Folgen
Karsten  Sohr
Karsten Sohr
Bestätigte E-Mail-Adresse bei tzi.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A model-checking approach to analysing organisational controls in a loan origination process
A Schaad, V Lotz, K Sohr
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
1332006
Analyzing and managing role-based access control policies
K Sohr, M Drouineaud, GJ Ahn, M Gogolla
IEEE Transactions on Knowledge and Data Engineering 20 (7), 924-939, 2008
902008
Automatically extracting threats from extended data flow diagrams
BJ Berger, K Sohr, R Koschke
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
592016
Specification and validation of authorisation constraints using UML and OCL
K Sohr, GJ Ahn, M Gogolla, L Migge
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
572005
A first step towards formal verification of security policy properties for RBAC
M Drouineaud, M Bortin, P Torrini, K Sohr
Fourth International Conference onQuality Software, 2004. QSIC 2004 …, 2004
452004
Organizing security patterns related to security and pattern recognition requirements
M Bunke, R Koschke, K Sohr
International Journal on Advances in Security 5 (1), 2012
442012
Extracting and analyzing the implemented security architecture of business applications
BJ Berger, K Sohr, R Koschke
2013 17th European Conference on Software Maintenance and Reengineering, 285-294, 2013
432013
A temporal-logic extension of role-based access control covering dynamic separation of duties
T Mossakowski, M Drouineaud, K Sohr
10th International Symposium on Temporal Representation and Reasoning, 2003 …, 2003
432003
Enforcing role-based access control policies in web services with UML and OCL
K Sohr, T Mustafa, X Bao, GJ Ahn
2008 Annual Computer Security Applications Conference (ACSAC), 257-266, 2008
362008
Formal specification of role-based security policies for clinical information systems
K Sohr, M Drouineaud, GJ Ahn
Proceedings of the 2005 ACM symposium on Applied computing, 332-339, 2005
362005
An architecture-centric approach to detecting security patterns in software
M Bunke, K Sohr
Engineering Secure Software and Systems: Third International Symposium …, 2011
332011
Idea: Towards architecture-centric security analysis of software
K Sohr, B Berger
Engineering Secure Software and Systems: Second International Symposium …, 2010
322010
An android security case study with bauhaus
BJ Berger, M Bunke, K Sohr
2011 18th Working Conference on Reverse Engineering, 179-183, 2011
302011
IO: An interconnected asset ontology in support of risk management processes
H Birkholz, I Sieverdingbeck, K Sohr, C Bormann
2012 Seventh International Conference on Availability, Reliability and …, 2012
282012
Comprehensive two-level analysis of static and dynamic rbac constraints with uml and ocl
M Kuhlmann, K Sohr, M Gogolla
2011 Fifth International Conference on Secure Software Integration and …, 2011
232011
Software security aspects of Java-based mobile phones
K Sohr, T Mustafa, A Nowak
Proceedings of the 2011 ACM Symposium on Applied Computing, 1494-1501, 2011
202011
Articulating and enforcing authorisation policies with UML and OCL
K Sohr, GJ Ahn, L Migge
ACM SIGSOFT Software Engineering Notes 30 (4), 1-7, 2005
202005
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL
K Sohr, M Kuhlmann, M Gogolla, H Hu, GJ Ahn
Information and Software Technology 54 (12), 1396-1417, 2012
182012
Employing UML and OCL for designing and analysing role-based access control
M Kuhlmann, K Sohr, M Gogolla
Mathematical Structures in Computer Science 23 (4), 796-833, 2013
172013
Efficient automated generation of attack trees from vulnerability databases
H Birkholz, S Edelkamp, F Junge, K Sohr
Working Notes for the 2010 AAAI Workshop on Intelligent Security (SecArt), 47-55, 2010
172010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20