default search action
Karsten Sohr
Person information
- affiliation: University of Bremen, Center for Computing Technologies (TZI), Germany
- affiliation: University of Marburg, Department of Mathematics and Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c47]Carlos E. Rubio-Medrano, Akash Kotak, Wenlu Wang, Karsten Sohr:
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications. SACMAT 2024 - 2023
- [j13]Mehrdad Bahrini, Thomas Münder, Karsten Sohr, Rainer Malaka:
Verständliche Informationssicherheit in Smarthome-Netzen. Datenschutz und Datensicherheit (dud) 47(6): 350-353 (2023) - [c46]Lorenz Hüther, Karsten Sohr, Bernhard J. Berger, Hendrik Rothe, Stefan Edelkamp:
Machine Learning for SAST: A Lightweight and Adaptable Approach. ESORICS (4) 2023: 85-104 - [c45]Denis Obrezkov, Karsten Sohr:
UCAT: The Uniform Categorization for Access Control. FPS (2) 2023: 3-14 - 2022
- [c44]Denis Obrezkov, Karsten Sohr, Rainer Malaka:
"Do Metaphors Influence the Usability of Access Control?": A Gamified Survey. MuC 2022: 472-476 - [c43]Mehrdad Bahrini, Nima Zargham, Alexander Wolff, Dennis-Kenji Kipker, Karsten Sohr, Rainer Malaka:
It's Long and Complicated! Enhancing One-Pager Privacy Policies in Smart Home Applications. NordiCHI 2022: 73:1-73:13 - 2021
- [j12]Henrik Reichmann, Malte Elson, Nele Borgert, Dennis-Kenji Kipker, Rainer Malaka, Karsten Sohr, Mehrdad Bahrini:
Erfahrbarer Datenschutz und IT-Sicherheit in Smart Home-Anwendungen. Datenschutz und Datensicherheit 45(4): 259-264 (2021) - [c42]Rodrigue Wete Nguempnang, Bernhard J. Berger, Karsten Sohr:
[Engineering] eNYPD - Entry Points Detector Jakarta Server Faces Use Case. SCAM 2021: 30-35 - [c41]Denis Obrezkov, Karsten Sohr, Rainer Malaka:
A Category-Based Framework for Privacy-Aware Collaborative Access Control. TrustBus 2021: 126-139 - 2020
- [j11]Mehmet Kus, Karsten Sohr:
Praktische Erfahrungen und Ansätze für âSecurity by Design' auf Basis der STRIDE-Methodik. Datenschutz und Datensicherheit 44(11): 750-754 (2020) - [j10]Christian Maeder, Karsten Sohr, Rodrigue Wete Nguempnang, Nils Meyer-Larsen, Rainer Müller:
Modeling and Validating Role-Based Authorization Policies for a Port Communication System with UML and OCL. J. Object Technol. 19(3): 3:1-14 (2020) - [j9]Michaela Bunke, Karsten Sohr:
Towards supporting software assurance assessments by detecting security patterns. Softw. Qual. J. 28(4): 1711-1753 (2020) - [c40]Mehrdad Bahrini, Nima Zargham, Johannes Pfau, Stella Lemke, Karsten Sohr, Rainer Malaka:
Good vs. Evil: Investigating the Effect of Game Premise in a Smart Home Security Educational Game. CHI PLAY (Companion) 2020: 182-187 - [c39]Mehrdad Bahrini, Nima Zargham, Johannes Pfau, Stella Lemke, Karsten Sohr, Rainer Malaka:
Enhancing Game-Based Learning Through Infographics in the Context of Smart Home Security. ICEC 2020: 18-36 - [c38]Marcel Schuster, Markus Germeier, Frank Hilken, Martin Gogolla, Karsten Sohr:
Modeling Low-Level Network Configurations for Analysis, Simulation and Testing. Modellierung 2020: 157-172 - [c37]Bernhard J. Berger, Rodrigue Wete Nguempnang, Karsten Sohr, Rainer Koschke:
Static Extraction of Enforced Authorization Policies SeeAuthz. SCAM 2020: 187-197
2010 – 2019
- 2019
- [c36]Mehrdad Bahrini, Nina Wenig, Marcel Meissner, Karsten Sohr, Rainer Malaka:
HappyPermi: Presenting Critical Data Flows in Mobile Application to Raise User Security Awareness. CHI Extended Abstracts 2019 - [c35]Nima Zargham, Mehrdad Bahrini, Georg Volkmar, Dirk Wenig, Karsten Sohr, Rainer Malaka:
What Could Go Wrong?: Raising Mobile Privacy and Security Awareness Through a Decision-Making Game. CHI PLAY (Companion) 2019: 805-812 - [c34]Mehrdad Bahrini, Georg Volkmar, Jonas Schmutte, Nina Wenig, Karsten Sohr, Rainer Malaka:
Make my Phone Secure!: Using Gamification for Mobile Security Settings. MuC 2019: 299-308 - [c33]Bernhard J. Berger, Christian Maeder, Rodrigue Wete Nguempnang, Karsten Sohr, Carlos E. Rubio-Medrano:
Towards Effective Verification of Multi-Model Access Control Properties. SACMAT 2019: 149-160 - [c32]Bernhard J. Berger, Karsten Sohr, Rainer Koschke:
The Architectural Security Tool Suite - ARCHSEC. SCAM 2019: 250-255 - 2016
- [c31]Bernhard J. Berger, Karsten Sohr, Rainer Koschke:
Automatically Extracting Threats from Extended Data Flow Diagrams. ESSoS 2016: 56-71 - [c30]Frank Hilken, Marcel Schuster, Karsten Sohr, Martin Gogolla:
Integrating UML/OCL Derived Properties into Validation and Verification Processes. OCL@MoDELS 2016: 89-104 - 2015
- [j8]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving Security Assurance with Assertion-based Application Construction. EAI Endorsed Trans. Collab. Comput. 1(6): e3 (2015) - [j7]Tanveer Mustafa, Karsten Sohr:
Understanding the implemented access control policy of Android system services with slicing and extended static checking. Int. J. Inf. Sec. 14(4): 347-366 (2015) - [c29]Lars Hamann, Karsten Sohr, Martin Gogolla:
Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. ESSoS 2015: 211-226 - 2014
- [c28]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Achieving security assurance with assertion-based application construction. CollaborateCom 2014: 503-510 - [c27]Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr, Melanie Volkamer:
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. Sicherheit 2014: 283-291 - 2013
- [j6]Mirco Kuhlmann, Karsten Sohr, Martin Gogolla:
Employing UML and OCL for designing and analysing role-based access control. Math. Struct. Comput. Sci. 23(4): 796-833 (2013) - [c26]Steffen Bartsch, Bernhard J. Berger, Michaela Bunke, Karsten Sohr:
The Transitivity-of-Trust Problem in Android Application Interaction. ARES 2013: 291-296 - [c25]Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr:
Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. COMPSAC 2013: 21-26 - [c24]Bernhard J. Berger, Karsten Sohr, Rainer Koschke:
Extracting and Analyzing the Implemented Security Architecture of Business Applications. CSMR 2013: 285-294 - [c23]Oliver Hofrichter, Martin Gogolla, Karsten Sohr:
UML/OCL based Design and Analysis of Role-Based Access Control Policies. GEMOC+AMINO@MoDELS 2013: 33-42 - 2012
- [j5]Karsten Sohr, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu, Gail-Joon Ahn:
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL. Inf. Softw. Technol. 54(12): 1396-1417 (2012) - [c22]Henk Birkholz, Ingo Sieverdingbeck, Karsten Sohr, Carsten Bormann:
IO: An Interconnected Asset Ontology in Support of Risk Management Processes. ARES 2012: 534-541 - [c21]Bernhard J. Berger, Karsten Sohr:
An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. SEC 2012: 25-36 - [i1]Steffen Bartsch, Karsten Sohr, Michaela Bunke, Oliver Hofrichter, Bernhard J. Berger:
The Transitivity of Trust Problem in the Interaction of Android Applications. CoRR abs/1204.1458 (2012) - 2011
- [j4]Henk Birkholz, Carsten Elfers, Bernd Samjeske, Karsten Sohr:
Unternehmensübergreifender Austausch von sicherheitsrelevantem Wissen. Datenschutz und Datensicherheit 35(4): 258-261 (2011) - [c20]Michaela Bunke, Karsten Sohr:
An Architecture-Centric Approach to Detecting Security Patterns in Software. ESSoS 2011: 156-166 - [c19]Karsten Sohr, Tanveer Mustafa, Adrian Nowak:
Software security aspects of Java-based mobile phones. SAC 2011: 1494-1501 - [c18]Mirco Kuhlmann, Karsten Sohr, Martin Gogolla:
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. SSIRI 2011: 108-117 - [c17]Bernhard J. Berger, Michaela Bunke, Karsten Sohr:
An Android Security Case Study with Bauhaus. WCRE 2011: 179-183 - 2010
- [c16]Karsten Sohr, Bernhard J. Berger:
Idea: Towards Architecture-Centric Security Analysis of Software. ESSoS 2010: 70-78 - [c15]Nicolai Kuntze, Roland Rieke, Günther Diederich, Richard Sethmann, Karsten Sohr, Tanveer Mustafa, Kai-Oliver Detken:
Secure Mobile Business Information Processing. EUC 2010: 672-678 - [c14]Tanveer Mustafa, Michael Drouineaud, Karsten Sohr:
Towards formal specification and verification of a role-based authorization engine using JML. SESS@ICSE 2010: 50-57 - [c13]Carsten Elfers, Mirko Horstmann, Karsten Sohr, Otthein Herzog:
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection. IDEAL 2010: 13-20 - [c12]Raffael Rittmeier, Karsten Sohr:
Grundzüge eines Sicherheitskonzeptes für Arztpraxen mit Hilfe von Attack Trees und unter Berücksichtigung der Gesundheitstelematik. perspeGKtive 2010: 113-119
2000 – 2009
- 2008
- [j3]Tanveer Mustafa, Karsten Sohr, Duc-Hanh Dang, Michael Drouineaud, Stefan Kowski:
Implementing Advanced RBAC Administration Functionality with USE. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 15 (2008) - [j2]Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, Martin Gogolla:
Analyzing and Managing Role-Based Access Control Policies. IEEE Trans. Knowl. Data Eng. 20(7): 924-939 (2008) - [c11]Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn:
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. ACSAC 2008: 257-266 - [c10]Steffen Bartsch, Karsten Sohr, Carsten Bormann:
Supporting Agile Development of Authorization Rules for SME Applications. CollaborateCom 2008: 461-471 - 2007
- [c9]Mehmet Kus, Michael Lawo, Marc Ronthaler, Richard Sethmann, Karsten Sohr, Katja Wind:
Angepasste Benutzerschnittstellen für das Wearable Computing im Projekt SiWear. MuC (Workshopband) 2007: 133-136 - 2006
- [c8]Andreas Schaad, Volkmar Lotz, Karsten Sohr:
A model-checking approach to analysing organisational controls in a loan origination process. SACMAT 2006: 139-149 - 2005
- [j1]Karsten Sohr, Gail-Joon Ahn, Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c7]Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge:
Specification and Validation of Authorisation Constraints Using UML and OCL. ESORICS 2005: 64-79 - [c6]Karsten Sohr, Gail-Joon Ahn, Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL. SESS@ICSE 2005: 1-7 - [c5]Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn:
Formal specification of role-based security policies for clinical information systems. SAC 2005: 332-339 - 2004
- [c4]Michael Drouineaud, Maksym Bortin, Paolo Torrini, Karsten Sohr:
A First Step Towards Formal Verification of Security Policy Properties for RBAC. QSIC 2004: 60-67 - 2003
- [c3]Till Mossakowski, Michael Drouineaud, Karsten Sohr:
A temporal-logic extension of role-based access control covering dynamic separation of duties. TIME 2003: 83-90 - 2001
- [b1]Karsten Sohr:
Die Sicherheitsaspekte von mobilem Code. University of Marburg, Germany, 2001 - [c2]Steffen Deter, Karsten Sohr:
Pini - A Jini-Like Plug&Play Technology for the KVM/CLDC. IICS 2001: 53-66
1990 – 1999
- 1999
- [c1]Karsten Sohr:
Nicht verifizierter Code: Eine neue Sicherheitslücke in Java. Java-Informations-Tage 1999: 171-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint