BibTeX records: Adam J. Slagell

download as .bib file

@article{DBLP:journals/tsg/LinSKSI18,
  author       = {Hui Lin and
                  Adam J. Slagell and
                  Zbigniew T. Kalbarczyk and
                  Peter W. Sauer and
                  Ravishankar K. Iyer},
  title        = {Runtime Semantic Security Analysis to Detect and Mitigate Control-Related
                  Attacks in Power Grids},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {1},
  pages        = {163--178},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2016.2547742},
  doi          = {10.1109/TSG.2016.2547742},
  timestamp    = {Wed, 03 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/LinSKSI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChungFKIWS16,
  author       = {Key{-}whan Chung and
                  Valerio Formicola and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Alexander Withers and
                  Adam J. Slagell},
  title        = {Attacking supercomputers through targeted alteration of environmental
                  control: {A} data driven case study},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {406--410},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860528},
  doi          = {10.1109/CNS.2016.7860528},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChungFKIWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/CaoBKIS15,
  author       = {Phuong Cao and
                  Eric C. Badger and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Adam J. Slagell},
  editor       = {David M. Nicol},
  title        = {Preemptive intrusion detection: theoretical framework and real-world
                  measurements},
  booktitle    = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages        = {5:1--5:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746194.2746199},
  doi          = {10.1145/2746194.2746199},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/CaoBKIS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/CaoBKIWS15,
  author       = {Phuong Cao and
                  Eric C. Badger and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Alexander Withers and
                  Adam J. Slagell},
  editor       = {David M. Nicol},
  title        = {Towards an unified security testbed and security analytics framework},
  booktitle    = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages        = {24:1--24:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746194.2746218},
  doi          = {10.1145/2746194.2746218},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/CaoBKIWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xsede/SchippDS15,
  author       = {Jonathan Schipp and
                  Jeannette Dopheide and
                  Adam J. Slagell},
  editor       = {Gregory D. Peterson},
  title        = {{ISLET:} an isolated, scalable, {\&} lightweight environment for
                  training},
  booktitle    = {Proceedings of the 2015 {XSEDE} Conference: Scientific Advancements
                  Enabled by Enhanced Cyberinfrastructure, St. Louis, MO, USA, July
                  26 - 30, 2015},
  pages        = {17:1--17:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2792745.2792762},
  doi          = {10.1145/2792745.2792762},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/xsede/SchippDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hpdc/2015clhs,
  editor       = {Scott Campbell and
                  Adam J. Slagell},
  title        = {Proceedings of the 2015 Workshop on Changing Landscapes in {HPC} Security,
                  CLHS@HPDC 2015, Portland, Oregon, USA, June 16, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752499},
  doi          = {10.1145/2752499},
  isbn         = {978-1-4503-3572-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpdc/2015clhs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/CaoCKIS14,
  author       = {Phuong Cao and
                  Key{-}whan Chung and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Adam J. Slagell},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Preemptive intrusion detection},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {21},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600197},
  doi          = {10.1145/2600176.2600197},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/CaoCKIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/CaoLNKIS14,
  author       = {Phuong Cao and
                  Hongyang Li and
                  Klara Nahrstedt and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Adam J. Slagell},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Personalized password guessing: a new security threat},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {22},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600198},
  doi          = {10.1145/2600176.2600198},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/CaoLNKIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/LinSKI14,
  author       = {Hui Lin and
                  Adam J. Slagell and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Semantic Security Analysis of {SCADA} Networks to Detect Malicious
                  Control Commands in Power Grids (Poster)},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {492},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659746},
  doi          = {10.1145/2659651.2659746},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/LinSKI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LinSKSI13,
  author       = {Hui Lin and
                  Adam J. Slagell and
                  Zbigniew Kalbarczyk and
                  Peter W. Sauer and
                  Ravishankar K. Iyer},
  editor       = {Benessa Defend and
                  Klaus Kursawe},
  title        = {Semantic security analysis of {SCADA} networks to detect malicious
                  control commands in power grids},
  booktitle    = {SEGS'13, Proceedings of the 2013 {ACM} Workshop on Smart Energy Grid
                  Security, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany},
  pages        = {29--34},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516930.2516947},
  doi          = {10.1145/2516930.2516947},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LinSKSI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LinSMKI13,
  author       = {Hui Lin and
                  Adam J. Slagell and
                  Catello Di Martino and
                  Zbigniew Kalbarczyk and
                  Ravishankar K. Iyer},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Adapting Bro into {SCADA:} building a specification-based intrusion
                  detection system for the {DNP3} protocol},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2459982},
  doi          = {10.1145/2459976.2459982},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LinSMKI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KingLS09,
  author       = {Justin King and
                  Kiran Lakkaraju and
                  Adam J. Slagell},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {A taxonomy and adversarial model for attacks against network log anonymization},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {1286--1293},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529572},
  doi          = {10.1145/1529282.1529572},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KingLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LakkarajuS08,
  author       = {Kiran Lakkaraju and
                  Adam J. Slagell},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Evaluating the utility of anonymized network traces for intrusion
                  detection},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {17},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460899},
