If you made any changes in Pure these will be visible here soon.

Research Output 1998 2019

  • 60 Conference Paper
  • 10 Article
  • 3 Chapter (Book)
  • 3 Foreword / Postscript
2010

Privacy in distributed commercial applications

Kuntze, N. & Rudolph, C., 1 Jan 2010, What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010 Held as Part of WCC 2010, Proceedings. Springer, p. 214-224 11 p. (IFIP Advances in Information and Communication Technology; vol. 328).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

19 Citations (Scopus)

Securing digital evidence

Richter, J., Kuntze, N. & Rudolph, C., 2010, Proceedings of the 5th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010). Endicott-Popovsky, B. & Lee, W. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2010. p. 119 - 130 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Security engineering for embedded systems - The SecFutur vision

Gürgens, S., Rudolph, C., Maña, A. & Nadjm-Tehrani, S., 2010, International Workshop on Security and Dependability for Resource Constrained Embedded Systems (secure and dependable RCES by design) (S&D4RCES 2010): In conjunction with SAFECOMP 2010 Conference: Schoenbrunn Palace Conference Centre, Vienna, Austria, 14 September 2010 [proceedings]. Hamid, B., Rudolph, C. & Ruland, C. (eds.). New York, New York: Association for Computing Machinery (ACM), 7

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Trust infrastructures for future energy networks

Kuntze, N., Rudolph, C., Cupelli, M., Liu, J. & Monti, A., 2010, IEEE PES General Meeting, PES 2010. 5589609

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Trust in peer-to-peer content distribution protocols

Kuntze, N., Rudolph, C. & Fuchs, A., 2010, Proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP 2010). Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K. & Sauveron, D. (eds.). Heidelberg Germany: Springer, Vol. 6033. p. 76 - 89 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009
1 Citation (Scopus)

On the security validation of integrated security solutions

Fuchs, A., Gürgens, S. & Rudolph, C., 2009, Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings. Vol. 297. p. 190-201 12 p. (IFIP Advances in Information and Communication Technology; vol. 297).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Reliable identities using off-the-shelf hardware security in MANETs

Kuntze, N., Fuchs, A. & Rudolph, C., 2009, Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 - 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009. Vol. 2. p. 781-786 6 p. 5283056

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Secure Web Service Workflow Execution

Rudolph, C., Kuntze, N. & Velikova, Z., 2 Apr 2009, In : Electronic Notes in Theoretical Computer Science. 236, C, p. 33-46 14 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Towards a generic process for security pattern integration

Fuchs, A., Gürgens, S. & Rudolph, C., 2009, Proceedings - 20th International Workshop on Database and Expert Systems Applications, DEXA2009. p. 171-175 5 p. 5337200

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trust in distributed small sized data centers

Kuntze, N. & Rudolph, C., 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 28-33 6 p. 5319266

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Verification of S&D Solutions for Network Communications and Devices

Rudolph, C., Compagna, L., Carbone, R., Muñoz, A. & Repp, J., 2009, Security and Dependability for Ambient Intelligence. Vol. 45. p. 143-163 21 p. (Advances in Information Security; vol. 45).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2008
5 Citations (Scopus)

Trust in business processes

Kuntze, N., Schmidt, A. U., Velikova, Z. & Rudolph, C., 1 Dec 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 1992-1997 6 p. 4709279

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007
31 Citations (Scopus)

Covert identity information in direct anonymous attestation (DAA)

Rudolph, C., 2007, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007). Venter, H., Eloff, M., Labuschagne, L., Eloff, J. & von Solms, R. (eds.). New York NY USA: Springer, Vol. 232. p. 443 - 448 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Facilitating the use of TPM technologies through S&D patterns

Gürgens, S., Rudolph, C., Maña, A. & Muñoz, A., 1 Dec 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 765-769 5 p. 4312997

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

36 Citations (Scopus)

Security evaluation of scenarios based on the TCG's TPM specification

Gurgens, S., Rudolph, C., Scheuermann, D. & Atts, M., 2007, Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS 2007). Biskup, J. & Lopez, J. (eds.). Heidelberg Germany: Springer, Vol. 4734. p. 438 - 453 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2006
12 Citations (Scopus)

Security engineering for ambient intelligence: A manifesto

Maña, A., Rudolph, C., Spanoudakis, G., Lotz, V., Massacci, F., Melideo, M. & López-Cobo, J. S., 1 Dec 2006, Integrating Security and Software Engineering: Advances and Future Visions. IGI Global, p. 244-270 27 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2005
13 Citations (Scopus)

Abstractions preserving parameter confidentiality

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Dec 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 418-437 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3679 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

29 Citations (Scopus)

On a formal framework for security properties

Gurgens, S., Ochsenschlager, P. & Rudolph, C., 2005, In : Computer Standards and Interfaces. 27, 5, p. 457 - 466 10 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

On the security of fair non-repudiation protocols

Gurgens, S., Rudolph, C. & Vogt, H., 2005, In : International Journal of Information Security. 4, 4, p. 253 - 262 10 p.

Research output: Contribution to journalArticleResearchpeer-review

8 Citations (Scopus)

Security analysis of efficient (Un-) fair non-repudiation protocols

Gurgens, S. & Rudolph, C., 2005, In : Formal Aspects of Computing. 17, 3, p. 260 - 276 17 p.

Research output: Contribution to journalArticleResearchpeer-review

2003
24 Citations (Scopus)

A business process-driven approach to security engineering

Maña, A., Montenegro, J. A., Rudolph, C. & Vivas, J. L., 1 Jan 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. IEEE, Institute of Electrical and Electronics Engineers, Vol. 2003-January. p. 477-481 5 p. 1232069

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

25 Citations (Scopus)

On the security of fair non-repudiation protocols

Gürgens, S., Rudolph, C. & Vogt, H., 1 Dec 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2851, p. 193-207 15 p.

Research output: Contribution to journalArticleResearchpeer-review

29 Citations (Scopus)

Security analysis of (Un-) fair non-repudiation protocols

Gürgens, S. & Rudolph, C., 1 Dec 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2629, p. 97-114 18 p.

Research output: Contribution to journalArticleResearchpeer-review

2002
14 Citations (Scopus)

Authenticity and provability - A formal framework

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Jan 2002, Infrastructure Security - International Conference, InfraSec 2002, Proceedings. Springer-Verlag London Ltd., p. 227-245 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2437).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

Role based specification and security analysis of cryptographic protocols using asynchronous product automata

Gürgens, S., Ochsenschläger, P. & Rudolph, C., 1 Jan 2002, Proceedings - 13th International Workshop on Database and Expert Systems Applications, DEXA 2002. IEEE, Institute of Electrical and Electronics Engineers, Vol. 2002-January. p. 473-479 7 p. 1045943

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1998
2 Citations (Scopus)

A formal model for systematic design of key establishment protocols

Rudolph, C., 1 Jan 1998, Information Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings. Springer-Verlag London Ltd., p. 332-343 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1438).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review