Publications and Patents
by Stephen D. Wolthusen
Copyright Notice
The documents contained in these directories are included by the
contributing authors as a means to ensure timely dissemination of scholarly
and technical work on a non-commercial basis. Copyright and all rights
therein are maintained by the authors or by other copyright holders,
notwithstanding that they have offered their works here electronically. It
is understood that all persons copying this information will adhere to the
terms and constraints invoked by each author's copyright. These works may
not be reposted without the explicit permission of the copyright holder.
Information on books I authored or co-authored is provided on a separate page.
Book Chapters
- 1
-
WOLTHUSEN, S. D.
Netzwerksicherheit
In Trendkompass Electronic Business - IT-Innovationen
& neue Prozesse im Unternehmenseinsatz.
Galileo Press, Bonn, Germany, 2004.
- 2
-
WOLTHUSEN, S. D.
Grundschutz für Praxis-Systeme.
In Jäckel, A., Ed.: Telemedizinführer Deutschland.
Deutsches Medizin Forum, Ober Mörlen, Germany, 2004.
- 3
-
BUSCH, C., AND WOLTHUSEN, S.
IT-Sicherheit für den Mittelstand: Leitfaden zum Thema
IT-Sicherheit.
No. 38 in Schriftenreihe der Landesinitiative hessen-media.
Hessisches Ministerium für Wirtschaft, Verkehr und Landesentwicklung,
Sept. 2002, ch. IT-Sicherheit - wie geht das?, pp. 9-34.
Edited Volumes
- 1
-
COLE, J. L., AND WOLTHUSEN,
S. D., Eds.
Proceedings of the Fourth IEEE International Workshop on
Information Assurance (IWIA 2006) (Royal Holloway, UK, Apr. 2005),
IEEE Press.
- 2
-
HÄMMERLI, B. M., AND WOLTHUSEN,
S. D., Eds.
Proceedings of CIP Europe: Critical Infrastructure
Protection (CIP Europe 2005) (Bonn,
Germany, Sep. 2005), Gesellschaft für Informatik.
- 3
-
HÄMMERLI, B. M., AND WOLTHUSEN,
S. D., Eds.
Proceedings of the First IEEE International Workshop on
Critical Infrastructure Protection (IWCIP 2005) (Darmstadt,
Germany, Nov. 2005), IEEE Press.
- 4
-
COLE, J. L., AND WOLTHUSEN,
S. D., Eds.
Proceedings of the Third IEEE International Workshop on
Information Assurance (IWIA 2005) (Washington D.C., USA, Mar. 2005),
IEEE Press.
- 5
-
COLE, J. L., ZHENG, Y.,
ANDWOLTHUSEN, S. D., Eds.
Proceedings of the Second IEEE International Workshop on
Information Assurance (IWIA 2004) (Charlotte, NC, USA, Apr. 2004),
IEEE Press.
- 6
-
COLE, J. L., AND WOLTHUSEN,
S. D., Eds.
Proceedings of the First IEEE International Workshop on
Information Assurance (IWIA 2003) (Darmstadt, Germany, Mar. 2003),
IEEE Press.
Refereed Publications
Where possible and permitted, electronic versions are provided. Please
ensure that your use of any such materials is in compliance with
copyright and all other regulations in all applicable jurisdictions.
1
WOLTHUSEN, S.
Vertrauenswürdige Protokollierung mittels nicht-deterministischer
nebenläufiger wechselseitiger Überwachung.
Datenschutz und Datensicherheit, 10 (2007), pp. 740-743.
2
SVENDSEN, N. K., AND
WOLTHUSEN, S.
An Analysis of Cyclical Interdependencies in Critical Infrastructures.
In Proceedings of the 2nd International Workshop on Critical
Information Infrastructures Security (Malaga, Spain,
Oct. 2007). Springer-Verlag.
(in press).
3
SVENDSEN, N. K., AND
WOLTHUSEN, S.
A Framework for 3D Geospatial Buffering of Events of Interest in
Critical Infrastructures.
In Proceedings of the 2nd International Workshop on Critical
Information Infrastructures Security (Malaga, Spain,
Oct. 2007). Springer-Verlag.
(in press).
4
REIDT, S., AND
WOLTHUSEN, S.
Efficient Trust Authority Distribution in Tactical MANET Environments.
In Proceedings of the IEEE Military Communications Conference 2007
(MILCOM 2007) (Orlando, FL, USA, Oct. 2007). IEEE Press.
5
SVENDSEN, N. K., AND
WOLTHUSEN, S.
A Framework for Modelling Logical, Physical, and Geographic
Dependencies between Critical Infrastructures.
In Proceedings of the Lund Energy Security Conference (Lund,
Sweden, Sep. 2007).
