Automated and adaptive model-driven security system and method for operating the same U Lang, R Schreiner US Patent 9,563,771, 2017 | 276 | 2017 |
Automated and adaptive model-driven security system and method for operating the same U Lang, R Schreiner US Patent 11,552,996, 2023 | 97 | 2023 |
Method and system for managing security policies U Lang, R Schreiner US Patent 9,043,861, 2015 | 95 | 2015 |
Method and system for policy management, testing, simulation, decentralization and analysis U Lang, R Schreiner US Patent 10,623,443, 2020 | 83 | 2020 |
Method and system for determining policies, rules, and agent characteristics, for automating agents, and protection U Lang, R Schreiner US Patent App. 16/255,811, 2019 | 78 | 2019 |
Method and system for rapid accreditation/re-accreditation of agile IT environments, for example service oriented architecture (SOA) U Lang, R Schreiner US Patent 8,856,863, 2014 | 61 | 2014 |
Developing secure distributed systems with CORBA U Lang, R Schreiner Artech house, 2002 | 53 | 2002 |
Openpmf scaas: Authorization as a service for cloud & soa applications U Lang 2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010 | 50 | 2010 |
ÆtherFlow: Principled wireless support in SDN M Yan, J Casey, P Shome, A Sprintson, A Sutton 2015 IEEE 23rd International Conference on Network Protocols (ICNP), 432-437, 2015 | 40 | 2015 |
Automated and adaptive model-driven security system and method for operating the same U Lang, R Schreiner US Patent 10,079,859, 2018 | 33 | 2018 |
Benefits and pitfalls of predictive policing E Schlehahn, P Aichroth, S Mann, R Schreiner, U Lang, IDH Shepherd, ... 2015 European intelligence and security informatics conference, 145-148, 2015 | 28 | 2015 |
Model driven development of security aspects J Reznik, T Ritter, R Schreiner, U Lang Electronic Notes in Theoretical Computer Science 163 (2), 65-79, 2007 | 26 | 2007 |
Protection of complex distributed systems R Schreiner, U Lang Proceedings of the 2008 workshop on Middleware security, 7-12, 2008 | 25 | 2008 |
The challenges of corba security A Alireza, U Lang, M Padelis, R Schreiner, M Schumacher Sicherheit in Netzen und Medienströmen: Tagungsband des GI-Workshops …, 2000 | 23 | 2000 |
Analysis of recommended cloud security controls to validate OpenPMF “policy as a service” U Lang, R Schreiner information security technical report 16 (3-4), 131-141, 2011 | 20 | 2011 |
Integrating security policies via container portable interceptors T Ritter, R Schreiner, U Lang Proceedings of the 4th workshop on Reflective and adaptive middleware systems, 2005 | 20 | 2005 |
Model Driven Security Management: Making Security Management Manageable in Complex Distributed Systems. U Lang, R Schreiner MODSEC@ MoDELS, 2008 | 18 | 2008 |
Verifiable identifiers in middleware security U Lang, D Gollmann, R Schreiner Seventeenth Annual Computer Security Applications Conference, 450-459, 2001 | 16 | 2001 |
Model driven security accreditation (MDSA) for agile, interconnected it landscapes U Lang, R Schreiner Proceedings of the first ACM workshop on Information security governance, 13-22, 2009 | 15 | 2009 |
Access policies for middleware U Lang University of Cambridge, Computer Laboratory, 2003 | 15 | 2003 |