Günter Karjoth
Günter Karjoth
Lucerne University of Applied Sciences
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα acm.org - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
A security model for aglets
G Karjoth, DB Lange, M Oshima
Internet Computing, IEEE 1 (4), 68-77, 1997
4381997
Enterprise privacy authorization language (EPAL)
P Ashley, S Hada, G Karjoth, C Powers, M Schunter
IBM Research, 2003
3992003
Platform for enterprise privacy practices: Privacy-enabled management of customer data
G Karjoth, M Schunter, M Waidner
Privacy Enhancing Technologies, 194-198, 2003
3702003
Routing on longest-matching prefixes
W Doeringer, G Karjoth, M Nassehi
IEEE/ACM Transactions on Networking (TON) 4 (1), 86-97, 1996
3401996
Using a rules model to improve handling of personally identifiable information
SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ...
US Patent 7,069,427, 2006
2592006
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
2541998
Access control in data processing systems
TR Gross, G Karjoth
US Patent App. 13/077,881, 2011
2392011
A privacy policy model for enterprises
G Karjoth, M Schunter
Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE, 271-281, 2002
2302002
Access control in data processing system
TR Gross, G Karjoth
US Patent 20,120,216,247, 2012
2262012
Variable length data sequence backtracking a trie structure
W Doeringer, D Dykeman, G Karjoth, M Nassehi, M Sharma
US Patent 5,787,430, 1998
2221998
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, 2-11, 2001
1872001
E-P3P privacy policies and privacy authorization
P Ashley, S Hada, G Karjoth, M Schunter
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society …, 2002
1792002
Aglets: Programming mobile agents in Java
D Lange, M Oshima, G Karjoth, K Kosaka
Worldwide Computing and Its Applications, 253-266, 1997
1631997
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
1552004
Disabling RFID tags with visible confirmation: clipped tags are silenced
G Karjoth, PA Moskowitz
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 27-30, 2005
1542005
Method and apparatus for secure transmission of data and applications
G Karjoth, LJ O'connor
US Patent App. 09/748,446, 2000
1502000
Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets
L Betz, JC Dayka, WB Farrell, RH Guski, G Karjoth, MA Nelson, ...
US Patent 7,617,393, 2009
1442009
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
L Betz, JC Dayka, WB Farrell, RH Guski, G Karjoth, MA Nelson, ...
US Patent 7,302,569, 2007
1352007
IMPLEMENTATION AND USE OF A PII DATA ACCESS CONTROL FACILITY EMLPLOYING PERSONALLY IDENTIFYING INFORMATION LABELS AND PURPOSE SERVING FUNCTION SETS
L Betz, J Dayka, W Farrell, R Guski, G Karjoth, M Nelson, B Pfitzmann, ...
EP Patent 1,660,967, 2006
1352006
IMPLEMENTATION AND USE OF A PII DATA ACCESS CONTROL FACILITY EMLPLOYING PERSONALLY IDENTIFYING INFORMATION LABELS AND PURPOSE SERVING FUNCTION SETS
L BETZ, J DAYKA, W FARRELL, R GUSKI, G KARJOTH, M NELSON, ...
WO Patent WO/2005/017,720, 2005
1352005
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20