Veröffentlichungen

A Design Pattern for Event-Based Processing of Security-enriched SOAP Messages

2010 - Meiko Jensen, Nils Gruschka, Luigi Lo Iacono

Proceedings of the Second International Workshop on Security Aspects in Grid and Cloud Computing (SAGC 2010), Krakow, Poland.

Secure Bindings of SAML Assertions to TLS Sessions

2010 - Jörg Schwenk, Sebastian Gajek, Meiko Jensen, Florian Kohlar,

Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Krakow, Poland.

On the analysis of cryptographic assumptions in the generic ring model

2009 - Tibor Jager, Jörg Schwenk

ASIACRYPT 2009

A Security Modeling Approach for Web-Service-based Business Processes

2009 - Meiko Jensen, Sven Feja

Proceedings of the 7th IEEE Workshop on Model-Based Development for Computer-Based Systems (MBD 2009), held as part of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), San Francisco, USA

Analysis of Signature Wrapping Attacks and Countermeasures

2009 - Jörg Schwenk, Sebastian Gajek, Lijun Liao, Meiko Jensen,

Proceedings of the 7th IEEE International Conference on Web Services (ICWS), Los Angeles, USA, 2009.

Dynamic Threshold Cryptosystem without Group Manager

2009 - Andreas Noack, M.Sc. Stefan Spitz

International Journal of Network Protocols and Algorithms (ISSN: 1943-3581) [Journal]

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Third International Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications, Las Palmas de Gran Canaria, Spain; 25 November 2009

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Technical Report. Full paper with security proof. [PDF]

Extending the Similarity-Based XML Multicast Approach with Digital Signatures

2009 - Jörg Schwenk, Meiko Jensen, Antonia Azzini, Stefania Marrara

Proceedings of the ACM Workshop on Secure Web Services (SWS), Chicago, Illinois, U.S.A.

Generating WS-SecurityPolicy Documents via Security Model Transformation

2009 - Meiko Jensen,

Proceedings of the Young Researchers Workshop on Modeling and Management of Business Processes (YRW-MBP 2009), held as part of SABRE 2009, Leipzig, Germany
Seite: