Publications

  1. Peter Amthor and René Gorges. A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks. To appear in Proceedings of the 21th International Conference on Security and Cryptography, SECRYPT 2024. INSTICC, 13 pages, SciTePress, 2024.
  2. Bochra Boughzala and Boris Koldehofe. In-Network Management of Parallel Data Streams over Programmable Data Planes. To appear in Proceedings of the 2024 IFIP Networking Conference, 9 pages, 2024. IFIP.
  3. Saad Saleh, Sunny Shu, and Boris Koldehofe. dAQM: Derivative-based Active Queue Management. To appear in Proceedings of the 2024 IFIP Networking Conference, 9 pages, 2024. IFIP.
  4. Ahmad Khalil, Majid Lotfian Delouee, Victoria Degeler, Tobias Meuser, Antonio Fernández Anta, Boris Koldehofe. Driving Towards Efficiency: Adaptive Resource-Aware Clustered Federated Learning in Vehicular Networks. To appear in Proceedings of the Mediterranean Communication and Computer Networking Conference (MedComNet),  2024, IEEE.
  5. Pratyush Agnihotri, Boris Koldehofe, Paul Stiegele, Roman Heinrich, Carsten Binnig, Manisha Luthra. ZeroTune: Learned Zero-Shot Cost Model for Parallelism Tuning in Stream Processing. To Appear in Proceedings of the IEEE 40th International Conference on Data Engineering (ICDE 2024), IEEE, 2024.
  6. Saad Saleh, Anouk S. Goossens, Sunny Shu, Tamalika Banerjee and Boris Koldehofe. Analog In-Network Computing through Memristor-based Match-Compute Processing. To appear in Proceedings of the 43rd IEEE International Conference on Computer Communications, (INFOCOM 2024), IEEE, 2024. [PDF]
  7. Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, and Boris Koldehofe. APP-CEP: Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems. To appear in Proceedings of the 10th International Conference on Information Systems Security and Privacy (ICISSP’24), 12 pages, SCITEPRESS.
  8. Chengbo Zhou, Christoph Gärtner, Amr Rizk, Boris Koldehofe, Björn Scheuermann and Ralf Kundel. RDA: Residence Delay Aggregation for Time-Sensitive Networking. To appear in Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2024), 5 pages, IEEE.
  9. Saad Saleh, Sunny Shu, and Boris Koldehofe. Adaptive In-Network Queue Management using Derivatives of Sojourn Time and Buffer Size. To appear in Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2024), 6 pages, IEEE. [PDF]
  10. Saad Saleh and Boris Koldehofe. Memristor-based Network Switching Architecture for Energy Efficient Cognitive Computational Models. In Proceedings of the 18th ACM International Symposium on Nanoscale Architectures (NANOARCH 2023), ACM press, 4 pages, 2023. [PDF]
  11. Saad Saleh and Boris Koldehofe. The Future is Analog: Energy-Efficient Cognitive Network Functions over Memristor-Based Analog Computations. In Proceedings of The 22nd ACM Workshop on Hot Topics in Networks (HotNets 2023), page 9 pages. ACM, 2023. In Press. [ bib | DOI | PDF]
  12. Christoph Gärtner, Amr Rizk, Boris Koldehofe, René Guillaume, Ralf Kundel, and Ralf Steinmetz. Demo: Flexibility-aware network management of time-sensitive flows. In Proceedings of the ACM SIGCOMM 2023 Conference, pages 1176--1178, 2023. [ bib | DOI | http ]
  13. Peter Amthor, Ulf Döring, Daniel Fischer, Jonas Genath, Gunther Kreuzberger. Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung. In Proceedings of the Sixth Workshop "Automatische Bewertung von Programmieraufgaben" (ABP 2023), 2023. [doi]
  14. Majid Lotfian Delouee, Boris Koldehofe, and Viktoriya Degeler. AQuA-CEP: Adaptive quality-aware complex event processing in the internet of things. In Proceedings of the 17th ACM International Conference on Distributed and Event-Based Systems, pages 13--24. ACM press, 2023. in press. [ bib | DOI ]
  15. Majid Lotfian Delouee, Boris Koldehofe, and Viktoriya Degeler. Towards pattern-level privacy protection in distributed complex event processing. In Proceedings of the 17th ACM International Conference on Distributed and Event-Based Systems, pages 185--186. ACM press, 2023. In press. [ bib | DOI ]
  16. Pratyush Agnihotri, Boris Koldehofe, Carsten Binnig, and Manisha Luthra. Zero-shot cost models for parallel stream processing. In Proceedings of the Sixth International Workshop on Exploiting Artificial Intelligence Techniques for Data Management (aiDM 2023), pages 5:1--5:5. ACM press, 2023. [ bib | DOI ]
  17. He Gu, Thomas Plagemann, Maik Benndorf, Vera Goebel, and Boris Koldehofe. Differential privacy for protecting private patterns in data streams. In Proceedings of the 1st International Workshop on Private, Secure, and Trustworthy IoT Data Management (ASTRIDE 2023), 2023. [ bib ]
  18. Christoph Gärtner, Amr Rizk, Boris Koldehofe, René Guillaume, Ralf Kundel, and Ralf Steinmetz. Fast incremental reconfiguration of dynamic time-sensitive networks at runtime.Computer Networks, 224:13 pages, 2023. [ bib | DOI ]
  19. Marius Schlegel, Peter Amthor. Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies. In Communications in Computer and Information Science (CCIS) 1795, E-Business and Telecommunications, pages 249–280. Springer Nature Switzerland, Cham, 2023. [doi]
  20. Marius Schlegel, Peter Amthor. The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. In Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, pages 234–246, 2021. [doi]
  21. Marius Schlegel, Peter Amthor. Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 431–442, 2020. [doi]
  22. Peter Amthor, Marius Schlegel. Towards Language Support for Model-based Security Policy Engineering. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 513–521, 2020.
