp, Belgium ; 11 - 14 June 2012, 1–4, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INSS.2012.6240522
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem
Döttling, N.; Müller-Quade, J.; Nascimento, A. C. A.
2012. ASIACRYPT 2012: Advances in Cryptology - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2 - 6, 2012. Ed.: X. Wang, 485–503, Springer Verlag. doi:10.1007/978-3-642-34961-4_30
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
Bernardo Machado, D.; Anderson, C. A. N.; Müller-Quade, J.
2012. International Conference on Information Theoretic Security (ICITS) : Montreal, QC, Canada, 15-17 August 2012. Ed.: A. Smith, 80–99, Springer Verlag. doi:10.1007/978-3-642-32284-6_5
Common Privacy Patterns in Video Surveillance and Smart Energy
Bier, C.; Krempel, E.
2012. 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 3 - 5 Dec. 2012. Ed.: K. Kwack, 610–615, Institute of Electrical and Electronics Engineers (IEEE)
How is Positive-Sum Privacy Feasible?
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2012. Future Security : 7th Security Research Conference, Bonn, Germany, September 4-6, 2012. Ed.: N. Aschenbruck, 265–268, Springer Verlag. doi:10.1007/978-3-642-33161-9_39
Evaluating the Usability of Interactive Verification Systems
Beckert, B.; Grebing, S.
2012. 1st International Workshop on Comparative Empirical Evaluation of Reasoning Systems (COMPARE), Manchester, UK, June 30, 2012. Ed.: V. Klebanov, 3–17, RWTH Aachen
Mind the Gap: Formal Verification and the Common Criteria
Beckert, B.; Bruns, D.; Grebing, S.
2012. 6th International Verification Workshop – VERIFY-2010 - What are the verification problems? What are the deduction techniques? Edinburgh, Great Britain, July 20–21, 2010. Hrsg.: M. Aderhold, 4–12, EasyChair
Lessons Learned From Microkernel Verification: Specification is the New Bottleneck
Baumann, C.; Beckert, B.; Blasum, H.; Bormer, T.
2012. Seventh Conference on Systems Software Verification (SSV), Sydney, Australia, 28-30 November 2012. Ed.: F. Cassez, 18–32, NICTA
User interaction interface for Energy Management in Smart Homes
Becker, B.; Kellerer, A.; Schmeck, H.
2012. 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012; Washington, DC; United States; 16 January 2012 through 20 January 2012, Art. Nr.: 6175616, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175616
Electrical Load Management in Smart Homes Using Evolutionary Algorithms
Allerding, F.; Premm, M.; Shukla, P. K.; Schmeck, H.
2012. Evolutionary Computation in Combinatorial Optimization - 12th European Conference, EvoCOP 2012, Málaga, Spain, April 11-13, 2012 - Proceedings. Ed.: J.-K. Hao, 99–110, Springer Verlag. doi:10.1007/978-3-642-29124-1_9
Formal Semantics of Model Fields in Annotation-based Specifications
Beckert, B.; Bruns, D.
2012. KI 2012: advances in artificial intelligence : 35th Annual German Conference on AI, Saarbrücken, Germany, September 24-27, 2012. Ed.: B. Glimm, 13–24, Springer Verlag
On the security of TLS-DHE in the standard model
Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J.
2012. 32nd Annual International Cryptology Conference, CRYPTO 2012; Santa Barbara, CA; United States; 19 August 2012 through 23 August 2012. Ed.: R. Canetti, 273–293, Springer Verlag. doi:10.1007/978-3-642-32009-5_17
Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
Jager, T.; Schinzel, S.; Somorovsky, J.
2012. 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-12, 2012. Ed.: S. Foresti, 752–769, Springer Verlag. doi:10.1007/978-3-642-33167-1
Improving the usability of specification languages and methods for annotation-based verification
Beckert, B.; Bormer, T.; Klebanov, V.
2012. Proceeding FMCO’10 Proceedings of the 9th international conference on Formal Methods for Components and Objects, 61–79, Springer Verlag. doi:10.1007/978-3-642-25271-6_4
Integration of Bounded Model Checking and Deductive Verification
Beckert, B.; Bormer, T.; Merz, F.; Sinz, C.
