Christian Jung
Christian Jung
Department Head Security Engineering
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Ids reference architecture model. industrial data space. version 2.0
B Otto, S Lohmann, S Steinbuss, A Teuscher, S Auer, M Boehmer, J Bohn, ...
International Data Spaces Association, 2018
Usage control architecture options for data sovereignty in business ecosystems
J Zrenner, FO Möller, C Jung, A Eitel, B Otto
Journal of Enterprise Information Management 32 (3), 477-495, 2019
Reference architecture model for the industrial data space
B Otto, S Lohmann, S Auer, G Brost, J Cirullies, A Eitel, T Ernst, C Haas, ...
Fraunhofer-Gesellschaft, 2017
Phishing in the wireless: Implementation and analysis
I Martinovic, FA Zdarsky, A Bachorek, C Jung, JB Schmitt
New Approaches for Security, Privacy and Trust in Complex Environments …, 2007
Context-aware, data-driven policy enforcement for smart mobile devices in business environments
D Feth, C Jung
Security and Privacy in Mobile Information and Communication Systems: 4th …, 2012
Indicator-based architecture-level security evaluation in a service-oriented environment
P Antonino, S Duszynski, C Jung, M Rudolph
Proceedings of the Fourth European Conference on Software Architecture …, 2010
Methods for segmenting cracks in 3d images of concrete: A comparison based on semi-synthetic images
T Barisin, C Jung, F Müsebeck, C Redenbach, K Schladitz
Pattern Recognition 129, 108747, 2022
Enhancing Cloud Security with Context-aware Usage Control Policies.
C Jung, A Eitel, R Schwarz
GI-Jahrestagung 211, 50, 2014
Context-aware policy enforcement for android
C Jung, D Feth, C Seise
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
Datenschutz und Datenanalyse: Herausforderungen und Lösungsansätze
M Steinebach, E Krempel, C Jung, M Hoffmann
Datenschutz und Datensicherheit-DuD 40 (7), 440-445, 2016
Usage control in the international data spaces
A Eitel, C Jung, R Brandstädter, A Hosseinzadeh, S Bader, C Kühnle, ...
Aufl. IDS Association, Berlin, 2021
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements.
A Hosseinzadeh, A Eitel, C Jung
ICISSP, 397-405, 2020
Formal specification and verification of JDK’s identity hash map implementation
M De Boer, S De Gouw, J Klamroth, C Jung, M Ulbrich, A Weigl
Formal Aspects of Computing 35 (3), 1-26, 2023
Data Usage Control.
C Jung, J Dörr
Designing data spaces, 129-146, 2022
Security policy specification templates for critical infrastructure services in the cloud
M Rudolph, R Schwarz, C Jung
The 9th International Conference for Internet Technology and Secured …, 2014
Practical experience gained from modeling security goals: using SGITs in an industrial project
C Jung, F Elberzhager, A Bagnato, F Raiteri
2010 International Conference on Availability, Reliability and Security, 531-536, 2010
Security evaluation of service-oriented systems with an extensible knowledge base
C Jung, M Rudolph, R Schwarz
2011 Sixth International Conference on Availability, Reliability and …, 2011
Towards automatic crack segmentation in 3d concrete images
C Jung, F Müsebeck, T Barisin, K Schladitz, C Redenbach, M Kiesche, ...
11th conf. ind. comput. tomogr.(ICT), 2022
Dealing with uncertainty in context-aware mobile applications
C Jung, A Eitel, D Feth, M Rudolph
MOBILITY 2015, 9, 2015
Automatic derivation of context descriptions
C Jung, D Feth, Y Elrakaiby
2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20