default search action
Manuel Koch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Manuel Koch:
Telematikinfrastruktur 2.0 - Verhindern von missbräuchlicher Profilbildung durch PET. Datenschutz und Datensicherheit 46(7): 427-431 (2022) - [c25]Teresa Schiatti, Marilu Casini, Thomas Hutschalik, Manuel Koch, Ramona Emig, Rémi Peyronnet, Ursula Ravens:
Impact of Mechanically-Induced Fibrosis on Atrial Electromechanical Function. CinC 2022: 1-3 - [i1]Jasmin Zalonis, Frederik Armknecht, Björn Grohmann, Manuel Koch:
Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context. CoRR abs/2201.11406 (2022) - 2020
- [j8]Manuel Koch, Andrea Pawils, Enrico Weide:
Das Standard-Datenschutzmodell in der Telematikinfrastruktur. Datenschutz und Datensicherheit 44(2): 104-110 (2020)
2010 – 2019
- 2013
- [j7]Manuel Koch, Sven Marx, Arno Elmer:
Informationelle Selbstbestimmung und Patientensouveränität in einem vernetzten Gesundheitswesen. Datenschutz und Datensicherheit 37(3): 131-136 (2013) - 2012
- [c24]Andreas Hallof, Manuel Koch, Sven Marx, Arno Elmer:
Elektronische Signaturen in der Telematikinfrastruktur. GI-Jahrestagung 2012: 1674-1680
2000 – 2009
- 2006
- [j6]Manuel Koch, Francesco Parisi-Presicce:
UML specification of access control policies and their formal verification. Softw. Syst. Model. 5(4): 429-447 (2006) - [c23]Steffen Kolarczyk, Manuel Koch, Klaus-Peter Löhr, Karl Pauls:
SecTOOL - Supporting Requirements Engineering for Access Control. ETRICS 2006: 254-267 - [c22]Manuel Koch, Karl Pauls:
Engineering Self-protection for Autonomous Systems. FASE 2006: 33-47 - 2005
- [j5]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Graph-based specification of access control policies. J. Comput. Syst. Sci. 71(1): 1-33 (2005) - [c21]Manuel Koch, Karl Pauls:
An Access Control Language for Dynamic Systems - Model-Driven Development and Verification. SDL Forum 2005: 16-31 - [c20]Manuel Koch, Karl Pauls:
Model-driven development of access control aspects. Sicherheit 2005: 273-284 - 2004
- [c19]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Administrative scope in the graph-based framework. SACMAT 2004: 97-104 - [c18]Paolo Bottoni, Manuel Koch, Francesco Parisi-Presicce, Gabriele Taentzer:
Termination of High-Level Replacement Units with Application to Model Transformation. VLFM 2004: 71-86 - [c17]Torsten Fink, Manuel Koch, Karl Pauls:
An MDA approach to Access Control Specifications Using MOF and UML Profiles. VODCA@FOSAD 2004: 161-179 - 2003
- [j4]Gerald Brose, Manuel Koch, Klaus-Peter Löhr:
Entwicklung und Verwaltung von Zugriffsschutz in verteilten Objektsystemen - eine Krankenhausfallstudie. Prax. Inf.verarb. Kommun. 26(1): 26-31 (2003) - [c16]Manuel Koch, Francesco Parisi-Presicce:
Formal access control analysis in the software development process. FMSE 2003: 67-76 - [c15]Manuel Koch, Francesco Parisi-Presicce:
Visual Specifications of Policies and Their Verification. FASE 2003: 278-293 - [c14]Torsten Fink, Manuel Koch, Cristian Oancea:
Specification and Enforcement of Access Control in Heterogeneous Distributed Applications. ICWS-Europe 2003: 88-100 - 2002
- [j3]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur. 5(3): 332-365 (2002) - [c13]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Decidability of Safety in Graph-Based Models for Access Control. ESORICS 2002: 229-243 - [c12]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Conflict Detection and Resolution in Access Control Policy Specifications. FoSSaCS 2002: 223-237 - [c11]Manuel Koch, Francesco Parisi-Presicce:
Describing Policies with Graph Constraints and Rules. ICGT 2002: 223-238 - 2001
- [c10]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Foundations for a Graph-Based Approach to the Specification of Access Control Policies. FoSSaCS 2001: 287-302 - [c9]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
On the specification and evolution of access control policies. SACMAT 2001: 121-130 - [c8]Paolo Bottoni, Manuel Koch, Francesco Parisi-Presicce, Gabriele Taentzer:
A Visualization of OCL Using Collaborations. UML 2001: 257-271 - [c7]Manuel Koch:
A graph-based approach to the compositional specification of distributed systems. GETGRATS Closing Workshop 2001: 212-221 - [c6]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Graph Transformations for the Specification of Access Control Policies. GETGRATS Closing Workshop 2001: 222-232 - 2000
- [b1]Manuel Koch:
Integration of graph transformation and temporal logic for the specification of distributed systems. Technical University of Berlin, Germany, 2000 - [c5]Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
A Formal Model for Role-Based Access Control Using Graph Transformation. ESORICS 2000: 122-139 - [c4]Paolo Bottoni, Manuel Koch, Francesco Parisi-Presicce, Gabriele Taentzer:
Consistency Checking and Visualization of OCL Constraints. UML 2000: 294-308
1990 – 1999
- 1999
- [c3]Ingrid Fischer, Manuel Koch, Michael R. Berthold:
Learning and Rewriting in Fuzzy Rule Graphs. AGTIVE 1999: 263-270 - 1998
- [j2]Manuel Koch, Ingrid Fischer, Victor Volle:
Graphtransformationen zur visuellen Beschreibung einer transaktionsgesteuerten Konfigurationskontrolle. Datenbank Rundbr. 21: 31-32 (1998) - [c2]Ingrid Fischer, Manuel Koch, Gabriele Taentzer:
Local Views on Distributed Systems and Their Communication. TAGT 1998: 164-178 - [c1]Fabio Gadducci, Reiko Heckel, Manuel Koch:
A Fully Abstract Model for Graph-Interpreted Temporal Logic. TAGT 1998: 310-322 - 1997
- [j1]Manuel Koch:
Graphtransformation als universelles Beschreibungs- und Ausführungsmodell für Transaktionen. Datenbank Rundbr. 19: 67-69 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint