Thomas Groß
Thomas Groß
Reader in System Security, Newcastle University
Verified email at ncl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Access control in data processing system
TR Gross, G Karjoth
US Patent 8,875,224, 2014
2272014
Security analysis of the SAML single sign-on browser/artifact profile
T Groß
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
2142003
User centricity: a taxonomy and open issues
A Bhargav-Spantzel, J Camenisch, T Gross, D Sommer
Journal of Computer Security 15 (5), 493-527, 2007
1882007
Anonymous credentials on a standard java card
P Bichsel, J Camenisch, T Groß, V Shoup
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1852009
Efficient attributes for anonymous credentials
J Camenisch, T Groß
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1382008
Cryptographic encoding and decoding of secret data
JL Camenisch, TR Gross, TS Heydt-Benjamin
US Patent 8,744,077, 2014
722014
Credential authenticated identification and key exchange
J Camenisch, N Casati, T Groß, V Shoup
Annual Cryptology Conference, 255-276, 2010
522010
Browser model for security analysis of browser-based protocols
T Groß, B Pfitzmann, AR Sadeghi
European Symposium on Research in Computer Security, 489-508, 2005
512005
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures
S Bleikertz, C Vogel, T Groß
Proceedings of the 30th annual computer security applications conference, 26-35, 2014
502014
Automated information flow analysis of virtualized infrastructures
S Bleikertz, T Groß, M Schunter, K Eriksson
European Symposium on Research in Computer Security, 392-415, 2011
442011
Efficient attributes for anonymous credentials
J Camenisch, T Groß
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-30, 2012
412012
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
392015
A virtualization assurance language for isolation and deployment
S Bleikertz, T Groß
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
372011
Method, system, and computer program product for virtual world access control management
A Bussani, JL Camenisch, TR Gross, D Husemann, A Schmidt, D Sommer
US Patent App. 12/062,066, 2009
372009
Understanding cybercrime from its stakeholders' perspectives: Part 1--attackers
B Arief, MAB Adzmi, T Gross
IEEE Security & Privacy 13 (1), 71-76, 2015
362015
Automated verification of virtualized infrastructures
S Bleikertz, T Groß, S Mödersheim
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 47-58, 2011
362011
Defense-in-depth against malicious insiders in the cloud
F Rocha, T Gross, A Van Moorsel
2013 IEEE International Conference on Cloud Engineering (IC2E), 88-97, 2013
352013
Vertical protocol composition
T Groß, S Modersheim
2011 IEEE 24th Computer Security Foundations Symposium, 235-250, 2011
352011
Attributes in cryptographic credentials
JL Camenisch, TR Gross
US Patent 8,281,131, 2012
302012
SAML artifact information flow revisited
T Groß, B Pfitzmann
In IEEE Workshop on Web Services Security (WSSS), 84-100, 2006
302006
The system can't perform the operation now. Try again later.
Articles 1–20