Publications

  1. M. Salmani, K. Razavi, P. Amthor, and B. Koldehofe, Bridging CPU and GPU Autoscaling for Cost-Efficient Inference Serving, To appear in the Proceedings of the 6th Workshop on Machine Learning and Systems (EuroMLSys ’26), April 27–30, 2026, Edinburgh, Scotland Uk. [PDF]
  2. B. Boughzala and B. Koldehofe, Delay-Sensitive In-Network QoS Management for Publish/Subscribe Communications, To appear In Proceedings of the 39th IEEE/IFIP Network Operations and Management Symposium (NOMS 2026) Miniconference, Rome, Italy, May 18–22, 2026. [PDF]
  3. P. Amthor, W. Huang, B. Koldehofe, and U. Majeed. Analog Computing Paradigms for Energy-Efficient Data-Driven Applications. To appear in Proceedings of the 17th international conference on autonomous systems (AUTSYS), 2025. [bib | PDF]
  4. Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, Martijn C. Schut, Boris Koldehofe. Pattern-level Privacy Protection in Event-based Systems. SN Computer Science. Vol. 6(1014). 21 pages. Springer Nature. 2025. [bib | DOI | PDF]
  5. Majid Lotfian Delouee. Adapting Event Processing in Dynamic IoT Applications, Meeting Evolving Requirements for Quality, Privacy, and Rule Autonomy. PhD thesis, externally supervised at University of Groningen. 215 pages. 2025. [DOI]
  6. S. Husung, Peter Amthor et al. Future skills in engineering education: digitalization of skills-based learning and examination. Project report, Oct. 2025, doi: 10.22032/DBT.67584.
  7. Bochra Boughzala, Boris Koldehofe and Alexander Lazovik. P4mCast: Accelerating and Scaling Fault-Tolerant Atomic Multicast in Multi-Cloud Environment. In Proceedings of 45th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2025), 6 pages. IEEE. 2025. [bib | DOI | PDF]
  8. Bochra Boughzala and Boris Koldehofe, In-Network Splitter Function Enabling Highly-Parallel Event Stream Processing.
    4th KuVS Expert Talk on Network Softwarization (KuVS FG NetSoft), 3 pages. 2025. [bibDOI | PDF]
  9. L. Chen, S. Saleh, F. Tavormina, L. Di Mario, J. Li, Z. Xie, N. Masciocchi, C. J. Brabec, B. Koldehofe, M. A. Loi. Modulating Trapping in Low-Dimensional Lead–Tin Halides for Energy-Efficient Neuromorphic Electronics.Advanced Materials, 9 pages, preprint, Wiley-VCH, 2025. [bibDOI]
  10. Mehran Salmani, Kamran Razavi, Max Mühlhäuser, Lin Wang, Boris Koldehofe. Efficient inference pipeline serving by bi-dimensional autoscaling. In Proceedings of the International Conference on Networked Systems (NetSys 2025): Technische Universität Ilmenau, pp. 13–16, ilmedia. [bib | DOIPDF]
  11. Boris Koldehofe, Florian Klingler, Christoph Sommer, Karin A. Hummel, and Peter Amthor, Eds., Proceedings of the International Conference on Networked Systems 2025 (NetSys 2025). ilmedia, 2025. [bibDOI]
  12. Saad Saleh. Methods and Design for Analog Computing Architectures: Memristors for Enhancing Expressiveness and Energy-Efficiency of Packet Processors. PhD thesis, externally supervised at University of Groningen. 212 pages, 2025. [DOI]
  13. Pratyush Agnihotri, Boris Koldehofe, Roman Heinrich, Carsten Binnig, and Manisha Luthra. PDSP-Bench: A Benchmarking System for Parallel and Distributed Stream Processing. In Proceedings of Performance Evaluation and Benchmarking: 16th TPC Technology Conference (TPCTC 2024), 23 pages, Springer Nature. [bib | DOI]
  14. Pratyush Agnihotri. Accurate Performance Modeling for Distributed Stream Processing: Methods for Performance Benchmarking and Zero-shot Parallelism Tuning in Distributed and Heterogeneous Environments. PhD thesis, externally supervised at Technische Universität Darmstadt, 189 pages, 2024. [DOI]

  15. Ahmad Khalil, Majid Lotfian Delouee, Victoria Degeler, Tobias Meuser, Antonio Fernandez Anta, and Boris Koldehofe. Driving towards efficiency: Adaptive resource-aware clustered federated learning in vehicular networks. In Proceedings of the 22nd Mediterranean Communication and Computer Networking Conference (MedComNet) , page 10 pages. IEEE, 2024.  [  bib  | DOI ]
  16. Chengbo Zhou, Christoph Gärtner, Amr Rizk, Boris Koldehofe, Björn Scheuermann, and Ralf Kundel. Rda: Residence delay aggregation for time-sensitive networking. In IEEE Network Operations and Management Symposium (NOMS), page 5 pages. IEEE, 2024. [ bib | DOI ]
  17. Robert Walther, Carsten Weinhold, Peter Amthor, Michael Roitzsch. Multi-Stakeholder Policy Enforcement for Distributed Systems. In Proceedings of the 10th International Workshop on Container Technologies and Container Clouds, WoC '24@Middleware. Association for Computing Machinery, 2024. [DOI]
  18. Bochra Boughzala and Boris Koldehofe. Poster: In-Network Total Order Guarantees supporting State Machine Replication with P4 Programmable Switches. In Proceedings of the 32nd IEEE International Conference on Network Protocols (ICNP 2024), 3 pages, 2024. IEEE.  [bib | DOI | PDF]
  19. Peter Amthor and René Gorges. A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks. In Pierangela Samarati and Sabrina De Capitani di Vimercati, editors, Proceedings of the 21th International Conference on Security and Cryptography, SECRYPT 2024. INSTICC, SciTePress, 2024. [DOI]
  20. Bochra Boughzala and Boris Koldehofe. In-Network Management of Parallel Data Streams over Programmable Data Planes. In Proceedings of 2024 IFIP Networking Conference (IFIP Networking), 2024, pp. 50-58, 2024. IFIP. [bib | DOI | PDF]
  21. Saad Saleh, Sunny Shu, and Boris Koldehofe. dAQM: Derivative-based Active Queue Management. In Proceedings of the 2024 IFIP Networking Conference, pp. 77-85, 2024. IFIP.  [bib | DOIPDF]
  22. Majid Lotfian Delouee, Daria G. Pernes, Victoria Degeler, and Boris Koldehofe. Poster: Towards federated llm-powered cep rule generation and refinement. In Proceedings of the 18th ACM International Conference on Distributed and Event-Based Systems (DEBS'24), 2 pages. ACM press, 2024. [bib | DOI ]
  23. Ahmad Khalil, Majid Lotfian Delouee, Victoria Degeler, Tobias Meuser, Antonio Fernández Anta, Boris Koldehofe. Driving Towards Efficiency: Adaptive Resource-Aware Clustered Federated Learning in Vehicular Networks. In Proceedings of the Mediterranean Communication and Computer Networking Conference (MedComNet),  2024, IEEE. [bib | DOI ]
  24. Pratyush Agnihotri, Boris Koldehofe, Paul Stiegele, Roman Heinrich, Carsten Binnig, Manisha Luthra. ZeroTune: Learned Zero-Shot Cost Model for Parallelism Tuning in Stream Processing. In Proceedings of the IEEE 40th International Conference on Data Engineering (ICDE 2024), IEEE, 2024. [bib | DOI ]
  25. Saad Saleh, Anouk S. Goossens, Sunny Shu, Tamalika Banerjee and Boris Koldehofe. Analog In-Network Computing through Memristor-based Match-Compute Processing. In Proceedings of the 43rd IEEE International Conference on Computer Communications, (INFOCOM 2024), pp. 2518-2527, IEEE, 2024. [bib | DOIPDF]
  26. Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, and Boris Koldehofe. APP-CEP: Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (ICISSP’24), 12 pages, SCITEPRESS. [bib | DOI PDF]
  27. Chengbo Zhou, Christoph Gärtner, Amr Rizk, Boris Koldehofe, Björn Scheuermann and Ralf Kundel. RDA: Residence Delay Aggregation for Time-Sensitive Networking. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2024), 5 pages, IEEE.
  28. Saad Saleh, Sunny Shu, and Boris Koldehofe. Adaptive In-Network Queue Management using Derivatives of Sojourn Time and Buffer Size. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2024), pp. 1-6, IEEE, 2024. [DOIPDF]
  29. Boris Koldehofe. Fair Adaptive Overlay Communications : A Historical Perspective on P2P-Based Publish/Subscribe.In: From Multimedia Communications to the Future Internet. Lecture Notes in Computer Science, vol 15200, pp 168–185. Springer. 2024.  [bib | DOI]
  30. Stefan Schulte, Boris Koldehofe: From Multimedia Communications to the Future Internet: Essays Dedicated to Ralf Steinmetz on the Occasion of His Retirement.Lecture Notes in Computer Science. ISBN 978-3-031-71873-1. Springer. 2024. [bib | DOI]
  31. Kamran Razavi, Mehran Salmani, Max Mühlhäuser, Boris Koldehofe, Lin Wang. A Tale of Two Scales: Reconciling Horizontal and Vertical Scaling for Inference Serving Systems. Technical Report arXiv preprint arXiv:2407.14843, 2024. DOI | PDF]
  32. Saad Saleh and Boris Koldehofe. Memristor-based Network Switching Architecture for Energy Efficient Cognitive Computational Models. In Proceedings of the 18th ACM International Symposium on Nanoscale Architectures (NANOARCH 2023), ACM press, pp. 1-4, 2023. [bib | DOI | PDF]
  33. Saad Saleh and Boris Koldehofe. The Future is Analog: Energy-Efficient Cognitive Network Functions over Memristor-Based Analog Computations. In Proceedings of The 22nd ACM Workshop on Hot Topics in Networks (HotNets 2023), pp. 254 - 262. ACM, 2023. [ bib | DOI | PDF]
  34. Christoph Gärtner, Amr Rizk, Boris Koldehofe, René Guillaume, Ralf Kundel, and Ralf Steinmetz. Demo: Flexibility-aware network management of time-sensitive flows. In Proceedings of the ACM SIGCOMM 2023 Conference, pages 1176--1178, 2023. [ bib | DOI | http ]
  35. Peter Amthor, Ulf Döring, Daniel Fischer, Jonas Genath, Gunther Kreuzberger. Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung. In Proceedings of the Sixth Workshop "Automatische Bewertung von Programmieraufgaben" (ABP 2023), 2023.[bib | DOI]
  36. Majid Lotfian Delouee, Boris Koldehofe, and Viktoriya Degeler. AQuA-CEP: Adaptive quality-aware complex event processing in the internet of things. In Proceedings of the 17th ACM International Conference on Distributed and Event-Based Systems, pages 13--24. ACM press, 2023. in press. [ bib | DOI ]
  37. Majid Lotfian Delouee, Boris Koldehofe, and Viktoriya Degeler. Towards pattern-level privacy protection in distributed complex event processing. In Proceedings of the 17th ACM International Conference on Distributed and Event-Based Systems, pages 185--186. ACM press, 2023. In press. [ bib | DOI ]
  38. Pratyush Agnihotri, Boris Koldehofe, Carsten Binnig, and Manisha Luthra. Zero-shot cost models for parallel stream processing. In Proceedings of the Sixth International Workshop on Exploiting Artificial Intelligence Techniques for Data Management (aiDM 2023), pages 5:1--5:5. ACM press, 2023. [ bib | DOI ]
  39. He Gu, Thomas Plagemann, Maik Benndorf, Vera Goebel, and Boris Koldehofe. Differential privacy for protecting private patterns in data streams. In Proceedings of the 1st International Workshop on Private, Secure, and Trustworthy IoT Data Management (ASTRIDE 2023), 2023. [ bib | DOI ]
  40. Christoph Gärtner, Amr Rizk, Boris Koldehofe, René Guillaume, Ralf Kundel, and Ralf Steinmetz. Fast incremental reconfiguration of dynamic time-sensitive networks at runtime. Computer Networks, 224:13 pages, 2023. [ bib | DOI ]
  41. Marius Schlegel, Peter Amthor. Putting the Pieces Together: Model-based Engineering Workflows for Attribute-based Access Control Policies. In Communications in Computer and Information Science (CCIS) 1795, E-Business and Telecommunications, pages 249–280. Springer Nature Switzerland, Cham, 2023. [doi]
  42. Marius Schlegel, Peter Amthor. The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. In Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, pages 234–246, 2021. [doi]
  43. Marius Schlegel, Peter Amthor. Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 431–442, 2020. [doi]
  44. Peter Amthor, Marius Schlegel. Towards Language Support for Model-based Security Policy Engineering. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 513–521, 2020.
  45. Peter Amthor, Martin Rabe. Command Dependencies in Heuristic Safety Analysis of Access Control Models. In Proceedings of the 12th International Symposium on Foundations & Practice of Security, FPS 2019, pages 207–224, 2020.
  46. Felix Wiemuth, Peter Amthor, Winfried E. Kühnhauser.Static Termination Analysis for Event-driven Distributed Algorithms. Proc. 13th International Conference on Distributed and Event-based Systems (DEBS 2019), 2019, pp. 151–162. Authors' Manuscript (PDF)
  47. Peter Amthor. Aspect-oriented Security Engineering (Dissertation)
    Cuvillier Verlag Göttingen, 2019.
  48. Marius Schlegel. Vortrag: Betriebssystemunterstützung für applikationsspezifische Sicherheitspolitiken. Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.
  49. Peter Amthor. Vortrag: Modellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken (Abstract, Folien). Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.
  50. Peter Amthor.Efficient Heuristic Safety Analysis of Core-based Security Policies. Proceedings of the 14th International Conference on Security and Cryptography (SECRYPT 2017), 2017, pp. 384–392.
  51. Peter Amthor, Winfried E. Kühnhauser.Privacy in sozialen Netzwerken: Eine Informationsflussanalyse. Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 224–240.
  52. Marius Schlegel.Risikobasierte Metapolitiken für spontane Kooperationen. Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 188–201.
  53. Martin Rabe. Betriebssystem-Sicherheitspolitiken formal analysieren. Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 126–139.
  54. Peter Amthor.The Entity Labeling Pattern for Modeling Operating Systems Access Control. M.S. Obaidat and P. Lorenz (Eds.): ICETE 2015, CCIS 585, pp. 270–292. Springer 2016. Accepted Author Manuscript (PDF)
  55. Marius Schlegel. Analyse und Simulation dynamischer RBAC-Zugriffssteuerungsmodelle. Proc. D·A·CH Security 2015, syssec Verlag, 2015, pp. 110–121.
  56. Peter Amthor.A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. Proceedings of the 12th International Conference on Security and Cryptography (SECRYPT 2015), 2015, pp. 88-99.
  57. Peter Amthor, Winfried E. Kühnhauser.Security Policy Synthesis in Mobile Systems. Proceedings of the IEEE SERVICES 2015 Visionary Track: Security and Privacy Engineering Theme, SPE '15. IEEE, 2015, pp. 189-197.
  58. Dominik Reinhardt, Maximilian Günter, Markus Kucera, Thomas Waas, Winfried E. Kühnhauser. Mapping CAN-to-Ethernet Communication Channels within Virtualized Enbedded Environments. Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems (SIES 2015).
  59. Dominik Reinhardt, Daniel Adam, Enno Lübbers, Rakshith Amarnath, Rolf Schneider, Simon Gansel, Stephan Schnitzer, Christian Herber, Timo Sandmann. Embedded Virtualization Approaches for Ensuring Safety and Security within E/E Automotive Systems. Embedded World Conference, 2015.
  60. Dominik Reinhardt.Ranking Software Components Using a Modified PageRank Algorithm Including Safety Aspects. International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV), 2014, pp. 274-281.
  61. Dominik Reinhardt, Gary Morgan.An Embedded Hypervisor for Safety-Relevant Automotive E/E-Systems. Industrial Embedded Systems (SIES), 2014 9th IEEE International Symposium on, pp. 189-198. 
  62. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck. WorSE: A Workbench for Model-based Security Engineering.Computers & Security Journal, Vol. 42, pp. 40-55. Elsevier, 2014. Accepted Author Manuscript (PDF)
  63. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck. Heuristic Safety Analysis of Access Control Models. Proc. 18th ACM Symposium on Access Control Models and Technologies (SACMAT 2013), pages 137-147.
  64. Peter Amthor, Winfried E. Kühnhauser.Leichtgewichtige Sicherheitsdomänen für spontane Kooperationen. D-A-CH Security 2013, syssec Verlag, 2013, pages 260-274.
  65. Dominik Reinhardt, Marcus Kucera. Domain Controlled Architecture - A New Approach for Large Scale Software Integrated Automotive Systems. Proc. International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2013), pages 221-226.
  66. Dominik Reinhardt, Dirk Kaule, Marcus Kucera.Achieving a Scalable E/E-Architecture using AUTOSAR and Virtualization. SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 489-497.
  67. Wolfgang Schwitzer, Rolf Schneider, Dominik Reinhardt, Georg Hofstetter. Tackling the Complexity of Timing-relevant Deployment Decisions in Multicore-based Embedded Automotive Software Systems. SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 478-488.
  68. Winfried E. Kühnhauser, Anja Pölck.Towards Access Control Model Engineering. Proc. 7th International Conference on Information Systems Security (ICISS 2011). In: Information Systems Security, LNCS 7093, Springer 2011, pages 379-382.
  69. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck.Model-based Safety Analysis of SELinux Security Policies. Proc. 5th International Conference on Network and System Security (NSS 2011), pages 208-215.
  70. Anja Fischer, Winfried E. Kühnhauser. Komposition von SELinux-Sicherheitspolitiken. D-A-CH Security 2010, syssec Verlag, 2010, pages 268-280. 
  71. Anja Fischer, Winfried E. Kühnhauser. Efficient Algorithmic Safety Analysis of HRU Security Models. Proc. International Conference on Security and Cryptography (SECRYPT 2010), pages 49-58. 
  72. Peter Amthor, Anja Fischer, Winfried E. Kühnhauser.Analyse von Zugriffssteuerungssystemen. D-A-CH Security 2009, syssec Verlag, 2009, pages 49-61. ISBN 978-3-00-027488-6. 
  73. Stefan Bode, Anja Fischer, Winfried E. Kühnhauser, Matthias Riebisch.Software Architectural Design Meets Security Engineering. 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), San Francisco, April 2009.
  74. Anja Fischer, Winfried E. Kühnhauser. Integration von Sicherheitsmodellen in Web Services. D-A-CH Security 2008, syssec Verlag, 2008, pages 305-316. ISBN 978-3-00-024632-6. 
  75. Alexander Eichhorn.Efficient Dependency Tracking in Packetised Media Streams. International Workshop on Multimedia Signal Processing (MMSP'07), Chania, Crete, Greece, October 2007. 
  76. Winfried E. Kühnhauser, Martin Süßkraut.A Time Model for Distributed Multimedia Applications. 8th International Conference on Distributed Computing and Networking (ICDCN 2006). LNCS 4308, pages 491-496, Dec. 2006. 
  77. Alexander Eichhorn.Modelling Dependency in Multimedia Streams. 14th annual ACM International Conference on Multimedia, pages 941-950. 2006. 
  78. Martin Hoffmann, Winfried E. Kühnhauser.Towards a Structure-Aware Failure Semantics for Streaming Media Communication Models. Journal of Parallel and Distributed Computing, Vol. 65, No. 9, pages 1047-1056. Elsevier, 2005.
  79. Winfried E. Kühnhauser, Gabriel Welsche. Sicherheitsmodelle für computergestützte Teamarbeit. D-A-CH Security 2005, syssec Verlag, 2005, pages 237-249. ISBN 3-00-015548-1. 
  80. Alexander Senier. Automatisierte Evaluation von Firewalls. D-A-CH Security 2005, syssec Verlag, 2005, pages 154-162. ISBN 3-00-015548-1. 
  81. Hans-Albrecht Schindler. Resource Management in Distributed Multimedia Environments. Proc. 49. Internationales Wissenschaftliches Kolloquium (IWK 2004), Ilmenau,Vol. 2, pages 303-308. Shaker, 2004. ISBN 3-8322-2824-1. 
  82. Winfried E. Kühnhauser. Root Kits - An Operating Systems Viewpoint. ACM SIGOPS Operating Systems Review, Vol. 38, No. 1, pages 12-23, January 2004. 
  83. Winfried E. Kühnhauser, Martin Süßkraut. Zur Rolle der Zeit in verteilten multimedialen Systemen. Proceedings of the 9th Workshop on Multimedia Information and Communication Systems (MIK2003), September 2003. 
  84. Winfried E. Kühnhauser.Root Kits. Datenschutz und Datensicherheit, Vol 27, No 44, April 2003, pages 218-222. Vieweg Verlag.
  85. Winfried E. Kühnhauser, Thorsten Pomierski. Sicherheitskonzept einer universitären Prüfungsverwaltung. Patrick Horster (ed): D-A-CH Security. Proceedings of the 2003 D-A-CH Security Conference, pages 354-365. IT Verlag, 2003. ISBN 3-00-010941-2. 
  86. Alexander Eichhorn, Winfried E. Kühnhauser. Datenströme in multimedialen Systemen - Merkmale und Auswirkungen -. Proceedings of the 8th Workshop on Multimedia Information and Communication Systems (MIK2002), October 2002. 
  87. Alexander Eichhorn, Winfried E. Kühnhauser.A Component-based Architecture for Streaming Media. Proceedings of the 7th Workshop on Multimedia Information and Communication Systems (MIK2001), September 2001. 
  88. Gregor Gärtner, Winfried E. Kühnhauser. Vertrauensbasierte Sicherheit mobiler Objekte. Patrick Horster (Hrsg.): Kommunikationssicherheit. Vieweg Verlag, März 2001. ISBN 3-528-05763-7. 
  89. Winfried E. Kühnhauser. Metapolitiken (Abstract, in English and German) (Book, 1.3mbyte, in German). GMD Research Series No. 13, 1999. ISBN 3-88457-362-4. 
  90. Winfried E. Kühnhauser. Policy Groups. Computers & Security Journal, Vol. 18, No. 4, pp. 351-363. Elsevier 1999. 
  91. Udo Halfmann, Winfried E. Kühnhauser.Embedding Security Policies into a Distributed Computing Environment. ACM SIGOPS Operating Systems Review, Vol. 33, No. 2, pp. 51-64 (April 1999). 
  92. Winfried E. Kühnhauser.A Comment on S. Kang's and H. Lee's paper on "Analysis and Solution of Non-Preemptive Policies for Scheduling Readers and Writers". ACM SIGOPS Operating Systems Review, Vol. 33, No. 2 (April 1999). 
  93. Winfried E. Kühnhauser. A Classification of Interdomain Actions. ACM SIGOPS Operating Systems Review, Vol. 32, No. 4, pp. 47-61 (October 1998). 
  94. Ciaran Bryce, Winfried E. Kühnhauser.An Approach to Security for World-Wide Applications. IFIP Conference on Communications and Multimedia Security, Athens 1997. Chapman & Hall, 1997. 
  95. Ciaran Bryce, Winfried E. Kühnhauser, Remy Amouroux, Mauricio Lopez, Harry Rudnik. CWASAR: A European Infrastructure for Secure Electronic Commerce. Journal Of Computer Security, Vol. 5, No. 3, pp. 225-235. IOS Press, 1997. 
  96. Winfried E. Kühnhauser. Sicherheitsaspekte einer europäischen Kommunikationsinfrastruktur für mittelständische Unternehmen. In: Softwaretechnik für Kommunikationssysteme, VDI FortschrittberichteReihe 10, Nr. 439, pp. 121-130, 1996. ISBN 3-18-343910-7. 
  97. Winfried E. Kühnhauser, Jochen Liedtke.Sicherheit in Betriebssystemen. German National Research Center for Computer Science (GMD), Technical Report 959, 1995. ISSN 0723-ß508.
  98. Winfried E. Kühnhauser.A Paradigm For User-Defined Security Policies. 14th IEEE Symposium On Reliable Distributed Systems, Bad Neuenahr. IEEE 1995. 
  99. Winfried E. Kühnhauser.On Paradigms for User-Defined Security Policies In Multipolicy Environments. 11th IFIP International Information Security Conference, Cape Town 1995. 
  100. Winfried E. Kühnhauser, Michael von Kopp Ostrowski.A Framework To Support Multiple Security Policies. 7th Canadian Computer Security Symposium, Ottawa 1995. 
  101. Winfried E. Kühnhauser. Confidence Domains For Distributed Systems. 6th Canadian Computer Security Symposium, Ottawa 1994. 
  102. Susann Sonntag, Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser, Wolfgang Lux. Adaptability Using Reflection. Hawaii International Conference on System Sciences, 1994. 
  103. Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser.The BirliX Security Architecture. Journal Of Computer Security, Vol. 2, No. 1. IOS Press, 1993.