If you made any changes in Pure these will be visible here soon.

Research Output 1998 2019

  • 60 Conference Paper
  • 10 Article
  • 3 Chapter (Book)
  • 3 Foreword / Postscript
Article
3 Citations (Scopus)

An integrated security and systems engineering process and modelling framework

Ruiz, J. F., Maña, A. & Rudolph, C., 2015, In : Computer Journal. 58, 10, p. 2328-2350 23 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Forensic readiness: emerging discipline for creating reliable and secure digital evidence

Endicott-Popovsky, B., Kuntze, N. & Rudolph, C., 2015, In : Journal of Harbin Institute of Technology (New Series). 22, 1, p. 1-8 8 p.

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

Formal notions of trust and confidentiality– enabling reasoning about system security

Fuchs, A., Gürgens, S. & Rudolph, C., 2011, In : Journal of Information Processing. 19, p. 274-291 18 p.

Research output: Contribution to journalArticleResearchpeer-review

29 Citations (Scopus)

On a formal framework for security properties

Gurgens, S., Ochsenschlager, P. & Rudolph, C., 2005, In : Computer Standards and Interfaces. 27, 5, p. 457 - 466 10 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

On the security of fair non-repudiation protocols

Gurgens, S., Rudolph, C. & Vogt, H., 2005, In : International Journal of Information Security. 4, 4, p. 253 - 262 10 p.

Research output: Contribution to journalArticleResearchpeer-review

25 Citations (Scopus)

On the security of fair non-repudiation protocols

Gürgens, S., Rudolph, C. & Vogt, H., 1 Dec 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2851, p. 193-207 15 p.

Research output: Contribution to journalArticleResearchpeer-review

14 Citations (Scopus)

Secure Web Service Workflow Execution

Rudolph, C., Kuntze, N. & Velikova, Z., 2 Apr 2009, In : Electronic Notes in Theoretical Computer Science. 236, C, p. 33-46 14 p.

Research output: Contribution to journalArticleResearchpeer-review

29 Citations (Scopus)

Security analysis of (Un-) fair non-repudiation protocols

Gürgens, S. & Rudolph, C., 1 Dec 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2629, p. 97-114 18 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Security analysis of efficient (Un-) fair non-repudiation protocols

Gurgens, S. & Rudolph, C., 2005, In : Formal Aspects of Computing. 17, 3, p. 260 - 276 17 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

Security knowledge representation artifacts for creating secure IT systems

Ruiz, J. F., Arjona, M., Mana, A. & Rudolph, C., Jan 2017, In : Computers & Security. 64, p. 69-91 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Chapter (Book)
8 Citations (Scopus)

On the creation of reliable digital evidence

Kuntze, N., Rudolph, C., Alva, A., Endicott-Popovsky, B., Christiansen, J. & Kemmerich, T., 2012, Advances in Digital Forensics VIII. Peterson, G. & Shenoi, S. (eds.). New York NY USA: Springer, Vol. 383. p. 3 - 17 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

12 Citations (Scopus)

Security engineering for ambient intelligence: A manifesto

Maña, A., Rudolph, C., Spanoudakis, G., Lotz, V., Massacci, F., Melideo, M. & López-Cobo, J. S., 1 Dec 2006, Integrating Security and Software Engineering: Advances and Future Visions. IGI Global, p. 244-270 27 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Verification of S&D Solutions for Network Communications and Devices

Rudolph, C., Compagna, L., Carbone, R., Muñoz, A. & Repp, J., 2009, Security and Dependability for Ambient Intelligence. Vol. 45. p. 143-163 21 p. (Advances in Information Security; vol. 45).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Conference Paper
13 Citations (Scopus)

Abstractions preserving parameter confidentiality

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Dec 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 418-437 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3679 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)

A business process-driven approach to security engineering

Maña, A., Montenegro, J. A., Rudolph, C. & Vivas, J. L., 1 Jan 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. IEEE, Institute of Electrical and Electronics Engineers, Vol. 2003-January. p. 477-481 5 p. 1232069

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A dynamic access control policy model for sharing of healthcare data in multiple domains

Salehi Shahraki, A., Rudolph, C. & Grobler, M., 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering. Chen, L., Ko, R. & Zhu, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 618-625 8 p. 8887394

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A dynamic cross-domain access control model for collaborative healthcare application

Salehi, A., Rudolph, C. & Grobler, M., 2019, IFIP/IEEE International Symposium on Integrated Network Management, IM 2019. Clemm, A., Ata, S. & Francois, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 643-648 6 p. 8717924

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

A formal model for systematic design of key establishment protocols

Rudolph, C., 1 Jan 1998, Information Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings. Springer-Verlag London Ltd., p. 332-343 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1438).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

A formal notion of trust – enabling reasoning about security properties

Fuchs, A., Gürgens, S. & Rudolph, C., 2010, Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Proceedings. Springer, Vol. 321. p. 200-215 16 p. (IFIP Advances in Information and Communication Technology; vol. 321).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A logic for secure stratified systems and its application to containerized systems

Lauer, H., Sakzad, A., Rudolph, C. & Nepal, S., 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering. Chen, L., Ko, R. & Zhu, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 562-569 8 p. 8887372

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

An implementation of access-control protocol for IoT home scenario

Wu, X., Steinfeld, R., Liu, J. & Rudolph, C., 2017, Proceedings - 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017). Zhu, G., Yao, S., Cui, X. & Xu, S. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 31-37 7 p. 7959965

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
7 Citations (Scopus)

A property based security risk analysis through weighted simulation

Winkelvos, T., Rudolph, C. & Repp, J., 2011, 2011 Annual Conference on Information Security for South Africa (ISSA 2011). Venter, H., Coetzee, M., Loock, M. & Olivier, M. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A resilient and distributed cabin network architecture

Kuntze, N., Rudolph, C., Hanka, O., Tobeck, N. & Shaw, D., 2014, 33rd DASC Digital Avionics Systems Conference, Designing and Air Transportation System with Multi-Level Resilience: Antlers Hilton, Colorado Springs, CO | October 5-9, 2014. Tank, A. & Blasch, E. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. A41-A410 10 p. 6979464

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

A security engineering process for systems of systems using security patterns

Ruiz, J. F., Rudolph, C., Mana, A. & Arjona, M., 2014, Proceedings - 8th Annual IEEE International Systems Conference, SysCon 2014: March 31 - April 3, 2014 Ottawa, ON, Canada. Givigi, S. & Beaulieu, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 8-11 4 p. 6819228

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

19 Citations (Scopus)

A user-centric privacy manager for future energy systems

Phom, H. S., Kuntze, N., Rudolph, C., Cupelli, M., Liu, J. & Monti, A., 2010, 2010 International Conference on Power System Technology: Technological Innovations Making Power Grid Smarter, POWERCON2010. 5666447

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Authenticity and provability - A formal framework

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Jan 2002, Infrastructure Security - International Conference, InfraSec 2002, Proceedings. Springer-Verlag London Ltd., p. 227-245 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2437).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Building secure systems using a security engineering process and security building blocks

Rein, A., Rudolph, C. & Ruiz, J. F., 2013, Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium): Fachtagung des GI-Fachbereichs Softwaretechnik, 26.02.–01.03.2013, in Aachen [proceedings]. Wagner, S. & Lichter, H. (eds.). Bonn: Gesellschaft fur Informatik (GI), Vol. P-215. p. 529-544 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)

"Can I trust the data I see?": a physician's concern on medical data in IoT health architectures

Jaigirdar, F. T., Rudolph, C. & Bain, C., 2019, ACSW'19 - Proceedings of the Australasian Computer Science Week Multiconference: Sydney, NSW, Australia — January 29 - 31, 2019. Wang, Y. & Patterson, D. (eds.). New York NY USA: Association for Computing Machinery (ACM), 10 p. 27

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

CeMoSS - Certification and model-driven development of safe and secure software

Huhn, M., Gerken, S. & Rudolph, C., 2014, Software Engineering 2014. Huhn, M., Gerken, S. & Rudolph, C. (eds.). Germany: Gesellschaft fur Informatik (GI), Vol. P227. p. 207-208 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

31 Citations (Scopus)

Covert identity information in direct anonymous attestation (DAA)

Rudolph, C., 2007, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007). Venter, H., Eloff, M., Labuschagne, L., Eloff, J. & von Solms, R. (eds.). New York NY USA: Springer, Vol. 232. p. 443 - 448 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Demo: Zero touch configuration

Kuntze, N., Larbig, P. & Rudolph, C., 2013, Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. IEEE, Institute of Electrical and Electronics Engineers, p. 1076-1077 2 p. 6573136

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)

Distributed security management for the IoT

Lincke, N., Kuntze, N. & Rudolph, C., 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015: May 11-15, 2015 Ottawa, Canada. Ata, S., Badonnel, R. & Xiao, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1373-1376 4 p. 7140499

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Enhancing security testing via automated replication of IT-asset topologies

Birkholz, H., Sieverdingbeck, I., Kuntze, N. & Rudolph, C., 2013, Proceedings of the 2013 8th International Conference on Availability, Reliability and Security (ARES 2013). Tjoa, A. M. & Weippl, E. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 341 - 349 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Establishing trust between nodes in mobile ad-hoc networks

Kuntze, N., Rudolph, C. & Paatero, J., 2012, Proceedings of the 4th International Conference on Trusted Systems (INTRUST 2012). Mitchell, C. J. & Tomlinson, A. (eds.). Heidelberg Germany: Springer, Vol. 7711. p. 48 - 62 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Exploring the space of digital evidence: Position paper

Rudolph, C., 30 Jun 2016, Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016, Proceedings, Part I. Liu, J. K. & Steinfeld, R. (eds.). Switzerland: Springer, p. 249-262 14 p. (Lecture Notes in Computer Science; vol. 9722).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Facilitating the use of TPM technologies through S&D patterns

Gürgens, S., Rudolph, C., Maña, A. & Muñoz, A., 1 Dec 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 765-769 5 p. 4312997

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

High impact False Data Injection Attack against Real-Time Pricing in Smart Grids

Dayaratne, T., Rudolph, C., Liebman, A., Salehi, M. & He, S., 2019, Proceedings of 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe). Dumbrava, V. & Roscia, M. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, 5 p. 8905473

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools

Zolotavkin, Y., Garcia, J. & Rudolph, C., 2017, Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Proceedings: 8th International Conference, GameSec 2017, Vienna, Austria, October 23–25, 2017, Proceedings. Rass, S., An, B., Kiekintveld, C., Fang, F. & Schauer, S. (eds.). Cham, Switzerland: Springer, Vol. 10575 LNCS. p. 21-39 19 p. (Lecture Notes in Computer Science; vol. 10575).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Integrating trust establishment into routing protocols of today's MANETs

Oberle, A., Rein, A., Kuntze, N., Rudolph, C., Paatero, J., Lunn, A. & Racz, P., 2013, Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC 2013). Wang, J. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 2369 - 2374 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Integrity based relationships and trustworthy communication between network participants

Oberle, A., Larbig, P., Kuntze, N. & Rudolph, C., 2014, IEEE ICC 2014 - Communication and Information Systems Security Symposium. Jamalipour, A. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 610-615 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

5 Citations (Scopus)

Integrity protection in a smart grid environment for wireless access of smart meters

Detken, K-O., Genzel, C-H., Rudolph, C. & Jahnke, M., 2014, Proceedings - 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems, IDAACS-SWS 2014: 11-12 September 2014 Offenburg, Germany. Sachenko, A. & Sikora, A. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. 79-86 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Interoperable device identification in smart-grid environments

Kuntze, N., Rudolph, C., Bente, I., Vieweg, J. & von Helden, J., 2011, Proceedings of the 2011 IEEE Power & Energy Society (PES) General Meeting. Van Wagner (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 7 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Introducing security building block models

Rein, A., Rudolph, C., Ruiz, J. F. & Fernandez, M. A., 2012, Proceedings of the ASE International Conference on Biomedical Computing (BioMedCom 2012). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 132 - 139 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

LMM: A common component for software license management on cloud

Kiyomoto, S., Rein, A., Nakano, Y., Rudolph, C. & Miyake, Y., 2013, Proceedings of the 10th International Conference on Security and Crytography (SECRYPT 2013). Samarati, P. (ed.). Setubal Portugal: ScitePress, Science and Technology Publications, Vol. 2013. p. 284 - 295 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

On the automatic establishment of security relations for devices

Kuntze, N. & Rudolph, C., 2013, Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). De Turck, F., Diao, Y. & Hong, C. S. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 832 - 835 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

On the secure distribution of vendor-specific keys in deployment scenarios

Kuntze, N. & Rudolph, C., 2015, ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26–28, 2015 Proceedings. Federrath, H. & Gollmann, D. (eds.). Cham Switzerland: Springer, p. 630-644 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

On the security validation of integrated security solutions

Fuchs, A., Gürgens, S. & Rudolph, C., 2009, Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings. Vol. 297. p. 190-201 12 p. (IFIP Advances in Information and Communication Technology; vol. 297).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy in distributed commercial applications

Kuntze, N. & Rudolph, C., 1 Jan 2010, What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010 Held as Part of WCC 2010, Proceedings. Springer, p. 214-224 11 p. (IFIP Advances in Information and Communication Technology; vol. 328).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

P-STM: privacy-protected Social Tie Mining of individual trajectories

Wang, S., Nepal, S., Sinnott, R. & Rudolph, C., 2019, Proceedings - 2019 IEEE International Conference on Web Services, IEEE ICWS 2019 - Part of the 2019 IEEE World Congress on Services, 8–13 July 2019 Milan, Italy. Bertino, E., Chang, C. K., Chen, P., Damiani, E., Goul, M. & Oyama, K. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-10 10 p. 8818397

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Redefining security engineering

Rudolph, C. & Fuchs, A., 2012, Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS 2012). Badra, M. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2012. p. 1 - 6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review