PUMA publications for /user/jaeschke/securityhttps://puma.uni-kassel.de/user/jaeschke/securityPUMA RSS feed for /user/jaeschke/security2024-03-15T06:35:24+01:00- Building access control models with attribute explorationhttps://puma.uni-kassel.de/bibtex/27be2b4bf0987c4d18adf7243eae690c0/jaeschkejaeschke2012-12-21T10:15:28+01:00access analysis attribute concept control exploration fca formal security <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Sergei Obiedkov" itemprop="url" href="/author/Sergei%20Obiedkov"><span itemprop="name">S. Obiedkov</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Derrick G. Kourie" itemprop="url" href="/author/Derrick%20G.%20Kourie"><span itemprop="name">D. Kourie</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J.H.P. Eloff" itemprop="url" href="/author/J.H.P.%20Eloff"><span itemprop="name">J. Eloff</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Computers and Security</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">28 </span></span>(<span itemprop="issueNumber">1–2</span>):
<span itemprop="pagination">2--7</span></em> </span>(<em><span>2009<meta content="2009" itemprop="datePublished"/></span></em>)
- Conceptual Information Systems Discussed through an IT-Security Toolhttps://puma.uni-kassel.de/bibtex/2283f8a780ac47746cc3031ad47bfdf9c/jaeschkejaeschke2012-10-22T14:46:13+02:00analysis concept example fca formal grundschutz gshb security <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Klaus Becker" itemprop="url" href="/author/Klaus%20Becker"><span itemprop="name">K. Becker</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Gerd Stumme" itemprop="url" href="/author/Gerd%20Stumme"><span itemprop="name">G. Stumme</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Rudolf Wille" itemprop="url" href="/author/Rudolf%20Wille"><span itemprop="name">R. Wille</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Uta Wille" itemprop="url" href="/author/Uta%20Wille"><span itemprop="name">U. Wille</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Monika Zickwolff" itemprop="url" href="/author/Monika%20Zickwolff"><span itemprop="name">M. Zickwolff</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">Knowledge Engineering and Knowledge Management Methods, Models, and Tools</span>, </em><em>Volume 1937 von Lecture Notes in Computer Science, </em><em><span itemprop="publisher">Springer</span>, </em><em>Berlin/Heidelberg, </em></span>(<em><span>2000<meta content="2000" itemprop="datePublished"/></span></em>)
- reCAPTCHA: Human-Based Character Recognition via Web Security Measureshttps://puma.uni-kassel.de/bibtex/2a20d5aa858b63fcf5d2daf908fec874f/jaeschkejaeschke2012-04-16T14:44:05+02:00captcha cirg collective computing intelligence ocr recaptcha security social <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Luis von Ahn" itemprop="url" href="/author/Luis%20von%20Ahn"><span itemprop="name">L. von Ahn</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Benjamin Maurer" itemprop="url" href="/author/Benjamin%20Maurer"><span itemprop="name">B. Maurer</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Colin McMillen" itemprop="url" href="/author/Colin%20McMillen"><span itemprop="name">C. McMillen</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="David Abraham" itemprop="url" href="/author/David%20Abraham"><span itemprop="name">D. Abraham</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Manuel Blum" itemprop="url" href="/author/Manuel%20Blum"><span itemprop="name">M. Blum</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Science</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">321 </span></span>(<span itemprop="issueNumber">5895</span>):
<span itemprop="pagination">1465--1468</span></em> </span>(<em><span>2008<meta content="2008" itemprop="datePublished"/></span></em>)
- Attacks and design of image recognition CAPTCHAshttps://puma.uni-kassel.de/bibtex/23c8aa0e647903603ddce90c1642b89b2/jaeschkejaeschke2010-10-11T15:39:09+02:00captcha image recognition security web <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Bin B. Zhu" itemprop="url" href="/author/Bin%20B.%20Zhu"><span itemprop="name">B. Zhu</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jeff Yan" itemprop="url" href="/author/Jeff%20Yan"><span itemprop="name">J. Yan</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Qiujie Li" itemprop="url" href="/author/Qiujie%20Li"><span itemprop="name">Q. Li</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Chao Yang" itemprop="url" href="/author/Chao%20Yang"><span itemprop="name">C. Yang</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Jia Liu" itemprop="url" href="/author/Jia%20Liu"><span itemprop="name">J. Liu</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Ning Xu" itemprop="url" href="/author/Ning%20Xu"><span itemprop="name">N. Xu</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Meng Yi" itemprop="url" href="/author/Meng%20Yi"><span itemprop="name">M. Yi</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Kaiwei Cai" itemprop="url" href="/author/Kaiwei%20Cai"><span itemprop="name">K. Cai</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">CCS '10: Proceedings of the 17th ACM conference on Computer and communications security</span>, </em></span><em>Seite <span itemprop="pagination">187--200</span>. </em><em>New York, NY, USA, </em><em><span itemprop="publisher">ACM</span>, </em>(<em><span>Oktober 2010<meta content="Oktober 2010" itemprop="datePublished"/></span></em>)
- Protecting your daily in-home activity information from a wireless snooping attackhttps://puma.uni-kassel.de/bibtex/20efc5c0ef9a17c35402c654ff76247b0/jaeschkejaeschke2010-10-11T15:30:59+02:00attack automation home rfid security sensor <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Vijay Srinivasan" itemprop="url" href="/author/Vijay%20Srinivasan"><span itemprop="name">V. Srinivasan</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="John Stankovic" itemprop="url" href="/author/John%20Stankovic"><span itemprop="name">J. Stankovic</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Kamin Whitehouse" itemprop="url" href="/author/Kamin%20Whitehouse"><span itemprop="name">K. Whitehouse</span></a></span>. </span><span itemtype="http://schema.org/Book" itemscope="itemscope" itemprop="isPartOf"><em><span itemprop="name">UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing</span>, </em></span><em>Seite <span itemprop="pagination">202--211</span>. </em><em>New York, NY, USA, </em><em><span itemprop="publisher">ACM</span>, </em>(<em><span>2008<meta content="2008" itemprop="datePublished"/></span></em>)