A security model for aglets G Karjoth, DB Lange, M Oshima Internet Computing, IEEE 1 (4), 68-77, 1997 | 466 | 1997 |
Enterprise privacy authorization language (EPAL) P Ashley, S Hada, G Karjoth, C Powers, M Schunter IBM Research, 2003 | 445 | 2003 |
Using a rules model to improve handling of personally identifiable information SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ... US Patent 7,069,427, 2006 | 410 | 2006 |
Platform for enterprise privacy practices: Privacy-enabled management of customer data G Karjoth, M Schunter, M Waidner Privacy Enhancing Technologies, 194-198, 2003 | 394 | 2003 |
Routing on longest-matching prefixes W Doeringer, G Karjoth, M Nassehi IEEE/ACM Transactions on Networking (TON) 4 (1), 86-97, 1996 | 351 | 1996 |
Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets L Betz, JC Dayka, WB Farrell, RH Guski, G Karjoth, MA Nelson, ... US Patent 7,617,393, 2009 | 303 | 2009 |
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets L Betz, JC Dayka, WB Farrell, RH Guski, G Karjoth, MA Nelson, ... US Patent 7,302,569, 2007 | 285 | 2007 |
IMPLEMENTATION AND USE OF A PII DATA ACCESS CONTROL FACILITY EMLPLOYING PERSONALLY IDENTIFYING INFORMATION LABELS AND PURPOSE SERVING FUNCTION SETS L Betz, J Dayka, W Farrell, R Guski, G Karjoth, M Nelson, B Pfitzmann, ... EP Patent 1,660,967, 2006 | 285 | 2006 |
IMPLEMENTATION AND USE OF A PII DATA ACCESS CONTROL FACILITY EMLPLOYING PERSONALLY IDENTIFYING INFORMATION LABELS AND PURPOSE SERVING FUNCTION SETS L BETZ, J DAYKA, W FARRELL, R GUSKI, G KARJOTH, M NELSON, ... WO Patent WO/2005/017,720, 2005 | 285 | 2005 |
Protecting the computation results of free-roaming agents G Karjoth, N Asokan, C Gülcü International Workshop on Mobile Agents, 195-207, 1998 | 263 | 1998 |
A privacy policy model for enterprises G Karjoth, M Schunter Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE, 271-281, 2002 | 248 | 2002 |
Access control in data processing systems TR Gross, G Karjoth US Patent App. 13/077,881, 2011 | 241 | 2011 |
Access control in data processing system TR Gross, G Karjoth US Patent 20,120,216,247, 2012 | 227 | 2012 |
Variable length data sequence backtracking a trie structure W Doeringer, D Dykeman, G Karjoth, M Nassehi, M Sharma US Patent 5,787,430, 1998 | 223 | 1998 |
E-P3P privacy policies and privacy authorization P Ashley, S Hada, G Karjoth, M Schunter Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society …, 2002 | 198 | 2002 |
Cryptographic security for mobile code J Algesheimer, C Cachin, J Camenisch, G Karjoth Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, 2-11, 2001 | 188 | 2001 |
Aglets: Programming mobile agents in Java D Lange, M Oshima, G Karjoth, K Kosaka Worldwide Computing and Its Applications, 253-266, 1997 | 173 | 1997 |
Disabling RFID tags with visible confirmation: clipped tags are silenced G Karjoth, PA Moskowitz Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 27-30, 2005 | 161 | 2005 |
Method and apparatus for secure transmission of data and applications G Karjoth, LJ O'connor US Patent App. 09/748,446, 2000 | 157 | 2000 |
Efficient comparison of enterprise privacy policies M Backes, G Karjoth, W Bagga, M Schunter Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004 | 152 | 2004 |