1. Communications in Computer and Information Science;P Amthor,2016
2. Amthor, P.: Efficient heuristic safety analysis of core-based security policies. In: Proceedings of the 14th International Conference on Security and Cryptography. SECRYPT 2017, pp. 384–392 (2017).
https://doi.org/10.5220/0006477103840392
3. Amthor, P.: Aspect-Oriented Security Engineering. Cuvillier Verlag, Göttingen (2019), ISBN 978-3-7369-9980-0
4. Amthor, P., Kühnhauser, W.E., Pölck, A.: Model-based safety analysis of SELinux security policies. In: Samarati, P., Foresti, S., Hu, J., Livraga, G. (eds.) Proceedings of 5th International Conference on Network and System Security, pp. 208–215. IEEE (2011)
5. Amthor, P., Kühnhauser, W.E., Pölck, A.: Heuristic safety analysis of access control models. In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, SACMAT 2013, pp. 137–148. ACM, New York (2013).
http://doi.acm.org/10.1145/2462410.2462413