BibTeX records: Cornelius Diekmann

download as .bib file

@article{DBLP:journals/afp/DiekmannH20,
  author       = {Cornelius Diekmann and
                  Lars Hupel},
  title        = {Hello World},
  journal      = {Arch. Formal Proofs},
  volume       = {2020},
  year         = {2020},
  url          = {https://www.isa-afp.org/entries/Hello\_World.html},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/DiekmannH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/DiekmannNKC19,
  author       = {Cornelius Diekmann and
                  Johannes Naab and
                  Andreas Korsten and
                  Georg Carle},
  title        = {Agile Network Access Control in the Container Age},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {41--55},
  year         = {2019},
  url          = {https://doi.org/10.1109/TNSM.2018.2889009},
  doi          = {10.1109/TNSM.2018.2889009},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/DiekmannNKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-00720,
  author       = {Cornelius Diekmann and
                  Johannes Naab and
                  Andreas Korsten and
                  Georg Carle},
  title        = {Agile Network Access Control in the Container Age},
  journal      = {CoRR},
  volume       = {abs/1903.00720},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.00720},
  eprinttype    = {arXiv},
  eprint       = {1903.00720},
  timestamp    = {Sat, 30 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-00720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/DiekmannHMHC18,
  author       = {Cornelius Diekmann and
                  Lars Hupel and
                  Julius Michaelis and
                  Max W. Haslbeck and
                  Georg Carle},
  title        = {Verified iptables Firewall Analysis and Verification},
  journal      = {J. Autom. Reason.},
  volume       = {61},
  number       = {1-4},
  pages        = {191--242},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10817-017-9445-1},
  doi          = {10.1007/S10817-017-9445-1},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/DiekmannHMHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Diekmann17,
  author       = {Cornelius Diekmann},
  title        = {Provably Secure Networks: Methodology and Toolset for Configuration
                  Management},
  school       = {Technical University Munich, Germany},
  year         = {2017},
  url          = {https://nbn-resolving.org/urn:nbn:de:bvb:91-diss-20170727-1350756-1-7},
  urn          = {urn:nbn:de:bvb:91-diss-20170727-1350756-1-7},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Diekmann17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/MaltitzDC17,
  author       = {Marcel von Maltitz and
                  Cornelius Diekmann and
                  Georg Carle},
  editor       = {Ahmed Bouajjani and
                  Alexandra Silva},
  title        = {Privacy Assessment Using Static Taint Analysis (Tool Paper)},
  booktitle    = {Formal Techniques for Distributed Objects, Components, and Systems
                  - 37th {IFIP} {WG} 6.1 International Conference, {FORTE} 2017, Held
                  as Part of the 12th International Federated Conference on Distributed
                  Computing Techniques, DisCoTec 2017, Neuch{\^{a}}tel, Switzerland,
                  June 19-22, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10321},
  pages        = {225--235},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60225-7\_16},
  doi          = {10.1007/978-3-319-60225-7\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/MaltitzDC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08228,
  author       = {Cornelius Diekmann},
  title        = {Provably Secure Networks: Methodology and Toolset for Configuration
                  Management},
  journal      = {CoRR},
  volume       = {abs/1708.08228},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08228},
  eprinttype    = {arXiv},
  eprint       = {1708.08228},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08228.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/DiekmannH16,
  author       = {Cornelius Diekmann and
                  Lars Hupel},
  title        = {Iptables{\_}Semantics},
  journal      = {Arch. Formal Proofs},
  volume       = {2016},
  year         = {2016},
  url          = {https://www.isa-afp.org/entries/Iptables\_Semantics.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/DiekmannH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/DiekmannMH16,
  author       = {Cornelius Diekmann and
                  Julius Michaelis and
                  Lars Hupel},
  title        = {{IP} Addresses},
  journal      = {Arch. Formal Proofs},
  volume       = {2016},
  year         = {2016},
  url          = {https://www.isa-afp.org/entries/IP\_Addresses.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/DiekmannMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/DiekmannMH16a,
  author       = {Cornelius Diekmann and
                  Julius Michaelis and
                  Max W. Haslbeck},
  title        = {Simple Firewall},
