Publications

Marius Schlegel, Peter Amthor. The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. In Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, pages 234–246, 2021.

Marius Schlegel, Peter Amthor. Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 431–442, 2020.

Peter Amthor, Marius Schlegel. Towards Language Support for Model-based Security Policy Engineering. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 513–521, 2020.

Peter Amthor, Martin Rabe. Command Dependencies in Heuristic Safety Analysis of Access Control Models. In Proceedings of the 12th International Symposium on Foundations & Practice of Security, FPS 2019, pages 207–224, 2020.

Peter Amthor, Daniel Fischer, Winfried E. Kühnhauser, Dirk Stelzer Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems Proc. 14th International Conference on Availability, Reliability and Security (ARES 2019), 2019, pp. 86:1–86:10.

Felix Wiemuth, Peter Amthor, Winfried E. Kühnhauser Static Termination Analysis for Event-driven Distributed Algorithms Proc. 13th International Conference on Distributed and Event-based Systems (DEBS 2019), 2019, pp. 151–162. Authors' Manuscript (PDF)

Peter Amthor Aspect-oriented Security Engineering (Dissertation) Cuvillier Verlag Göttingen, 2019.

Marius Schlegel Vortrag: Betriebssystemunterstützung für applikationsspezifische Sicherheitspolitiken Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.

Peter Amthor Vortrag: Modellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken(Abstract, Folien) Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.

Peter Amthor Efficient Heuristic Safety Analysis of Core-based Security Policies Proceedings of the 14th International Conference on Security and Cryptography (SECRYPT 2017), 2017, pp. 384–392.

Peter Amthor, Winfried E. Kühnhauser Privacy in sozialen Netzwerken: Eine Informationsflussanalyse Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 224–240.

Marius Schlegel Risikobasierte Metapolitiken für spontane Kooperationen Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 188–201.

Martin Rabe Betriebssystem-Sicherheitspolitiken formal analysieren Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 126–139.

Peter Amthor The Entity Labeling Pattern for Modeling Operating Systems Access Control M.S. Obaidat and P. Lorenz (Eds.): ICETE 2015, CCIS 585, pp. 270–292. Springer 2016. Accepted Author Manuscript (PDF)

Marius Schlegel Analyse und Simulation dynamischer RBAC-Zugriffssteuerungsmodelle Proc.D·A·CHSecurity 2015, syssec Verlag, 2015, pp. 110–121.

Peter Amthor A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux Proceedings of the 12th International Conference on Security and Cryptography (SECRYPT 2015), 2015, pp. 88-99.

Peter Amthor, Winfried E. Kühnhauser Security Policy Synthesis in Mobile Systems Proceedings of the IEEE SERVICES 2015 Visionary Track: Security and Privacy Engineering Theme, SPE '15. IEEE, 2015, pp. 189-197.

Dominik Reinhardt, Maximilian Günter, Markus Kucera, Thomas Waas, Winfried E. Kühnhauser Mapping CAN-to-Ethernet Communication Channels within Virtualized Enbedded Environments Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems (SIES 2015).

Dominik Reinhardt, Daniel Adam, Enno Lübbers, Rakshith Amarnath, Rolf Schneider, Simon Gansel, Stephan Schnitzer, Christian Herber, Timo Sandmann Embedded Virtualization Approaches for Ensuring Safety and Security within E/E Automotive Systems Embedded World Conference, 2015.

Dominik Reinhardt Ranking Software Components Using a Modified PageRank Algorithm Including Safety Aspects International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV), 2014, pp. 274-281.

Dominik Reinhardt, Gary Morgan An Embedded Hypervisor for Safety-Relevant Automotive E/E-Systems Industrial Embedded Systems (SIES), 2014 9th IEEE International Symposium on, pp. 189-198.

Peter Amthor, Winfried E. Kühnhauser, Anja Pölck WorSE: A Workbench for Model-based Security Engineering Computers & Security Journal, Vol. 42, pp. 40-55. Elsevier, 2014. Accepted Author Manuscript (PDF)

Peter Amthor, Winfried E. Kühnhauser, Anja Pölck Heuristic Safety Analysis of Access Control Models Proc. 18th ACM Symposium on Access Control Models and Technologies (SACMAT 2013), pages 137-147.

