Seguir
Günter Karjoth
Günter Karjoth
Lucerne University of Applied Sciences
Email confirmado em acm.org - Página inicial
Título
Citado por
Citado por
Ano
A security model for aglets
G Karjoth, DB Lange, M Oshima
Internet Computing, IEEE 1 (4), 68-77, 1997
4661997
Enterprise privacy authorization language (EPAL)
P Ashley, S Hada, G Karjoth, C Powers, M Schunter
IBM Research, 2003
4492003
Using a rules model to improve handling of personally identifiable information
SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ...
US Patent 7,069,427, 2006
4142006
Platform for enterprise privacy practices: Privacy-enabled management of customer data
G Karjoth, M Schunter, M Waidner
Privacy Enhancing Technologies, 194-198, 2003
3952003
Routing on longest-matching prefixes
W Doeringer, G Karjoth, M Nassehi
IEEE/ACM Transactions on Networking (TON) 4 (1), 86-97, 1996
3521996
Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets
L Betz, JC Dayka, WB Farrell, RH Guski, G Karjoth, MA Nelson, ...
US Patent 7,617,393, 2009
3072009
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
L Betz, JC Dayka, WB Farrell, RH Guski, G Karjoth, MA Nelson, ...
US Patent 7,302,569, 2007
2892007
IMPLEMENTATION AND USE OF A PII DATA ACCESS CONTROL FACILITY EMLPLOYING PERSONALLY IDENTIFYING INFORMATION LABELS AND PURPOSE SERVING FUNCTION SETS
L Betz, J Dayka, W Farrell, R Guski, G Karjoth, M Nelson, B Pfitzmann, ...
EP Patent 1,660,967, 2006
2892006
IMPLEMENTATION AND USE OF A PII DATA ACCESS CONTROL FACILITY EMLPLOYING PERSONALLY IDENTIFYING INFORMATION LABELS AND PURPOSE SERVING FUNCTION SETS
L BETZ, J DAYKA, W FARRELL, R GUSKI, G KARJOTH, M NELSON, ...
WO Patent WO/2005/017,720, 2005
2892005
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
2631998
A privacy policy model for enterprises
G Karjoth, M Schunter
Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE, 271-281, 2002
2512002
Access control in data processing systems
TR Gross, G Karjoth
US Patent App. 13/077,881, 2011
2412011
Access control in data processing system
TR Gross, G Karjoth
US Patent 20,120,216,247, 2012
2272012
Variable length data sequence backtracking a trie structure
W Doeringer, D Dykeman, G Karjoth, M Nassehi, M Sharma
US Patent 5,787,430, 1998
2231998
E-P3P privacy policies and privacy authorization
P Ashley, S Hada, G Karjoth, M Schunter
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society …, 2002
2012002
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, 2-11, 2001
1882001
Aglets: Programming mobile agents in Java
D Lange, M Oshima, G Karjoth, K Kosaka
Worldwide Computing and Its Applications, 253-266, 1997
1741997
Disabling RFID tags with visible confirmation: clipped tags are silenced
G Karjoth, PA Moskowitz
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 27-30, 2005
1612005
Method and apparatus for secure transmission of data and applications
G Karjoth, LJ O'connor
US Patent App. 09/748,446, 2000
1592000
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
1532004
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20