Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2017Data residency challenges and opportunities for standardization
Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char
Report
2017SDN-based security policy module for Industry 4.0 remote maintenance
Papp, Katalin
: Khondoker, Rahamatullah; Weber, Frank; Larbig, Pedro; Massacci, Fabio; Waidner, Michael
Master Thesis
2016A framework for generating user- and domain-tailored security policy editors
Rudolph, Manuel; Moucha, Cornelius; Feth, Denis
Report
2016A framework for generating user- and domain-tailored security policy editors
Rudolph, Manuel; Moucha, Cornelius; Feth, Denis
Conference Paper
2016Requirements elicitation and derivation of security policy templates - an industrial case study
Rudolph, Manuel; Feth, Denis; Doerr, Joerg; Spilker, Joerg
Report
2014Datenkontrolle der Zukunft. Sicherheitsrichtlinien über Systemgrenzen hinweg eigenverantworlich durchsetzen können
Doerr, Joerg; Eisenbarth, Michael
Journal Article
2014Datenkontrolle der Zukunft: Sicherheitsrichtlinien über Systemgrenzen hinweg eigenverantwortlich durchsetzen können
Doerr, Joerg; Eisenbarth, Michael
Report
2014Enhancing cloud security with context-aware usage control policies
Jung, Christian; Eitel, Andreas; Schwarz, Reinhard
Report
2014Enhancing cloud security with context-aware usage control policies
Jung, Christian; Eitel, Andreas; Schwarz, Reinhard
Conference Paper
2014Security policy specification templates for critical infrastructure services in the cloud
Rudolph, Manuel; Schwarz, Reinhard; Jung, Christian
Report
2014Security policy specification templates for critical infrastructure services in the cloud
Rudolph, Manuel; Schwarz, Reinhard; Jung, Christian
Conference Paper
2012Goal-based policies for self-protecting systems
Schütte, J.
Conference Paper
2011Apollon: Towards a semantically extensible policy framework
Schütte, J.
Conference Paper
2009Die Auswirkungen des Klimawandels auf sicherheits- und verteidigungspolitische Fragestellungen
Müller, S.
Report
2009What is the shape of your security policy? Security as a classification problem
Türpe, S.
Conference Paper
2007A holistic approach to security policies - policy distribution with XACML over COPS
Peters, J.; Rieke, R.; Rochaeli, T.; Steinemann, B.; Wolf, R.
Conference Paper, Journal Article
2006Enterprise document security
Oesing, Ursula; Krüger, Roland; Pinsdorf, Ulrich
Conference Paper
2006Risikomanagement, Sicherheitspolitiken und technische Verfahren zu deren Durchsetzung (I)
Wolthusen, S.
Journal Article
2006Risikomanagement, Sicherheitspolitiken und technische Verfahren zu deren Durchsetzung (II)
Wolthusen, S.
Journal Article
2005Protocols for policy negotiation
Peters, J.; Rieke, R.; Rochaeli, T.; Steinemann, B.; Wolf, R.
Report
2004Implementierung von Security Policies in offenen Telekollaborationen
Herfert, M.; Schmidt, A.U.; Ochsenschläger, P.; Repp, J.; Rieke, R.; Schmucker, M.; Vettermann, S.; Böttge, U.; Escaleira, C.; Rüdiger, D.
Conference Paper
2004Modeling critical infrastructure requirements
Wolthusen, S.
Conference Paper
2004Synchronization of run-time security information policies
Ghori, M.H.
: Schaefer, K. (Prüfer); Schmucker, M. (Prüfer)
Master Thesis
2004Tempering network stacks
Wolthusen, Stephen
Conference Paper
2003Embedding policy-controlled ID sensors within host operation system security enforcement components for real time monitoring
Wolthusen, S.
Conference Paper
2003Goalkeeper: Close-in interface protection
Wolthusen, S.
Conference Paper
2002Access and use control using externally controlled reference monitors
Wolthusen, S.
Journal Article
2002Distributed intrusion detection for policy. Controlled heterogeneous environments
Wolthusen, S.
Conference Paper
2002IT-Sicherheit - wie geht das?
Busch, C.; Wolthusen, S.
Book Article
2001Layered multipoint network defense and security policy enforcement
Wolthusen, S.
Conference Paper
2001Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
Wolthusen, S.
Conference Paper
1996Security policies in OSI-management - experiences from the DeTeBerkom project BMSec
Grimm, R.; Hetschold, T.
Journal Article