  23. Peter Amthor, Martin Rabe. Command Dependencies in Heuristic Safety Analysis of Access Control Models. In Proceedings of the 12th International Symposium on Foundations & Practice of Security, FPS 2019, pages 207–224, 2020.
  24. Felix Wiemuth, Peter Amthor, Winfried E. Kühnhauser. Static Termination Analysis for Event-driven Distributed Algorithms. Proc. 13th International Conference on Distributed and Event-based Systems (DEBS 2019), 2019, pp. 151–162. Authors' Manuscript (PDF)
  25. Peter Amthor. Aspect-oriented Security Engineering (Dissertation)
    Cuvillier Verlag Göttingen, 2019.
  26. Marius Schlegel. Vortrag: Betriebssystemunterstützung für applikationsspezifische Sicherheitspolitiken. Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.
  27. Peter Amthor. Vortrag: Modellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken (Abstract, Folien). Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.
  28. Peter Amthor. Efficient Heuristic Safety Analysis of Core-based Security Policies. Proceedings of the 14th International Conference on Security and Cryptography (SECRYPT 2017), 2017, pp. 384–392.
  29. Peter Amthor, Winfried E. Kühnhauser. Privacy in sozialen Netzwerken: Eine Informationsflussanalyse. Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 224–240.
  30. Marius Schlegel. Risikobasierte Metapolitiken für spontane Kooperationen. Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 188–201.
  31. Martin Rabe. Betriebssystem-Sicherheitspolitiken formal analysieren. Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 126–139.
  32. Peter Amthor. The Entity Labeling Pattern for Modeling Operating Systems Access Control. M.S. Obaidat and P. Lorenz (Eds.): ICETE 2015, CCIS 585, pp. 270–292. Springer 2016. Accepted Author Manuscript (PDF)
  33. Marius Schlegel.Analyse und Simulation dynamischer RBAC-Zugriffssteuerungsmodelle. Proc. D·A·CH Security 2015, syssec Verlag, 2015, pp. 110–121.
  34. Peter Amthor. A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. Proceedings of the 12th International Conference on Security and Cryptography (SECRYPT 2015), 2015, pp. 88-99.
  35. Peter Amthor, Winfried E. Kühnhauser. Security Policy Synthesis in Mobile Systems. Proceedings of the IEEE SERVICES 2015 Visionary Track: Security and Privacy Engineering Theme, SPE '15. IEEE, 2015, pp. 189-197.
  36. Dominik Reinhardt, Maximilian Günter, Markus Kucera, Thomas Waas, Winfried E. Kühnhauser. Mapping CAN-to-Ethernet Communication Channels within Virtualized Enbedded Environments. Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems (SIES 2015).
  37. Dominik Reinhardt, Daniel Adam, Enno Lübbers, Rakshith Amarnath, Rolf Schneider, Simon Gansel, Stephan Schnitzer, Christian Herber, Timo Sandmann. Embedded Virtualization Approaches for Ensuring Safety and Security within E/E Automotive Systems. Embedded World Conference, 2015.
  38. Dominik Reinhardt. Ranking Software Components Using a Modified PageRank Algorithm Including Safety Aspects. International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV), 2014, pp. 274-281.
  39. Dominik Reinhardt, Gary Morgan. An Embedded Hypervisor for Safety-Relevant Automotive E/E-Systems. Industrial Embedded Systems (SIES), 2014 9th IEEE International Symposium on, pp. 189-198. 