  journal      = {Arch. Formal Proofs},
  volume       = {2016},
  year         = {2016},
  url          = {https://www.isa-afp.org/entries/Simple\_Firewall.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/DiekmannMH16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/MichaelisD16,
  author       = {Julius Michaelis and
                  Cornelius Diekmann},
  title        = {Routing},
  journal      = {Arch. Formal Proofs},
  volume       = {2016},
  year         = {2016},
  url          = {https://www.isa-afp.org/entries/Routing.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/MichaelisD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/MichaelisD16a,
  author       = {Julius Michaelis and
                  Cornelius Diekmann},
  title        = {{LOFT} - Verified Migration of Linux Firewalls to {SDN}},
  journal      = {Arch. Formal Proofs},
  volume       = {2016},
  year         = {2016},
  url          = {https://www.isa-afp.org/entries/LOFT.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/MichaelisD16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/DiekmannMHC16,
  author       = {Cornelius Diekmann and
                  Julius Michaelis and
                  Max W. Haslbeck and
                  Georg Carle},
  title        = {Verified iptables firewall analysis},
  booktitle    = {2016 {IFIP} Networking Conference, Networking 2016 and Workshops,
                  Vienna, Austria, May 17-19, 2016},
  pages        = {252--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IFIPNetworking.2016.7497196},
  doi          = {10.1109/IFIPNETWORKING.2016.7497196},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/DiekmannMHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DiekmannSC16,
  author       = {Cornelius Diekmann and
                  Lukas Schwaighofer and
                  Georg Carle},
  title        = {Certifying Spoofing-Protection of Firewalls},
  journal      = {CoRR},
  volume       = {abs/1603.07538},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.07538},
  eprinttype    = {arXiv},
  eprint       = {1603.07538},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DiekmannSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DiekmannPNKHC16,
  author       = {Cornelius Diekmann and
                  Stephan{-}Alexander Posselt and
                  Heiko Niedermayer and
                  Holger Kinkelin and
                  Oliver Hanka and
                  Georg Carle},
  title        = {Verifying Security Policies using Host Attributes},
  journal      = {CoRR},
  volume       = {abs/1604.00204},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.00204},
  eprinttype    = {arXiv},
  eprint       = {1604.00204},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DiekmannPNKHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DiekmannHC16,
  author       = {Cornelius Diekmann and
                  Lars Hupel and
                  Georg Carle},
  title        = {Semantics-Preserving Simplification of Real-World Firewall Rule Sets},
  journal      = {CoRR},
  volume       = {abs/1604.00206},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.00206},
  eprinttype    = {arXiv},
  eprint       = {1604.00206},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DiekmannHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DiekmannKC16,
  author       = {Cornelius Diekmann and
                  Andreas Korsten and
                  Georg Carle},
  title        = {Demonstrating topoS: Theorem-Prover-Based Synthesis of Secure Network
                  Configurations},
  journal      = {CoRR},
  volume       = {abs/1604.00273},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.00273},
  eprinttype    = {arXiv},
  eprint       = {1604.00273},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DiekmannKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BraunDKC16,
  author       = {Lothar Braun and
                  Cornelius Diekmann and
                  Nils Kammenhuber and
                  Georg Carle},
  title        = {Adaptive Load-Aware Sampling for Network Monitoring on Multicore Commodity
                  Hardware},
  journal      = {CoRR},
  volume       = {abs/1604.02322},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.02322},
  eprinttype    = {arXiv},
  eprint       = {1604.02322},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BraunDKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MaltitzDC16,
  author       = {Marcel von Maltitz and
                  Cornelius Diekmann and
                  Georg Carle},
  title        = {Taint Analysis for System-Wide Privacy Audits: {A} Framework and Real-World
                  Case Studies},
  journal      = {CoRR},
  volume       = {abs/1608.04671},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.04671},
  eprinttype    = {arXiv},
  eprint       = {1608.04671},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MaltitzDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/DiekmannSC15,
  author       = {Cornelius Diekmann and
                  Lukas Schwaighofer and
                  Georg Carle},
