Karsten Sohr

780 total citations
44 papers, 352 citations indexed

About

Karsten Sohr is a scholar working on Artificial Intelligence, Sociology and Political Science and Information Systems. According to data from OpenAlex, Karsten Sohr has authored 44 papers receiving a total of 352 indexed citations (citations by other indexed papers that have themselves been cited), including 30 papers in Artificial Intelligence, 25 papers in Sociology and Political Science and 21 papers in Information Systems. Recurrent topics in Karsten Sohr's work include Security and Verification in Computing (22 papers), Access Control and Trust (19 papers) and Advanced Malware Detection Techniques (14 papers). Karsten Sohr is often cited by papers focused on Security and Verification in Computing (22 papers), Access Control and Trust (19 papers) and Advanced Malware Detection Techniques (14 papers). Karsten Sohr collaborates with scholars based in Germany and United States. Karsten Sohr's co-authors include Gail‐Joon Ahn, Martin Gogolla, Andreas Schaad, Bernhard Berger, Mirco Kuhlmann, Rainer Koschke, Rainer Malaka, Till Mossakowski, Carsten Bormann and Hongxin Hu and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Knowledge and Data Engineering and Information and Software Technology.

In The Last Decade

Karsten Sohr

38 papers receiving 328 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Karsten Sohr Germany 11 206 196 178 74 63 44 352
Torsten Lodderstedt Switzerland 5 210 1.0× 225 1.1× 308 1.7× 89 1.2× 94 1.5× 8 417
Jürgen Doser Switzerland 5 243 1.2× 266 1.4× 345 1.9× 100 1.4× 113 1.8× 7 494
Mary Ellen Zurko United States 10 294 1.4× 374 1.9× 306 1.7× 165 2.2× 35 0.6× 23 594
Frédéric Cuppens France 9 178 0.9× 162 0.8× 107 0.6× 114 1.5× 20 0.3× 35 275
Steven A. Demurjian United States 12 155 0.8× 241 1.2× 217 1.2× 171 2.3× 15 0.2× 73 431
Bart De Win Belgium 10 68 0.3× 242 1.2× 324 1.8× 112 1.5× 23 0.4× 48 429
Jeffrey Voas United States 5 175 0.8× 253 1.3× 225 1.3× 100 1.4× 12 0.2× 7 385
Bob Blakley United States 6 71 0.3× 99 0.5× 207 1.2× 121 1.6× 30 0.5× 18 298
Rob Ennals United States 7 57 0.3× 217 1.1× 142 0.8× 166 2.2× 10 0.2× 9 376
Luca Verderame Italy 11 58 0.3× 97 0.5× 230 1.3× 120 1.6× 22 0.3× 34 366

Countries citing papers authored by Karsten Sohr

Since Specialization
Citations

This map shows the geographic impact of Karsten Sohr's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Karsten Sohr with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Karsten Sohr more than expected).

Fields of papers citing papers by Karsten Sohr

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Karsten Sohr. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Karsten Sohr. The network helps show where Karsten Sohr may publish in the future.

Co-authorship network of co-authors of Karsten Sohr

This figure shows the co-authorship network connecting the top 25 collaborators of Karsten Sohr. A scholar is included among the top collaborators of Karsten Sohr based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Karsten Sohr. Karsten Sohr is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Wolff, Alexander, et al.. (2022). It’s Long and Complicated! Enhancing One-Pager Privacy Policies in Smart Home Applications. 1–13. 5 indexed citations
3.
Berger, Bernhard, et al.. (2021). [Engineering] eNYPD—Entry Points Detector Jakarta Server Faces Use Case. 30–35. 1 indexed citations
4.
Sohr, Karsten, et al.. (2020). Praktische Erfahrungen und Ansätze für âSecurity by Design‘ auf Basis der STRIDE-Methodik. Datenschutz und Datensicherheit - DuD. 44(11). 750–754. 1 indexed citations
5.
Sohr, Karsten, et al.. (2020). Modeling and Validating Role-Based Authorization Policies for a Port Communication System with UML and OCL.. The Journal of Object Technology. 19(3). 3:1–3:1. 4 indexed citations
6.
Wenig, Dirk, et al.. (2019). What Could Go Wrong?. 805–812. 10 indexed citations
7.
Sohr, Karsten, et al.. (2016). Integrating UML/OCL Derived Properties into Validation and Verification Processes.. 89–104. 1 indexed citations
8.
Gogolla, Martin, et al.. (2013). UML/OCL based Design and Analysis of Role-Based Access Control Policies.. 33–42. 1 indexed citations
9.
Sohr, Karsten, et al.. (2012). Organizing Security Patterns Related to Security and Pattern Recognition Requirements. 5. 46–67. 17 indexed citations
10.
Sohr, Karsten, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu, & Gail‐Joon Ahn. (2012). Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL. Information and Software Technology. 54(12). 1396–1417. 11 indexed citations
11.
Sohr, Karsten, et al.. (2011). Software security aspects of Java-based mobile phones. 1494–1501. 6 indexed citations
12.
Sohr, Karsten, et al.. (2010). Towards formal specification and verification of a role-based authorization engine using JML. 50–57. 2 indexed citations
13.
Memon, Mohsin Ali, Manzoor Ahmed Hashmani, & Karsten Sohr. (2010). Validation of Temporary Delegation and Revocation of Roles with UML and OCL. International Journal of Computer Theory and Engineering. 6–11.
14.
Sohr, Karsten, et al.. (2008). Analyzing and Managing Role-Based Access Control Policies. IEEE Transactions on Knowledge and Data Engineering. 20(7). 924–939. 44 indexed citations
15.
Sohr, Karsten, et al.. (2008). Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. 257–266. 19 indexed citations
16.
Hollstein, Thomas, et al.. (2007). Security challenges for RFID key applications. Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft). 1–12. 1 indexed citations
17.
Schaad, Andreas, et al.. (2006). A model-checking approach to analysing organisational controls in a loan origination process. 139–139. 57 indexed citations
18.
Sohr, Karsten, et al.. (2004). A first step towards formal verification of security policy properties for RBAC. 60–67. 15 indexed citations
19.
Sohr, Karsten, et al.. (2004). A first step towards formal verification of security policy properties for RBAC. 60–67. 7 indexed citations
20.
Mossakowski, Till, et al.. (2004). A temporal-logic extension of role-based access control covering dynamic separation of duties. 83–90. 14 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026