| | |
---|
2017 | Data residency challenges and opportunities for standardization Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char | Report |
2017 | SDN-based security policy module for Industry 4.0 remote maintenance Papp, Katalin : Khondoker, Rahamatullah; Weber, Frank; Larbig, Pedro; Massacci, Fabio; Waidner, Michael | Master Thesis |
2016 | A framework for generating user- and domain-tailored security policy editors Rudolph, Manuel; Moucha, Cornelius; Feth, Denis | Report |
2016 | A framework for generating user- and domain-tailored security policy editors Rudolph, Manuel; Moucha, Cornelius; Feth, Denis | Conference Paper |
2016 | Requirements elicitation and derivation of security policy templates - an industrial case study Rudolph, Manuel; Feth, Denis; Doerr, Joerg; Spilker, Joerg | Report |
2014 | Datenkontrolle der Zukunft. Sicherheitsrichtlinien über Systemgrenzen hinweg eigenverantworlich durchsetzen können Doerr, Joerg; Eisenbarth, Michael | Journal Article |
2014 | Datenkontrolle der Zukunft: Sicherheitsrichtlinien über Systemgrenzen hinweg eigenverantwortlich durchsetzen können Doerr, Joerg; Eisenbarth, Michael | Report |
2014 | Enhancing cloud security with context-aware usage control policies Jung, Christian; Eitel, Andreas; Schwarz, Reinhard | Report |
2014 | Enhancing cloud security with context-aware usage control policies Jung, Christian; Eitel, Andreas; Schwarz, Reinhard | Conference Paper |
2014 | Security policy specification templates for critical infrastructure services in the cloud Rudolph, Manuel; Schwarz, Reinhard; Jung, Christian | Report |
2014 | Security policy specification templates for critical infrastructure services in the cloud Rudolph, Manuel; Schwarz, Reinhard; Jung, Christian | Conference Paper |
2012 | Goal-based policies for self-protecting systems Schütte, J. | Conference Paper |
2011 | Apollon: Towards a semantically extensible policy framework Schütte, J. | Conference Paper |
2009 | Die Auswirkungen des Klimawandels auf sicherheits- und verteidigungspolitische Fragestellungen Müller, S. | Report |
2009 | What is the shape of your security policy? Security as a classification problem Türpe, S. | Conference Paper |
2007 | A holistic approach to security policies - policy distribution with XACML over COPS Peters, J.; Rieke, R.; Rochaeli, T.; Steinemann, B.; Wolf, R. | Conference Paper, Journal Article |
2006 | Enterprise document security Oesing, Ursula; Krüger, Roland; Pinsdorf, Ulrich | Conference Paper |
2006 | Risikomanagement, Sicherheitspolitiken und technische Verfahren zu deren Durchsetzung (I) Wolthusen, S. | Journal Article |
2006 | Risikomanagement, Sicherheitspolitiken und technische Verfahren zu deren Durchsetzung (II) Wolthusen, S. | Journal Article |
2005 | Protocols for policy negotiation Peters, J.; Rieke, R.; Rochaeli, T.; Steinemann, B.; Wolf, R. | Report |
2004 | Implementierung von Security Policies in offenen Telekollaborationen Herfert, M.; Schmidt, A.U.; Ochsenschläger, P.; Repp, J.; Rieke, R.; Schmucker, M.; Vettermann, S.; Böttge, U.; Escaleira, C.; Rüdiger, D. | Conference Paper |
2004 | Modeling critical infrastructure requirements Wolthusen, S. | Conference Paper |
2004 | Synchronization of run-time security information policies Ghori, M.H. : Schaefer, K. (Prüfer); Schmucker, M. (Prüfer) | Master Thesis |
2004 | Tempering network stacks Wolthusen, Stephen | Conference Paper |
2003 | Embedding policy-controlled ID sensors within host operation system security enforcement components for real time monitoring Wolthusen, S. | Conference Paper |
2003 | Goalkeeper: Close-in interface protection Wolthusen, S. | Conference Paper |
2002 | Access and use control using externally controlled reference monitors Wolthusen, S. | Journal Article |
2002 | Distributed intrusion detection for policy. Controlled heterogeneous environments Wolthusen, S. | Conference Paper |
2002 | IT-Sicherheit - wie geht das? Busch, C.; Wolthusen, S. | Book Article |
2001 | Layered multipoint network defense and security policy enforcement Wolthusen, S. | Conference Paper |
2001 | Security Policy Enforcement at the File System Level in the Windows NT Operating System Family Wolthusen, S. | Conference Paper |
1996 | Security policies in OSI-management - experiences from the DeTeBerkom project BMSec Grimm, R.; Hetschold, T. | Journal Article |