2012. Formal Verification of Object-Oriented Software : international conference; revised selected papers, FoVeOOS 2011, Turin, Italy, October 5 - 7, 2011. Ed.: B. Beckert, 86–104, Springer Verlag. doi:10.1007/978-3-642-31762-0_7
Maintenance and Privacy in Unstructured GeoCast Overlays for Smart Traffic Applications
Heep, B.; Baumgart, I.
2012. Proceedings of the 4th International Conference on Ubiquitous and Future Networks (ICUFN 2012), Phuket, Thailand, Juli 2012, 286–287, IEEE Computer Society. doi:10.1109/ICUFN.2012.6261712
Extending the Palladio Component Model using Profiles and Stereotypes
Kramer, M. E.; Durdik, Z.; Hauck, M.; Henss, J.; Küster, M.; Merkle, P.; Rentschler, A.
2012. Palladio Days 2012. Proceedings, 8 - 9 November 2012, Universität Paderborn, Germany. Ed.: S. Becker, 7–15, Karlsruher Institut für Technologie (KIT)
Waters Signatures with Optimal Security Reduction
Hofheinz, D.; Jager, T.; Knapp, E.
2012. Public Key Cryptography -PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography Darmstadt, Germany, May 21-23, 2012. Proceedings. Ed.: M. Fischlin, 66–83, Springer Verlag. doi:10.1007/978-3-642-30057-8_5
All-But-Many Lossy Trapdoor Functions
Hofheinz, D.
2012. Advances in Cryptology -EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Cambridge, UK, April 15-19, 2012. Proceedings. Ed.: D. Pointcheval, 209–227, Springer Verlag. doi:10.1007/978-3-642-29011-4_14
Tightly Secure Signatures and Public-Key Encryption
Hofheinz, D.; Jager, T.
2012. Advances in Cryptology - CRYPTO 2012 32nd Annual Cryptology Conference Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Ed.: R. Safavi-Naini, 590–607, Springer Verlag. doi:10.1007/978-3-642-32009-5_35
On definitions of selective opening security
Böhl, F.; Hofheinz, D.; Kraschewski, D.
2012. 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012; Darmstadt; Germany; 21 May 2012 through 23 May 2012, 522–539, Springer Verlag. doi:10.1007/978-3-642-30057-8_31
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2012. 6th International Conference on Information Theoretic Security, ICITS 2012 Montreal, QC, Canada, August 15-17, 2012 Proceedings. Ed.: A. Smith, 111–128, Springer Verlag. doi:10.1007/978-3-642-32284-6_7
Bücher
Recht ex machina – Formalisierung des Rechts im Internet der Dienste
Raabe, O.; Wacker, R.; Oberle, D.; Baumann, C.; Funk, C.
2012. Springer Verlag
Zeitschriftenaufsätze
Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Legal Aspects of Service Robotics
Spiecker genannt Döhmann, I.; Dreier, T.
2012. Poiesis & praxis, 9 (3/4), 201–217. doi:10.1007/s10202-012-0115-4
Engineering Compliant Services: Advising Developers by Automating Legal Reasoning
Raabe, O.; Oberle, D.; Drefs, F.; Wacker, R.; Baumann, C.
2012. Script-ed, 9 (3), 280–313. doi:10.2966/scrip.090312.280
Model generation for quantified formulas with application to test data generation
Gladisch, C. D.
2012. International journal on software tools for technology transfer, 14 (4), 439–459. doi:10.1007/s10009-012-0227-0
Der Verwaltungsprozess und das erste deutsche Mediationsgesetz - Streit über den Weg der Streitschlichtung
Eisenbarth, M.; Döhmann, I. S. genannt
2012. Deutsches Verwaltungsblatt, 127 (16), 993–999
Oblivious Transfer Based on the McEliece Assumptions
Dowsley, R.; Graaf, J. van de; Müller-Quade, J.; Nascimento, A. C. A.
2012. IEICE transactions / E / A, E95.A (2), 567–575
A CCA2 Secure Variant of the McEliece Cryptosystem
Döttling, N.; Dowsley, R.; Jörn Müller-Quade; Anderson C. A. Nascimento
2012. IEEE transactions on information theory, 58 (10), 6672–6680. doi:10.1109/TIT.2012.2203582
Schutz der Forschungsfreiheit nach dem Informationsfreiheitsgesetz (IFG)
Bretthauer, S.
2012. Neue Zeitschrift für Verwaltungsrecht, 2012 (18), 1144–1148
Intelligente Videoüberwachung – Schreckensszenario oder Gewinn für den Datenschutz?
Bier, C.; Döhmann, I. S. genannt
2012. Computer und Recht, 28 (9), 610–619. doi:10.9785/ovs-cr-2012-610.
Eine formale Semantik für die Java Modeling Language
Bruns, D.
2012. Informatik-Spektrum, 35 (1), 45–49. doi:10.1007/s00287-011-0532-0
2011
Buchaufsätze
Online- und Offline-Nutzung von Daten: Einige Überlegungen zum Umgang mit Informationen im Internetzeitalter
Spiecker genannt Döhmann, I.
2011. Internet – Überholt die Wirklichkeit das Recht? Nürnberg, 07.10. – 09.10.2010, 39–54, Schmidt
Teil-Verfassungordnung Datenschutz
Spiecker genannt Döhmann, I.
2011. Der Eigenwert des Verfassungsrechts. Hrsg.: St. Korioth, 278–304, Mohr Siebeck
Prozessbezogener Datenschutz im Smart Grid
Raabe, O.
2011. Sicherheit und Datenschutz bei Smart Energy. Hrsg.: H. Thielmann; D. Klumpp; J. Eberspächer, 42 ff, Münchner Kreis
Proceedingsbeiträge
Tool Support for the Comprehensive Modeling of Quality Information within Business Process Models
Heinrich, R.; Kappe, A.; Paech, B.
2011. Enterprise Modelling and Information Systems Architectures : (EMISA 2011) ; Hamburg, Germany, September 22 - 23, 2011. Ed.: M. Nüttgens, 213–218, Gesellschaft für Informatik (GI)
Modeling quality information within business process models
Heinrich, R.; Kappe, A.; Paech, B.
2011. Proceedings of the 4th Workshop "Software Quality Modeling and Evaluation" (SQMB 2011) : Tagungsband des 4. Workshops "Software-Qualitätsmodellierung und –bewertung" (SQMB 2011). Ed.: S. Wagner, 4–13
Feasibility Analysis of Pret a Voter for German Federal Elections
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer Verlag. doi:10.1007/978-3-642-32747-6_10
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., Advanced Computing Systems Association (USENIX)
User Study of the Improved Helios Voting System Interface
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEEXplore. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, Association for Computing Machinery (ACM). doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität
A Formal Approach Towards Measuring Trust in Distributed Systems
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, Association for Computing Machinery (ACM). doi:10.1145/1982185.1982548
Die Vermessung der Welt als Problem des Datenschutzrechts – zum Umgang mit Geodaten im Internet
Spiecker genannt Döhmann, I.
2011. Perspektiven des deutschen, polnischen und europäischen Informationsrechts : Ergebnisse einer deutsch-polnischen Alexander von Humboldt-Institutspartnerschaft, 91–109, V&R unipress
Die Nutzung elektronischer Medien: REACh-Datenbanken, Veröffentlichung von Genehmigungsverfahren im Internet und Geodaten-Vermittlung wie Google Maps
Spiecker genannt Döhmann, I.
2011. Aktuelle Rechtsfragen und Probleme des freien Informationszugangs, insbesondere im Umweltschutz, 26. Trierer Kolloquium zum Umwelt- und Technikrecht vom 5. bis 7. September 2010. Hrsg.: R. Hendler, 155–186, Schmidt
Sicherheit in der Informationstechnik-Verantwortungsteilung zwischen Nutzern, Wirtschaft und Staat
Schallbruch, M.; Micklitz, S.; Kurz, C.; Steels, L.; Broy, M.; Dolev, D.; Weßel, C.; Meyer, K.; Zwingenberger, F.; Donges, M.; others
2011. Informatik 2011: Informatik schafft Communities, Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 4. - 7.10.2011 in Berlin, 39, Ges. für Informatik
Verlässliche Software fur kritische Infrastrukturen - Preface
Beckert, B.; Snelting, G.
