Publications

This is the complete overview of all my publications in journals, conferences or white papers. Documents published as deliverables of a project are not listed.

[26] Santiago Pina Ros, Mario Lischka, and Félix Gómez Mármol. Graph-Based XACML Evaluation. In SACMAT '12: Proceedings of the 17th ACM symposium on Access control models and technologies. ACM, June 2012. to be published. [ bib ]
[25] Marcus Q. Kuhnen, Mario Lischka, and Félix Gómez Mármol. Triggering idm authentication methods based on device capabilities information. In Neeraj Suri and Michael Waidner, editors, GI Sicherheit 2012, Lecture Notes in Informatics, pages 235-244. Springer, March 7-9 2012. [ bib ]
[24] Stephan Groß, Nils Gruschka, Meiko Jensen, Mario Lischka, André Miede, Marc Mosch, Stefan Schulte, and Melanie Siebenhaar. Sicherheitsprobleme im cloud computing. Praxis der Informationsverarbeitung und Kommunikation (PIK), 34(3):126-134, Sep 2011. [ bib ]
[23] Identity and Access Management for Networks and Services; Requirements of an Enforcement Framework in a Distributed Environment Enforcement Framework in a Distributed Environment. Technical Report ISG INS 005, ETSI, Sophia Antipolis, 3 2011. [ bib | http ]
[22] Ingo Friese, Jonas Högberg, Fulup Ar Foll, Gaël Gourmelen, Mario Lischka, Joni Brennan, Peter Weik, and Sebastian Lampe. Bridging ims and internet identity. In Intelligence in Next Generation Networks (ICIN), 2010 14th International Conference on, pages 1-6, October 2010. [ bib | DOI | http ]
[21] M. Barisch, E. Torroglosa Garcia, M. Lischka, R. Marques, R. Marx, A. Matos, A. Perez Mendez, and D. Scheuermann. Security and privacy enablers for future identity management systems. In Paul Cunningham and Miriam Cunningham, editors, Future Network & MobileSummit 2010 Conference, July 2010. [ bib | .pdf ]
[20] Mario Lischka. Dynamic obligation specification and negotiation. In optional optional optional optional, editor, 12th IEEE/IFIP Network Operations and Management Symposium (NOMS 2010), pages 155-162, Osaka, Japan, April 2010. IEEE. [ bib | DOI ]
[19] Alejandro Pérez, Elena María Torroglosa, Gabriel López, Antonio F. Gómez-Skarmeta, Joao Girao, and Mario Lischka. SWIFT - Advanced Services for Identity Management. Novatica, Journal of Sociación de Técnicos de Informática, Spain, January 2010. [ bib ]
[18] Mario Lischka, Yukiko Endo, and Manuel Sánchez Cuenca. Deductive Policies with XACML. In Proceedings of the Workshop on Secure Web Services, pages 37-44, Chicago, IL, November 13 2009. ACM. [ bib | DOI | http ]
[17] David Chadwick and Mario Lischka. Obligation standardization. In W3C Workshop on Access Control Application Scenarios, November 2009. [ bib | .pdf ]
[16] Mario Lischka, Yukiko Endo, Elena Torroglosa, Alejandro Pérez, and Antonio G. Skarmeta. Towards standardization of distributed access control. In W3C Workshop on Access Control Application Scenarios, November 2009. [ bib | .pdf ]
[15] Johannes Haeussler, Daniel Kraft, Marcus Kuhnen, Mario Lischka, and Jochen Bauknecht. Policy-based real-time decision-making for personalized service delivery. In IEEE International Symposium on Policies for Distributed Systems and Networks, pages 53-59, London, UK, July, 20-22 2009. IEEE. [ bib | DOI ]
[14] Marcus Q. Kuhnen, Daniel Kraft, Anett Schülke, Jochen Bauknecht, Johannes Häußler, and Mario Lischka. "personalization-based optimization of real-time service delivery in a multi-device environment". In 2009 IEEE Wireless Communications and Networking Conference, pages 3029-3034, Budapest, Hungary, April 2009. [ bib | DOI | http ]
[13] Amardeo Sarma, Antonio F. Gómez-Skarmeta, Gabriel López, Óscar Cánovas, Alejandro Pérez, Elena María Torroglosa, Rudolphe Marquesa, Ricardo Azevedo, Mario Lischka, Yukiko Endo, Marc Barisch, and Hervais C. Simo Fhom. SWIFT White Paper: Identity as a Convergence Layer. White Paper, 2009. [ bib | http ]
[12] Ingo Friese, Jonas Högberg, Mario Lischka, Gaël Gourmelen, Fulup Ar Foll, and Joni Brennan. Bridging IMS and Internet Identity, Liberty Alliance Project. White Paper, Dec 2009. [ bib | www: ]
[11] A. Schulke, D. Kraft, J. Bauknecht, A. Hassan, M. Kuhnen, and M. Lischka. Real-Time SDP Personalization in a Multi-Device Environment. In IEEE Global Telecommunications Conference, pages 1-5, Nov 30 - Dec. 4 2008. [ bib | DOI | http ]
[10] Mario Lischka. Dezentrale Rollenbasierte Autorisierung und Administrierung. PhD thesis, University of Dortmund, Mai 2006. [ bib | http | .PDF ]
[9] Horst F. Wedde and Mario Lischka. Modular Authorization and Administration. ACM Transactions on Information and System Security, 7(3):363-391, August 2004. [ bib | DOI | http ]
[8] Horst F. Wedde, Muddassar Farooq, and Mario Lischka. An Evolutionary Meta Hierarchical Scheduler for Linux Operating System. In Kalyanmoy Deb et. al, editor, Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2004) - Part II, volume 3103 of Lecture Notes in Computer Science, pages 1334 - 1335, Seatle, WA, USA, June 26-30 2004. Springer Verlag. [ bib | http | .pdf ]
[7] Horst F. Wedde, Muddassar Farooq, and Mario Lischka. A User Centered Evolutionary Scheduling Framework. In The 2004 International Conference on Artificial Intelligence (IC-AI'04), volume 2, pages 1126-1132, Las Vegas, NV, USA, June 21-24 2004. CSREA Press. [ bib | .pdf ]
[6] Horst F. Wedde and Mario Lischka. Role-Based Access Control in Ambient and Remote Space. In Trent Jaeger and Elena Ferrari, editors, Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT), pages 21-30, Yorktown Heights, NY, June, 2-4 2004. ACM SIGSAC, ACM Press. [ bib | DOI | http | .pdf ]
[5] Horst F. Wedde and Mario Lischka. Cooperative Role-Based Administration. In Elena Ferrari and David Ferraiolo, editors, Proceedings of the eigth ACM Symposium on Access Control Models and Technologies (SACMAT), Como, Italy, June, 2-3 2003. ACM SIGSAC, ACM Press. [ bib | http | .pdf ]
[4] Horst F. Wedde and Mario Lischka. Composing Heterogenous Access Policies between Organizations. In Proceedings of the IADIS International Conference e-Society 2003, Lisbon/ Portugal, June, 3-6 2003. International Association for Development of the Information Society. [ bib | .pdf ]
[3] Horst F. Wedde and Mario Lischka. Modular Authorization. In Ravi Sandhu and Trent Jaeger, editors, Proceedings of the sixth ACM Symposium on Access Control Models and Technologies (SACMAT), pages 97-105, Chantilly, Virginia, May 3-4 2001. ACM SIGSAC, ACM Press. [ bib | http | .pdf ]
[2] Horst F. Wedde and Mario Lischka. New Dimensions in Distributed Journalism Through Dragon Slayer III. In Proc. of the 7th Euromicro Workshop on Parallel and Distributed Processing, Madeira, Portugal, Feb 1999. Euromicro, IEEE Computer Society Press. [ bib | http | .pdf ]
[1] Mario Lischka. Verteilte kompetenzbasierte Authentifizierung von Knoten im Dragon Slayer III System. Master's thesis, Informatik III, University of Dortmund, Juli 1998. [ bib | .pdf ]

Copyright Notice

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without explicit permission of the copyright holder.