Info
Publications
Filtered by author : Lowis L (clear filter )
filter list :
Journal Articles
Years:
2015 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002 |
2001 |
2000 |
1999 |
1998 |
1997 |
1996 |
1995 |
1994
|
show all
back to the top of all publications
back to the year overview
Accorsi R , Lowis L , Sato Y
Automated Certification for Compliant Cloud-based Business Processes
2011 Business & Information Systems Engineering, volume : 3, pages : 145 - 154
Accorsi R , Lowis L , Sato Y
Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse
2011 Wirtschaftsinformatik, volume : 53, issue : 3, pages : 139 - 149
Lowis L , Accorsi R
Vulnerability Analysis in SOA-Based Business Processes
2011 IEEE Trans. Services Computing 4(3), pages : 230 - 242
back to the year overview
Book chapters
Years:
2016 |
2015 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002 |
2001 |
2000 |
1999 |
1998 |
1997 |
1996 |
1995 |
1994 |
1987
|
show all
back to the top of all publications
back to the year overview
Höhn S , Jürjens J , Lowis L , Accorsi R
Identification of Vulnerabilities in Web Services using Model-Based Securit
In : Web Services Security Development and Architecture: Theoretical and Practical Issues , pages : 1 - 32, Gutiérrez, C. and E. Fernández-Medina and M. Piattini (ed.) , IGI Global, 2010
back to the year overview
Herrmann A , Paech B , Kirn S , Kossmann D , Müller G , Binnig C , Gilliot M , Illes T , Lowis L , Weiß D
Durchgängige Qualität von Unternehmenssoftware.
In : Industrie Management. Industrie Zeitschrift für industrielle Geschäftsprozesse. , GITO-Verlag (Berlin), 2006
Conference papers
Years:
2017 |
2016 |
2015 |
2014 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002 |
2001 |
2000 |
1999 |
1998 |
1997 |
1996 |
1995 |
1994 |
1992 |
1991 |
1986
|
show all
back to the top of all publications
back to the year overview
Lowis L , Accorsi R
On a Classification Approach for SOA Vulnerabilities
2009 1st IEEE Workshop on Security Aspects of Process and Services Engineering, Seattle, Washington, USA Proceedings of the 1st IEEE Workshop on Security Aspects of Process and Services Engineering
Sackmann S , Lowis L , Kittel K
Selecting Services in Business Process Execution – A Risk-based Approach
2009 Tagung Wirtschaftsinformatik (WI'09), Wien Business Services: Konzepte, Technologien, Anwendungen, pages : 357 - 366
back to the year overview
Sackmann S , Kähmer M , Gilliot M , Lowis L
A Classification Model for Automating Compliance
2008 Tenth IEEE Conference on E-Commerce Technology (CEC08), Washington, USA Proceedings of Tenth IEEE Conference on E-Commerce Technology (CEC08), pages : 79 - 86
Lowis L
Towards Automated Risk Identification in Service-Oriented Architectures
2008 Multikonferenz Wirtschaftsinformatik, München Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 08)
Lowis L , Höhn S , Gilliot M
Vulnerability Effect Propagation in Service-Oriented Archtectures
2008 Sicherheit 2008, volume : 128, pages : 473 - 484
back to the year overview
Lowis L
Sicherheitsüberwachung entfernter Dienste in service-orientierten Architekturen
2007 Second GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2007-01 Proceedings of the Second GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), page : 5
back to the year overview
Lowis L , Hohl A
Enabling Persistent Service Links
2005 7th IEEE International Conference on E-Commerce Technology Proceedings of the 7th IEEE International Conference on E-Commerce Technology, pages : 301 - 306
Hohl A , Lowis L , Zugenmaier A
Look Who's Talking - Authenticating Service Access Points
2005 2nd International Conference of Ubiquitous Computing Proceedings of the 2nd International Conference of Ubiquitous Computing, pages : 151 - 162
Other publications
Years:
2012 |
2010 |
2008 |
2007 |
2006 |
2005 |
2001 |
2000 |
1998
|
show all
back to the top of all publications
back to the year overview
Weiß D , Kaack J , Kirn S , Gilliot M , Lowis L , Müller G , Herrmann A , Binnig C , Illes T , Paech B , Kossmann D
Die SIKOSA-Methodik – Unterstützung der industriellen Softwareproduktion durch methodisch integrierte Softwareentwicklungsprozesse.
Wirtschaftsinf, volume : 49, issue : 3, pages : 188 - 198, 2007