Publications
clear filter)
: Höhn S (Journal Articles
Years: 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994back to the top of all publications
2010
back to the year overview- Müller G, Accorsi R, Höhn S, Sackmann S
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten
2010 Informatik Spektrum, volume: 33, issue: 1, pages: 3 - 13
2004
back to the year overview- Höhn S, Jürjens J
Automated checking of SAP security permissions
2004 Integrity and Internal Control in Information Systems VI, pages: 13 - 30
Book chapters
Years: 2016 | 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1987back to the top of all publications
2010
back to the year overview- Höhn S, Jürjens J, Lowis L, Accorsi R
Identification of Vulnerabilities in Web Services using Model-Based Securit
In: Web Services Security Development and Architecture: Theoretical and Practical Issues, pages: 1 - 32, Gutiérrez, C. and E. Fernández-Medina and M. Piattini (ed.), IGI Global, 2010
2007
back to the year overview- Accorsi R, Höhn S, Maier M
An Approach for Secure Usability for Ambient Intelligence Environments.
In: Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security., A. Schmidt, M. Kreutzer, R. Accorsi (ed.), Nova-Publishers, 2007 - Müller G, Accorsi R, Höhn S, Kähmer M, Strasser M
Sicherheit in Ubiquitous Computing: Schutz durch Gebote?
In: Die Informatisierung des Alltags - Leben in smarten Umgebungen, pages: 127 - 142, Friedeman Mattern (ed.), Springer-Verlag, 2007
2006
back to the year overview- Höhn S
Bringing the user back into control: a new paradigm for usability in highly dynamic systems
In: TrustBus 2006, LNCS 4083, pages: 114 - 122, S. Fischer-Hübner et al. (ed.), Springer-Verlag (Berlin Heidelberg), 2006
Conference papers
Years: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986back to the top of all publications
2009
back to the year overview- Höhn S
Model-based reasoning on the achievement of business goals
2009 ACM Symposium on Applied Computing (SAC), New York, NY, USA Proceedings of the ACM Symposium on Applied Computing (SAC), pages: 1589 - 1593
2008
back to the year overview- Höhn S, Jürjens J
Rubacon: automated support for model-based compliance engineering
2008 ICSE '08: 30th international conference on Software engineering, Leipzig, Germany ICSE '08: Proceedings of the 30th international conference on Software engineering, page: 75–878 - Lowis L, Höhn S, Gilliot M
Vulnerability Effect Propagation in Service-Oriented Archtectures
2008 Sicherheit 2008, volume: 128, pages: 473 - 484
2007
back to the year overview- Parrend P, Frenot S, Höhn S
Privacy-Aware Service Integration
2007 International Conference on Pervasive Services Proceedings of the International Conference on Pervasive Services, pages: 397 - 402