| 2009 |
16 | | Luca Compagna,
Ulrich Flegel,
Volkmar Lotz:
Towards Validating Security Protocol Deployment in the Wild.
COMPSAC (2) 2009: 434-438 |
| 2008 |
15 | | Luca Compagna,
Volkmar Lotz,
Fabio Massacci:
Preface.
Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008) |
14 | | Volkmar Lotz,
Emmanuel Pigout,
Peter M. Fischer,
Donald Kossmann,
Fabio Massacci,
Alexander Pretschner:
Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach.
Wirtschaftsinformatik 50(5): 383-391 (2008) |
| 2007 |
13 | | Volkmar Lotz,
Bhavani M. Thuraisingham:
SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, Proceedings
ACM 2007 |
12 | | Martin Wimmer,
Martina-Cezara Albutiu,
Alfons Kemper,
Maarten Rits,
Volkmar Lotz:
Efficient Access Control for Composite Applications.
BTW 2007: 613-616 |
11 | | Arnaud Dury,
Sergiy Boroday,
Alexandre Petrenko,
Volkmar Lotz:
Formal Verification of Business Workflows and Role Based Access Control Systems.
SECURWARE 2007: 201-210 |
| 2006 |
10 | | Martin Wimmer,
Alfons Kemper,
Maarten Rits,
Volkmar Lotz:
Consolidating the Access Control of Composite Applications and Workflows.
DBSec 2006: 44-59 |
9 | | Andreas Schaad,
Volkmar Lotz,
Karsten Sohr:
A model-checking approach to analysing organisational controls in a loan origination process.
SACMAT 2006: 139-149 |
| 2005 |
8 | | David von Oheimb,
Volkmar Lotz,
Georg Walter:
Analyzing SLE 88 memory management security using Interacting State Machines.
Int. J. Inf. Sec. 4(3): 155-171 (2005) |
| 2003 |
7 | | David von Oheimb,
Georg Walter,
Volkmar Lotz:
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment.
ESORICS 2003: 217-234 |
6 | | David von Oheimb,
Volkmar Lotz:
Generic Interacting State Machines and Their Instantiation with Dynamic Features.
ICFEM 2003: 144-166 |
| 2002 |
5 | | David von Oheimb,
Volkmar Lotz:
Formal Security Analysis with Interacting State Machines.
ESORICS 2002: 212-228 |
| 2000 |
4 | | Volkmar Lotz,
Volker Kessler,
Georg Walter:
A Formal Security Model for Microprocessor Hardware.
IEEE Trans. Software Eng. 26(8): 702-712 (2000) |
| 1999 |
3 | | Volkmar Lotz,
Volker Kessler,
Georg Walter:
A Formal Security Model for Microprocessor Hardware.
World Congress on Formal Methods 1999: 718-737 |
| 1997 |
2 | | Volkmar Lotz:
Threat Scenarios as a Means to Formally Develop Secure Systems.
Journal of Computer Security 5(1): 31-68 (1997) |
| 1996 |
1 | | Volkmar Lotz:
Threat Scenarios as a Means to Formally Develop Secure Systems.
ESORICS 1996: 242-265 |