(in press).
6
REIDT, S., AND
WOLTHUSEN, S.
An Evaluation of Cluster Head TA Distribution Mechanisms in
Tactical MANET Environments
In Proceedings of the First Annual Conference of the ITA
(ITA 2007) (College Park, MD, USA, Sep. 2007).
7
WU, M.-D., AND
WOLTHUSEN, S.
Network Forensics of SSL/TLS Encrypted Channels
In Proceedings of the Sixth European Conference on Information
Warfare and Security (Defence Academy of the United Kingdom,
Shrivenham, UK, July 2007).
8
SVENDSEN, N. K., AND
WOLTHUSEN, S.
Analysis and Statistical Properties of Critical Infrastructure
Interdependency Multiflow Models
In Proceedings from the Eighth Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2007), IEEE Press, pp. 247-254.
9
REIDT, S., AND
WOLTHUSEN, S.
Efficient Distribution of Trust Authority Functions in Tactical
Networks
In Proceedings from the Eighth Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2007), IEEE Press, pp. 84-91.
10
SVENDSEN, N. K., AND
WOLTHUSEN, S.
Graph Models of Critical Infrastructure Interdependencies.
In Inter-Domain Management, Proceedings of the First International
Conference on Autonomous Infrastructure, Management, and Security (AIMS
2007) (Oslo, Norway, Jun. 2007). A. K. Bandara and M. Burgess, Eds.,
vol. 4543 of Lecture Notes in Computer Science, Springer-Verlag, pp. 208-211.
11
WOLTHUSEN, S.
The Role of Mathematics in Information Security Education.
In Proceedings of the 5th IFIP TC 11.8 World Conference on
Information Security Education (WISE 5) (West Point, NY, USA,
Jun. 2007). Springer-Verlag, pp. 129-136.
12
SVENDSEN, N. K., AND
WOLTHUSEN, S.
Connectivity Models of Interdependency in Mixed-Type Critical
Infrastructure Networks
Information Security Technical Report 1 (2007), pp. 44-55.
13
SVENDSEN, N. K., AND
WOLTHUSEN, S.
Multigraph Dependency Models for Heterogeneous
Critical Infrastructures.
In Proceedings of the First Annual IFIP TC 11.10 International
Conference on Critical Infrastructure Protection (Hanover, NH, USA,
Mar. 2007). Springer-Verlag, pp. 337-350.
14
WOLTHUSEN, S.
Automated Extraction of Behavioural Profiles from Document Usage.
BT Technology Journal 25,1 (2007), pp. 192-200.
15
WOLTHUSEN, S.
Windows Device Interface Security
Information Security Technical Report 11 (2006),
pp. 160-165.
16
HJELMÅS, E. AND
WOLTHUSEN, S.
Full-Spectrum Information Security Education: Integrating B.Sc.,
M.Sc., and Ph.D. Programs
In Proceedings of the 3rd Annual Conference on
Information Security Curriculum Development (Kennesaw, GA,
USA, Sep. 2006), ACM Press.
17
WOLTHUSEN, S.
Secure Visualization of GIS Data
In Proceedings from the Seventh Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2006), IEEE Press, pp. 200-207.
18
WIEHE, A. , HJELMÅS, E.
AND WOLTHUSEN, S.
Quantitative Analysis of Efficient Antispam Techniques
In Proceedings from the Seventh Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2006), IEEE Press, pp. 163-169.
19
WOLTHUSEN, S.
Revisionssichere Protokollierung in Standardbetriebssystemen
Datenschutz und Datensicherheit, 5 (2006), pp. 281-284.
20
WOLTHUSEN, S.
Risikomanagement, Sicherheitspolitiken und technische Verfahren
zur Durchsetzung von Sicherheitspolitiken (II)
IT-Sicherheit & Datenschutz 4 (2006),
pp. 349-352
21
WOLTHUSEN, S.
Risikomanagement, Sicherheitspolitiken und technische Verfahren
zur Durchsetzung von Sicherheitspolitiken (I)
IT-Sicherheit & Datenschutz 4 (2006),
pp. 319-321
22
DAHL, O. M. AND WOLTHUSEN, S.
Modeling and Execution of Complex Attack Scenarios using Interval Timed
Colored Petri Nets
In Proceedings of the Fourth IEEE International Workshop on
Information Assurance (Royal Holloway,
UK, Apr. 2006), pp. 157-168, IEEE Press.
23
GRAF, F. AND WOLTHUSEN, S.
A Capability-Based Transparent Cryptographic File System
In Proceedings of CYBERWORLDS 2005 (Singapore, Nov. 2005),
pp. 101-108. IEEE Press.
24
WOLTHUSEN, S.
GIS-based Command and Control Infrastructure for
Critical Infrastructure Protection
In Proceedings of the First IEEE International Workshop on
Critical Infrastructure Protection (IWCIP 2005) (Darmstadt, Germany,
Nov. 2005), pp. 40--47. IEEE Press.
25
WOLTHUSEN, S.
Molehunt: Near-line Semantic Activity Tracking
In Proceedings from the Sixth Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2005), IEEE Press, pp. 410-418.
26
WOLTHUSEN, S.
Trustworthiness in Security Policy Mechanisms for Network-Centric
Warfare Environments
In Proceedings of the NATO RTO Workshop on Information Security for
Network Enabled Capabilities (The Hague, The Netherlands, April
2005). (not available online due to security restrictions).
27
LIKAVEC, J. AND WOLTHUSEN, S.
Enforcing Messaging Security Policies
In Proceedings of the Third IEEE International Workshop on
Information Assurance (Washington D.C.,
USA, Mar. 2005), IEEE Press, pp. 131-138.
28
WOLTHUSEN, S.
Defensive Information Warfare and the Protection of Critical Infrastructures
In Proceedings of the XVI International Amaldi Conference of
Academies of Science and National Scientific Societies on Problems of
Global Security (Trieste, Italy, Nov. 2004), Accademia dei Lincei.
29
WOLTHUSEN, S.
Modeling Critical Infrastructure Requirements.
In Proceedings from the Fifth Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2004), IEEE Press, pp. 101-108.
30
WOLTHUSEN, S.
Self-Inflicted Vulnerabilities
Naval War College Review LVII,3/4 (2004), pp. 102-113.
31
WOLTHUSEN, S.
Tempering Network Stacks
In Proceedings of the NATO RTO Symposium on Adaptive
Defence in Unclassified Networks (Toulouse, France, April 2004),
NATO Research and Technology Organization.
32
BUSCH, C., AND WOLTHUSEN, S. D.
Information Warfare: Threats to Critical Infrastructures.
In Proceedings of the XV International Amaldi Conference of
Academies of Science and National Scientific Societies on Problems of Global
Security (Helsinki, Finland, Sept. 2003).
33
WOLTHUSEN, S. D.
Goalkeeper: Close-In Interface Protection.
In Proceedings 19th Annual Computer Security Applications
Conference (ACSAC'03) (Las Vegas, NV, USA, Dec. 2003), IEEE Press,
pp. 334-341.
34
WOLTHUSEN, S.
A Distributed Multipurpose Mail Guard.
In Proceedings from the Fourth Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2003), IEEE Press, pp. 258-265.
35
WOLTHUSEN, S. D., AND PREDIGER, F.
ReEncryption -- Das Konzept für den umfassenden
Dokumentenschutz.
In D-A-CH Security: Bestandsaufnahme und Perspektiven.
Gemeinsame Arbeitskonferenz GI OCG BITKOM SI TeleTrusT (Erfurt, Germany, Mar. 2003), Kluwer Academic Publishers,
pp. 273-284.
36
WOLTHUSEN, S.
Distributed Intrusion Detection for Policy-Controlled Heterogeneous
Environments.
In Proceedings from the Third Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2002), IEEE Press, pp. 255-262.
37
WOLTHUSEN, S.
Embedding Policy-Controlled ID Sensors within Host Operating System
Security Enforcement Components for Real Time Monitoring.
In Proceedings of the NATO RTO Symposium on Real Time Intrusion
Detection Symposium (RTID) (Estoril, Portugal, May 2002), NATO
Research and Technology Organization.
Publication RTO-MP-101.
38
BUSCH, C., AND WOLTHUSEN, S.
Sensitivity Labels and Invisible Identification Markings in
Human-Readable Output.
In Proceedings of Electronic Imaging 2002 (San Jose, CA,
USA, Jan. 2002), The International Society for Optical Engineering (SPIE),
pp. 149-157.
39
WOLTHUSEN, S.
Access and Use Control using Externally Controlled Reference
Monitors.
ACM Operating Systems Review 36, 1 (2002), 58-69.
40
WOLTHUSEN, S.
Security Policy Enforcement at the File System Level in the Windows
NT Operating System Family.
In Proceedings 17th Annual Computer Security Applications
Conference (ACSAC'01) (New Orleans, LA, USA, Dec. 2001), IEEE Press,
pp. 55-63.
41
BUSCH, C., AND WOLTHUSEN, S.
Tracing Data Diffusion in Industrial Research with Robust
Watermarking.
In Proceedings of the 2001 Fourth Workshop on Multimedia Signal
Processing (MMSP'01) (Cannes, France, Oct. 2001), J.-L. Dugelay and
K. Rose, Eds., IEEE Press, pp. 207-212.
42
WOLTHUSEN, S.