  editor       = {Mauro Tortonesi and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder and
                  Edmundo Roberto Mauro Madeira and
                  Corinna Schmitt and
                  Joan Serrat},
  title        = {Certifying spoofing-protection of firewalls},
  booktitle    = {11th International Conference on Network and Service Management, {CNSM}
                  2015, Barcelona, Spain, November 9-13, 2015},
  pages        = {168--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNSM.2015.7367354},
  doi          = {10.1109/CNSM.2015.7367354},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/DiekmannSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/DiekmannKC15,
  author       = {Cornelius Diekmann and
                  Andreas Korsten and
                  Georg Carle},
  editor       = {Mauro Tortonesi and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder and
                  Edmundo Roberto Mauro Madeira and
                  Corinna Schmitt and
                  Joan Serrat},
  title        = {Demonstrating topoS: Theorem-prover-based synthesis of secure network
                  configurations},
  booktitle    = {11th International Conference on Network and Service Management, {CNSM}
                  2015, Barcelona, Spain, November 9-13, 2015},
  pages        = {366--371},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNSM.2015.7367384},
  doi          = {10.1109/CNSM.2015.7367384},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/DiekmannKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/DiekmannHC15,
  author       = {Cornelius Diekmann and
                  Lars Hupel and
                  Georg Carle},
  editor       = {Nikolaj S. Bj{\o}rner and
                  Frank S. de Boer},
  title        = {Semantics-Preserving Simplification of Real-World Firewall Rule Sets},
  booktitle    = {{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
                  June 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9109},
  pages        = {195--212},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19249-9\_13},
  doi          = {10.1007/978-3-319-19249-9\_13},
  timestamp    = {Thu, 14 Apr 2022 20:26:16 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/DiekmannHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/Diekmann14,
  author       = {Cornelius Diekmann},
  title        = {Network Security Policy Verification},
  journal      = {Arch. Formal Proofs},
  volume       = {2014},
  year         = {2014},
  url          = {https://www.isa-afp.org/entries/Network\_Security\_Policy\_Verification.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/Diekmann14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/DiekmannPNKHC14,
  author       = {Cornelius Diekmann and
                  Stephan{-}Alexander Posselt and
                  Heiko Niedermayer and
                  Holger Kinkelin and
                  Oliver Hanka and
                  Georg Carle},
  editor       = {Erika {\'{A}}brah{\'{a}}m and
                  Catuscia Palamidessi},
  title        = {Verifying Security Policies Using Host Attributes},
  booktitle    = {Formal Techniques for Distributed Objects, Components, and Systems
                  - 34th {IFIP} {WG} 6.1 International Conference, {FORTE} 2014, Held
                  as Part of the 9th International Federated Conference on Distributed
                  Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8461},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43613-4\_9},
  doi          = {10.1007/978-3-662-43613-4\_9},
  timestamp    = {Fri, 09 Apr 2021 18:40:15 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/DiekmannPNKHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/DiekmannHC14,
  author       = {Cornelius Diekmann and
                  Lars Hupel and
                  Georg Carle},
  editor       = {Jun Pang and
                  Yang Liu},
  title        = {Directed Security Policies: {A} Stateful Network Implementation},
  booktitle    = {Proceedings Third International Workshop on Engineering Safety and
                  Security Systems, {ESSS} 2014, Singapore, Singapore, 13 May 2014},
  series       = {{EPTCS}},
  volume       = {150},
  pages        = {20--34},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.150.3},
  doi          = {10.4204/EPTCS.150.3},
  timestamp    = {Mon, 23 Dec 2019 09:19:12 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/DiekmannHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/BraunDKC13,
  author       = {Lothar Braun and
                  Cornelius Diekmann and
                  Nils Kammenhuber and
                  Georg Carle},
  title        = {Adaptive load-aware sampling for network monitoring on multicore commodity
                  hardware},
  booktitle    = {{IFIP} Networking Conference, 2013, Brooklyn, New York, USA, 22-24
                  May, 2013},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6663536/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/BraunDKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics