Publications and Patents
by Stephen D. Wolthusen

Copyright Notice

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.


 

Information on books I authored or co-authored is provided on a separate page.
 


Book Chapters

1
WOLTHUSEN, S. D.
Netzwerksicherheit
In Trendkompass Electronic Business - IT-Innovationen & neue Prozesse im Unternehmenseinsatz.
Galileo Press, Bonn, Germany, 2004.

2
WOLTHUSEN, S. D.
Grundschutz für Praxis-Systeme.
In Jäckel, A., Ed.: Telemedizinführer Deutschland.
Deutsches Medizin Forum, Ober Mörlen, Germany, 2004.

3
BUSCH, C., AND WOLTHUSEN, S.
IT-Sicherheit für den Mittelstand: Leitfaden zum Thema IT-Sicherheit.
No. 38 in Schriftenreihe der Landesinitiative hessen-media. Hessisches Ministerium für Wirtschaft, Verkehr und Landesentwicklung, Sept. 2002, ch. IT-Sicherheit - wie geht das?, pp. 9-34.

Edited Volumes

1
COLE, J. L., AND WOLTHUSEN, S. D., Eds.
Proceedings of the Fourth IEEE International Workshop on Information Assurance (IWIA 2006) (Royal Holloway, UK, Apr. 2005), IEEE Press.

2
HÄMMERLI, B. M., AND WOLTHUSEN, S. D., Eds.
Proceedings of CIP Europe: Critical Infrastructure Protection (CIP Europe 2005) (Bonn, Germany, Sep. 2005), Gesellschaft für Informatik.

3
HÄMMERLI, B. M., AND WOLTHUSEN, S. D., Eds.
Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005) (Darmstadt, Germany, Nov. 2005), IEEE Press.

4
COLE, J. L., AND WOLTHUSEN, S. D., Eds.
Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA 2005) (Washington D.C., USA, Mar. 2005), IEEE Press.

5
COLE, J. L., ZHENG, Y., ANDWOLTHUSEN, S. D., Eds.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA 2004) (Charlotte, NC, USA, Apr. 2004), IEEE Press.

6
COLE, J. L., AND WOLTHUSEN, S. D., Eds.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA 2003) (Darmstadt, Germany, Mar. 2003), IEEE Press.

Refereed Publications

Where possible and permitted, electronic versions are provided. Please ensure that your use of any such materials is in compliance with copyright and all other regulations in all applicable jurisdictions.

1
WOLTHUSEN, S.
Vertrauenswürdige Protokollierung mittels nicht-deterministischer nebenläufiger wechselseitiger Überwachung.
Datenschutz und Datensicherheit, 10 (2007), pp. 740-743.
PDF

2
SVENDSEN, N. K., AND WOLTHUSEN, S.
An Analysis of Cyclical Interdependencies in Critical Infrastructures.
In Proceedings of the 2nd International Workshop on Critical Information Infrastructures Security (Malaga, Spain, Oct. 2007). Springer-Verlag.
PDF
(in press).

3
SVENDSEN, N. K., AND WOLTHUSEN, S.
A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures.
In Proceedings of the 2nd International Workshop on Critical Information Infrastructures Security (Malaga, Spain, Oct. 2007). Springer-Verlag.
PDF
(in press).

4
REIDT, S., AND WOLTHUSEN, S.
Efficient Trust Authority Distribution in Tactical MANET Environments.
In Proceedings of the IEEE Military Communications Conference 2007 (MILCOM 2007) (Orlando, FL, USA, Oct. 2007). IEEE Press.
PDF

5
SVENDSEN, N. K., AND WOLTHUSEN, S.
A Framework for Modelling Logical, Physical, and Geographic Dependencies between Critical Infrastructures.
In Proceedings of the Lund Energy Security Conference (Lund, Sweden, Sep. 2007).
(in press).