2011. INFORMATIK 2011 Informatik schafft Communities – Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Berlin, Germany, 4. - 7.10.2011. Ed.: H.-U. Heiß Hrsg.: Hans-Ulrich Heiß; Peter Pepper; Holger Schlingloff; Jörg Schneider, 347, Ges. für Informatik
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions
Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings, 364–381, Springer Verlag. doi:10.1007/978-3-642-19571-6_22
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011. Extended full version in the IACR ePrint Archive, 164–181, Springer Verlag
Short Signatures from Weaker Assumptions
Hofheinz, D.; Jager, T.; Kiltz, E.
2011. Advances in Cryptology - ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security Seoul, South Korea, December 4-8, 2011., 647–666, Springer Verlag. doi:10.1007/978-3-642-25385-0_35
Efficient Reductions for Non-Signaling Cryptographic Primitives
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 5th International Conference on Information Theoretic Security, ICITS 2011; Amsterdam; Netherlands; 21 May 2011 through 24 May 2011. Ed.: S. Fehr, 120–137, Springer Verlag. doi:10.1007/978-3-642-20728-0_12
The 1st Verified Software Competition: Experience Report
Klebanov, V.; Müller, P.; Shankar, N.; Leavens, G. T.; Wüstholz, V.; Alkassar, E.; Arthan, R.; Bronish, D.; Chapman, R.; Cohen, E.
2011. FM 2011: Formal Methods 17th International Symposium on Formal Methods Limerick, Ireland, June 20-24, 2011 Proceedings. Ed.: M. Butler, 154–168, Springer Verlag. doi:10.1007/978-3-642-21437-0_14
Information flow analysis via path condition refinement
Taghdiri, M.; Snelting, G.; Sinz, C.
2011. Formal Aspects of Security and Trust 7th InternationalWorkshop, FAST 2010 Pisa, Italy, September 16-17, 2010. Ed.: P. Degano Revised Selected Papers, 65–79, Springer Verlag
User behavior prediction for energy management in smart homes
Bao, K.; Allerding, F.; Schmeck, H.
2011. Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC’11; Shanghai; China; 26 July 2011 through 28 July 201, 1335–1339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/FSKD.2011.6019758
Organic smart Home - Architecture for Energy Management in Intelligent Buildings
Allerding, F.; Schmeck, H.
2011. Workshop Organic Computing as part of ICAC, June 14-18, 2011, Karlsruhe, 67–76, Association for Computing Machinery (ACM). doi:10.1145/1998642.1998654
Zeitschriftenaufsätze
Vertrauensbildung bei Internetwahlen
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Gebrauchstaugliche Informationssicherheit
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Gebrauchstaugliche Nutzerauthentifizierung
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Bonsai Trees, or How to Delegate a Lattice Basis
Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C.
2011. Journal of cryptology, 25 (4), 601–639. doi:10.1007/s00145-011-9105-2
Die Entscheidung des Bundesverwaltungsgerichts vom 09.06.2010 -– Datei Gewalttäter Sport
Spiecker genannt Döhmann, I.; Kehr, T.
2011. Deutsches Verwaltungsblatt, 15, 930–936
Harmonisierung konträrer Kommunikationsmodelle im Datenschutzkonzept des EnWG – Stern trifft Kette
Raabe, O.; Lorenz, M.; Pallas, F.; Weis, E.
2011. Computer und Recht, 27 (12), 831–840. doi:10.9785/ovs-cr-2011-831
KASTEL - An Application-Driven Center of Excellence for IT Security
Müller-Quade, J.
2011. Information technology, 53 (5), 250–255. doi:10.1524/itit.2011.0650
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Dowsley, R.; Müller-Quade, J.; Otsuka, A.; Hanaoka, G.; Imai, H.; Nascimento, A. C. A.
2011. IEICE transactions / E / A, E94.A (2), 725–734. doi:10.1587/transfun.E94.A.725
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Döttling, N.; Mie, T.; Jörn Müller-Quade; Nilges, T.
2011. IACR Cryptology ePrint Archive, 2011, 1–32
Kommunikation als Herausforderung: Neue Wege im Datenschutz sozialer Netzwerke
Spiecker Döhmann, I.
2011. Anwaltsblatt, 61 (4), 256–259
Software Security in Virtualized Infrastructures - The Smart Meter Example
Beckert, B.; Hofheinz, D.; Müller-Quade, J.; Pretschner, A.; Snelting, G.
2011. it - Information Technology, 53 (3), 142–151. doi:10.1524/itit.2011.0636
Advanced chopping of sequential and concurrent programs
Giffhorn, D.
2011. Software Quality Journal, 19 (2), 239–294. doi:10.1007/s11219-010-9114-7
Service robotics: do you know your new companion? Framing an interdisciplinary technology assessment
Decker, M.; Dillmann, R.; Dreier, T.; Fischer, M.; Gutmann, M.; Ott, I.; Spiecker gen. Döhmann, I.
2011. Poiesis & praxis, 8 (1), 25–44. doi:10.1007/s10202-011-0098-6
2010
Buchaufsätze
A Process to Effectively Identify “Guilty” Performance Antipatterns
Cortellessa, V.; Martens, A.; Reussner, R.; Trubiani, C.
2010. Fundamental approaches to software engineering : 13th international conference, FASE 2010, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010 ; proceedings. Ed.: D. Rosenblum, 368–382, Springer Verlag. doi:10.1007/978-3-642-12029-9_26
Electronic Voting in Germany
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer Netherlands
Proceedingsbeiträge
Defining the Quality of Business Processes
Heinrich, R.; Paech, B.
2010. Modellierung 2010 : 24. - 26. März 2010, Klagenfurt, Österreich / [Fachtagung "Modellierung"]. Ed.: G. Engels, 133–148, Gesellschaft für Informatik (GI)
Using quality of service bounds for effective multi-objective software architecture optimization
Noorshams, Q.; Martens, A.; Reussner, R.
2010. Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems (QUASOSS ’10), Oslo, Norway, October 4, 2010, 1:1–1:6, Association for Computing Machinery (ACM). doi:10.1145/1858263.1858265
Automatically Improve Software Architecture Models for Performance, Reliability, and Cost Using Evolutionary Algorithms
Martens, A.; Koziolek, H.; Becker, S.; Reussner, R.
2010. WOSP/SIPEW’10 : proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering; January 28 - 30, 2010, San José, CA, USA, 105–116, Association for Computing Machinery (ACM). doi:10.1145/1712605.1712624
A Hybrid Approach for Multi-attribute QoS Optimisation in Component Based Software Systems
Martens, A.; Ardagna, D.; Koziolek, H.; Mirandola, R.; Reussner, R.
2010. Research into practice - reality and gaps : 6th International Conference on the Quality of Software Architectures, QoSA 2010, Prague, Czech Republic, June 23 - 25, 2010 ; proceedings. Ed.: G. T. Heineman, 84–101, Springer Verlag. doi:10.1007/978-3-642-13821-8_8
State dependence in performance evaluation of component-based software systems
Kapova, L.; Buhnova, B.; Martens, A.; Happe, J.; Reussner, R.
2010. First Joint WOSP/SIPEW International Conference on Performance Engineering San Jose California USA January 28 - 30, 2010. Ed.: A. Adamson, 37–48, ACM Digital Library. doi:10.1145/1712605.1712613
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft
An Evaluation and Certification Approach to Enable Voting Service Providers
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, Gesellschaft für Informatik (GI)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, Gesellschaft für Informatik (GI)
Verifiability in Electronic Voting - Explanations for Non Security Experts
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, Gesellschaft für Informatik (GI)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2010.106
Speeding up context-, object- and field-sensitive SDG generation
Graf, J.
2010. 10th IEEE International Working Conference on Source Code Analysis and Manipulation, Timisoara, Romania , September 12-13, 2010. Ed.: J. Vinju, 105–114, Institute of Electrical and Electronics Engineers (IEEE)
Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing
Wasserrab, D.; Lohner, D.
2010. 6th International Verification Workshop - VERIFY-2010, Edinburgh, July 20-21, 2010
Experiences with PDG-based IFC
Hammer, C.
2010. Engineering secure software and systems - second international symposium, ESSoS 2010, Pisa, Italy, February 3 - 4, 2010. Proceedings. Ed.: F. Massacci, 44–60, Springer Verlag
Gateway Decompositions for Constrained Reachability Problems
Katz, B.; Krug, M.; Lochbihler, A.; Rutter, I.; Snelting, G.; Wagner, D.
2010. Experimental Algorithms - 9th International Symposium, SEA 2010, Ischia Island, Naples, Italy, May 20-22, 2010. Proceedings. Ed.: P. Festa, 449–461, Springer Verlag
Zeitschriftenaufsätze
Using Genetic Search for Reverse Engineering of Parametric Behavior Models for Performance Prediction
Krogmann, K.; Kuperberg, M.; Reussner, R.
2010. IEEE transactions on software engineering, 36 (6), 865–877. doi:10.1109/TSE.2010.69
Evaluierungsverfahren für Internetwahlsysteme
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Information Flow Noninterference via Slicing
Wasserrab, D.
2010. The Archive of Formal Proofs, (3), 44 S
2009
Buchaufsätze
Developing a Legal Framework for Remote Electronic Voting
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer Verlag. doi:10.1007/978-3-642-04135-8_6
Proceedingsbeiträge
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, Association for Computing Machinery (ACM). doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik (GI)
Classifying Privacy and Verifiability Requirements for Electronic Voting
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen Druck+Verlag
Towards the impact of the operational environment on the security of e-voting
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik (GI)
Determine the Resilience of Evaluated Internet Voting Systems
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik (GI)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag
Specification of a Voting Service Provider
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.8
Zeitschriftenaufsätze
Verifizierbarkeit elektronischer Wahlen
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Polynomial runtime in simulatability definitions
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
2009. Journal of computer security, 17 (5), 703–735. doi:10.3233/JCS-2009-0354
Backing up Slicing : Verifying the Interprocedural Two-Phase Horwitz-Reps-Binkley Slicer
Wasserrab, D.
2009. The Archive of Formal Proofs, (11), 543 S
On Temporal Path Conditions in Dependence Graphs
Lochbihler, A.; Snelting, G.
2009. Automated Software Engineering, 16 (2), 263–290
Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs
Hammer, C.; Snelting, G.
2009. International journal of information security, 8 (6), 399–422
2008
Proceedingsbeiträge
Trust Models for Remote Electronic Voting
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik (GI)
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Development of a Formal IT-Security Model for Remote Electronic Voting Systems
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik (GI)
Precise Analysis of Java Programs using JOANA
Giffhorn, D.; Hammer, C.
2008. Proceedings of the 8th IEEE International Working Conference on Source Code Analysis and Manipulation. Ed.: S. Kawada, 267–268, IEEE Computer Society
2007
Proceedingsbeiträge
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges
Requirements and Evaluation Techniques for Online-Voting
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner
The Development of Remote E-Voting Around the World: A Review of Roads and Directions
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer Verlag
Compliance of RIES to the proposed e-voting protection profile
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer Verlag
Requirements and Evaluation Procedures for eVoting
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society. doi:10.1109/ARES.2007.124
Zeitschriftenaufsätze
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
2006
Proceedingsbeiträge
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, Gesellschaft für Informatik (GI)
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Overview Online-Wahlen
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec
Information Flow Analysis Based Security Checking of Health Service Composition Plans
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: H. Stormer, 59–70, Ges. für Informatik
Information Flow Control to Secure Dynamic Web Service Composition
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer Verlag. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, Gesellschaft für Informatik (GI)
Enabling the Application of Open Systems like PCs for Online Voting
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, Gesellschaft für Informatik (GI)
Multiple Cast in Online Voting - Analyzing Chances
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106, Ges. für Informatik
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, Institute of Electrical and Electronics Engineers (IEEE)
Zeitschriftenaufsätze
Die Online-Wahl auf dem Weg zum Durchbruch
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
2005
Proceedingsbeiträge
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg
Zeitschriftenaufsätze
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
2004
Proceedingsbeiträge
From Legal Principles to an Internet Voting System
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, Gesellschaft für Informatik (GI)