Publications
2008
Bouwman, B., S. Mauw, and M. Petkovic. "Rights Management for Role-Based Access Control." Paper presented at the Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08), Las Vegas, USA, 2008-01 2008.
Nadjm-Tehrani, J. Elmqvist and S. "Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems, in Design, Automation, and Test in Europe (Date) " Paper presented at the Conference, EDA/ACM/SIGDA, Europe 2008 March .
Critoph Brandt, Thomas Engel, B. Braatz, and F. Herrmann. An approach using formally well-founded domain languages for secure coarse-grained IT system modeling in a real-world. In Proceedings of the Seventh International Workshop on Graph Transformation and Visual Modeling T echniques, GT-VMT 2008., 2008.
D. Fischer, D. Basin, and T. Engel. Topology Dynamics and Routing for Predictable Mobile Networks. In Proceedings of the 16th International Conference on Network Protocols (ICNP), 2008, pages 207-217, October 2008. IEEE.
D. Fischer, K. Eckstein, M. Merri, and T. Engel. Is Internet Security Good Enough for Space Missions. In Proceedings of the 59th International Astronautical Congress (IAC), 2008, October 2008. IAF.
D. Fischer, T. Engel, and M. Merri. Key Management for CCSDS compliant space missions. In Proceedings of the 9th International Conference on Space Operations (Spaceops 2008), May 2008.
D. Fischer, M. Merri, and T. Engel. Security Extensions for Space-Link Communication. In Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN), 2008, pages 1-6, August 2008. IEEE.
D. Fischer, M.Merri, and P. Bargellini. The Operations Security Concept for Future Earth Observation Missions. In Proceedings of the Data Systems in Aerospace Conference (DASIA 2008), April 2008.
Raphael Frank, Thomas Scherer, and Thomas Engel. Emergency Group Calls over Interoperable Networks. In CSE '08: Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, pages 349-354, 2008. IEEE.
Raphael Frank, Thomas Scherer, and Thomas Engel. Tree Based Flooding Protocol for Multi-Hop Wireless Networks. In Broadcom'08: Proceedings of the 3rd International Conference on Broadband Communications, Information Technology & Biomedical Applications, pages 318-323, 2008. IEEE.
Volker Fusenig, Dagmara Spiewak, and Thomas Engel. Acimn: A protocol for Anonymous Communication In Multi hop wireless networks. In Ljiljana Brankovic and Mirka Miller, editors, Sixth Australasian Information Security Conference (AISC 2008), volume 81 of CRPIT, Wollongong, NSW, Australia, pages 107-114, 2008. ACS.
Dagmara Spiewak, Volker Fusenig, and Thomas Engel. The importance of location on trust in mobile networks. WESEAS Transactions on Communication, 7(5):349-360, 2008.
Volker Fusenig, Eugen Staab, Uli Sorger, and Thomas Engel. Unlinkable Communication. In Proceedings of the Sixth Annual Conference on Privacy, Security and Trust (PST2008), Fredericton, New Brunswick, Canada, pages 51–55, October 1-3 2008.
Volker Fusenig, Dagmara Spiewak, and Thomas Engel. Anonymous Communication in Multi hop wireless networks. Journal of Research and Practice in Information Technology, 40(3):205-224, 2008.
Eugen Staab and Thomas Engel. Combining Cognitive and Computational Concepts for Experience-Based Trust Reasoning. In Rino Falcone, Suzanne Barber, Jordi Sabater-Mir, and Munindar Singh, editors, Proceedings of the 11th International AAMAS'08 Workshop on Trust in Agent Societies, pages 41-45, 2008.
Eugen Staab and Thomas Engel. Combining Cognitive with Computational Trust Reasoning. In Rino Falcone, Suzanne Barber, Jordi Sabater, and Munindar Singh, editors, Trust in Agent Societies, volume 5396 of LNCS (LNAI), pages 99-111, December 2008. Springer Verlag.
Eugen Staab, Volker Fusenig, and Thomas Engel. Towards Trust-Based Acquisition of Unverifiable Information. In Matthias Klusch, Michal Pechoucek, and Axel Polleres, editors, Cooperative Information Agents XII, volume 5180 of LNCS (LNAI), pages 41-54, 2008. Springer Verlag.
Eugen Staab, Volker Fusenig, and Thomas Engel. Trust-Aided Acquisition of Unverifiable Information. In ECAI '08: Proceedings of the 18th European Conference on Artificial Intelligence, pages 869-870, 2008. IOS Press.
Eugen Staab, Volker Fusenig, and Thomas Engel. Using Correlation for Collusion Detection in Grid Settings. Technical report 000657499, University of Luxembourg, July 2008.
Gérard Wagener, Alexandre Dulaunoy, and Thomas Engel. An Instrumented Analysis of Unknown Software and Malware Driven by Free Libre Open Source Software. In Signal Image Technology & Internet Based Systems, pages 597-605, November 2008. IEEE Computer Society, CPS.
Gérard Wagener, Alexandre Dulaunoy, and Thomas Engel. Towards an estimation of the accuracy of TCP reassembly in network forensics. In Future Generation Communication and Networking, volume 2, pages 273-278, December 2008. IEEE Computer Society, CPS.
Gérard Wagener and Thomas Engel. Attacking the TCP Reassembly Plane of Network Forensics Tools. In IT Underground XI, October 2008. Software-Konferencje.
Gérard Wagener, Frédéric Raynal, Alexandre Dulaunoy, and Christophe Kyvrakidis. Detecting User Mode Linux Honeypots is fine ... but it's better to crash them.. In Hack.lu / barcamp, October 2008. CSRRT-LU.
Eugen Staab, Volker Fusenig, and Thomas Engel. Using Correlation for Collusion Detection in Grid Settings. Technical report 000657499, University of Luxembourg, July 2008.
Michael Stieghahn. On Business Cases and Security Degrees for Mobile Devices in Banking Environments. Technical report, University of Luxembourg, March 2008.
Sheila Becker. Security Evaluation for P2P Communication Systems. Master's thesis, INRIA - LORIA in cooperation with University of Luxembourg, 2008.
Dominic Dunlop, Sebastien Varrette, and Pascal Bouvry.. On the Use of a Genetic Algorithm in High Performance Computer Benchmark Tuning. In IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'08), Edinburgh, UK, pages 105-113, June 2008.
C. Brucks, M. Hilker, C. Schommer, R. Weires, and C. Wagner. Symbolic Computing with Incremental Mind-maps to Manage and Mine Data Streams - Some Applications. In 4th International Workshop on Neural-Symbolic Learning and Reasoning (NeSy'08), volume 366, Patras, Greece, pages 14-18, July 2008. CEUR-WS.org.