Claus Wonnemann

Affiliations:
  • University of Freiburg, Germany


According to our database1, Claus Wonnemann authored at least 16 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Durchsetzung von Cybersecurity in IoT-Lieferketten.
Wirtschaftsinformatik Manag., October, 2023

2022
Cyber-Security entlang der IoT-Lieferkette.
Datenschutz und Datensicherheit, 2022

2011
Mechanismen zur Sicherheitszertifizierung formalisierter Geschäftsprozesse (Mechanisms for the security certification of formalized business processes)
PhD thesis, 2011

Strong non-leak guarantees for workflow models.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Towards Forensic Data Flow Analysis of Business Process Logs.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

Forensic Leak Detection for Business Process Models.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems.
Proceedings of the Sixth International Conference on Availability, 2011

2010
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Towards Information Flow Auditing in Workflows.
Proceedings of the Software Engineering 2010, 2010

Static Information Flow Analysis of Workflow Models.
Proceedings of the INFORMATIK 2010 - Business Process and Service Science - Proceedings of ISSS and BPSC, September 27, 2010

Auditing Workflow Executions against Dataflow Policies.
Proceedings of the Business Information Systems, 13th International Conference, 2010

2009
On Information Flow Forensics in Business Application Scenarios.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Detective Information Flow Analysis for Business Processes.
Proceedings of the Business Process, 2009

2008
RFID - ist Sicherheit in offenen Anwendungen erreichbar?
Wirtschaftsinf., 2008

Password Management for EPC Class 1 Generation 2 Transponders.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

2006
A case study of specification and verification using JML in an avionics application.
Proceedings of the 4th international workshop on Java technologies for real-time and embedded systems, 2006


  Loading...