Ludwig Seitz
Ludwig Seitz
Adresse e-mail validée de
Citée par
Citée par
Authorization framework for the internet-of-things
L Seitz, G Selander, C Gehrmann
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
Medical images simulation, storage, and processing on the european datagrid testbed
J Montagnat, F Bellet, H Benoit-Cattin, V Breton, L Brunie, H Duque, ...
Journal of Grid Computing 2 (4), 387, 2004
Access control system and method for operating said system
B Sadighi, L Cao, L Seitz
US Patent 8,482,378, 2013
S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things
S Raza, L Seitz, D Sitenkov, G Selander
IEEE Transactions on Automation Science and Engineering, 1-11, 2016
Object Security for Constrained RESTful Environments (OSCORE)
G Selander, J Mattsson, F Palombini, L Seitz
Internet Engineering Task Force (IETF), 2019
Authentication and authorization for constrained environments (ace) using the oauth 2.0 framework (ace-oauth)
L Seitz, G Selander, E Wahlstroem, S Erdtman, H Tschofenig
IETF, Internet-Draft draft-ietf-ace-oauth-authz-24, 2019
Policy administration control and delegation using xacml and delegent
L Seitz, E Rissanen, T Sandholm, BS Firozabadi, O Mulmo
The 6th IEEE/ACM International Workshop on Grid Computing, 2005., 6 pp., 2005
Key management for encrypted data storage in distributed systems
L Seitz, JM Pierson, L Brunie
Second IEEE International Security in Storage Workshop, 20-20, 2003
Use Cases for Authentication and Authorization in Constrained Environments
L Seitz, S Gerdes, G Selander, M Mani, S Kumar, 2016
New paradigms for access control in constrained environments
A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar
2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014
Semantic access control for medical applications in grid environments
L Seitz, JM Pierson, L Brunie
European Conference on Parallel Processing, 374-383, 2003
Encrypted storage of medical data on a grid
L Seitz, JM Pierson, L Brunie
Methods of Information in Medicine 44 (02), 198-201, 2005
Authentication and Authorisation Prototype on the μgrid for Medical Data Management.
L Seitz, J Montagnat, JM Pierson, D Oriol, D Lingrand
HealthGrid, 222-233, 2005
An architecture for authorization in constrained environments
S Gerdes, L Seitz, G Selander, C Bormann
IETF, Internet-Draft draft-ietf-ace-actors-03, 2016
Secure Session for a Group of Network Nodes
C Gehrmann, O Ohlsson, L Seitz
US Patent App. 14/413,276, 2012
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
M Tiloca, C Gehrmann, L Seitz
International Journal of Information Security 16 (2), 173-193, 2017
Metadata for efficient, secure and extensible access to data in a medical grid
JM Pierson, L Seitz, H Duque, J Montagnat
Proceedings. 15th International Workshop on Database and Expert Systems …, 2004
Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace)
S Gerdes, O Bergmann, C Bormann, G Selander, L Seitz
Internet Engineering Task Force, Internet-Draft draft-ietf-acedtls-authorize-03, 2018
Safe Distributed Architecture for Image-based Computer Assisted Diagnosis
S Varette, JL Roch, J Montagnat, L Seitz, JM Pierson, F Leprévost
Workshop on Health Pervasive Systems, 1-10, 2006
Secure communication for ad-hoc, federated groups
A Sjöholm, L Seitz, B Sadighi
Proceedings of the 7th symposium on Identity and trust on the Internet, 48-58, 2008
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20