Karsten Sohr
Orcid: 0000-0001-6781-4226Affiliations:
- University of Bremen, Center for Computing Technologies (TZI), Germany
- University of Marburg, Department of Mathematics and Computer Science, Germany
According to our database1,
Karsten Sohr
authored at least 61 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Empowering User Security Awareness and Risk Assessment Within Gamified Smartphone Environment.
Proceedings of the Entertainment Computing - ICEC 2024, 2024
2023
Datenschutz und Datensicherheit (dud), May, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
It's Long and Complicated! Enhancing One-Pager Privacy Policies in Smart Home Applications.
Proceedings of the NordiCHI '22: Nordic Human-Computer Interaction Conference, Aarhus, Denmark, October 8, 2022
Proceedings of the MuC '22: Mensch und Computer 2022, Darmstadt Germany, September 4, 2022
2021
Datenschutz und Datensicherheit, 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021
2020
Softw. Qual. J., 2020
Modeling and Validating Role-Based Authorization Policies for a Port Communication System with UML and OCL.
J. Object Technol., 2020
Praktische Erfahrungen und Ansätze für âSecurity by Design' auf Basis der STRIDE-Methodik.
Datenschutz und Datensicherheit, 2020
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020
Proceedings of the Modellierung 2020, 19.-21. Februar 2020, Wien, Österreich., 2020
Enhancing Game-Based Learning Through Infographics in the Context of Smart Home Security.
Proceedings of the Entertainment Computing - ICEC 2020, 2020
Good vs. Evil: Investigating the Effect of Game Premise in a Smart Home Security Educational Game.
Proceedings of the CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play, Virtual Event, Canada, November 2-4, 2020, 2020
2019
Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of Mensch und Computer 2019, Hamburg, Germany, September 8-11, 2019, 2019
What Could Go Wrong?: Raising Mobile Privacy and Security Awareness Through a Decision-Making Game.
Proceedings of the Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, 2019
HappyPermi: Presenting Critical Data Flows in Mobile Application to Raise User Security Awareness.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2016
Proceedings of the 16th International Workshop on OCL and Textual Modelling co-located with 19th International Conference on Model Driven Engineering Languages and Systems (MODELS 2016), 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
2015
Understanding the implemented access control policy of Android system services with slicing and extended static checking.
Int. J. Inf. Sec., 2015
EAI Endorsed Trans. Collab. Comput., 2015
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
2014
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
2013
Math. Struct. Comput. Sci., 2013
Proceedings of the Joint Proceedings of the First International Workshop On the Globalization of Modeling Languages (GEMOC 2013) and the First International Workshop: Towards the Model Driven Organization (AMINO 2013) Co-located with the 16th International Conference on Model Driven Engineering Languages and Systems (MODELS 2013), Miami, USA, September 29, 2013
Extracting and Analyzing the Implemented Security Architecture of Business Applications.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL.
Inf. Softw. Technol., 2012
CoRR, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Datenschutz und Datensicherheit, 2011
Proceedings of the 18th Working Conference on Reverse Engineering, 2011
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
2010
Grundzüge eines Sicherheitskonzeptes für Arztpraxen mit Hilfe von Attack Trees und unter Berücksichtigung der Gesundheitstelematik.
Proceedings of the perspeGKtive 2010, 2010
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2010
Towards formal specification and verification of a role-based authorization engine using JML.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
2008
IEEE Trans. Knowl. Data Eng., 2008
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Mensch & Computer 2007 Workshopband, 2007
2006
A model-checking approach to analysing organisational controls in a loan origination process.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
2005
ACM SIGSOFT Softw. Eng. Notes, 2005
Formal specification of role-based security policies for clinical information systems.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Computer Security, 2005
2004
Proceedings of the 4th International Conference on Quality Software (QSIC 2004), 2004
2003
A temporal-logic extension of role-based access control covering dynamic separation of duties.
Proceedings of the 10th International Symposium on Temporal Representation and Reasoning / 4th International Conference on Temporal Logic (TIME-ICTL 2003), 2003
2001
Proceedings of the Innovative Internet Computing Systems, 2001
1999
Proceedings of the JIT '99, 1999