Günter Karjoth
Günter Karjoth
Lucerne University of Applied Sciences
Verified email at acm.org - Homepage
Cited by
Cited by
A security model for aglets
G Karjoth, DB Lange, M Oshima
Internet Computing, IEEE 1 (4), 68-77, 1997
Enterprise privacy authorization language (EPAL)
P Ashley, S Hada, G Karjoth, C Powers, M Schunter
IBM Research, 2003
Platform for enterprise privacy practices: Privacy-enabled management of customer data
G Karjoth, M Schunter, M Waidner
Privacy Enhancing Technologies, 194-198, 2003
Routing on longest-matching prefixes
W Doeringer, G Karjoth, M Nassehi
IEEE/ACM Transactions on Networking (TON) 4 (1), 86-97, 1996
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
Access control in data processing systems
TR Gross, G Karjoth
US Patent App. 13/077,881, 2011
Variable length data sequence backtracking a trie structure
W Doeringer, D Dykeman, G Karjoth, M Nassehi, M Sharma
US Patent 5,787,430, 1998
A privacy policy model for enterprises
G Karjoth, M Schunter
Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE, 271-281, 2002
Access control in data processing system
TR Gross, G Karjoth
US Patent 20,120,216,247, 2012
Using a rules model to improve handling of personally identifiable information
SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ...
US Patent 7,069,427, 2006
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, 2-11, 2001
E-P3P privacy policies and privacy authorization
P Ashley, S Hada, G Karjoth, M Schunter
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society …, 2002
Aglets: Programming mobile agents in Java
D Lange, M Oshima, G Karjoth, K Kosaka
Worldwide Computing and Its Applications, 253-266, 1997
Method and apparatus for secure transmission of data and applications
G Karjoth, LJ O'connor
US Patent App. 09/748,446, 2000
Disabling RFID tags with visible confirmation: clipped tags are silenced
G Karjoth, PA Moskowitz
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 27-30, 2005
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
Access control with IBM Tivoli access manager
G Karjoth
ACM Transactions on Information and System Security (TISSEC) 6 (2), 232-257, 2003
Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets
L Betz, JC Dayka, WB Farrell, RH Guski, G Karjoth, MA Nelson, ...
US Patent 7,617,393, 2009
Privacy-enabled services for enterprises
G Karjoth, M Schunter, M Waidner
Database and Expert Systems Applications, 2002. Proceedings. 13th …, 2002
System and method for disabling RFID tags
PA Moskowitz, RJ Von Gutfeld, G Karjoth
US Patent 7,737,853, 2010
The system can't perform the operation now. Try again later.
Articles 1–20