Skip to main content Skip to main navigation
Personen vor Bildschirm, überlegend© Adobe Stock

Educational Technology Lab

Publikationen

Seite 1 von 2.

  1. Dieter Hutter; Heiko Mantel; Ina Schäfer; Axel Schairer

    Security of Multi-Agent Systems: A Case Study on Comparison Shopping

    In: Journal of Applied Logic, Vol. 5, No. 2, Pages 303-332, Elsevier B.V. 6/2007.

  2. Heiko Mantel; Axel Schairer

    Exploiting Generic Aspects of Security Models in Formal Developments

    In: Dieter Hutter; Werner Stephan (Hrsg.). Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday. Springer, 2005.

  3. Dieter Hutter; Axel Schairer

    Possibilistic Information Flow Control in the Presence of Encrypted Communication

    In: P.Ryan; P.Samarati (Hrsg.). 9th European Symposium on Research in Computer Security, ESORICS 2004. European Symposium on Computer Security …

  4. Axel Schairer

    Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems

    In: Dieter Hutter; Günter Müller; Werner Stephan; Markus Ullmann (Hrsg.). Proceedings of the First International Conference on Security in Pervasive …

  5. Dieter Hutter; Heiko Mantel; Axel Schairer

    Informationsflußkontrolle als Grundlage für die Scherheit von Multiagentensystemen

    In: PIK - Praxis der Informationsverarbeitung und Kommunikation, Sonderheft Sicherheit, 2003.

  6. Axel Schairer; Dieter Hutter

    Proof Transformations for Evolutionary Formal Software Development

    In: Proceedings 9th International Conference on Algebraic Methodology And Software Technology, AMAST2002. International Conference on Algebraic …

  7. Gerhard Schellhorn; Wolfgang Reif; Axel Schairer; Paul Karger; Vernon Austel; David Toll

    Verified Formal Security Models for Multiapplicative Smart Cards

    In: Journal of Computer Security, Vol. 10, No. 4, Pages 339-367, 2002.

  8. Serge Autexier; Dieter Hutter; Till Mossakowski; Axel Schairer

    The Development Graph Manager MAYA

    In: Proceedings 9th International Conference on Algebraic Methodology And Software Technology, AMAST2002. International Conference on Algebraic …

  9. Heiko Mantel; Axel Schairer; Matthias Kabatnik; Michael Kreutzer; Alf Zugenmaier

    Using Information Flow Control to Evaluate Access Protection of Location Information in Mobile Communication Networks

    Technical Report, Vol. 159, 8/2001.

  10. A Pragmatic Approach to Reuse in Tactical Theorem Proving

    In: Proceedings of the 4th International Workshop on Strategies in Automated Deduction (STRATEGIES 2001), 1st International Joint Conference on …

Leitung

Prof. Dr. Niels Pinkwart

Stellvertreterin:
Susan Beudt

Stellvertretung in kaufmännisch-administrativen Fragen:
Michael Dietrich

Kontakt


Tel.: +49 30 23895 0

Deutsches Forschungszentrum für
Künstliche Intelligenz GmbH (DFKI)
Educational Technology Lab

Alt-Moabit 91 C
10559 Berlin
Deutschland