Kurt Stenzel

According to our database1, Kurt Stenzel authored at least 45 papers between 1993 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Secure Integration of Third Party Components in a Model-Driven Approach.
Trans. Large Scale Data Knowl. Centered Syst., 2016

Declassification of Information with Complex Filter Functions.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Formal verification of QVT transformations for code generation.
Softw. Syst. Model., 2015

Modeling information flow properties with UML.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Integration and Exchangeability of External Security-Critical Web Services in a Model-Driven Approach.
Proceedings of the Advances in Conceptual Modeling, 2015

Integrating a Model-Driven Approach and Formal Verification for the Development of Secure Service Applications.
Proceedings of the Correct Software in Web Applications and Web Services, 2015

2014
A Model-Driven Approach to Noninterference.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Modeling test cases for security protocols with SecureMDD.
Comput. Networks, 2014

Formalizing Information Flow Control in a Model-Driven Approach.
Proceedings of the Information and Communication Technology, 2014

2013
Model-Driven Development of Information Flow-Secure Systems with IFlow.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Model Checking of Security-Critical Applications in a Model-Driven Approach.
Proceedings of the Software Engineering and Formal Methods - 11th International Conference, 2013

Security requirements formalized with OCL in a model-driven approach.
Proceedings of the International Workshop on Model-Driven Requirements Engineering, 2013

2012
Model-Driven Development of Secure Service Applications.
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012

Model-Driven Testing of Security Protocols with SecureMDD.
Proceedings of the 5th International Conference on New Technologies, 2012

Incremental development of large, secure smart card applications.
Proceedings of the Model-Driven Security Workshop, 2012

Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Mondex: Engineering a Provable Secure Electronic Purse.
Int. J. Softw. Informatics, 2011

2010
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Pitfalls in Formal Reasoning about Security Protocols.
Proceedings of the ARES 2010, 2010

2009
Generating formal specifications for security-critical applications - A model-driven approach.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Model-Driven Code Generation for Secure Smart Card Applications.
Proceedings of the 20th Australian Software Engineering Conference (ASWEC 2009), 2009

SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code.
Proceedings of the FM 2008: Formal Methods, 2008

Verification of Java Programs with Generics.
Proceedings of the Algebraic Methodology and Software Technology, 2008

2007
ASN1-light: A Verified Message Encoding for Security Protocols.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

A Refinement Method for Java Programs.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2007

2006
Developing Provable Secure M-Commerce Applications.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Verification of Java card programs.
PhD thesis, 2005

Object Oriented Verification Kernels for Secure Java Applications.
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005

2004
Electronic-Onboard-Ticketing: Software Challenges of an State-of-the-Art M-Commerce Application.
Proceedings of the Mobile Economy, 2004

A Construction Kit for Modeling the Security of M-commerce Applications.
Proceedings of the Applying Formal Methods: Testing, Performance and M/ECommerce, 2004

A Formally Verified Calculus for Full Java Card.
Proceedings of the Algebraic Methodology and Software Technology, 2004

2003
Design for Trust: Security im M-Commerce.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003

2002
A Method for Secure Smartcard Applications.
Proceedings of the Algebraic Methodology and Software Technology, 2002

2000
Formal System Development with KIV.
Proceedings of the Fundamental Approaches to Software Engineering, 2000

1998
VSE: Controlling the Complexity in Formal Software Developments.
Proceedings of the Applied Formal Methods, 1998

KIV 3.0 for Provably Correct Systems.
Proceedings of the Applied Formal Methods, 1998

1997
Proving System Correctness with KIV.
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997

Proving System Correctness with KIV 3.0.
Proceedings of the Automated Deduction, 1997

1995
Three Selected Case Studies in Verification.
Proceedings of the KORSO, 1995

1994
Tactics in KIV.
J. Inf. Process. Cybern., 1994

Formal Specification and Verification Using KIV.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International Symposium Organized Jointly with the Working Group Provably Correct Systems, 1994

1993
The KIV System: A Tool for Formal Program Development.
Proceedings of the STACS 93, 1993

Reuse of Proofs in Software Verification.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1993


  Loading...