BibTeX records: Günther Pernul

download as .bib file

@article{DBLP:journals/ijisec/EmplSSP24,
  author       = {Philip Empl and
                  Daniel Schlette and
                  Lukas St{\"{o}}ger and
                  G{\"{u}}nther Pernul},
  title        = {Generating {ICS} vulnerability playbooks with open standards},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {2},
  pages        = {1215--1230},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00760-5},
  doi          = {10.1007/S10207-023-00760-5},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/EmplSSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BaumerMP23,
  author       = {Thomas Baumer and
                  Mathis M{\"{u}}ller and
                  G{\"{u}}nther Pernul},
  title        = {System for Cross-Domain Identity Management {(SCIM):} Survey and Enhancement
                  With {RBAC}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {86872--86894},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3304270},
  doi          = {10.1109/ACCESS.2023.3304270},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BaumerMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GlasVRBP23,
  author       = {Magdalena Glas and
                  Manfred Vielberth and
                  Tobias Reittinger and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  title        = {Improving cybersecurity skill development through visual programming},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {316--330},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0170},
  doi          = {10.1108/ICS-11-2022-0170},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GlasVRBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/EmplP23,
  author       = {Philip Empl and
                  G{\"{u}}nther Pernul},
  title        = {Digital-Twin-Based Security Analytics for the Internet of Things},
  journal      = {Inf.},
  volume       = {14},
  number       = {2},
  pages        = {95},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14020095},
  doi          = {10.3390/INFO14020095},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/EmplP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/GlasVP23,
  author       = {Magdalena Glas and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {Train as you Fight: Evaluating Authentic Cybersecurity Training in
                  Cyber Ranges},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {622:1--622:19},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581046},
  doi          = {10.1145/3544548.3581046},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/GlasVP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/EmplHP23,
  author       = {Philip Empl and
                  Henric Hager and
                  G{\"{u}}nther Pernul},
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {Digital Twins for IoT Security Management},
  booktitle    = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  pages        = {141--149},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6\_9},
  doi          = {10.1007/978-3-031-37586-6\_9},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/EmplHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KernBFP23,
  author       = {Sascha Kern and
                  Thomas Baumer and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {Maintain High-Quality Access Control Policies: An Academic and Practice-Driven
                  Approach},
  booktitle    = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6\_14},
  doi          = {10.1007/978-3-031-37586-6\_14},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KernBFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/GlasBSP23,
  author       = {Magdalena Glas and
                  Fabian B{\"{o}}hm and
                  Falko Sch{\"{o}}nteich and
                  G{\"{u}}nther Pernul},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Cyber Range Exercises: Potentials and Open Challenges for Organizations},
  booktitle    = {Human Aspects of Information Security and Assurance - 17th {IFIP}
                  {WG} 11.12 International Symposium, {HAISA} 2023, Kent, UK, July 4-6,
                  2023, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {674},
  pages        = {24--35},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38530-8\_3},
  doi          = {10.1007/978-3-031-38530-8\_3},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/GlasBSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KernBGFP22,
  author       = {Sascha Kern and
                  Thomas Baumer and
                  Sebastian Groll and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Optimization of Access Control Policies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103301},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103301},
  doi          = {10.1016/J.JISA.2022.103301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KernBGFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/BohmVP22,
  author       = {Fabian B{\"{o}}hm and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  title        = {Formalizing and Integrating User Knowledge into Security Analytics},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {5},
  pages        = {347},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-022-01209-7},
  doi          = {10.1007/S42979-022-01209-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/BohmVP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/EmplSZP22,
  author       = {Philip Empl and
                  Daniel Schlette and
                  Daniel Zupfer and
                  G{\"{u}}nther Pernul},
  title        = {SOAR4IoT: Securing IoT Assets with Digital Twins},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3538975},
