Günter Karjoth
Günter Karjoth
Lucerne University of Applied Sciences
Geverifieerd e-mailadres voor acm.org - Homepage
TitelGeciteerd doorJaar
A security model for aglets
G Karjoth, DB Lange, M Oshima
Internet Computing, IEEE 1 (4), 68-77, 1997
4301997
Enterprise privacy authorization language (EPAL)
P Ashley, S Hada, G Karjoth, C Powers, M Schunter
IBM Research, 2003
4072003
Platform for enterprise privacy practices: Privacy-enabled management of customer data
G Karjoth, M Schunter, M Waidner
Privacy Enhancing Technologies, 194-198, 2003
3482003
Routing on longest-matching prefixes
W Doeringer, G Karjoth, M Nassehi
IEEE/ACM Transactions on Networking (TON) 4 (1), 86-97, 1996
3261996
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
2461998
Access control in data processing systems
TR Gross, G Karjoth
US Patent App. 13/077,881, 2011
2192011
Variable length data sequence backtracking a trie structure
W Doeringer, D Dykeman, G Karjoth, M Nassehi, M Sharma
US Patent 5,787,430, 1998
2191998
A privacy policy model for enterprises
G Karjoth, M Schunter
Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE, 271-281, 2002
2122002
Access control in data processing system
TR Gross, G Karjoth
US Patent 20,120,216,247, 2012
2092012
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, 2-11, 2001
1772001
E-P3P privacy policies and privacy authorization
P Ashley, S Hada, G Karjoth, M Schunter
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society …, 2002
1702002
Using a rules model to improve handling of personally identifiable information
SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ...
US Patent 7,069,427, 2006
1652006
Aglets: Programming mobile agents in Java
D Lange, M Oshima, G Karjoth, K Kosaka
Worldwide Computing and Its Applications, 253-266, 1997
1551997
Method and apparatus for secure transmission of data and applications
G Karjoth, LJ O'connor
US Patent App. 09/748,446, 2000
1472000
Disabling RFID tags with visible confirmation: clipped tags are silenced
G Karjoth, PA Moskowitz
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 27-30, 2005
1442005
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
1422004
Access control with IBM Tivoli access manager
G Karjoth
ACM Transactions on Information and System Security (TISSEC) 6 (2), 232-257, 2003
1272003
Privacy-enabled services for enterprises
G Karjoth, M Schunter, M Waidner
Database and Expert Systems Applications, 2002. Proceedings. 13th …, 2002
822002
System and method for disabling RFID tags
PA Moskowitz, RJ Von Gutfeld, G Karjoth
US Patent 7,737,853, 2010
792010
System and method for disabling RFID tags
PA Moskowitz, RJ Von Gutfeld, G Karjoth
US Patent 7,277,016, 2007
792007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20