Layered Multipoint Network Defense and Security Policy Enforcement.
In Proceedings from the Second Annual IEEE SMC Information
Assurance Workshop, United States Military Academy (West Point, NY,
USA, June 2001), IEEE Press, pp. 100-108.
43
RADEMER, E., AND WOLTHUSEN, S.
Transparent Access To Encrypted Data Using Operating System Network
Stack Extensions.
In Communications and Multimedia Security Issues of the New
Century: Proceedings of the IFIP TC6/TC11 Fifth Joint Working Conference on
Communications and Multimedia Security (CMS'01) (Darmstadt, Germany,
May 2001), R. Steinmetz, J. Dittman, and M. Steinebach, Eds., IFIP, Kluwer
Academic Publishers, pp. 213-226.
44
BUSCH, C., RADEMER, E., SCHMUCKER, M., AND WOLTHUSEN, S.
Concepts for a watermarking technique for music scores.
In Proceedings of the Visual 2000 3rd International
Conference on Visual Computing (Mexico City, Mexico, Sept. 2000).
45
BUSCH, C., GRAF, F., WOLTHUSEN, S., AND ZEIDLER, A.
A system for intellectual property protection.
In Proceedings of the World Multiconference on Systemics,
Cybernetics, and Informatics (SCI 2000) Int'l Conf. on Information
Systems Analysis and Synthesis (ISAS 2000) (Orlando, FL, USA, July
2000), pp. 225-230.
46
BUSCH, C., GRAF, F., AND WOLTHUSEN, S.
Courseware needs security.
In Proceedings of ICCE, 7th International Conference on
Computers in Education (Chiba, Japan, Nov. 1999).
47
BUSCH, C., FUNK, W., AND WOLTHUSEN, S.
Digital Watermarking: From Concepts to Real-Time Video
Applications.
IEEE Computer Graphics and Applications 19, 1 (Jan.Feb.
1999), 25-35.
48
WOLTHUSEN, S.
On the limitations of digital watermarks.
In Proceedings of the World Multiconference on Systemics,
Cybernetics, and Informatics (SCI 98) Int'l Conf. on Information
Systems Analysis and Synthesis (ISAS 98) (Orlando, FL, USA, July 1998).
49
WOLTHUSEN, S.
Digital Watermarking: Ready for the Real World?
In Proceedings of IT '98 (Moscow, Russia, Feb. 1998),
pp. 73-75.
Granted Patents
- 1
-
BUSCH, C., RADEMER, E. and WOLTHUSEN,
S.
German Patent DE 100 58 175: Verfahren und Einrichtung zur
automatischen Markierung von Ausdrucken einer Datenverarbeitungsanlage.
Priority: November 22nd, 2000. Granted: August 8th, 2002.
- 2
-
BUSCH, C., RADEMER, E. and WOLTHUSEN,
S.
International Patent PCT/DE/01333: Method for Integrating Hidden
Information in a Set of Notes.
Priority: May 15th, 2001. Granted: November 22nd, 2001.
3
WOLTHUSEN, S.
German Patent 10146361.8-53: Vorrichtung und Verfahren zur
Etablierung einer Sicherheitspolitik in einem verteilten System.
Priority: September 20th, 2001. Granted: September 20th, 2006.
Miscellaneous Publications
- 1
-
WOLTHUSEN, S.
Sichere Geo-Webdienste
Business Geomatics, 2 (2006), 3.
- 2
-
WOLTHUSEN, S.
Information Sharing and Decision Support for C(I)IP
In Proceedings of CIP Europe: Critical Infrastructure
Protection (Bonn, Germany,
Sep. 2005), pp. 7--12. Gesellschaft für Informatik.
- 3
-
WOLTHUSEN, S.
Von der Patienten-Chip-Karte zur Health Professional Card.
Der Deutsche Dermatologe, 10 (Oct. 1999), 788-789.
- 4
-
WOLTHUSEN, S.
Sicherheitsfragen in der Informationstechnik.
Zeitschrift für Dermatologie, 188 (1999), 188-192.
- 5
-
WOLTHUSEN, S.
Sicherheit von Praxis-Systemen.
Der Deutsche Dermatologe, 9 (Sept. 1999), 687-692.
- 6
-
ENCARNAÇÃO, J. L., AND WOLTHUSEN, S.
Sicherheit in der Informationstechnik.
In Digitale Signaturen -- ihre Rolle im Rechts- und
Geschäftsverkehr (1998), Deutsch-Japanischer Rat, pp. 74-96.
|
This page and all contents (unless otherwise noted) are
Copyright © 2002-2008 by Stephen D. Wolthusen
All rights reserved.
|