6
REIDT, S., AND WOLTHUSEN, S.
An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments
In Proceedings of the First Annual Conference of the ITA (ITA 2007) (College Park, MD, USA, Sep. 2007).
PDF

7
WU, M.-D., AND WOLTHUSEN, S.
Network Forensics of SSL/TLS Encrypted Channels
In Proceedings of the Sixth European Conference on Information Warfare and Security (Defence Academy of the United Kingdom, Shrivenham, UK, July 2007).
PDF

8
SVENDSEN, N. K., AND WOLTHUSEN, S.
Analysis and Statistical Properties of Critical Infrastructure Interdependency Multiflow Models
In Proceedings from the Eighth Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2007), IEEE Press, pp. 247-254.
PDF

9
REIDT, S., AND WOLTHUSEN, S.
Efficient Distribution of Trust Authority Functions in Tactical Networks
In Proceedings from the Eighth Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2007), IEEE Press, pp. 84-91.
PDF

10
SVENDSEN, N. K., AND WOLTHUSEN, S.
Graph Models of Critical Infrastructure Interdependencies.
In Inter-Domain Management, Proceedings of the First International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2007) (Oslo, Norway, Jun. 2007). A. K. Bandara and M. Burgess, Eds., vol. 4543 of Lecture Notes in Computer Science, Springer-Verlag, pp. 208-211.
PDF

11
WOLTHUSEN, S.
The Role of Mathematics in Information Security Education.
In Proceedings of the 5th IFIP TC 11.8 World Conference on Information Security Education (WISE 5) (West Point, NY, USA, Jun. 2007). Springer-Verlag, pp. 129-136.
PDF

12
SVENDSEN, N. K., AND WOLTHUSEN, S.
Connectivity Models of Interdependency in Mixed-Type Critical Infrastructure Networks
Information Security Technical Report 1 (2007), pp. 44-55.
PDF

13
SVENDSEN, N. K., AND WOLTHUSEN, S.
Multigraph Dependency Models for Heterogeneous Critical Infrastructures.
In Proceedings of the First Annual IFIP TC 11.10 International Conference on Critical Infrastructure Protection (Hanover, NH, USA, Mar. 2007). Springer-Verlag, pp. 337-350.
PDF

14
WOLTHUSEN, S.
Automated Extraction of Behavioural Profiles from Document Usage.
BT Technology Journal 25,1 (2007), pp. 192-200.
PDF

15
WOLTHUSEN, S.
Windows Device Interface Security
Information Security Technical Report 11 (2006), pp. 160-165.
PDF

16
HJELMÅS, E. AND WOLTHUSEN, S.
Full-Spectrum Information Security Education: Integrating B.Sc., M.Sc., and Ph.D. Programs
In Proceedings of the 3rd Annual Conference on Information Security Curriculum Development (Kennesaw, GA, USA, Sep. 2006), ACM Press.
PDF

17
WOLTHUSEN, S.
Secure Visualization of GIS Data
In Proceedings from the Seventh Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2006), IEEE Press, pp. 200-207.
PDF

18
WIEHE, A. , HJELMÅS, E. AND WOLTHUSEN, S.
Quantitative Analysis of Efficient Antispam Techniques
In Proceedings from the Seventh Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2006), IEEE Press, pp. 163-169.
PDF

19
WOLTHUSEN, S.
Revisionssichere Protokollierung in Standardbetriebssystemen
Datenschutz und Datensicherheit, 5 (2006), pp. 281-284.
PDF

20
WOLTHUSEN, S.
Risikomanagement, Sicherheitspolitiken und technische Verfahren zur Durchsetzung von Sicherheitspolitiken (II)
IT-Sicherheit & Datenschutz 4 (2006), pp. 349-352
PDF

21
WOLTHUSEN, S.
Risikomanagement, Sicherheitspolitiken und technische Verfahren zur Durchsetzung von Sicherheitspolitiken (I)
IT-Sicherheit & Datenschutz 4 (2006), pp. 319-321
PDF

22
DAHL, O. M. AND WOLTHUSEN, S.
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
In Proceedings of the Fourth IEEE International Workshop on Information Assurance (Royal Holloway, UK, Apr. 2006), pp. 157-168, IEEE Press.
PDF

23
GRAF, F. AND WOLTHUSEN, S.
A Capability-Based Transparent Cryptographic File System
In Proceedings of CYBERWORLDS 2005 (Singapore, Nov. 2005), pp. 101-108. IEEE Press.
PDF   PostScript

24
WOLTHUSEN, S.
GIS-based Command and Control Infrastructure for Critical Infrastructure Protection
In Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005) (Darmstadt, Germany, Nov. 2005), pp. 40--47. IEEE Press.
PDF   PostScript

25
WOLTHUSEN, S.
Molehunt: Near-line Semantic Activity Tracking
In Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2005), IEEE Press, pp. 410-418.
PDF   PostScript

26
WOLTHUSEN, S.
Trustworthiness in Security Policy Mechanisms for Network-Centric Warfare Environments
In Proceedings of the NATO RTO Workshop on Information Security for Network Enabled Capabilities (The Hague, The Netherlands, April 2005). (not available online due to security restrictions).

27
LIKAVEC, J. AND WOLTHUSEN, S.
Enforcing Messaging Security Policies
In Proceedings of the Third IEEE International Workshop on Information Assurance (Washington D.C., USA, Mar. 2005), IEEE Press, pp. 131-138.
PDF   PostScript

28
WOLTHUSEN, S.
Defensive Information Warfare and the Protection of Critical Infrastructures
In Proceedings of the XVI International Amaldi Conference of Academies of Science and National Scientific Societies on Problems of Global Security (Trieste, Italy, Nov. 2004), Accademia dei Lincei.

29
WOLTHUSEN, S.
Modeling Critical Infrastructure Requirements.
In Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2004), IEEE Press, pp. 101-108.
PDF   PostScript

30
WOLTHUSEN, S.
Self-Inflicted Vulnerabilities
Naval War College Review LVII,3/4 (2004), pp. 102-113.
PDF   PostScript

31
WOLTHUSEN, S.
Tempering Network Stacks
In Proceedings of the NATO RTO Symposium on Adaptive Defence in Unclassified Networks (Toulouse, France, April 2004), NATO Research and Technology Organization.
PDF   PostScript

32
BUSCH, C., AND WOLTHUSEN, S. D.
Information Warfare: Threats to Critical Infrastructures.
In Proceedings of the XV International Amaldi Conference of Academies of Science and National Scientific Societies on Problems of Global Security (Helsinki, Finland, Sept. 2003).
PDF   PostScript

33
WOLTHUSEN, S. D.
Goalkeeper: Close-In Interface Protection.
In Proceedings 19th Annual Computer Security Applications Conference (ACSAC'03) (Las Vegas, NV, USA, Dec. 2003), IEEE Press, pp. 334-341.
PDF   PostScript

34
WOLTHUSEN, S.
A Distributed Multipurpose Mail Guard.
In Proceedings from the Fourth Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2003), IEEE Press, pp. 258-265.
PDF   PostScript

35
WOLTHUSEN, S. D., AND PREDIGER, F.
ReEncryption -- Das Konzept für den umfassenden Dokumentenschutz.
In D-A-CH Security: Bestandsaufnahme und Perspektiven. Gemeinsame Arbeitskonferenz GI $\cdot$ OCG $\cdot$ BITKOM $\cdot$ SI $\cdot$ TeleTrusT (Erfurt, Germany, Mar. 2003), Kluwer Academic Publishers, pp. 273-284.
PDF   PostScript

36
WOLTHUSEN, S.
Distributed Intrusion Detection for Policy-Controlled Heterogeneous Environments.
In Proceedings from the Third Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2002), IEEE Press, pp. 255-262.
PDF   PostScript

37
WOLTHUSEN, S.
Embedding Policy-Controlled ID Sensors within Host Operating System Security Enforcement Components for Real Time Monitoring.
In Proceedings of the NATO RTO Symposium on Real Time Intrusion Detection Symposium (RTID) (Estoril, Portugal, May 2002), NATO Research and Technology Organization.
Publication RTO-MP-101.
PDF   PostScript

38
BUSCH, C., AND WOLTHUSEN, S.
Sensitivity Labels and Invisible Identification Markings in Human-Readable Output.
In Proceedings of Electronic Imaging 2002 (San Jose, CA, USA, Jan. 2002), The International Society for Optical Engineering (SPIE), pp. 149-157.
PDF   PostScript

39
WOLTHUSEN, S.
Access and Use Control using Externally Controlled Reference Monitors.
ACM Operating Systems Review 36, 1 (2002), 58-69.
PDF   PostScript

40
WOLTHUSEN, S.
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family.
In Proceedings 17th Annual Computer Security Applications Conference (ACSAC'01) (New Orleans, LA, USA, Dec. 2001), IEEE Press, pp. 55-63.
PDF   PostScript

41
BUSCH, C., AND WOLTHUSEN, S.
Tracing Data Diffusion in Industrial Research with Robust Watermarking.
In Proceedings of the 2001 Fourth Workshop on Multimedia Signal Processing (MMSP'01) (Cannes, France, Oct. 2001), J.-L. Dugelay and K. Rose, Eds., IEEE Press, pp. 207-212.
PDF   PostScript

42
WOLTHUSEN, S.
Layered Multipoint Network Defense and Security Policy Enforcement.
In Proceedings from the Second Annual IEEE SMC Information Assurance Workshop, United States Military Academy (West Point, NY, USA, June 2001), IEEE Press, pp. 100-108.
PDF   PostScript

43
RADEMER, E., AND WOLTHUSEN, S.
Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.
In Communications and Multimedia Security Issues of the New Century: Proceedings of the IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) (Darmstadt, Germany, May 2001), R. Steinmetz, J. Dittman, and M. Steinebach, Eds., IFIP, Kluwer Academic Publishers, pp. 213-226.
PDF   PostScript

44
BUSCH, C., RADEMER, E., SCHMUCKER, M., AND WOLTHUSEN, S.
Concepts for a watermarking technique for music scores.
In Proceedings of the Visual 2000 3rd International Conference on Visual Computing (Mexico City, Mexico, Sept. 2000).
PDF   PostScript

45
BUSCH, C., GRAF, F., WOLTHUSEN, S., AND ZEIDLER, A.
A system for intellectual property protection.
In Proceedings of the World Multiconference on Systemics, Cybernetics, and Informatics (SCI 2000) Int'l Conf. on Information Systems Analysis and Synthesis (ISAS 2000) (Orlando, FL, USA, July 2000), pp. 225-230.
PDF   PostScript

46
BUSCH, C., GRAF, F., AND WOLTHUSEN, S.
Courseware needs security.
In Proceedings of ICCE, 7th International Conference on Computers in Education (Chiba, Japan, Nov. 1999).
PDF   PostScript

47
BUSCH, C., FUNK, W., AND WOLTHUSEN, S.
Digital Watermarking: From Concepts to Real-Time Video Applications.
IEEE Computer Graphics and Applications 19, 1 (Jan.Feb. 1999), 25-35.
PDF   PostScript

48
WOLTHUSEN, S.
On the limitations of digital watermarks.
In Proceedings of the World Multiconference on Systemics, Cybernetics, and Informatics (SCI 98) Int'l Conf. on Information Systems Analysis and Synthesis (ISAS 98) (Orlando, FL, USA, July 1998).
PDF   PostScript

49
WOLTHUSEN, S.
Digital Watermarking: Ready for the Real World?
In Proceedings of IT '98 (Moscow, Russia, Feb. 1998), pp. 73-75.

Granted Patents

1
BUSCH, C., RADEMER, E. and WOLTHUSEN, S.
German Patent DE 100 58 175: Verfahren und Einrichtung zur automatischen Markierung von Ausdrucken einer Datenverarbeitungsanlage.
Priority: November 22nd, 2000. Granted: August 8th, 2002.

2
BUSCH, C., RADEMER, E. and WOLTHUSEN, S.
International Patent PCT/DE/01333: Method for Integrating Hidden Information in a Set of Notes.
Priority: May 15th, 2001. Granted: November 22nd, 2001.

3
WOLTHUSEN, S.
German Patent 10146361.8-53: Vorrichtung und Verfahren zur Etablierung einer Sicherheitspolitik in einem verteilten System.
Priority: September 20th, 2001. Granted: September 20th, 2006.

Miscellaneous Publications

1
WOLTHUSEN, S.
Sichere Geo-Webdienste
Business Geomatics, 2 (2006), 3.

2
WOLTHUSEN, S.
Information Sharing and Decision Support for C(I)IP
In Proceedings of CIP Europe: Critical Infrastructure Protection (Bonn, Germany, Sep. 2005), pp. 7--12. Gesellschaft für Informatik.
PDF

3
WOLTHUSEN, S.
Von der Patienten-Chip-Karte zur Health Professional Card.
Der Deutsche Dermatologe, 10 (Oct. 1999), 788-789.

4
WOLTHUSEN, S.
Sicherheitsfragen in der Informationstechnik.
Zeitschrift für Dermatologie, 188 (1999), 188-192.

5
WOLTHUSEN, S.
Sicherheit von Praxis-Systemen.
Der Deutsche Dermatologe, 9 (Sept. 1999), 687-692.

6
ENCARNAÇÃO, J. L., AND WOLTHUSEN, S.
Sicherheit in der Informationstechnik.
In Digitale Signaturen -- ihre Rolle im Rechts- und Geschäftsverkehr (1998), Deutsch-Japanischer Rat, pp. 74-96.
 
 

[ This Web Page is Lynx Friendly! ]

This page and all contents (unless otherwise noted) are Copyright © 2002-2008 by Stephen D. Wolthusen
All rights reserved.