Meiko Jensen
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j8]
- [c43]Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen:
Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR. BigData 2018: 5027-5033 - [i1]Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen:
Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR. CoRR abs/1811.08531 (2018) - 2016
- [c42]Meiko Jensen, Nils Gruschka, Jens Lüssem:
Datenschutz im Fahrzeug der Zukunft: Vernetzt, Autonom, Elektrisch. GI-Jahrestagung 2016: 441-454 - 2015
- [c41]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen:
Towards Measuring Maturity of Privacy-Enhancing Technologies. APF 2015: 3-20 - [c40]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen, Stefan Schiffner:
Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies. Privacy and Identity Management 2015: 97-110 - [c39]Claudio Agostino Ardagna, Meiko Jensen, Miguel Vargas Martin:
IEEE Services Visionary Track on Security and Privacy Engineering (SPE 2015). SERVICES 2015: 151 - [c38]Meiko Jensen, Nils Gruschka:
Privacy-Preserving Detection of Plagiarism in Scientific Documents. SERVICES 2015: 175-180 - [c37]Marit Hansen, Meiko Jensen, Martin Rost:
Protection Goals for Privacy Engineering. IEEE Symposium on Security and Privacy Workshops 2015: 159-166 - [c36]Meiko Jensen:
Applying the protection goals for privacy engineering to mobile devices. WISEC 2015: 26:1-26:2 - 2014
- [c35]Nils Gruschka, Meiko Jensen:
Aligning User Consent Management and Service Process Modeling. GI-Jahrestagung 2014: 527-538 - [c34]Claudio Agostino Ardagna, Meiko Jensen, Zhixiong Chen, Ernesto Damiani:
4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs. SERVICES 2014: 103-104 - 2013
- [j7]Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau:
Security and Privacy-Enhancing Multicloud Architectures. IEEE Trans. Dependable Sec. Comput. 10(4): 212-224 (2013) - [c33]Meiko Jensen:
Challenges of Privacy Protection in Big Data Analytics. BigData Congress 2013: 235-238 - [c32]Meiko Jensen:
Towards Privacy-Friendly Transparency Services in Inter-organizational Business Processes. COMPSAC Workshops 2013: 200-205 - [c31]Nils Gruschka, Meiko Jensen:
Wasch mich, aber mach mich nicht nass - Anonymisierungsverfahren als Schlüssel zur datenschutzkonformen E-Mail-Filterung. GI-Jahrestagung 2013: 2119-2133 - [c30]Andreas Becker, Meiko Jensen:
Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings. ICWS 2013: 531-538 - 2012
- [j6]Meiko Jensen, Holger Junker, Luigi Lo Iacono, Christian Mainka, Jörg Schwenk:
XML Signature Wrapping Angriffe wirksam unterbinden. Datenschutz und Datensicherheit 36(4): 236-240 (2012) - [c29]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
Making XML Signatures Immune to XML Signature Wrapping Attacks. CLOSER (Selected Papers) 2012: 151-167 - [c28]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XSpRES - Robust and Effective XML Signatures for Web Services. CLOSER 2012: 187-197 - [c27]Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen:
On Breaking SAML: Be Whoever You Want to Be. USENIX Security Symposium 2012: 397-412 - 2011
- [b1]Meiko Jensen:
Analysis of attacks and defenses in the context of web services. Ruhr University Bochum 2011, pp. 1-152 - [j5]Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security. IJMCMC 3(4): 20-35 (2011) - [j4]Stephan Groß, Mario Lischka, Nils Gruschka, André Miede, Meiko Jensen, Marc Mosch, Stefan Schulte, Melanie Siebenhaar:
Sicherheitsprobleme im Cloud Computing. Praxis der Informationsverarbeitung und Kommunikation 34(3): 126-134 (2011) - [j3]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Norbert Luttenberger:
Server-Side Streaming Processing of WS-Security. IEEE Trans. Services Computing 4(4): 272-285 (2011) - [c26]Meiko Jensen, Jörg Schwenk, Jens-Matthias Bohli, Nils Gruschka, Luigi Lo Iacono:
Security Prospects through Cloud Computing by Adopting Multiple Clouds. IEEE CLOUD 2011: 565-572 - [c25]Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
All your clouds are belong to us: security analysis of cloud management interfaces. CCSW 2011: 3-14 - [c24]Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz:
Crouching tiger - hidden payload: security risks of scalable vectors graphics. ACM Conference on Computer and Communications Security 2011: 239-250 - [c23]Meiko Jensen, Christopher Meyer:
Expressiveness Considerations of XML Signatures. COMPSAC Workshops 2011: 392-397 - [c22]
- 2010
- [c21]Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
Secure Bindings of SAML Assertions to TLS Sessions. ARES 2010: 62-69 - [c20]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono:
A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages. ARES 2010: 410-415 - [c19]Nils Gruschka, Meiko Jensen:
Attack Surfaces: A Taxonomy for Attacks on Cloud Services. IEEE CLOUD 2010: 276-279 - [c18]Meiko Jensen, Sven Schäge, Jörg Schwenk:
Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing. IEEE CLOUD 2010: 540-541 - [c17]Juraj Somorovsky, Meiko Jensen, Jörg Schwenk:
Streaming-Based Verification of XML Signatures in SOAP Messages. SERVICES 2010: 637-644 - [c16]Ralph Herkenhöner, Hermann de Meer, Meiko Jensen, Henrich Christopher Pöhls:
Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions. SERVICES 2010: 645-652
2000 – 2009
- 2009
- [j2]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XML Signature Wrapping Angriffe - What you process is not always what you verify. Datenschutz und Datensicherheit 33(9): 553-560 (2009) - [j1]Meiko Jensen, Nils Gruschka, Ralph Herkenhöner:
A survey of attacks on web services. Computer Science - R&D 24(4): 185-197 (2009) - [c15]Meiko Jensen, Jörg Schwenk:
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. ARES 2009: 25-32 - [c14]Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
On Technical Security Issues in Cloud Computing. IEEE CLOUD 2009: 109-116 - [c13]Meiko Jensen:
Generating WS-SecurityPolicy Documents via Security Model Transformation. BPSC 2009: 233-234 - [c12]Meiko Jensen, Nils Gruschka:
Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions. DEXA Workshops 2009: 117-121 - [c11]
- [c10]Sebastian Gajek, Meiko Jensen, Lijun Liao, Jörg Schwenk:
Analysis of Signature Wrapping Attacks and Countermeasures. ICWS 2009: 575-582 - [c9]Meiko Jensen, Lijun Liao, Jörg Schwenk:
The curse of namespaces in the domain of XML signature. SWS 2009: 29-36 - [c8]Antonia Azzini, Stefania Marrara, Meiko Jensen, Jörg Schwenk:
Extending the similarity-based XML multicast approach with digital signatures. SWS 2009: 45-52 - 2008
- [c7]Meiko Jensen, Nils Gruschka, Norbert Luttenberger:
The Impact of Flooding Attacks on Network-based Services. ARES 2008: 509-513 - [c6]Meiko Jensen:
A Fault Propagation Approach for Highly Distributed Service Compositions. IEEE SCC (2) 2008: 507-510 - [c5]Norbert Luttenberger, Meiko Jensen:
Proceedings of the Workshop on Security for Web Services and Service-Oriented Architectures. GI Jahrestagung (1) 2008: 109 - [c4]Meiko Jensen, Nils Gruschka:
Flooding Attack Issues of Web Services and Service-Oriented Architectures. GI Jahrestagung (1) 2008: 117-122 - 2007
- [c3]Meiko Jensen, Nils Gruschka, Ralph Herkenhöner, Norbert Luttenberger:
SOA and Web Services: New Technologies, New Standards - New Attacks. ECOWS 2007: 35-44 - [c2]Nils Gruschka, Meiko Jensen, Norbert Luttenberger:
A Stateful Web Service Firewall for BPEL. ICWS 2007: 142-149 - [c1]Nils Gruschka, Meiko Jensen, Torben Dziuk:
Event-based application of ws-security policy on soap messages. SWS 2007: 1-8
Coauthor Index
last updated on 2019-01-28 22:55 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint