Ludwig Seitz
Ludwig Seitz
Combitech AB
Verified email at
Cited by
Cited by
Object security for constrained restful environments (oscore)
G Selander, J Mattsson, F Palombini, L Seitz
Authorization framework for the internet-of-things
L Seitz, G Selander, C Gehrmann
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
Access control system and method for operating said system
B Sadighi, L Cao, L Seitz
US Patent 8,482,378, 2013
S3K: Scalable security with symmetric keys—DTLS key establishment for the Internet of Things
S Raza, L Seitz, D Sitenkov, G Selander
IEEE Transactions on Automation Science and Engineering 13 (3), 1270-1280, 2016
Authentication and authorization for constrained environments (ACE) using the OAuth 2.0 framework (ACE-OAuth)
L Seitz, G Selander, E Wahlstroem, S Erdtman, H Tschofenig
Internet Engineering Task Force, Internet-Draft draft-ietf-ace-oauth-authz-16, 2018
Medical images simulation, storage, and processing on the european datagrid testbed
J Montagnat, F Bellet, H Benoit-Cattin, V Breton, L Brunie, H Duque, ...
Journal of Grid Computing 2, 387-400, 2004
Policy administration control and delegation using xacml and delegent
L Seitz, E Rissanen, T Sandholm, BS Firozabadi, O Mulmo
The 6th IEEE/ACM International Workshop on Grid Computing, 2005., 6 pp., 2005
Use cases for authentication and authorization in constrained environments
L Seitz, S Gerdes, G Selander, M Mani, S Kumar
Key management for encrypted data storage in distributed systems
L Seitz, JM Pierson, L Brunie
Second IEEE International Security in Storage Workshop, 20-20, 2003
New paradigms for access control in constrained environments
A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar
2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014
Semantic access control for medical applications in grid environments
L Seitz, JM Pierson, L Brunie
Lecture notes in computer science, 374-383, 2003
Secure session for a group of network nodes
C Gehrmann, O Ohlsson, L Seitz
US Patent 9,705,856, 2017
Encrypted storage of medical data on a grid
L Seitz, JM Pierson, L Brunie
Methods of Information in Medicine 44 (02), 198-201, 2005
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
M Tiloca, C Gehrmann, L Seitz
International Journal of Information Security 16 (2), 173-193, 2017
Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace)
S Gerdes, O Bergmann, C Bormann, G Selander, L Seitz
Internet Engineering Task Force, Internet-Draft draft-ietf-acedtls-authorize-03, 2018
An architecture for authorization in constrained environments
S Gerdes, L Seitz, G Selander, C Bormann
IETF Draft, October 22, 2018
Metadata for efficient, secure and extensible access to data in a medical grid
JM Pierson, L Seitz, H Duque, J Montagnat
Proceedings. 15th International Workshop on Database and Expert Systems …, 2004
Authentication and Authorisation Prototype on the μgrid for Medical Data Management.
L Seitz, J Montagnat, JM Pierson, D Oriol, D Lingrand
HealthGrid, 222-233, 2005
Evaluating the performance of the OSCORE security protocol in constrained IoT environments
M Gunnarsson, J Brorsson, F Palombini, L Seitz, M Tiloca
Internet of Things 13, 100333, 2021
Requirements for coap end-to-end security
G Selander, F Palombini, K Hartke
IETF draft, July 6, 2016
The system can't perform the operation now. Try again later.
Articles 1–20