  doi          = {10.1145/1460877.1460899},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LakkarajuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0712-1224,
  author       = {Kiran Lakkaraju and
                  Adam J. Slagell},
  title        = {Evaluating the Utility of Single Field Anonymization Polices by the
                  {IDS} Metric : Towards measuring the trade off between Utility and
                  Security},
  journal      = {CoRR},
  volume       = {abs/0712.1224},
  year         = {2007},
  url          = {http://arxiv.org/abs/0712.1224},
  eprinttype    = {arXiv},
  eprint       = {0712.1224},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0712-1224.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/SlagellBY06,
  author       = {Adam J. Slagell and
                  Rafael Bonilla and
                  William Yurcik},
  title        = {A survey of {PKI} components and scalability issues},
  booktitle    = {Proceedings of the 25th {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2006, April 10-12, 2006, Phoenix,
                  Arizona, {USA}},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/.2006.1629442},
  doi          = {10.1109/.2006.1629442},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/SlagellBY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/SlagellLL06,
  author       = {Adam J. Slagell and
                  Kiran Lakkaraju and
                  Katherine Luo},
  editor       = {William LeFebvre},
  title        = {{FLAIM:} {A} Multi-level Anonymization Framework for Computer and
                  Network Logs},
  booktitle    = {Proceedings of the 20th Conference on Systems Administration {(LISA}
                  2006), Washington, DC, USA, December 3-8, 2006},
  pages        = {63--77},
  publisher    = {{USENIX}},
  year         = {2006},
  url          = {http://www.usenix.org/events/lisa06/tech/slagell.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/SlagellLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YinYS06,
  author       = {Xiaoxin Yin and
                  William Yurcik and
                  Adam J. Slagell},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {\emph{VisFlowCluster-IP}: Connectivity-Based Visual Clustering of
                  Network Hosts},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {284--295},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_24},
  doi          = {10.1007/0-387-33406-8\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/YinYS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BasneyFHKMPSW06,
  author       = {Jim Basney and
                  Patrick Flanigan and
                  Jin Heo and
                  Himanshu Khurana and
                  Joe Muggli and
                  Meenal Pant and
                  Adam J. Slagell and
                  Von Welch},
  title        = {Mithril: Adaptable Security for Survivability in Collaborative Computing
                  Sites},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359560},
  doi          = {10.1109/SECCOMW.2006.359560},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BasneyFHKMPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0601079,
  author       = {Katherine Luo and
                  Yifan Li and
                  Charis Ermopoulos and
                  William Yurcik and
                  Adam J. Slagell},
  title        = {{SCRUB-PA:} {A} Multi-Level Multi-Dimensional Anonymization Tool for
                  Process Accounting},
  journal      = {CoRR},
  volume       = {abs/cs/0601079},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0601079},
  eprinttype    = {arXiv},
  eprint       = {cs/0601079},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0601079.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0606063,
  author       = {Adam J. Slagell and
                  Kiran Lakkaraju and
                  Katherine Luo},
  title        = {{FLAIM:} {A} Multi-level Anonymization Framework for Computer and
                  Network Logs},
  journal      = {CoRR},
  volume       = {abs/cs/0606063},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0606063},
  eprinttype    = {arXiv},
  eprint       = {cs/0606063},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0606063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/KhuranaBSAHB05,
  author       = {Himanshu Khurana and
                  Rafael Bonilla and
                  Adam J. Slagell and
                  Raja Afandi and
                  Hyung{-}Seok Hahm and
                  Jim Basney},
  editor       = {Pascal Lorenz and
                  Petre Dini},
  title        = {Scalable Group Key Management with Partially Trusted Controllers},
  booktitle    = {Networking - {ICN} 2005, 4th International Conference on Networking,
                  ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3421},
  pages        = {662--672},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31957-3\_75},
  doi          = {10.1007/978-3-540-31957-3\_75},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/KhuranaBSAHB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/YinYS05,
  author       = {Xiaoxin Yin and
                  William Yurcik and
                  Adam J. Slagell},
  title        = {The Design of VisFlowConnect-IP: {A} Link Analysis System for {IP}
                  Security Situational Awareness},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {141--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.17},
  doi          = {10.1109/IWIA.2005.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/YinYS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KhuranaSB05,
  author       = {Himanshu Khurana and
                  Adam J. Slagell and
                  Rafael Bonilla},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {{SELS:} a secure e-mail list service},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {306--313},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1066752},
  doi          = {10.1145/1066677.1066752},
  timestamp    = {Tue, 06 Nov 2018 11:06:45 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KhuranaSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LakkarajuBSYN05,
  author       = {Kiran Lakkaraju and
                  Ratna Bearavolu and
                  Adam J. Slagell and
                  William Yurcik and
                  Stephen C. North},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Closing-the-Loop in NVisionIP: Integrating Discovery and Search in
                  Security Visualizations},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {9},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.3},
  doi          = {10.1109/VIZSEC.2005.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LakkarajuBSYN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0409005,
  author       = {Adam J. Slagell and
                  William Yurcik},
  title        = {Sharing Computer Network Logs for Security and Privacy: {A} Motivation
                  for New Methodologies of Anonymization},
  journal      = {CoRR},
  volume       = {cs.CR/0409005},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs.CR/0409005},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0409005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0409018,
  author       = {Adam J. Slagell and
                  Rafael Bonilla},
  title        = {{PKI} Scalability Issues},
  journal      = {CoRR},
  volume       = {cs.CR/0409018},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs.CR/0409018},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0409018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Slagell04,
  author       = {Adam J. Slagell},
  title        = {Known-Plaintext Attack Against a Permutation Based Video},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Slagell04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics