Publikationen
Marius Schlegel, Peter Amthor. The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. In Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, pages 234–246, 2021.
Marius Schlegel, Peter Amthor. Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 431–442, 2020.
Peter Amthor, Marius Schlegel. Towards Language Support for Model-based Security Policy Engineering. In Proceedings of the 17th International Conference on Security and Cryptography, SECRYPT 2020, pages 513–521, 2020.
Peter Amthor, Martin Rabe. Command Dependencies in Heuristic Safety Analysis of Access Control Models. In Proceedings of the 12th International Symposium on Foundations & Practice of Security, FPS 2019, pages 207–224, 2020.
Peter Amthor, Daniel Fischer, Winfried E. Kühnhauser, Dirk Stelzer
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems
Proc. 14th International Conference on Availability, Reliability and Security (ARES 2019), 2019, pp. 86:1–86:10.
Felix Wiemuth, Peter Amthor, Winfried E. Kühnhauser
Static Termination Analysis for Event-driven Distributed Algorithms
Proc. 13th International Conference on Distributed and Event-based Systems (DEBS 2019), 2019, pp. 151–162.
Authors' Manuscript (PDF)
Peter Amthor
Aspect-oriented Security Engineering (Dissertation)
Cuvillier Verlag Göttingen, 2019.
Marius Schlegel
Vortrag: Betriebssystemunterstützung für applikationsspezifische Sicherheitspolitiken
Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.
Peter Amthor
Vortrag: Modellierung und formale Analyse von Betriebssystem-Sicherheitspolitiken (Abstract, Folien)
Herbsttreffen der GI-Fachgruppe Betriebssysteme, Hochschule Coburg, 19.10.2018.
Peter Amthor
Efficient Heuristic Safety Analysis of Core-based Security Policies
Proceedings of the 14th International Conference on Security and Cryptography (SECRYPT 2017), 2017, pp. 384–392.
Peter Amthor, Winfried E. Kühnhauser
Privacy in sozialen Netzwerken: Eine Informationsflussanalyse
Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 224–240.
Marius Schlegel
Risikobasierte Metapolitiken für spontane Kooperationen
Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 188–201.
Martin Rabe
Betriebssystem-Sicherheitspolitiken formal analysieren
Proc. D·A·CH Security 2016, syssec Verlag, 2016, pp. 126–139.
Peter Amthor
The Entity Labeling Pattern for Modeling Operating Systems Access Control
M.S. Obaidat and P. Lorenz (Eds.): ICETE 2015, CCIS 585, pp. 270–292. Springer 2016.
Accepted Author Manuscript (PDF)
Marius Schlegel
Analyse und Simulation dynamischer RBAC-Zugriffssteuerungsmodelle
Proc. D·A·CH Security 2015, syssec Verlag, 2015, pp. 110–121.
Peter Amthor
A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux
Proceedings of the 12th International Conference on Security and Cryptography (SECRYPT 2015), 2015, pp. 88-99.
Peter Amthor, Winfried E. Kühnhauser
Security Policy Synthesis in Mobile Systems
Proceedings of the IEEE SERVICES 2015 Visionary Track: Security and Privacy Engineering Theme, SPE '15. IEEE, 2015, pp. 189-197.
Dominik Reinhardt, Maximilian Günter, Markus Kucera, Thomas Waas, Winfried E. Kühnhauser
Mapping CAN-to-Ethernet Communication Channels within Virtualized Enbedded Environments
Proceedings of the 10th IEEE International Symposium on Industrial Embedded Systems (SIES 2015).
Dominik Reinhardt, Daniel Adam, Enno Lübbers, Rakshith Amarnath, Rolf Schneider, Simon Gansel, Stephan Schnitzer, Christian Herber, Timo Sandmann
Embedded Virtualization Approaches for Ensuring Safety and Security within E/E Automotive Systems
Embedded World Conference, 2015.
Dominik Reinhardt
Ranking Software Components Using a Modified PageRank Algorithm Including Safety Aspects
International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV), 2014, pp. 274-281.
Dominik Reinhardt, Gary Morgan
An Embedded Hypervisor for Safety-Relevant Automotive E/E-Systems
Industrial Embedded Systems (SIES), 2014 9th IEEE International Symposium on, pp. 189-198.
Peter Amthor, Winfried E. Kühnhauser, Anja Pölck
WorSE: A Workbench for Model-based Security Engineering
Computers & Security Journal, Vol. 42, pp. 40-55. Elsevier, 2014.
Accepted Author Manuscript (PDF)
Peter Amthor, Winfried E. Kühnhauser, Anja Pölck
Heuristic Safety Analysis of Access Control Models
Proc. 18th ACM Symposium on Access Control Models and Technologies (SACMAT 2013), pages 137-147.
Peter Amthor, Winfried E. Kühnhauser
Leichtgewichtige Sicherheitsdomänen für spontane Kooperationen
D-A-CH Security 2013, syssec Verlag, 2013, pages 260-274.
Dominik Reinhardt, Marcus Kucera
Domain Controlled Architecture - A New Approach for Large Scale Software Integrated Automotive Systems
Proc. International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2013), pages 221-226.
Dominik Reinhardt, Dirk Kaule, Marcus Kucera
Achieving a Scalable E/E-Architecture using AUTOSAR and Virtualization
SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 489-497.
Wolfgang Schwitzer, Rolf Schneider, Dominik Reinhardt, Georg Hofstetter
Tackling the Complexity of Timing-relevant Deployment Decisions in Multicore-based Embedded Automotive Software Systems
SAE International Journal of Passenger Cars - Electronic and Electrical Systems 6(2), 2013, pages 478-488.
Winfried E. Kühnhauser, Anja Pölck
Towards Access Control Model Engineering
Proc. 7th International Conference on Information Systems Security (ICISS 2011). In: Information Systems Security, LNCS 7093, Springer 2011, pages 379-382.
Peter Amthor, Winfried E. Kühnhauser, Anja Pölck
Model-based Safety Analysis of SELinux Security Policies
Proc. 5th International Conference on Network and System Security (NSS 2011), pages 208-215.
Anja Fischer, Winfried E. Kühnhauser
Komposition von SELinux-Sicherheitspolitiken
D-A-CH Security 2010, syssec Verlag, 2010, pages 268-280.
Anja Fischer, Winfried E. Kühnhauser
Efficient Algorithmic Safety Analysis of HRU Security Models
Proc. International Conference on Security and Cryptography (SECRYPT 2010), pages 49-58.
Peter Amthor, Anja Fischer, Winfried E. Kühnhauser
Analyse von Zugriffssteuerungssystemen
D-A-CH Security 2009, syssec Verlag, 2009, pages 49-61. ISBN 978-3-00-027488-6.
Stefan Bode, Anja Fischer, Winfried E. Kühnhauser, Matthias Riebisch
Software Architectural Design Meets Security Engineering
16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), San Francisco, April 2009.
Anja Fischer, Winfried E. Kühnhauser
Integration von Sicherheitsmodellen in Web Services
D-A-CH Security 2008, syssec Verlag, 2008, pages 305-316. ISBN 978-3-00-024632-6.
Alexander Eichhorn
Efficient Dependency Tracking in Packetised Media Streams
International Workshop on Multimedia Signal Processing (MMSP'07), Chania, Crete, Greece, October 2007.
Winfried E. Kühnhauser, Martin Süßkraut
A Time Model for Distributed Multimedia Applications
8th International Conference on Distributed Computing and Networking (ICDCN 2006). LNCS 4308, pages 491-496, Dec. 2006.
Alexander Eichhorn
Modelling Dependency in Multimedia Streams
14th annual ACM International Conference on Multimedia, pages 941-950. 2006.
Martin Hoffmann, Winfried E. Kühnhauser
Towards a Structure-Aware Failure Semantics for Streaming Media Communication Models.
Journal of Parallel and Distributed Computing, Vol. 65, No. 9, pages 1047-1056. Elsevier, 2005.
Winfried E. Kühnhauser, Gabriel Welsche
Sicherheitsmodelle für computergestützte Teamarbeit.
D-A-CH Security 2005, syssec Verlag, 2005, pages 237-249. ISBN 3-00-015548-1.
Alexander Senier
Automatisierte Evaluation von Firewalls.
D-A-CH Security 2005, syssec Verlag, 2005, pages 154-162. ISBN 3-00-015548-1.
Hans-Albrecht Schindler
Resource Management in Distributed Multimedia Environments.
Proc. 49. Internationales Wissenschaftliches Kolloquium (IWK 2004), Ilmenau,Vol. 2, pages 303-308. Shaker, 2004. ISBN 3-8322-2824-1.
Winfried E. Kühnhauser
Root Kits - An Operating Systems Viewpoint
ACM SIGOPS Operating Systems Review, Vol. 38, No. 1, pages 12-23, January 2004.
Winfried E. Kühnhauser, Martin Süßkraut
Zur Rolle der Zeit in verteilten multimedialen Systemen
Proceedings of the 9th Workshop on Multimedia Information and Communication Systems (MIK2003), September 2003.
Winfried E. Kühnhauser
Root Kits
Datenschutz und Datensicherheit, Vol 27, No 44, April 2003, pages 218-222. Vieweg Verlag.
Winfried E. Kühnhauser, Thorsten Pomierski
Sicherheitskonzept einer universitären Prüfungsverwaltung
Patrick Horster (ed): D-A-CH Security. Proceedings of the 2003 D-A-CH Security Conference, pages 354-365. IT Verlag, 2003. ISBN 3-00-010941-2.
Alexander Eichhorn, Winfried E. Kühnhauser
Datenströme in multimedialen Systemen - Merkmale und Auswirkungen -
Proceedings of the 8th Workshop on Multimedia Information and Communication Systems (MIK2002), October 2002.
Alexander Eichhorn, Winfried E. Kühnhauser
A Component-based Architecture for Streaming Media
Proceedings of the 7th Workshop on Multimedia Information and Communication Systems (MIK2001), September 2001.
Gregor Gärtner, Winfried E. Kühnhauser
Vertrauensbasierte Sicherheit mobiler Objekte
Patrick Horster (Hrsg.): Kommunikationssicherheit. Vieweg Verlag, März 2001. ISBN 3-528-05763-7.
Winfried E. Kühnhauser
Metapolitiken (Abstract, in English and German) (Book, 1.3mbyte, in German)
GMD Research Series No. 13, 1999. ISBN 3-88457-362-4.
Winfried E. Kühnhauser
Policy Groups
Computers & Security Journal, Vol. 18, No. 4, pp. 351-363. Elsevier 1999.
Udo Halfmann, Winfried E. Kühnhauser
Embedding Security Policies into a Distributed Computing Environment
ACM SIGOPS Operating Systems Review, Vol. 33, No. 2, pp. 51-64 (April 1999).
Winfried E. Kühnhauser
A Comment on S. Kang's and H. Lee's paper on "Analysis and Solution of Non-Preemptive Policies for Scheduling Readers and Writers"
ACM SIGOPS Operating Systems Review, Vol. 33, No. 2 (April 1999).
Winfried E. Kühnhauser
A Classification of Interdomain Actions
ACM SIGOPS Operating Systems Review, Vol. 32, No. 4, pp. 47-61 (October 1998).
Ciaran Bryce, Winfried E. Kühnhauser
An Approach to Security for World-Wide Applications
IFIP Conference on Communications and Multimedia Security, Athens 1997. Chapman & Hall, 1997.
Ciaran Bryce, Winfried E. Kühnhauser, Remy Amouroux, Mauricio Lopez, Harry Rudnik
CWASAR: A European Infrastructure for Secure Electronic Commerce
Journal Of Computer Security, Vol. 5, No. 3, pp. 225-235. IOS Press, 1997.
Winfried E. Kühnhauser
Sicherheitsaspekte einer europäischen Kommunikationsinfrastruktur für mittelständische Unternehmen
In: Softwaretechnik für Kommunikationssysteme, VDI FortschrittberichteReihe 10, Nr. 439, pp. 121-130, 1996. ISBN 3-18-343910-7.
Winfried E. Kühnhauser, Jochen Liedtke
Sicherheit in Betriebssystemen
German National Research Center for Computer Science (GMD), Technical Report 959, 1995. ISSN 0723-ß508.
Winfried E. Kühnhauser
A Paradigm For User-Defined Security Policies
14th IEEE Symposium On Reliable Distributed Systems, Bad Neuenahr. IEEE 1995.
Winfried E. Kühnhauser
On Paradigms for User-Defined Security Policies In Multipolicy Environments
11th IFIP International Information Security Conference, Cape Town 1995.
Winfried E. Kühnhauser, Michael von Kopp Ostrowski
A Framework To Support Multiple Security Policies
7th Canadian Computer Security Symposium, Ottawa 1995.
Winfried E. Kühnhauser
Confidence Domains For Distributed Systems
6th Canadian Computer Security Symposium, Ottawa 1994.
Susann Sonntag, Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser, Wolfgang Lux
Adaptability Using Reflection
Hawaii International Conference on System Sciences, 1994.
Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser
The BirliX Security Architecture
Journal Of Computer Security, Vol. 2, No. 1. IOS Press, 1993.