Peter Amthor, Winfried E. Kühnhauser Leichtgewichtige Sicherheitsdomänen für spontane Kooperationen D-A-CH Security 2013, syssec Verlag, 2013, pages 260-274.

Dominik Reinhardt, Marcus Kucera Domain Controlled Architecture - A New Approach for Large Scale Software Integrated Automotive Systems Proc. International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2013), pages 221-226.

Dominik Reinhardt, Dirk Kaule, Marcus Kucera Achieving a Scalable E/E-Architecture using AUTOSAR and Virtualization SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 489-497.

Wolfgang Schwitzer, Rolf Schneider, Dominik Reinhardt, Georg Hofstetter Tackling the Complexity of Timing-relevant Deployment Decisions in Multicore-based Embedded Automotive Software Systems SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 478-488.

Winfried E. Kühnhauser, Anja Pölck Towards Access Control Model Engineering Proc. 7th International Conference on Information Systems Security (ICISS 2011). In: Information Systems Security, LNCS 7093, Springer 2011, pages 379-382.

Peter Amthor, Winfried E. Kühnhauser, Anja Pölck Model-based Safety Analysis of SELinux Security Policies Proc. 5th International Conference on Network and System Security (NSS 2011), pages 208-215.

Anja Fischer, Winfried E. Kühnhauser Komposition von SELinux-Sicherheitspolitiken D-A-CH Security 2010, syssec Verlag, 2010, pages 268-280.

Anja Fischer, Winfried E. Kühnhauser Efficient Algorithmic Safety Analysis of HRU Security Models Proc. International Conference on Security and Cryptography (SECRYPT 2010), pages 49-58.

Peter Amthor, Anja Fischer, Winfried E. Kühnhauser Analyse von Zugriffssteuerungssystemen D-A-CH Security 2009, syssec Verlag, 2009, pages 49-61. ISBN 978-3-00-027488-6.

Stefan Bode, Anja Fischer, Winfried E. Kühnhauser, Matthias Riebisch Software Architectural Design Meets Security Engineering 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), San Francisco, April 2009.

Anja Fischer, Winfried E. Kühnhauser Integration von Sicherheitsmodellen in Web Services D-A-CH Security 2008, syssec Verlag, 2008, pages 305-316. ISBN 978-3-00-024632-6.

Alexander Eichhorn Efficient Dependency Tracking in Packetised Media Streams International Workshop on Multimedia Signal Processing (MMSP'07), Chania, Crete, Greece, October 2007.

Winfried E. Kühnhauser, Martin Süßkraut A Time Model for Distributed Multimedia Applications 8th International Conference on Distributed Computing and Networking (ICDCN 2006). LNCS 4308, pages 491-496, Dec. 2006.

Alexander Eichhorn Modelling Dependency in Multimedia Streams 14th annual ACM International Conference on Multimedia, pages 941-950. 2006.

Martin Hoffmann, Winfried E. Kühnhauser Towards a Structure-Aware Failure Semantics for Streaming Media Communication Models. Journal of Parallel and Distributed Computing, Vol. 65, No. 9, pages 1047-1056. Elsevier, 2005.

Winfried E. Kühnhauser, Gabriel Welsche Sicherheitsmodelle für computergestützte Teamarbeit. D-A-CH Security 2005, syssec Verlag, 2005, pages 237-249. ISBN 3-00-015548-1.

Alexander Senier Automatisierte Evaluation von Firewalls. D-A-CH Security 2005, syssec Verlag, 2005, pages 154-162. ISBN 3-00-015548-1.

Hans-Albrecht Schindler Resource Management in Distributed Multimedia Environments. Proc. 49. Internationales Wissenschaftliches Kolloquium (IWK 2004), Ilmenau,Vol. 2, pages 303-308. Shaker, 2004. ISBN 3-8322-2824-1.

Winfried E. Kühnhauser Root Kits - An Operating Systems Viewpoint ACM SIGOPS Operating Systems Review, Vol. 38, No. 1, pages 12-23, January 2004.

Winfried E. Kühnhauser, Martin Süßkraut Zur Rolle der Zeit in verteilten multimedialen Systemen Proceedings of the 9th Workshop on Multimedia Information and Communication Systems (MIK2003), September 2003.

Winfried E. Kühnhauser Root Kits Datenschutz und Datensicherheit, Vol 27, No 44, April 2003, pages 218-222. Vieweg Verlag.

Winfried E. Kühnhauser, Thorsten Pomierski Sicherheitskonzept einer universitären Prüfungsverwaltung Patrick Horster (ed): D-A-CH Security. Proceedings of the 2003 D-A-CH Security Conference, pages 354-365. IT Verlag, 2003. ISBN 3-00-010941-2.

Alexander Eichhorn, Winfried E. Kühnhauser Datenströme in multimedialen Systemen - Merkmale und Auswirkungen - Proceedings of the 8th Workshop on Multimedia Information and Communication Systems (MIK2002), October 2002.

Alexander Eichhorn, Winfried E. Kühnhauser A Component-based Architecture for Streaming Media Proceedings of the 7th Workshop on Multimedia Information and Communication Systems (MIK2001), September 2001.

Gregor Gärtner, Winfried E. Kühnhauser Vertrauensbasierte Sicherheit mobiler Objekte Patrick Horster (Hrsg.): Kommunikationssicherheit. Vieweg Verlag, März 2001. ISBN 3-528-05763-7.

Winfried E. Kühnhauser Metapolitiken (Abstract, in English and German) (Book, 1.3mbyte, in German) GMD Research Series No. 13, 1999. ISBN 3-88457-362-4.

Winfried E. Kühnhauser Policy Groups Computers & Security Journal, Vol. 18, No. 4, pp. 351-363. Elsevier 1999.

Udo Halfmann, Winfried E. Kühnhauser Embedding Security Policies into a Distributed Computing Environment ACM SIGOPS Operating Systems Review, Vol. 33, No. 2, pp. 51-64 (April 1999).

Winfried E. Kühnhauser A Comment on S. Kang's and H. Lee's paper on "Analysis and Solution of Non-Preemptive Policies for Scheduling Readers and Writers" ACM SIGOPS Operating Systems Review, Vol. 33, No. 2 (April 1999).

Winfried E. Kühnhauser A Classification of Interdomain Actions ACM SIGOPS Operating Systems Review, Vol. 32, No. 4, pp. 47-61 (October 1998).

Ciaran Bryce, Winfried E. Kühnhauser An Approach to Security for World-Wide Applications IFIP Conference on Communications and Multimedia Security, Athens 1997. Chapman & Hall, 1997.

Ciaran Bryce, Winfried E. Kühnhauser, Remy Amouroux, Mauricio Lopez, Harry Rudnik CWASAR: A European Infrastructure for Secure Electronic Commerce Journal Of Computer Security, Vol. 5, No. 3, pp. 225-235. IOS Press, 1997.

Winfried E. Kühnhauser Sicherheitsaspekte einer europäischen Kommunikationsinfrastruktur für mittelständische Unternehmen In: Softwaretechnik für Kommunikationssysteme, VDI FortschrittberichteReihe 10, Nr. 439, pp. 121-130, 1996. ISBN 3-18-343910-7.

Winfried E. Kühnhauser, Jochen Liedtke Sicherheit in Betriebssystemen German National Research Center for Computer Science (GMD), Technical Report 959, 1995. ISSN 0723-ß508.

Winfried E. Kühnhauser A Paradigm For User-Defined Security Policies 14th IEEE Symposium On Reliable Distributed Systems, Bad Neuenahr. IEEE 1995.

Winfried E. Kühnhauser On Paradigms for User-Defined Security Policies In Multipolicy Environments 11th IFIP International Information Security Conference, Cape Town 1995.

Winfried E. Kühnhauser, Michael von Kopp Ostrowski A Framework To Support Multiple Security Policies 7th Canadian Computer Security Symposium, Ottawa 1995.

Winfried E. Kühnhauser Confidence Domains For Distributed Systems 6th Canadian Computer Security Symposium, Ottawa 1994.

Susann Sonntag, Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser, Wolfgang Lux Adaptability Using Reflection Hawaii International Conference on System Sciences, 1994.

Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser The BirliX Security Architecture Journal Of Computer Security, Vol. 2, No. 1. IOS Press, 1993.