If you made any changes in Pure these will be visible here soon.

Research Output 1998 2019

  • 60 Conference Paper
  • 10 Article
  • 3 Chapter (Book)
  • 3 Foreword / Postscript
1998
2 Citations (Scopus)

A formal model for systematic design of key establishment protocols

Rudolph, C., 1 Jan 1998, Information Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings. Springer-Verlag London Ltd., p. 332-343 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1438).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2002
14 Citations (Scopus)

Authenticity and provability - A formal framework

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Jan 2002, Infrastructure Security - International Conference, InfraSec 2002, Proceedings. Springer-Verlag London Ltd., p. 227-245 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2437).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

Role based specification and security analysis of cryptographic protocols using asynchronous product automata

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Jan 2002, Proceedings - 13th International Workshop on Database and Expert Systems Applications, DEXA 2002. IEEE, Institute of Electrical and Electronics Engineers, Vol. 2002-January. p. 473-479 7 p. 1045943

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2003
24 Citations (Scopus)

A business process-driven approach to security engineering

Maña, A., Montenegro, J. A., Rudolph, C. & Vivas, J. L., 1 Jan 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. IEEE, Institute of Electrical and Electronics Engineers, Vol. 2003-January. p. 477-481 5 p. 1232069

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

25 Citations (Scopus)

On the security of fair non-repudiation protocols

Gürgens, S., Rudolph, C. & Vogt, H., 1 Dec 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2851, p. 193-207 15 p.

Research output: Contribution to journalArticleResearchpeer-review

29 Citations (Scopus)

Security analysis of (Un-) fair non-repudiation protocols

Gürgens, S. & Rudolph, C., 1 Dec 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2629, p. 97-114 18 p.

Research output: Contribution to journalArticleResearchpeer-review

2005
13 Citations (Scopus)

Abstractions preserving parameter confidentiality

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Dec 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 418-437 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3679 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

29 Citations (Scopus)

On a formal framework for security properties

Gurgens, S., Ochsenschlager, P. & Rudolph, C., 2005, In : Computer Standards and Interfaces. 27, 5, p. 457 - 466 10 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

On the security of fair non-repudiation protocols

Gurgens, S., Rudolph, C. & Vogt, H., 2005, In : International Journal of Information Security. 4, 4, p. 253 - 262 10 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Security analysis of efficient (Un-) fair non-repudiation protocols

Gurgens, S. & Rudolph, C., 2005, In : Formal Aspects of Computing. 17, 3, p. 260 - 276 17 p.

Research output: Contribution to journalArticleResearchpeer-review

2006
12 Citations (Scopus)

Security engineering for ambient intelligence: A manifesto

Maña, A., Rudolph, C., Spanoudakis, G., Lotz, V., Massacci, F., Melideo, M. & López-Cobo, J. S., 1 Dec 2006, Integrating Security and Software Engineering: Advances and Future Visions. IGI Global, p. 244-270 27 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2007
31 Citations (Scopus)

Covert identity information in direct anonymous attestation (DAA)

Rudolph, C., 2007, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007). Venter, H., Eloff, M., Labuschagne, L., Eloff, J. & von Solms, R. (eds.). New York NY USA: Springer, Vol. 232. p. 443 - 448 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Facilitating the use of TPM technologies through S&D patterns

Gürgens, S., Rudolph, C., Maña, A. & Muñoz, A., 1 Dec 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 765-769 5 p. 4312997

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

36 Citations (Scopus)

Security evaluation of scenarios based on the TCG's TPM specification

Gurgens, S., Rudolph, C., Scheuermann, D. & Atts, M., 2007, Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS 2007). Biskup, J. & Lopez, J. (eds.). Heidelberg Germany: Springer, Vol. 4734. p. 438 - 453 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008
5 Citations (Scopus)

Trust in business processes

Kuntze, N., Schmidt, A. U., Velikova, Z. & Rudolph, C., 1 Dec 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 1992-1997 6 p. 4709279

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009
1 Citation (Scopus)

On the security validation of integrated security solutions

Fuchs, A., Gürgens, S. & Rudolph, C., 2009, Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings. Vol. 297. p. 190-201 12 p. (IFIP Advances in Information and Communication Technology; vol. 297).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Reliable identities using off-the-shelf hardware security in MANETs

Kuntze, N., Fuchs, A. & Rudolph, C., 2009, Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 - 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009. Vol. 2. p. 781-786 6 p. 5283056

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Secure Web Service Workflow Execution

Rudolph, C., Kuntze, N. & Velikova, Z., 2 Apr 2009, In : Electronic Notes in Theoretical Computer Science. 236, C, p. 33-46 14 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Towards a generic process for security pattern integration

