default search action
Peter Amthor 0001
Person information
- affiliation (PhD 2019): Ilmenau University of Technology, Germany
Other persons with the same name
- Peter Amthor 0002 — University of Bremen, Germany
- Peter Amthor 0003 — Siemens AG, CT SE 1, Munich, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Majid Lotfian Delouee, Victoria Degeler, Peter Amthor, Boris Koldehofe:
APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems. ICISSP 2024: 486-497 - [c16]Peter Amthor, René Gorges:
A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks. SECRYPT 2024: 78-90 - [c15]Robert Walther, Carsten Weinhold, Peter Amthor, Michael Roitzsch:
Multi-Stakeholder Policy Enforcement for Distributed Systems. WOC@Middleware 2024: 7-12 - 2023
- [c14]Peter Amthor, Ulf Döring, Daniel Fischer, Jonas Genath, Gunther Kreuzberger:
Erfahrungen bei der Integration des Autograding-Systems CodeOcean in die universitäre Programmierausbildung. ABP 2023: 67-74 - 2021
- [c13]Marius Schlegel, Peter Amthor:
Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies. ICETE (Selected Papers) 2021: 249-280 - [c12]Marius Schlegel, Peter Amthor:
The Missing Piece of the ABAC Puzzle: A Modeling Scheme for Dynamic Analysis. SECRYPT 2021: 234-246 - 2020
- [c11]Marius Schlegel, Peter Amthor:
Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies. ICETE (2) 2020: 431-442 - [c10]Peter Amthor, Marius Schlegel:
Towards Language Support for Model-based Security Policy Engineering. ICETE (2) 2020: 513-521
2010 – 2019
- 2019
- [b1]Peter Amthor:
Aspect-oriented security engineering: a model-based approach. Technische Universität Ilmenau, Germany, Cuvillier Verlag 2019, ISBN 978-3-7369-9980-0, pp. 1-245 - [c9]Peter Amthor, Daniel Fischer, Winfried E. Kühnhauser, Dirk Stelzer:
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. ARES 2019: 86:1-86:10 - [c8]Felix Wiemuth, Peter Amthor, Winfried E. Kühnhauser:
Static Termination Analysis for Event-driven Distributed Algorithms. DEBS 2019: 151-162 - [c7]Peter Amthor, Martin Rabe:
Command Dependencies in Heuristic Safety Analysis of Access Control Models. FPS 2019: 207-224 - 2017
- [c6]Peter Amthor:
Efficient Heuristic Safety Analysis of Core-based Security Policies. SECRYPT 2017: 384-392 - [i1]Peter Amthor:
Towards a Uniform Framework for Dynamic Analysis of Access Control Models. CoRR abs/1706.03536 (2017) - 2015
- [c5]Peter Amthor:
The Entity Labeling Pattern for Modeling Operating Systems Access Control. ICETE (Selected Papers) 2015: 270-292 - [c4]Peter Amthor:
A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. SECRYPT 2015: 88-99 - [c3]Peter Amthor, Winfried E. Kühnhauser:
Security Policy Synthesis in Mobile Systems. SERVICES 2015: 189-197 - 2014
- [j1]Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:
WorSE: A Workbench for Model-based Security Engineering. Comput. Secur. 42: 40-55 (2014) - 2013
- [c2]Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:
Heuristic safety analysis of access control models. SACMAT 2013: 137-148 - 2011
- [c1]Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:
Model-based safety analysis of SELinux security policies. NSS 2011: 208-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint