Graph-Based XACML Evaluation S Pina Ros, M Lischka, F Gómez Mármol | 71 | 2012 |
Role-based access control in ambient and remote space HF Wedde, M Lischka Proceedings of the ninth ACM symposium on Access control models and …, 2004 | 32 | 2004 |
Modular Authorization HF Wedde, M Lischka Proceedings of the sixth ACM Symposium on Access Control Models and …, 2001 | 24 | 2001 |
Deductive policies with XACML M Lischka, Y Endo, M Sánchez Cuenca Proceedings of the 2009 ACM workshop on Secure web services, 37-44, 2009 | 19 | 2009 |
Security and privacy enablers for future identity management systems M Barisch, ET Garcia, M Lischka, R Marques, R Marx, A Matos, ... 2010 Future Network & Mobile Summit, 1-10, 2010 | 18 | 2010 |
Cooperative role-based administration HF Wedde, M Lischka Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 18 | 2003 |
Modular authorization and administration HF Wedde, M Lischka ACM Transactions on Information and System Security (TISSEC) 7 (3), 363-391, 2004 | 17 | 2004 |
Privacy in smart metering ecosystems P Ebinger, JL Hernández Ramos, P Kikiras, M Lischka, A Wiesmaier International Workshop on Smart Grid Security, 120-131, 2012 | 15 | 2012 |
Personalization-based optimization of real-time service delivery in a multi-device environment MQ Kuhnen, D Kraft, A Schulke, J Bauknecht, J Haussler, M Lischka 2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009 | 12 | 2009 |
Composing heterogenous access policies between organizations HFWM Lischka, HF Wedde Proceedings of the IADIS International Conference e-Society, Lisbon, 3-6, 2003 | 9 | 2003 |
Internet-of-Things architecture IoT-A project deliverable D1. 2—Initial architectural reference model for IoT M Bauer, N Bui, P Giacomin, N Gruschka, S Haller, E Ho, R Kernchen, ... European Commission, 2011 | 8 | 2011 |
Bridging IMS and Internet Identity I Friese, J Högberg, FA Foll, G Gourmelen, M Lischka, J Brennan, P Weik, ... 2010 14th International Conference on Intelligence in Next Generation …, 2010 | 8 | 2010 |
Dynamic obligation specification and negotiation M Lischka 2010 IEEE Network Operations and Management Symposium-NOMS 2010, 155-162, 2010 | 8 | 2010 |
New dimensions in distributed journalism through dragon slayer iii HF Wedde, M Lischka Proceedings of the Seventh Euromicro Workshop on Parallel and Distributed …, 1999 | 7 | 1999 |
Policy-based real-time decision-making for personalized service delivery J Bauknecht, J Haussler, D Kraft, MQ Kuhnen, M Lischka, A Schulke 2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009 | 5 | 2009 |
Sicherheitsprobleme im Cloud Computing S Groß, M Lischka, N Gruschka, A Miede, M Jensen, M Mosch, S Schulte, ... PIK-Praxis der Informationsverarbeitung und Kommunikation 34 (3), 126-134, 2011 | 4 | 2011 |
An evolutionary meta hierarchical scheduler for the Linux operating system HF Wedde, M Farooq, M Lischka Genetic and Evolutionary Computation–GECCO 2004: Genetic and Evolutionary …, 2004 | 4 | 2004 |
Modular Authorization FW HORST, M LISCHKA Proceedings of the sixth ACM Symposium on Access Control Models and …, 2001 | 4 | 2001 |
Verteilte kompetenzbasierte Authentifizierung von Knoten im Dragon Slayer III System M Lischka Master’s thesis, Informatik III, Universitt, 1998 | 4 | 1998 |
method for access control within a network and a network M Lischka US Patent App. 13/142,085, 2011 | 3 | 2011 |