Fuchs, A., Gürgens, S. & Rudolph, C., 2009, Proceedings - 20th International Workshop on Database and Expert Systems Applications, DEXA2009. p. 171-175 5 p. 5337200

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trust in distributed small sized data centers

Kuntze, N. & Rudolph, C., 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 28-33 6 p. 5319266

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Verification of S&D Solutions for Network Communications and Devices

Rudolph, C., Compagna, L., Carbone, R., Muñoz, A. & Repp, J., 2009, Security and Dependability for Ambient Intelligence. Vol. 45. p. 143-163 21 p. (Advances in Information Security; vol. 45).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2010
12 Citations (Scopus)

A formal notion of trust – enabling reasoning about security properties

Fuchs, A., Gürgens, S. & Rudolph, C., 2010, Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Proceedings. Springer, Vol. 321. p. 200-215 16 p. (IFIP Advances in Information and Communication Technology; vol. 321).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

19 Citations (Scopus)

A user-centric privacy manager for future energy systems

Phom, H. S., Kuntze, N., Rudolph, C., Cupelli, M., Liu, J. & Monti, A., 2010, 2010 International Conference on Power System Technology: Technological Innovations Making Power Grid Smarter, POWERCON2010. 5666447

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preface

Hamid, B., Rudolph, C. & Rulan, C., 2010, International Workshop on Security and Dependability for Resource Constrained Embedded Systems (secure and dependable RCES by design) (S&D4RCES 2010): In conjunction with SAFECOMP 2010 Conference: Schoenbrunn Palace Conference Centre, Vienna, Austria, 14 September 2010 [proceedings]. New York, New York: Association for Computing Machinery (ACM), 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

Privacy in distributed commercial applications

Kuntze, N. & Rudolph, C., 1 Jan 2010, What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010 Held as Part of WCC 2010, Proceedings. Springer, p. 214-224 11 p. (IFIP Advances in Information and Communication Technology; vol. 328).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

19 Citations (Scopus)

Securing digital evidence

Richter, J., Kuntze, N. & Rudolph, C., 2010, Proceedings of the 5th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010). Endicott-Popovsky, B. & Lee, W. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2010. p. 119 - 130 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Security engineering for embedded systems - The SecFutur vision

Gürgens, S., Rudolph, C., Maña, A. & Nadjm-Tehrani, S., 2010, International Workshop on Security and Dependability for Resource Constrained Embedded Systems (secure and dependable RCES by design) (S&D4RCES 2010): In conjunction with SAFECOMP 2010 Conference: Schoenbrunn Palace Conference Centre, Vienna, Austria, 14 September 2010 [proceedings]. Hamid, B., Rudolph, C. & Ruland, C. (eds.). New York, New York: Association for Computing Machinery (ACM), 7

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Trust infrastructures for future energy networks

Kuntze, N., Rudolph, C., Cupelli, M., Liu, J. & Monti, A., 2010, IEEE PES General Meeting, PES 2010. 5589609

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Trust in peer-to-peer content distribution protocols

Kuntze, N., Rudolph, C. & Fuchs, A., 2010, Proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP 2010). Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K. & Sauveron, D. (eds.). Heidelberg Germany: Springer, Vol. 6033. p. 76 - 89 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2011
7 Citations (Scopus)

A property based security risk analysis through weighted simulation

Winkelvos, T., Rudolph, C. & Repp, J., 2011, 2011 Annual Conference on Information Security for South Africa (ISSA 2011). Venter, H., Coetzee, M., Loock, M. & Olivier, M. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Formal notions of trust and confidentiality– enabling reasoning about system security

Fuchs, A., Gürgens, S. & Rudolph, C., 2011, In : Journal of Information Processing. 19, p. 274-291 18 p.

Research output: Contribution to journalArticleResearchpeer-review

13 Citations (Scopus)

Interoperable device identification in smart-grid environments

Kuntze, N., Rudolph, C., Bente, I., Vieweg, J. & von Helden, J., 2011, Proceedings of the 2011 IEEE Power & Energy Society (PES) General Meeting. Van Wagner (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 7 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preface

Hamid, B., Rudolph, C., Mana, A. & Nadjm-Tehrani, S., 2011, International Workshop on Security and Dependability for Resource Constrained Embedded Systems (Secure and Dependable RCES by Design), S and D4RCES - 2011, in conjunction with SAFECOMP 2011 Conference, Naples, Italy, 22 September 2011.

Research output: Chapter in Book/Report/Conference proceedingForeword / PostscriptOtherpeer-review

13 Citations (Scopus)

Secure digital chains of evidence

Kuntze, N. & Rudolph, C., 2011, Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). Campbell, R. & Guan, Y. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2012
1 Citation (Scopus)

Establishing trust between nodes in mobile ad-hoc networks

Kuntze, N., Rudolph, C. & Paatero, J., 2012, Proceedings of the 4th International Conference on Trusted Systems (INTRUST 2012). Mitchell, C. J. & Tomlinson, A. (eds.). Heidelberg Germany: Springer, Vol. 7711. p. 48 - 62 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Introducing security building block models

Rein, A., Rudolph, C., Ruiz, J. F. & Fernandez, M. A., 2012, Proceedings of the ASE International Conference on Biomedical Computing (BioMedCom 2012). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 132 - 139 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

On the creation of reliable digital evidence

Kuntze, N., Rudolph, C., Alva, A., Endicott-Popovsky, B., Christiansen, J. & Kemmerich, T., 2012, Advances in Digital Forensics VIII. Peterson, G. & Shenoi, S. (eds.). New York NY USA: Springer, Vol. 383. p. 3 - 17 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Redefining security engineering

Rudolph, C. & Fuchs, A., 2012, Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS 2012). Badra, M. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2012. p. 1 - 6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Trust areas: A security paradigm for the future Internet

Rudolph, C., 2012, Proceedings of the 7th International Workshop on Security and Trust Management (STM 2011). Goos, G., Hartmanis, J. & van Leeuwen, J. (eds.). Heidelberg Germany: Springer, Vol. 7170. p. 22 - 27 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trusted service access with dynamic security infrastructure configuration

Marx, R., Kuntze, N., Rudolph, C., Bente, I. & Vieweg, J., 2012, 18th Asia-Pacific Conference on Communications (APCC 2012). Cho, Y. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2012. p. 730 - 735 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2013

Building secure systems using a security engineering process and security building blocks

Rein, A., Rudolph, C. & Ruiz, J. F., 2013, Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium): Fachtagung des GI-Fachbereichs Softwaretechnik, 26.02.–01.03.2013, in Aachen [proceedings]. Wagner, S. & Lichter, H. (eds.). Bonn: Gesellschaft fur Informatik (GI), Vol. P-215. p. 529-544 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

Demo: Zero touch configuration

Kuntze, N., Larbig, P. & Rudolph, C., 2013, Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. IEEE, Institute of Electrical and Electronics Engineers, p. 1076-1077 2 p. 6573136

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)

Enhancing security testing via automated replication of IT-asset topologies

Birkholz, H., Sieverdingbeck, I., Kuntze, N. & Rudolph, C., 2013, Proceedings of the 2013 8th International Conference on Availability, Reliability and Security (ARES 2013). Tjoa, A. M. & Weippl, E. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 341 - 349 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Integrating trust establishment into routing protocols of today's MANETs

Oberle, A., Rein, A., Kuntze, N., Rudolph, C., Paatero, J., Lunn, A. & Racz, P., 2013, Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC 2013). Wang, J. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 2369 - 2374 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

LMM: A common component for software license management on cloud

Kiyomoto, S., Rein, A., Nakano, Y., Rudolph, C. & Miyake, Y., 2013, Proceedings of the 10th International Conference on Security and Crytography (SECRYPT 2013). Samarati, P. (ed.). Setubal Portugal: ScitePress, Science and Technology Publications, Vol. 2013. p. 284 - 295 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

On the automatic establishment of security relations for devices

Kuntze, N. & Rudolph, C., 2013, Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). De Turck, F., Diao, Y. & Hong, C. S. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 832 - 835 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

5 Citations (Scopus)

Secure deployment of SmartGrid equipment

Kuntze, N. & Rudolph, C., 2013, Proceedings of the 2013 IEEE Power & Energy Society (PES) General Meeting. Vaahedi, E. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 1 - 5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security engineering based on structured formal reasoning

Fuchs, A. & Rudolph, C., 2013, Proceedings of the ASE International Conference on BioMedical Computing (BioMedCom 2012). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 145 - 152 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Seizure of digital data and 'selective suppression' of digital evidence

Kuntze, N., Rudolph, C., Schilling, H., Alva, A., Brisbois, B. & Endicott-Popovsky, B., 2013, Proceedings of the 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE). Lee, C. C. & Elmaghraby, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1 - 6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

ZeMoSS-Workshop: Zertifizierung und modellgetriebene Entwicklung sicherer Software

Translated title of the contribution: ZeMoSS Workshop: Certification and model-driven development of secure softwareHuhn, M., Gerken, S. & Rudolph, C., 2013, Software Engineering 2013 - Fachtagung des GI-Fachbereichs Softwaretechnik, Proceedings. Gesellschaft fur Informatik (GI), Vol. P-213. p. 367 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch