default search action
Meiko Jensen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-Robert Ulbricht, Isabel Wagner, Kim Wuyts, Christian Zimmermann:
Privacy Engineering From Principles to Practice: A Roadmap. IEEE Secur. Priv. 22(2): 86-92 (2024) - [c51]Florian Weijers, Meiko Jensen, Antje Raab-Düsterhöft:
Forensic strategies and methods in advanced software-defined networks. INFORMATIK 2024: 331-341 - [c50]Meiko Jensen, Marit Hansen, Malte Hansen:
Privacy Challenges in the Metaverse. MetaCom 2024: 182-189 - [e2]Meiko Jensen, Cédric Lauradoux, Kai Rannenberg:
Privacy Technologies and Policy - 12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, September 4-5, 2024, Proceedings. Lecture Notes in Computer Science 14831, Springer 2024, ISBN 978-3-031-68023-6 [contents] - [e1]Felix Bieker, Silvia De Conca, Nils Gruschka, Meiko Jensen, Ina Schiering:
Privacy and Identity Management. Sharing in a Digital World - 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8-11, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology 695, Springer 2024, ISBN 978-3-031-57977-6 [contents] - [i2]Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-Robert Ulbricht, Isabel Wagner, Kim Wuyts, Christian Zimmermann:
Privacy Engineering From Principles to Practice: A Roadmap. CoRR abs/2404.03442 (2024) - 2023
- [c49]Malte Hansen, Nils Gruschka, Meiko Jensen:
A Universal Data Model for Data Sharing Under the European Data Strategy. APF 2023: 3-19 - [c48]Jonas Palm, Meiko Jensen:
Analysis of a Consent Management Specification and Prototype Under the GDPR. NordSec 2023: 3-17 - 2022
- [c47]Malte Hansen, Meiko Jensen:
A Generic Data Model for Implementing Right of Access Requests. APF 2022: 3-22 - [c46]Ken Ahrens, Jonas Palm, Meiko Jensen:
CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments. EuroS&P Workshops 2022: 194-202 - [c45]Simone Fischer-Hübner, Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen:
Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning. Privacy and Identity Management 2022: 11-20
2010 – 2019
- 2019
- [c44]Meiko Jensen, Sahil Kapila, Nils Gruschka:
Towards Aligning GDPR Compliance with Software Development: A Research Agenda. ICISSP 2019: 389-396 - 2018
- [j8]Meiko Jensen:
Zur Messbarkeit von Schutzzielen. Datenschutz und Datensicherheit 42(1): 23-26 (2018) - [c43]Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen:
Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR. IEEE BigData 2018: 5027-5033 - [i1]Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen:
Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR. CoRR abs/1811.08531 (2018) - 2016
- [c42]Meiko Jensen, Nils Gruschka, Jens Lüssem:
Datenschutz im Fahrzeug der Zukunft: Vernetzt, Autonom, Elektrisch. GI-Jahrestagung 2016: 441-454 - 2015
- [c41]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen:
Towards Measuring Maturity of Privacy-Enhancing Technologies. APF 2015: 3-20 - [c40]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen, Stefan Schiffner:
Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies. Privacy and Identity Management 2015: 97-110 - [c39]Claudio A. Ardagna, Meiko Jensen, Miguel Vargas Martin:
IEEE Services Visionary Track on Security and Privacy Engineering (SPE 2015). SERVICES 2015: 151 - [c38]Meiko Jensen, Nils Gruschka:
Privacy-Preserving Detection of Plagiarism in Scientific Documents. SERVICES 2015: 175-180 - [c37]Marit Hansen, Meiko Jensen, Martin Rost:
Protection Goals for Privacy Engineering. IEEE Symposium on Security and Privacy Workshops 2015: 159-166 - [c36]Meiko Jensen:
Applying the protection goals for privacy engineering to mobile devices. WISEC 2015: 26:1-26:2 - 2014
- [c35]Nils Gruschka, Meiko Jensen:
Aligning User Consent Management and Service Process Modeling. GI-Jahrestagung 2014: 527-538 - [c34]Claudio A. Ardagna, Meiko Jensen, Zhixiong Chen, Ernesto Damiani:
4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs. SERVICES 2014: 103-104 - 2013
- [j7]Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau:
Security and Privacy-Enhancing Multicloud Architectures. IEEE Trans. Dependable Secur. Comput. 10(4): 212-224 (2013) - [c33]Meiko Jensen:
Challenges of Privacy Protection in Big Data Analytics. BigData Congress 2013: 235-238 - [c32]Meiko Jensen:
Towards Privacy-Friendly Transparency Services in Inter-organizational Business Processes. COMPSAC Workshops 2013: 200-205 - [c31]Nils Gruschka, Meiko Jensen:
Wasch mich, aber mach mich nicht nass - Anonymisierungsverfahren als Schlüssel zur datenschutzkonformen E-Mail-Filterung. GI-Jahrestagung 2013: 2119-2133 - [c30]Andreas Becker, Meiko Jensen:
Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings. ICWS 2013: 531-538 - 2012
- [j6]Meiko Jensen, Holger Junker, Luigi Lo Iacono, Christian Mainka, Jörg Schwenk:
XML Signature Wrapping Angriffe wirksam unterbinden. Datenschutz und Datensicherheit 36(4): 236-240 (2012) - [c29]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
