Publications
clear filter)
: Wonnemann C (Journal Articles
Years: 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994back to the top of all publications
2008
back to the year overview- Wonnemann C
RFID – ist Sicherheit in offenen Anwendungen erreichbar?
2008 Wirtschaftsinformatik, volume: 50, issue: 5
2007
back to the year overview- Strüker J, Wonnemann C, Kähmer M, Gille D
Managing the Deactivation Process of EPC Class-1 Generation-2 Tags in Retail Industry.
2007 Expert Report on Password Management for EPC Gen2 Tags for a German Retail Group
Book chapters
Years: 2016 | 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1987back to the top of all publications
2011
back to the year overview- Accorsi R, Wonnemann C
Forensic Leak Detection for Business Processes Models
In: Proceedings of the IFIP Conference on Digital Forensics, Springer-Verlag (Berlin), 2011 - Accorsi R, Wonnemann C
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements
In: Proceedings of the ERCIM Workshop on Security and Trust Management, Springer (Athens, Greece), 2011
2010
back to the year overview- Accorsi R, Wonnemann C
Static Information Flow Analysis of Workflow Models
In: Business Process and Service Science, pages: 194 - 205, Gesellschaft für Informatik (Leipzig, Germany), 2010
2009
back to the year overview- Accorsi R, Wonnemann C
Detective Information Flow Analysis for Business Processes (Extended Abstract)
In: Business Processes, Services Computing and Intelligent Service Management, pages: 223 - 224, Abramowicz, W., Macaszek L., Kowalczyk R., and Speck A. (ed.), Bonner Köllen Verlag (Bonn et al.), 2009
Conference papers
Years: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986back to the top of all publications
2011
back to the year overview- Accorsi R, Wonnemann C
Informationsfluss-Mechanismen zur Zertifizierung von Cloud-basierten Geschäftsprozessen
2011 Deutscher IT-Sicherheitskongress des BSI - Accorsi R, Wonnemann C, Dochow S
SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems
2011 Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pages: 692 - 697 - Accorsi R, Wonnemann C
Strong Non-Leak Guarantees for Workflow Models
2011 ACM Symposium on Applied Computing (Enterprise Engineering Track). TaiChung, Taiwan Proceedings of ACM Symposium on Applied Computing (Enterprise Engineering Track) - Accorsi R, Wonnemann C, Stocker T
Towards forensic data flow analysis of business process logs
2011 Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics, pages: 3 - 20
2010
back to the year overview- Accorsi R, Wonnemann C
Auditing Workflow Executions against Dataflow Policies
2010 Conference on Business Information Systems, Berlin, Germany Proceedings of the Conference on Business Information Systems, Lecture Notes in Business Information Processing, volume: 47, pages: 207 - 217
2009
back to the year overview- Wonnemann C, Accorsi R
On Information Flow Forensics in Business Application Scenarios
2009 4th IEEE Workshop on Security, Trust, and Privacy for Software Applications, Seattle, Washington, USA Proceedings of the 4th IEEE Workshop on Security, Trust, and Privacy for Software Applications - Wonnemann C, Accorsi R, Müller G
On Information Flow Forensics in Business Application Scenarios
2009 Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pages: 324 - 328
2008
back to the year overview- Wonnemann C, Strüker J
Password Management for EPC Class 1 Generation 2 Transponders
2008 10th IEEE Conference on E-Commerce Technology (CEC'08), Washington, USA Proceedings of the 10th IEEE Conference on E-Commerce Technology (CEC'08)