Marcel Winandy

According to our database1, Marcel Winandy authored at least 39 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Mind the Shift: Secure Migration of Containerized Processes in Edge Computing.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2016
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2014
A trusted versioning file system for passive mobile storage devices.
J. Netw. Comput. Appl., 2014

2012
Security and trust architectures for protecting sensitive data on commodity computing platforms.
PhD thesis, 2012

Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen und Lösungsansätze.
Datenschutz und Datensicherheit, 2012

Applying a Security Kernel Framework to Smart Meter Gateways.
Proceedings of the ISSE 2012, 2012

Flexible patient-controlled security for electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012

2011
Uni-directional trusted path: Transaction confirmation on just one device.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

ROPdefender: a detection tool to defend against return-oriented programming attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Trusted virtual domains on OKL4: secure information sharing on smartphones.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011

Securing the Access to Electronic Health Records on Mobile Phones.
Proceedings of the Biomedical Engineering Systems and Technologies, 2011

2010
Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

Token-Based Cloud Computing.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Privilege Escalation Attacks on Android.
Proceedings of the Information Security - 13th International Conference, 2010

TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of the Trusted Systems - Second International Conference, 2010

Securing the e-health cloud.
Proceedings of the ACM International Health Informatics Symposium, 2010

A Note on the Security in the Card Management System of the German E-Health Card.
Proceedings of the Electronic Healthcare - Third International Conference, 2010

Trusted virtual domains on OpenSolaris: usable secure desktop environments.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

Return-oriented programming without returns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Patterns for Secure Boot and Secure Storage in Computer Systems.
Proceedings of the ARES 2010, 2010

2009
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Proceedings of the Trusted Computing, 2009

Transparent Mobile Storage Protection in Trusted Virtual Domains.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Proceedings of the Information Security Practice and Experience, 2009

Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Proceedings of the Trusted Systems, First International Conference, 2009

Software distribution as a malware infection vector.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

A Pattern for Secure Graphical User Interface Systems.
Proceedings of the Database and Expert Systems Applications, 2009

TruWallet: trustworthy and migratable wallet-based web authentication.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Property-Based TPM Virtualization.
Proceedings of the Information Security, 11th International Conference, 2008

Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

Flexible and secure enterprise rights management based on trusted virtual domains.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Proceedings of the The Second International Conference on Availability, 2007

2006
Security Architecture for Device Encryption and VPN.
Proceedings of the ISSE 2006, 2006

TCG inside?: a note on TPM specification compliance.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
Multilateral security considerations for adaptive mobile applications.
Proceedings of the ICETE 2005, 2005

Towards Context-Sensitive Intelligence.
Proceedings of the Software Architecture, 2nd European Workshop, 2005

2003
A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Protecting Java Component Integrity Against Trojan Horse Programs.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002


  Loading...