Publications
clear filter)
: Lowis L (Journal Articles
Years: 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994back to the top of all publications
2011
back to the year overview- Accorsi R, Lowis L, Sato Y
Automated Certification for Compliant Cloud-based Business Processes
2011 Business & Information Systems Engineering, volume: 3, pages: 145 - 154 - Accorsi R, Lowis L, Sato Y
Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse
2011 Wirtschaftsinformatik, volume: 53, issue: 3, pages: 139 - 149 - Lowis L, Accorsi R
Vulnerability Analysis in SOA-Based Business Processes
2011 IEEE Trans. Services Computing 4(3), pages: 230 - 242
2010
back to the year overview- Accorsi R, Lowis L
ComCert: Automated Certification of Cloud-based Business Processes
2010 ERCIM News, volume: 83, page: 50 - Lowis L, Accorsi R
Vulnerability analysis in SOA-based business processes
2010 IEEE Transactions on Services Computing
Book chapters
Years: 2016 | 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1987back to the top of all publications
2010
back to the year overview- Höhn S, Jürjens J, Lowis L, Accorsi R
Identification of Vulnerabilities in Web Services using Model-Based Securit
In: Web Services Security Development and Architecture: Theoretical and Practical Issues, pages: 1 - 32, Gutiérrez, C. and E. Fernández-Medina and M. Piattini (ed.), IGI Global, 2010
2006
back to the year overview- Herrmann A, Paech B, Kirn S, Kossmann D, Müller G, Binnig C, Gilliot M, Illes T, Lowis L, Weiß D
Durchgängige Qualität von Unternehmenssoftware.
In: Industrie Management. Industrie Zeitschrift für industrielle Geschäftsprozesse. , GITO-Verlag (Berlin), 2006
Conference papers
Years: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986back to the top of all publications
2009
back to the year overview- Lowis L, Accorsi R
On a Classification Approach for SOA Vulnerabilities
2009 1st IEEE Workshop on Security Aspects of Process and Services Engineering, Seattle, Washington, USA Proceedings of the 1st IEEE Workshop on Security Aspects of Process and Services Engineering - Sackmann S, Lowis L, Kittel K
Selecting Services in Business Process Execution – A Risk-based Approach
2009 Tagung Wirtschaftsinformatik (WI'09), Wien Business Services: Konzepte, Technologien, Anwendungen, pages: 357 - 366
2008
back to the year overview- Sackmann S, Kähmer M, Gilliot M, Lowis L
A Classification Model for Automating Compliance
2008 Tenth IEEE Conference on E-Commerce Technology (CEC08), Washington, USA Proceedings of Tenth IEEE Conference on E-Commerce Technology (CEC08), pages: 79 - 86 - Lowis L
Towards Automated Risk Identification in Service-Oriented Architectures
2008 Multikonferenz Wirtschaftsinformatik, München Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI 08) - Lowis L, Höhn S, Gilliot M
Vulnerability Effect Propagation in Service-Oriented Archtectures
2008 Sicherheit 2008, volume: 128, pages: 473 - 484
2007
back to the year overview- Lowis L
Sicherheitsüberwachung entfernter Dienste in service-orientierten Architekturen
2007 Second GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2007-01 Proceedings of the Second GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), page: 5
2005
back to the year overview- Lowis L, Hohl A
Enabling Persistent Service Links
2005 7th IEEE International Conference on E-Commerce Technology Proceedings of the 7th IEEE International Conference on E-Commerce Technology, pages: 301 - 306 - Hohl A, Lowis L, Zugenmaier A
Look Who's Talking - Authenticating Service Access Points
2005 2nd International Conference of Ubiquitous Computing Proceedings of the 2nd International Conference of Ubiquitous Computing, pages: 151 - 162
Other publications
Years: 2012 | 2010 | 2008 | 2007 | 2006 | 2005 | 2001 | 2000 | 1998back to the top of all publications
2007
back to the year overview- Weiß D, Kaack J, Kirn S, Gilliot M, Lowis L, Müller G, Herrmann A, Binnig C, Illes T, Paech B, Kossmann D
Die SIKOSA-Methodik – Unterstützung der industriellen Softwareproduktion durch methodisch integrierte Softwareentwicklungsprozesse.
Wirtschaftsinf, volume: 49, issue: 3, pages: 188 - 198, 2007