| 2009 |
8 | | Lutz Lowis,
Rafael Accorsi:
On a Classification Approach for SOA Vulnerabilities.
COMPSAC (2) 2009: 439-444 |
7 | | Stefan Sackmann,
Lutz Lowis,
Kai Kittel:
A Risk Based Approach for Selecting Services in Business Process Execution.
Wirtschaftsinformatik (1) 2009: 357-366 |
| 2008 |
6 | | Stefan Sackmann,
Martin Kähmer,
Maike Gilliot,
Lutz Lowis:
A Classification Model for Automating Compliance.
CEC/EEE 2008: 79-86 |
5 | | Lutz Lowis:
Towards Automated Risk Identification in Service-Oriented Architectures.
Multikonferenz Wirtschaftsinformatik 2008 |
4 | | Lutz Lowis,
Sebastian Höhn,
Maike Gilliot:
Vulnerability Effect Propagation in Service-Oriented Archtectures.
Sicherheit 2008: 473-484 |
| 2007 |
3 | | Daniel Weiß,
Jörn Kaack,
Stefan Kirn,
Maike Gilliot,
Lutz Lowis,
Günter Müller,
Andrea Herrmann,
Carsten Binnig,
Timea Illes,
Barbara Paech,
Donald Kossmann:
Die SIKOSA-Methodik.
Wirtschaftsinformatik 49(3): 188-198 (2007) |
| 2005 |
2 | | Lutz Lowis,
Adolf Hohl:
Enabling Persistent Service Links.
CEC 2005: 301-306 |
1 | | Adolf Hohl,
Lutz Lowis,
Alf Zugenmaier:
Look Who's Talking - Authenticating Service Access Points.
SPC 2005: 151-162 |