19982019
If you made any changes in Pure these will be visible here soon.

Research Output 1998 2019

  • 55 Conference Paper
  • 11 Article
  • 3 Chapter (Book)
  • 2 Foreword / Postscript
Filter
Conference Paper
2019

A dynamic cross-domain access control model for collaborative healthcare application

Salehi, A., Rudolph, C. & Grobler, M., 2019, IFIP/IEEE International Symposium on Integrated Network Management, IM 2019. Clemm, A., Ata, S. & Francois, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 643-648 6 p. 8717924

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

"Can I trust the data I see?": a physician's concern on medical data in IoT health architectures

Jaigirdar, F. T., Rudolph, C. & Bain, C., 2019, ACSW'19 - Proceedings of the Australasian Computer Science Week Multiconference: Sydney, NSW, Australia — January 29 - 31, 2019. Wang, Y. & Patterson, D. (eds.). New York NY USA: Association for Computing Machinery (ACM), 10 p. 27

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards a blockchain based fall prediction model for aged care

Rupasinghe, T., Burstein, F., Rudolph, C. & Strange, S., 2019, ACSW'19 - Proceedings of the Australasian Computer Science Week Multiconference: Sydney, NSW, Australia — January 29 - 31, 2019. Wang, Y. & Patterson, D. (eds.). New York NY USA: Association for Computing Machinery (ACM), 10 p. 32

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2018

User-centred attestation for layered and decentralised systems

Lauer, H., Salehi S., A., Rudolph, C. & Nepal, S., 2018, Proceedings -2018 - Workshop on Decentralized IoT Security and Standards (DISS) : February 18, 2018 San Diego, California. Bergmann, O., Dahm, T., Garcia-Morchon, O., Jurdak, R., Kovatsch, M., Król, M., Leiba, B., Marchal, S., Ott, J., Pfaff, O., Raza, S., Reshetova, E., Schooler, E., Selander, G., Sethi, M., Stavrou, A., Svetinovic, D., Tschofening, H., Tschorsch, F., Tschudin, C. & Tsudik, G. (eds.). Reston VA USA: Internet Society, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
2017

Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools

Zolotavkin, Y., Garcia, J. & Rudolph, C., 2017, Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Proceedings: 8th International Conference, GameSec 2017, Vienna, Austria, October 23–25, 2017, Proceedings. Rass, S., An, B., Kiekintveld, C., Fang, F. & Schauer, S. (eds.). Cham, Switzerland: Springer, Vol. 10575 LNCS. p. 21-39 19 p. (Lecture Notes in Computer Science; vol. 10575).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2016

Exploring the space of digital evidence: Position paper

Rudolph, C., 30 Jun 2016, Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016, Proceedings, Part I. Liu, J. K. & Steinfeld, R. (eds.). Switzerland: Springer, p. 249-262 14 p. (Lecture Notes in Computer Science; vol. 9722).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2015

Distributed security management for the IoT

Lincke, N., Kuntze, N. & Rudolph, C., 2015, Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015: May 11-15, 2015 Ottawa, Canada. Ata, S., Badonnel, R. & Xiao, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1373-1376 4 p. 7140499

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

On the secure distribution of vendor-specific keys in deployment scenarios

Kuntze, N. & Rudolph, C., 2015, ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26–28, 2015 Proceedings. Federrath, H. & Gollmann, D. (eds.). Cham Switzerland: Springer, p. 630-644 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security vs. safety: Why do people die despite good safety?

Kuntze, N., Rudolph, C., Brisbois, B., Boggess, M., Endicott-Popovsky, B. & Leivesley, S., 2015, ICNS 2015 - Innovation in Operations, Implementation Benefits and Integration of the CNS Infrastructure - Conference Proceedings: April 23-23 2015 Herndon, VA. Schnell, M. & Oishi, R. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 13. p. A4-1-A4-10 10 p. 7121276

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2014

A resilient and distributed cabin network architecture

Kuntze, N., Rudolph, C., Hanka, O., Tobeck, N. & Shaw, D., 2014, 33rd DASC Digital Avionics Systems Conference, Designing and Air Transportation System with Multi-Level Resilience: Antlers Hilton, Colorado Springs, CO | October 5-9, 2014. Tank, A. & Blasch, E. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. A41-A410 10 p. 6979464

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A security engineering process for systems of systems using security patterns

Ruiz, J. F., Rudolph, C., Mana, A. & Arjona, M., 2014, Proceedings - 8th Annual IEEE International Systems Conference, SysCon 2014: March 31 - April 3, 2014 Ottawa, ON, Canada. Givigi, S. & Beaulieu, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 8-11 4 p. 6819228

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

CeMoSS - Certification and model-driven development of safe and secure software

Huhn, M., Gerken, S. & Rudolph, C., 2014, Software Engineering 2014. Gesellschaft fur Informatik (GI), Vol. P227. p. 207-208 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Integrity based relationships and trustworthy communication between network participants

Oberle, A., Larbig, P., Kuntze, N. & Rudolph, C., 2014, Proceedings - 2014 IEEE International Conference on Communications, ICC 2014. Jamalipour, A. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. 610-615 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Integrity protection in a smart grid environment for wireless access of smart meters

Detken, K-O., Genzel, C-H., Rudolph, C. & Jahnke, M., 2014, Proceedings - 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems, IDAACS-SWS 2014: 11-12 September 2014 Offenburg, Germany. Sachenko, A. & Sikora, A. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. 79-86 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Resilient core networks for energy distribution

Kuntze, N., Rudolph, C., Leivesley, S., Manz, D. & Endicott-Popovsky, B., 2014, Proceedings - 2014 IEEE Power & Energy Society General Meeting, PES 2014: 27-31 July 2014 National Harbour, MD, USA. H. Nelson, J. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p. 6939164

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security foundation for a distributed cabin core architecture

Kuntze, N., Rudolph, C. & Hanka, O., 2014, 2014 Information Security for South Africa: Proceedings of the ISSA 2014 Conference: 13-14 August 2014, Radisson Blu Gautrain Hotel, Sandton, Johannesburg, South Africa. Venter, H., Loock, M., Coetzee, M. & Eloff, M. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trusted neighborhood discovery in critical infrastructures

Gottert, N., Kuntze, N., Rudolph, C. & Wahid, K. F., 2014, Proceedings - 2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014: 3-6 November 2014 Venice, Italy. Wong, V., McDonald, J. & Nordstrom, L. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. 976-981 6 p. 7007775

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2013

Building secure systems using a security engineering process and security building blocks

Rein, A., Rudolph, C. & Ruiz, J. F., 2013, Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium): Fachtagung des GI-Fachbereichs Softwaretechnik, 26.02.–01.03.2013, in Aachen [proceedings]. Wagner, S. & Lichter, H. (eds.). Bonn: Gesellschaft fur Informatik (GI), Vol. P-215. p. 529-544 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Demo: Zero touch configuration

Kuntze, N., Larbig, P. & Rudolph, C., 2013, Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management, IM 2013. IEEE, Institute of Electrical and Electronics Engineers, p. 1076-1077 2 p. 6573136

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Enhancing security testing via automated replication of IT-asset topologies

Birkholz, H., Sieverdingbeck, I., Kuntze, N. & Rudolph, C., 2013, Proceedings of the 2013 8th International Conference on Availability, Reliability and Security (ARES 2013). Tjoa, A. M. & Weippl, E. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 341 - 349 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Integrating trust establishment into routing protocols of today's MANETs

Oberle, A., Rein, A., Kuntze, N., Rudolph, C., Paatero, J., Lunn, A. & Racz, P., 2013, Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC 2013). Wang, J. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 2369 - 2374 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

LMM: A common component for software license management on cloud

Kiyomoto, S., Rein, A., Nakano, Y., Rudolph, C. & Miyake, Y., 2013, Proceedings of the 10th International Conference on Security and Crytography (SECRYPT 2013). Samarati, P. (ed.). Setubal Portugal: ScitePress, Science and Technology Publications, Vol. 2013. p. 284 - 295 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

On the automatic establishment of security relations for devices

Kuntze, N. & Rudolph, C., 2013, Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). De Turck, F., Diao, Y. & Hong, C. S. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 832 - 835 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Secure deployment of SmartGrid equipment

Kuntze, N. & Rudolph, C., 2013, Proceedings of the 2013 IEEE Power & Energy Society (PES) General Meeting. Vaahedi, E. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 1 - 5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security engineering based on structured formal reasoning

Fuchs, A. & Rudolph, C., 2013, Proceedings of the ASE International Conference on BioMedical Computing (BioMedCom 2012). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 145 - 152 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Seizure of digital data and 'selective suppression' of digital evidence

Kuntze, N., Rudolph, C., Schilling, H., Alva, A., Brisbois, B. & Endicott-Popovsky, B., 2013, Proceedings of the 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE). Lee, C. C. & Elmaghraby, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1 - 6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

ZeMoSS-Workshop: Zertifizierung und modellgetriebene Entwicklung sicherer Software

Huhn, M., Gerken, S. & Rudolph, C., 2013, Software Engineering 2013 - Fachtagung des GI-Fachbereichs Softwaretechnik, Proceedings. Gesellschaft fur Informatik (GI), Vol. P-213. p. 367 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2012

Establishing trust between nodes in mobile ad-hoc networks

Kuntze, N., Rudolph, C. & Paatero, J., 2012, Proceedings of the 4th International Conference on Trusted Systems (INTRUST 2012). Mitchell, C. J. & Tomlinson, A. (eds.). Heidelberg Germany: Springer, Vol. 7711. p. 48 - 62 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Introducing security building block models

Rein, A., Rudolph, C., Ruiz, J. F. & Fernandez, M. A., 2012, Proceedings of the ASE International Conference on Biomedical Computing (BioMedCom 2012). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2013. p. 132 - 139 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Redefining security engineering

Rudolph, C. & Fuchs, A., 2012, Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS 2012). Badra, M. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2012. p. 1 - 6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trust areas: A security paradigm for the future Internet

Rudolph, C., 2012, Proceedings of the 7th International Workshop on Security and Trust Management (STM 2011). Goos, G., Hartmanis, J. & van Leeuwen, J. (eds.). Heidelberg Germany: Springer, Vol. 7170. p. 22 - 27 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trusted service access with dynamic security infrastructure configuration

Marx, R., Kuntze, N., Rudolph, C., Bente, I. & Vieweg, J., 2012, 18th Asia-Pacific Conference on Communications (APCC 2012). Cho, Y. (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2012. p. 730 - 735 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2011

A property based security risk analysis through weighted simulation

Winkelvos, T., Rudolph, C. & Repp, J., 2011, 2011 Annual Conference on Information Security for South Africa (ISSA 2011). Venter, H., Coetzee, M., Loock, M. & Olivier, M. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Interoperable device identification in smart-grid environments

Kuntze, N., Rudolph, C., Bente, I., Vieweg, J. & von Helden, J., 2011, Proceedings of the 2011 IEEE Power & Energy Society (PES) General Meeting. Van Wagner (ed.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 7 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Secure digital chains of evidence

Kuntze, N. & Rudolph, C., 2011, Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). Campbell, R. & Guan, Y. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2011. p. 1 - 8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2010

A formal notion of trust – enabling reasoning about security properties

Fuchs, A., Gürgens, S. & Rudolph, C., 2010, Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Proceedings. Springer, Vol. 321. p. 200-215 16 p. (IFIP Advances in Information and Communication Technology; vol. 321).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A user-centric privacy manager for future energy systems

Phom, H. S., Kuntze, N., Rudolph, C., Cupelli, M., Liu, J. & Monti, A., 2010, 2010 International Conference on Power System Technology: Technological Innovations Making Power Grid Smarter, POWERCON2010. 5666447

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy in distributed commercial applications

Kuntze, N. & Rudolph, C., 1 Jan 2010, What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010 Held as Part of WCC 2010, Proceedings. Springer, p. 214-224 11 p. (IFIP Advances in Information and Communication Technology; vol. 328).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Securing digital evidence

Richter, J., Kuntze, N. & Rudolph, C., 2010, Proceedings of the 5th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010). Endicott-Popovsky, B. & Lee, W. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2010. p. 119 - 130 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security engineering for embedded systems - The SecFutur vision

Gürgens, S., Rudolph, C., Maña, A. & Nadjm-Tehrani, S., 2010, International Workshop on Security and Dependability for Resource Constrained Embedded Systems (secure and dependable RCES by design) (S&D4RCES 2010): In conjunction with SAFECOMP 2010 Conference: Schoenbrunn Palace Conference Centre, Vienna, Austria, 14 September 2010 [proceedings]. Hamid, B., Rudolph, C. & Ruland, C. (eds.). New York, New York: Association for Computing Machinery (ACM), 7

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trust infrastructures for future energy networks

Kuntze, N., Rudolph, C., Cupelli, M., Liu, J. & Monti, A., 2010, IEEE PES General Meeting, PES 2010. 5589609

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trust in peer-to-peer content distribution protocols

Kuntze, N., Rudolph, C. & Fuchs, A., 2010, Proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP 2010). Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K. & Sauveron, D. (eds.). Heidelberg Germany: Springer, Vol. 6033. p. 76 - 89 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009

On the security validation of integrated security solutions

Fuchs, A., Gürgens, S. & Rudolph, C., 2009, Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings. Vol. 297. p. 190-201 12 p. (IFIP Advances in Information and Communication Technology; vol. 297).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Reliable identities using off-the-shelf hardware security in MANETs

Kuntze, N., Fuchs, A. & Rudolph, C., 2009, Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 - 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009. Vol. 2. p. 781-786 6 p. 5283056

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards a generic process for security pattern integration

Fuchs, A., Gürgens, S. & Rudolph, C., 2009, Proceedings - 20th International Workshop on Database and Expert Systems Applications, DEXA2009. p. 171-175 5 p. 5337200

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Trust in distributed small sized data centers

Kuntze, N. & Rudolph, C., 2009, UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences. p. 28-33 6 p. 5319266

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008

Trust in business processes

Kuntze, N., Schmidt, A. U., Velikova, Z. & Rudolph, C., 1 Dec 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 1992-1997 6 p. 4709279

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007

Covert identity information in direct anonymous attestation (DAA)

Rudolph, C., 2007, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007). Venter, H., Eloff, M., Labuschagne, L., Eloff, J. & von Solms, R. (eds.). New York NY USA: Springer, Vol. 232. p. 443 - 448 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Facilitating the use of TPM technologies through S&D patterns

Gürgens, S., Rudolph, C., Maña, A. & Muñoz, A., 1 Dec 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 765-769 5 p. 4312997

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security evaluation of scenarios based on the TCG's TPM specification

Gurgens, S., Rudolph, C., Scheuermann, D. & Atts, M., 2007, Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS 2007). Biskup, J. & Lopez, J. (eds.). Heidelberg Germany: Springer, Vol. 4734. p. 438 - 453 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review