Making XML Signatures Immune to XML Signature Wrapping Attacks. CLOSER (Selected Papers) 2012: 151-167 - [c28]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XSpRES - Robust and Effective XML Signatures for Web Services. CLOSER 2012: 187-197 - [c27]Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen:
On Breaking SAML: Be Whoever You Want to Be. USENIX Security Symposium 2012: 397-412 - 2011
- [b1]Meiko Jensen:
Analysis of attacks and defenses in the context of web services. Ruhr University Bochum, 2011, pp. 1-152 - [j5]Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security. Int. J. Mob. Comput. Multim. Commun. 3(4): 20-35 (2011) - [j4]Stephan Groß, Mario Lischka, Nils Gruschka, André Miede, Meiko Jensen, Marc Mosch, Stefan Schulte, Melanie Siebenhaar:
Sicherheitsprobleme im Cloud Computing. Prax. Inf.verarb. Kommun. 34(3): 126-134 (2011) - [j3]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Norbert Luttenberger:
Server-Side Streaming Processing of WS-Security. IEEE Trans. Serv. Comput. 4(4): 272-285 (2011) - [c26]Meiko Jensen, Jörg Schwenk, Jens-Matthias Bohli, Nils Gruschka, Luigi Lo Iacono:
Security Prospects through Cloud Computing by Adopting Multiple Clouds. IEEE CLOUD 2011: 565-572 - [c25]Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
All your clouds are belong to us: security analysis of cloud management interfaces. CCSW 2011: 3-14 - [c24]Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz:
Crouching tiger - hidden payload: security risks of scalable vectors graphics. CCS 2011: 239-250 - [c23]Meiko Jensen, Christopher Meyer:
Expressiveness Considerations of XML Signatures. COMPSAC Workshops 2011: 392-397 - [c22]Meiko Jensen, Florian Kerschbaum:
Towards Privacy-Preserving XML Transformation. ICWS 2011: 65-72 - 2010
- [c21]Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
Secure Bindings of SAML Assertions to TLS Sessions. ARES 2010: 62-69 - [c20]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono:
A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages. ARES 2010: 410-415 - [c19]Nils Gruschka, Meiko Jensen:
Attack Surfaces: A Taxonomy for Attacks on Cloud Services. IEEE CLOUD 2010: 276-279 - [c18]Meiko Jensen, Sven Schäge, Jörg Schwenk:
Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing. IEEE CLOUD 2010: 540-541 - [c17]Juraj Somorovsky, Meiko Jensen, Jörg Schwenk:
Streaming-Based Verification of XML Signatures in SOAP Messages. SERVICES 2010: 637-644 - [c16]Ralph Herkenhöner, Hermann de Meer, Meiko Jensen, Henrich Christopher Pöhls:
Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions. SERVICES 2010: 645-652
2000 – 2009
- 2009
- [j2]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XML Signature Wrapping Angriffe - What you process is not always what you verify. Datenschutz und Datensicherheit 33(9): 553-560 (2009) - [j1]Meiko Jensen, Nils Gruschka, Ralph Herkenhöner:
A survey of attacks on web services. Comput. Sci. Res. Dev. 24(4): 185-197 (2009) - [c15]Meiko Jensen, Jörg Schwenk:
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. ARES 2009: 25-32 - [c14]Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
On Technical Security Issues in Cloud Computing. IEEE CLOUD 2009: 109-116 - [c13]Meiko Jensen:
Generating WS-SecurityPolicy Documents via Security Model Transformation. BPSC 2009: 233-234 - [c12]Meiko Jensen, Nils Gruschka:
Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions. DEXA Workshops 2009: 117-121 - [c11]Meiko Jensen, Sven Feja:
A Security Modeling Approach for Web-Service-Based Business Processes. ECBS 2009: 340-347 - [c10]Sebastian Gajek, Meiko Jensen, Lijun Liao, Jörg Schwenk:
Analysis of Signature Wrapping Attacks and Countermeasures. ICWS 2009: 575-582 - [c9]Meiko Jensen, Lijun Liao, Jörg Schwenk:
The curse of namespaces in the domain of XML signature. SWS 2009: 29-36 - [c8]Antonia Azzini, Stefania Marrara, Meiko Jensen, Jörg Schwenk:
Extending the similarity-based XML multicast approach with digital signatures. SWS 2009: 45-52 - 2008
- [c7]Meiko Jensen, Nils Gruschka, Norbert Luttenberger:
The Impact of Flooding Attacks on Network-based Services. ARES 2008: 509-513 - [c6]Meiko Jensen:
A Fault Propagation Approach for Highly Distributed Service Compositions. IEEE SCC (2) 2008: 507-510 - [c5]Norbert Luttenberger, Meiko Jensen:
Proceedings of the Workshop on Security for Web Services and Service-Oriented Architectures. GI Jahrestagung (1) 2008: 109 - [c4]Meiko Jensen, Nils Gruschka:
Flooding Attack Issues of Web Services and Service-Oriented Architectures. GI Jahrestagung (1) 2008: 117-122 - 2007
- [c3]Meiko Jensen, Nils Gruschka, Ralph Herkenhöner, Norbert Luttenberger:
SOA and Web Services: New Technologies, New Standards - New Attacks. ECOWS 2007: 35-44 - [c2]Nils Gruschka, Meiko Jensen, Norbert Luttenberger:
A Stateful Web Service Firewall for BPEL. ICWS 2007: 142-149 - [c1]Nils Gruschka, Meiko Jensen, Torben Dziuk:
Event-based application of ws-security policy on soap messages. SWS 2007: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint