default search action
Günter Karjoth
Person information
- affiliation: IBM Research Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c41]Mariia Astrakhantceva, Günter Karjoth, Bettina Hübscher:
Die Bordkarte als Authentifikationsmittel bei Flugreisen. Sicherheit 2016: 113-124 - 2015
- [c40]Günter Karjoth:
Aligning Security and Business Objectives for Process-Aware Information Systems. CODASPY 2015: 243 - 2014
- [j15]David A. Basin, Samuel J. Burri, Günter Karjoth:
Obstruction-free authorization enforcement: Aligning security and business objectives. J. Comput. Secur. 22(5): 661-698 (2014) - 2013
- [c39]Jan Camenisch, Günter Karjoth, Gregory Neven, Franz-Stefan Preiss:
Anonymously sharing Flickr pictures with facebook friends. WPES 2013: 13-24 - 2012
- [j14]David A. Basin, Samuel J. Burri, Günter Karjoth:
Dynamic enforcement of abstract separation of duty constraints. ACM Trans. Inf. Syst. Secur. 15(3): 13:1-13:30 (2012) - [c38]David A. Basin, Samuel J. Burri, Günter Karjoth:
Optimal workflow-aware authorizations. SACMAT 2012: 93-102 - 2011
- [c37]Samuel J. Burri, Günter Karjoth:
Flexible Scoping of Authorization Constraints on Business Processes with Loops and Parallelism. Business Process Management Workshops (2) 2011: 411-422 - [c36]David A. Basin, Samuel J. Burri, Günter Karjoth:
Separation of duties as a service. AsiaCCS 2011: 423-429 - [c35]David A. Basin, Samuel J. Burri, Günter Karjoth:
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. CSF 2011: 99-113 - 2010
- [j13]Marc Langheinrich, Günter Karjoth:
Social networking and the risk to companies and institutions. Inf. Secur. Tech. Rep. 15(2): 51-56 (2010) - [c34]Chris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian M. Molloy, Jorge Lobo, Seraphin B. Calo:
Towards an integrated approach to role engineering. SafeConfig 2010: 63-70
2000 – 2009
- 2009
- [c33]David A. Basin, Samuel J. Burri, Günter Karjoth:
Dynamic Enforcement of Abstract Separation of Duty Constraints. ESORICS 2009: 250-267 - 2008
- [j12]S. Sitharama Iyengar, Richard R. Brooks, Günter Karjoth:
International Journal of Distributed Sensor Networks. Int. J. Distributed Sens. Networks 4(1): 1-3 (2008) - [c32]Günter Karjoth, Andreas Schade, Els Van Herreweghen:
Implementing ACL-Based Policies in XACML. ACSAC 2008: 183-192 - 2007
- [e3]Günter Karjoth, Ketil Stølen:
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-885-5 [contents] - [i1]Günter Karjoth, Paul A. Moskowitz:
Clipped RFID Tags Protect Consumer Privacy. ERCIM News 2007(68) (2007) - 2006
- [p1]Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Service-oriented Assurance - Comprehensive Security by Explicit Assurances. Quality of Protection 2006: 13-24 - [e2]Günter Karjoth, Fabio Massacci:
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-553-3 [contents] - 2005
- [c31]Günter Karjoth, Paul A. Moskowitz:
Disabling RFID tags with visible confirmation: clipped tags are silenced. WPES 2005: 27-30 - 2004
- [j11]Günter Karjoth, Matthias Schunter, Michael Waidner:
Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004) - [c30]Michael Backes, Markus Dürmuth, Günter Karjoth:
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. POLICY 2004: 185-188 - [c29]Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter:
Efficient comparison of enterprise privacy policies. SAC 2004: 375-382 - 2003
- [j10]Günter Karjoth:
Access control with IBM Tivoli access manager. ACM Trans. Inf. Syst. Secur. 6(2): 232-257 (2003) - [c28]Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner:
Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449 - [c27]Günter Karjoth, Matthias Schunter, Els Van Herreweghen:
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. POLICY 2003: 135-146 - 2002
- [c26]Günter Karjoth, Matthias Schunter:
A Privacy Policy Model for Enterprises. CSFW 2002: 271-281 - [c25]Günter Karjoth, Matthias Schunter, Michael Waidner:
Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487 - [c24]Günter Karjoth, Matthias Schunter, Michael Waidner:
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84 - [c23]Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter:
E-P3P privacy policies and privacy authorization. WPES 2002: 103-109 - [e1]Dieter Gollmann, Günter Karjoth, Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2 [contents] - 2001
- [j9]Jürgen Bohn, Günter Karjoth:
Generische Sicherheitsdienste für mobile Anwendungen. HMD Prax. Wirtsch. 220 (2001) - [c22]Günter Karjoth:
The Authorization Service of Tivoli Policy Director. ACSAC 2001: 319-328 - [c21]Jürgen Bohn, Günter Karjoth:
Sicherheitsdienste für mobile Agentenanwendungen. Kommunikation in Verteilten Systemen 2001: 305-314 - [c20]Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth:
Cryptographic Security for Mobile Code. S&P 2001: 2-11 - 2000
- [j8]Günter Karjoth, Joachim Posegga:
Mobile agents and telcos' nightmares. Ann. des Télécommunications 55(7-8): 388-400 (2000) - [j7]Günter Karjoth:
Authorization in CORBA Security. J. Comput. Secur. 8(2/3): 89-108 (2000) - [c19]Luke O'Connor, Günter Karjoth:
Efficient Downloading and Updating Applications on Portable Devices Using Authentication Trees. CARDIS 2000: 327-344 - [c18]Günter Karjoth:
An Operational Semantics of Java 2 Access Control. CSFW 2000: 224-232 - [c17]Günter Karjoth:
Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces. ASA/MA 2000: 44-56
1990 – 1999
- 1998
- [j6]Günter Karjoth, N. Asokan, Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents. Pers. Ubiquitous Comput. 2(2): 92-99 (1998) - [c16]Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell:
Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 - [c15]Günter Karjoth:
Authorization in CORBA Security. ESORICS 1998: 143-158 - [c14]Günter Karjoth, N. Asokan, Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents. Mobile Agents 1998: 195-207 - [c13]Günter Karjoth, Danny B. Lange, Mitsuru Oshima:
A Security Model for Aglets. Mobile Agents and Security 1998: 188-205 - 1997
- [j5]Günter Karjoth, Danny B. Lange, Mitsuru Oshima:
A Security Model for Aglets. IEEE Internet Comput. 1(4): 68-77 (1997) - [j4]Willibald A. Doeringer, Günter Karjoth, Mehdi Nassehi:
Corrections to "Routing on longest-matching prefixes". IEEE/ACM Trans. Netw. 5(4): 600 (1997) - [c12]Danny B. Lange, Mitsuru Oshima, Günter Karjoth, Kazuya Kosaka:
Aglets: Programming Mobile Agents in Java. WWCA 1997: 253-266 - 1996
- [j3]Willibald A. Doeringer, Günter Karjoth, Mehdi Nassehi:
Routing on longest-matching prefixes. IEEE/ACM Trans. Netw. 4(1): 86-97 (1996) - 1995
- [c11]Günter Karjoth:
Integrated Access Control Management. IS&N 1995: 64-74 - 1993
- [j2]Günter Karjoth, Carl Binding, Jan Gustafsson:
LOEWE: A LOTOS Engineering Workbench. Comput. Networks ISDN Syst. 25(7): 853-874 (1993) - [c10]Günter Karjoth:
Dynamic State Machines with Multiway Synchronization, Channels and Shared Variables. PSTV 1993: 61-76 - 1992
- [j1]Carl Binding, Wiet Bouma, Michel Dauphin, Günter Karjoth, Yan Yang:
A Common Compiler for LOTOS and SDL Specifications. IBM Syst. J. 31(4): 668-690 (1992) - [c9]Günter Karjoth:
Implementing LOTOS Specifications by Communicating State Machines. CONCUR 1992: 386-400 - [c8]Günter Karjoth:
Generating transition graphs from LOTOS specifications. FORTE 1992: 281-294 - [c7]Günter Karjoth:
XFSM: A Format Model of Communicating State Machines for Implementation Specification. PARLE 1992: 979-980 - 1990
- [c6]Günter Karjoth:
A Compilation of Algebraic Processes Based on Extended-Action Derivation. FORTE 1990: 127-140
1980 – 1989
- 1988
- [c5]Günter Karjoth:
A LISP-Based LOTOS Environment. FORTE 1988: 73-77 - 1987
- [b1]Günter Karjoth:
Prozessalgebra und temporale Logik: angewandt zur Spezifikation u. Analyse von komplexen Protokollen. University of Stuttgart, Germany, 1987, pp. 1-188 - 1986
- [c4]Günter Karjoth:
On the Formal Specification of Protocols in Distributed Databases. ICCC 1986: 479-484 - 1985
- [c3]Günter Karjoth:
An interactive system for the analysis of communicating processes. PSTV 1985: 91-102 - 1984
- [c2]Ed Brinksma, Günter Karjoth:
A Specification of the OSI Transport Service in LOTOS. PSTV 1984: 227-251 - 1983
- [c1]Günter Karjoth:
A Behavioural Description Language for the Formal Treatment of Protocols in Distributed Systems. Protocol Specification, Testing, and Verification 1983: 125-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint