Conrad Rudolph

Learn More
In today's software development process, security related design decisions are rarely made early in the overall process. Even if security is considered early, this means that in most cases a more-or-less encompassing security requirement analyses is made; Based on this analysis best-practices, ad-hoc design decisions or individual expertise is used to(More)
We present a work that explores the feasibility of automated face recognition technologies for analyzing identities in works of portraiture, and in the process provide additional evidence to settle some long-standing questions in art history. Works of portrait art bear the mark of visual interpretation of the artist. Moreover, the number of samples(More)
This article explores the feasibility of face-recognition technologies for analyzing works of portraiture and, in the process, provides a quantitative source of evidence to art historians in answering many of their ambiguities concerning identity of the subject in some portraits and in understanding artists? styles. Works of portrait art bear the mark of(More)
Renaissance portraits were depictions of some important royals of those times. Analysis of faces in these portraits can provide valuable dynastical information in addition to enriching personal details of the depicted sitter. Such studies can offer insights to the art-history community in understanding and linking personal histories. In particular, face(More)
In this work, we explore the feasibility of face recognition technologies for analyzing works of portraiture, and in the process provide a quantitative source of evidence to art historians in answering many of their ambiguities concerning identity of the subject in some portraits and in understanding artists’ styles. Works of portrait art bear the mark of(More)
Security by Design and Secure Engineering are among the most pressing challenges in IT Security research and practice. Increased attacker potential and dependence on IT-Systems in economy and in critical infrastructures cause a higher demand in securely engineered systems and thus in new approaches and methodologies. This paper introduces a consistent(More)
  • 1