Christian Banse
Christian Banse
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic
D Herrmann, C Banse, H Federrath
Computers & Security 39, 17-33, 2013
A secure northbound interface for SDN applications
C Banse, S Rangarajan
2015 IEEE Trustcom/BigDataSE/ISPA 1, 834-839, 2015
Tracking users on the internet with behavioral patterns: Evaluation of its practical feasibility
C Banse, D Herrmann, H Federrath
IFIP International Information Security Conference, 235-248, 2012
Analyzing characteristic host access patterns for re-identification of web user sessions
D Herrmann, C Gerber, C Banse, H Federrath
Information Security Technology for Applications: 15th Nordic Conference on …, 2012
Evaluating the performance of continuous test-based cloud service certification
P Stephanow, C Banse
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events
S Gebert, D Hock, T Zinner, P Tran-Gia, M Hoffmann, M Jarschel, ...
ACM SIGCOMM Computer Communication Review 44 (4), 359-360, 2014
Zklaims: Privacy-preserving attribute-based credentials using non-interactive zero-knowledge techniques
M Schanzenbach, T Kilian, J Schütte, C Banse
arXiv preprint arXiv:1907.09579, 2019
Cloud property graph: Connecting cloud security assessments with static code analysis
C Banse, I Kunz, A Schneider, K Weiss
2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 13-19, 2021
Generating threat profiles for cloud service certification systems
P Stephanow, C Banse, J Schütte
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
Towards tracking data flows in cloud architectures
I Kunz, V Casola, A Schneider, C Banse, J Schütte
2020 IEEE 13th International Conference on Cloud Computing (CLOUD), 445-452, 2020
Android OS security: Risks and limitations
R Fedler, C Banse, C Krauss, V Fusenig
Android OS security: risks and limitations a practical evaluation
R Fedler, C Banse, C Krauss, V Fusenig
Fraunhofer Research Institution for Applied and Integrated Security, 2012
Managing and presenting user attributes over a decentralized secure name system
M Schanzenbach, C Banse
International Workshop on Data Privacy Management, 213-220, 2016
Reducing implementation efforts in continuous auditing certification via an audit API
D Knoblauch, C Banse
2019 IEEE 28th International Conference on Enabling Technologies …, 2019
Privacy property graph: Towards automated privacy threat modeling via static graph-based analysis
I Kunz, K Weiss, A Schneider, C Banse
Proceedings on Privacy Enhancing Technologies, 2023
Privacy smells: Detecting privacy problems in cloud architectures
I Kunz, A Schneider, C Banse
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
Practical decentralized attribute-based delegation using secure name systems
M Schanzenbach, C Banse, J Schütte
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
A taxonomy-based approach for security in software-defined networking
C Banse, J Schuette
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
MEDINA: Improving Cloud Services trustworthiness through continuous audit-based certification
L Orue-Echevarria, JL Garcia, C Banse, J Alonso
Enhancing NFV orchestration with security policies
F Wendland, C Banse
Proceedings of the 13th international conference on availability …, 2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20