2018
- Data Usage Control for Distributed Systems. ACM Transactions on Privacy and Security, 2018 more…
2016
- Compliance Monitoring of Third-Party Applications in Online Social Networks. The 8th International Workshop on Privacy Engineering (Proceedings of the 8th International Workshop on Privacy Engineering), IEEE, 2016, 9-16 more…
2015
- SHRIFT System-wide HybRid Information Flow Tracking. ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, Springer International Publishing, 2015, 371-385 more…
2014
- On quantitative dynamic data flow tracking. Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2014 more…
2013
- Internet Privacy – Options for adequate realisation. Springer Science + Business Media, 2013 more…
- Data Protection in a Cloud-Enabled Smart Grid. First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers, Springer Science + Business Media, 2013 more…
- Data usage control enforcement in distributed systems. Proceedings of the Third ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2013 more…
- Model-Based Usage Control Policy Derivation. Proceedings of the 5th International Conference on Engineering Secure Software and Systems, Springer Science + Business Media, 2013 more…
2012
- Flexible Data-Driven Security for Android. Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability, Institute of Electrical & Electronics Engineers (IEEE), 2012 more…
- Towards a policy enforcement infrastructure for distributed usage control. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, Association for Computing Machinery (ACM), 2012 more…
- State of Online Privacy: A Technical Perspective. Springer Science + Business Media, 2012 more…
- Deriving implementation-level policies for usage control enforcement. {Proceedings of the Second ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2012 more…
- Representation-Independent Data Usage Control. In: Data Privacy Management and Autonomous Spontaneus Security. Springer Berlin Heidelberg, 2012, 122-140 more…
- Representation-Independent Data Usage Control. Proceedings of the 6th International Conference, and 4th International Conference on Data Privacy Management and Autonomous Spontaneus Security, Springer Science + Business Media, 2012 more…
- Data Loss Prevention Based on Data-Driven Usage Control. 23rd IEEE International Symposium on Software Reliability Engineering, ISSRE 2012, Dallas, TX, USA, November 27-30, 2012, IEEE, 2012 more…
- Data Loss Prevention Based on Data-Driven Usage Control. Proceedings of the 2012 IEEE 23rd International Symposium on Software Reliability Engineering, Institute of Electrical & Electronics Engineers (IEEE), 2012 more…
2011
- Software Security in Virtualized Infrastructures: The Smart Meter Example. it - Information Technology, 2011 more…
- A virtualized usage control bus system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2011 more…
- Distributed data usage control for web applications. Proceedings of the First ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery (ACM), 2011 more…
- Data-centric multi-layer usage control enforcement. Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, Association for Computing Machinery (ACM), 2011 more…
- A Hypervisor-Based Bus System for Usage Control. Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, Institute of Electrical & Electronics Engineers (IEEE), 2011 more…
- A Trustworthy Usage Control Enforcement Framework. Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, Institute of Electrical & Electronics Engineers (IEEE), 2011 more…
- Data Protection in Heterogeneous Distributed Systems: A Smart Meter Example. Dependable Software for Critical Infrastructures, 2011 more…
2010
- Requirements Analysis for Privacy in Social Networks. 8th Intl. Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods (VG), 2010 more…
2009
- GoCoMM: A Governance and Compliance Maturity Model. Proceedings of the First ACM Workshop on Information Security Governance, Association for Computing Machinery (ACM), 2009 more…
- State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. Proceedings of the 2009 Third International Conference on Network and System Security, Institute of Electrical & Electronics Engineers (IEEE), 2009 more…
- Usage Control Enforcement with Data Flow Tracking for X11. 5th Intl. Workshop on Security and Trust Management (STM), 2009 more…
- Policy Evolution in Distributed Usage Control. 4th Intl. Workshop on Security and Trust Management (STM'08), Elsevier BV, 2009, 109-123 more…
- An Overview of Distributed Usage Control. 2nd Conf. Knowledge Engineering: Principles and Techniques, 2009 more…
2008
- Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. J. Wirtschaftsinformatik, Springer Science + Business Media, 2008, 383-391 more…
- Mechanisms for usage control. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), 2008 more…
- Usage Control Enforcement: Present and Future. Security Privacy, IEEE, Institute of Electrical & Electronics Engineers (IEEE), 2008, 44-53 more…
- Negotiation of Usage Control Policies - Simply the Best? Availability, Reliability and Security, 2008. ARES 08. Third International Conference on Availability, Reliability and Security , Institute of Electrical & Electronics Engineers (IEEE), 2008 more…
2007
- A technical architecture for enforcing usage control requirements in service-oriented architectures. Proceedings of the 2007 ACM Workshop on Secure Web Services, Association for Computing Machinery (ACM), 2007 more…
- Verteilte Nutzungskontrolle. digma , 2007 more…
- Monitors for Usage Control. Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security,, Springer Science + Business Media, 2007 more…
- A Policy Language for Distributed Usage Control. Proceedings of the 12th European Conference on Research in Computer Security, Springer Science + Business Media, 2007 more…
- DUKE--Distributed Usage Control Enforcement. 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), Institute of Electrical & Electronics Engineers (IEEE), 2007 more…
- Usage Control in Service-Oriented Architectures. 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings, Springer Science + Business Media, 2007 more…
2006
- Usage Control Requirements in Mobile and Ubiquitous Computing Applications. Systems and Networks Communications, 2006. ICSNC '06. International Conference, Institute of Electrical & Electronics Engineers (IEEE), 2006 more…
- Distributed usage control. Communications of the ACM, Association for Computing Machinery (ACM), 2006, 39 more…
2005
- On Obligations. 10th European Symp. on Research in Computer Security (ESORICS'05), Springer LNCS , 2005 more…