  40. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck. WorSE: A Workbench for Model-based Security Engineering.Computers & Security Journal, Vol. 42, pp. 40-55. Elsevier, 2014. Accepted Author Manuscript (PDF)
  41. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck. Heuristic Safety Analysis of Access Control Models. Proc. 18th ACM Symposium on Access Control Models and Technologies (SACMAT 2013), pages 137-147.
  42. Peter Amthor, Winfried E. Kühnhauser. Leichtgewichtige Sicherheitsdomänen für spontane Kooperationen. D-A-CH Security 2013, syssec Verlag, 2013, pages 260-274.
  43. Dominik Reinhardt, Marcus Kucera. Domain Controlled Architecture - A New Approach for Large Scale Software Integrated Automotive Systems. Proc. International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2013), pages 221-226.
  44. Dominik Reinhardt, Dirk Kaule, Marcus Kucera. Achieving a Scalable E/E-Architecture using AUTOSAR and Virtualization. SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 489-497.
  45. Wolfgang Schwitzer, Rolf Schneider, Dominik Reinhardt, Georg Hofstetter. Tackling the Complexity of Timing-relevant Deployment Decisions in Multicore-based Embedded Automotive Software Systems. SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 478-488.
  46. Winfried E. Kühnhauser, Anja Pölck. Towards Access Control Model Engineering. Proc. 7th International Conference on Information Systems Security (ICISS 2011). In: Information Systems Security, LNCS 7093, Springer 2011, pages 379-382.
  47. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck. Model-based Safety Analysis of SELinux Security Policies. Proc. 5th International Conference on Network and System Security (NSS 2011), pages 208-215.
  48. Anja Fischer, Winfried E. Kühnhauser. Komposition von SELinux-Sicherheitspolitiken. D-A-CH Security 2010, syssec Verlag, 2010, pages 268-280. 
  49. Anja Fischer, Winfried E. Kühnhauser. Efficient Algorithmic Safety Analysis of HRU Security Models. Proc. International Conference on Security and Cryptography (SECRYPT 2010), pages 49-58. 
  50. Peter Amthor, Anja Fischer, Winfried E. Kühnhauser. Analyse von Zugriffssteuerungssystemen. D-A-CH Security 2009, syssec Verlag, 2009, pages 49-61. ISBN 978-3-00-027488-6. 
  51. Stefan Bode, Anja Fischer, Winfried E. Kühnhauser, Matthias Riebisch. Software Architectural Design Meets Security Engineering. 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), San Francisco, April 2009.
  52. Anja Fischer, Winfried E. Kühnhauser. Integration von Sicherheitsmodellen in Web Services. D-A-CH Security 2008, syssec Verlag, 2008, pages 305-316. ISBN 978-3-00-024632-6. 
  53. Alexander Eichhorn. Efficient Dependency Tracking in Packetised Media Streams. International Workshop on Multimedia Signal Processing (MMSP'07), Chania, Crete, Greece, October 2007. 
  54. Winfried E. Kühnhauser, Martin Süßkraut. A Time Model for Distributed Multimedia Applications. 8th International Conference on Distributed Computing and Networking (ICDCN 2006). LNCS 4308, pages 491-496, Dec. 2006. 
  55. Alexander Eichhorn. Modelling Dependency in Multimedia Streams. 14th annual ACM International Conference on Multimedia, pages 941-950. 2006. 
  56. Martin Hoffmann, Winfried E. Kühnhauser. Towards a Structure-Aware Failure Semantics for Streaming Media Communication Models. Journal of Parallel and Distributed Computing, Vol. 65, No. 9, pages 1047-1056. Elsevier, 2005.
  57. Winfried E. Kühnhauser, Gabriel Welsche. Sicherheitsmodelle für computergestützte Teamarbeit. D-A-CH Security 2005, syssec Verlag, 2005, pages 237-249. ISBN 3-00-015548-1. 
  58. Alexander Senier. Automatisierte Evaluation von Firewalls. D-A-CH Security 2005, syssec Verlag, 2005, pages 154-162. ISBN 3-00-015548-1. 
  59. Hans-Albrecht Schindler. Resource Management in Distributed Multimedia Environments. Proc. 49. Internationales Wissenschaftliches Kolloquium (IWK 2004), Ilmenau,Vol. 2, pages 303-308. Shaker, 2004. ISBN 3-8322-2824-1. 
  60. Winfried E. Kühnhauser. Root Kits - An Operating Systems Viewpoint. ACM SIGOPS Operating Systems Review, Vol. 38, No. 1, pages 12-23, January 2004. 
  61. Winfried E. Kühnhauser, Martin Süßkraut. Zur Rolle der Zeit in verteilten multimedialen Systemen. Proceedings of the 9th Workshop on Multimedia Information and Communication Systems (MIK2003), September 2003. 
  62. Winfried E. Kühnhauser. Root Kits. Datenschutz und Datensicherheit, Vol 27, No 44, April 2003, pages 218-222. Vieweg Verlag.
  63. Winfried E. Kühnhauser, Thorsten Pomierski. Sicherheitskonzept einer universitären Prüfungsverwaltung. Patrick Horster (ed): D-A-CH Security. Proceedings of the 2003 D-A-CH Security Conference, pages 354-365. IT Verlag, 2003. ISBN 3-00-010941-2. 
  64. Alexander Eichhorn, Winfried E. Kühnhauser. Datenströme in multimedialen Systemen - Merkmale und Auswirkungen -. Proceedings of the 8th Workshop on Multimedia Information and Communication Systems (MIK2002), October 2002. 
  65. Alexander Eichhorn, Winfried E. Kühnhauser. A Component-based Architecture for Streaming Media. Proceedings of the 7th Workshop on Multimedia Information and Communication Systems (MIK2001), September 2001. 
  66. Gregor Gärtner, Winfried E. Kühnhauser. Vertrauensbasierte Sicherheit mobiler Objekte. Patrick Horster (Hrsg.): Kommunikationssicherheit. Vieweg Verlag, März 2001. ISBN 3-528-05763-7. 
  67. Winfried E. Kühnhauser. Metapolitiken (Abstract, in English and German) (Book, 1.3mbyte, in German). GMD Research Series No. 13, 1999. ISBN 3-88457-362-4. 
  68. Winfried E. Kühnhauser. Policy Groups. Computers & Security Journal, Vol. 18, No. 4, pp. 351-363. Elsevier 1999. 
  69. Udo Halfmann, Winfried E. Kühnhauser. Embedding Security Policies into a Distributed Computing Environment. ACM SIGOPS Operating Systems Review, Vol. 33, No. 2, pp. 51-64 (April 1999). 
  70. Winfried E. Kühnhauser. A Comment on S. Kang's and H. Lee's paper on "Analysis and Solution of Non-Preemptive Policies for Scheduling Readers and Writers". ACM SIGOPS Operating Systems Review, Vol. 33, No. 2 (April 1999). 
  71. Winfried E. Kühnhauser. A Classification of Interdomain Actions. ACM SIGOPS Operating Systems Review, Vol. 32, No. 4, pp. 47-61 (October 1998). 
  72. Ciaran Bryce, Winfried E. Kühnhauser. An Approach to Security for World-Wide Applications. IFIP Conference on Communications and Multimedia Security, Athens 1997. Chapman & Hall, 1997. 
  73. Ciaran Bryce, Winfried E. Kühnhauser, Remy Amouroux, Mauricio Lopez, Harry Rudnik. CWASAR: A European Infrastructure for Secure Electronic Commerce. Journal Of Computer Security, Vol. 5, No. 3, pp. 225-235. IOS Press, 1997. 
  74. Winfried E. Kühnhauser. Sicherheitsaspekte einer europäischen Kommunikationsinfrastruktur für mittelständische Unternehmen. In: Softwaretechnik für Kommunikationssysteme, VDI FortschrittberichteReihe 10, Nr. 439, pp. 121-130, 1996. ISBN 3-18-343910-7. 
  75. Winfried E. Kühnhauser, Jochen Liedtke. Sicherheit in Betriebssystemen. German National Research Center for Computer Science (GMD), Technical Report 959, 1995. ISSN 0723-ß508.
  76. Winfried E. Kühnhauser. A Paradigm For User-Defined Security Policies. 14th IEEE Symposium On Reliable Distributed Systems, Bad Neuenahr. IEEE 1995. 
  77. Winfried E. Kühnhauser. On Paradigms for User-Defined Security Policies In Multipolicy Environments. 11th IFIP International Information Security Conference, Cape Town 1995. 
  78. Winfried E. Kühnhauser, Michael von Kopp Ostrowski. A Framework To Support Multiple Security Policies. 7th Canadian Computer Security Symposium, Ottawa 1995. 
  79. Winfried E. Kühnhauser. Confidence Domains For Distributed Systems. 6th Canadian Computer Security Symposium, Ottawa 1994. 
  80. Susann Sonntag, Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser, Wolfgang Lux. Adaptability Using Reflection. Hawaii International Conference on System Sciences, 1994. 
  81. Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser. The BirliX Security Architecture. Journal Of Computer Security, Vol. 2, No. 1. IOS Press, 1993.