  doi          = {10.1145/3538969.3538975},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/EmplSZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PutzVP22,
  author       = {Benedikt Putz and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  title        = {{BISCUIT} - Blockchain Security Incident Reporting based on Human
                  Observations},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {27:1--27:6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3538984},
  doi          = {10.1145/3538969.3538984},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PutzVP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/DietzHHP22,
  author       = {Marietheres Dietz and
                  Leon Hageman and
                  Constantin von Hornung and
                  G{\"{u}}nther Pernul},
  editor       = {Maanak Gupta and
                  Sajad Khorsandroo and
                  Mahmoud Abdelsalam},
  title        = {Employing Digital Twins for Security-by-Design System Testing},
  booktitle    = {Sat-CPS@CODASPY 2022: Proceedings of the 2022 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April
                  2022},
  pages        = {97--106},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510547.3517929},
  doi          = {10.1145/3510547.3517929},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/DietzHHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/DietzSP22,
  author       = {Marietheres Dietz and
                  Daniel Schlette and
                  G{\"{u}}nther Pernul},
  editor       = {Hong Va Leong and
                  Sahra Sedigh Sarvestani and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Hiroki Kashiwazaki and
                  Dave Towey and
                  Ji{-}Jiang Yang and
                  Hossain Shahriar},
  title        = {Harnessing Digital Twin Security Simulations for systematic Cyber
                  Threat Intelligence},
  booktitle    = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
                  {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
  pages        = {789--797},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMPSAC54236.2022.00129},
  doi          = {10.1109/COMPSAC54236.2022.00129},
  timestamp    = {Thu, 11 Aug 2022 16:32:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/DietzSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ReisserVFP22,
  author       = {Andreas Reisser and
                  Manfred Vielberth and
                  Sofia Fohringer and
                  G{\"{u}}nther Pernul},
  editor       = {Shamik Sural and
                  Haibing Lu},
  title        = {Security Operations Center Roles and Skills: {A} Comparison of Theory
                  and Practice},
  booktitle    = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13383},
  pages        = {316--327},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10684-2\_18},
  doi          = {10.1007/978-3-031-10684-2\_18},
  timestamp    = {Thu, 14 Jul 2022 17:34:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ReisserVFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/GlasVRBP22,
  author       = {Magdalena Glas and
                  Manfred Vielberth and
                  Tobias Reittinger and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Visual Programming in Cyber Range Training to Improve Skill Development},
  booktitle    = {Human Aspects of Information Security and Assurance - 16th {IFIP}
                  {WG} 11.12 International Symposium, {HAISA} 2022, Mytilene, Lesbos,
                  Greece, July 6-8, 2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {658},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-12172-2\_1},
  doi          = {10.1007/978-3-031-12172-2\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/haisa/GlasVRBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PutzP22,
  author       = {Benedikt Putz and
                  G{\"{u}}nther Pernul},
  title        = {Comparing Successful {DLT} Consortia: {A} Lifecycle Perspective},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/79896},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/PutzP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/FriedlGEBP22,
  author       = {Sabrina Friedl and
                  Magdalena Glas and
                  Ludwig Englbrecht and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  editor       = {Lynette Drevin and
                  Natalia G. Miloslavskaya and
                  Wai Sze Leung and
                  Sun{\'{e}} von Solms},
  title        = {ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics},
  booktitle    = {Information Security Education - Adapting to the Fourth Industrial
                  Revolution - 15th {IFIP} {WG} 11.8 World Conference, {WISE} 2022,
                  Copenhagen, Denmark, June 13-15, 2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {650},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-08172-9\_6},
  doi          = {10.1007/978-3-031-08172-9\_6},
  timestamp    = {Thu, 25 Aug 2022 08:14:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/FriedlGEBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ubisec/FriedlEBP22,
  author       = {Sabrina Friedl and
                  Ludwig Englbrecht and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  editor       = {Guojun Wang and
                  Kim{-}Kwang Raymond Choo and
                  Jie Wu and
                  Ernesto Damiani},
  title        = {Support Tool Selection in Digital Forensics Training},
  booktitle    = {Ubiquitous Security - Second International Conference, UbiSec 2022,
                  Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1768},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-99-0272-9\_1},
  doi          = {10.1007/978-981-99-0272-9\_1},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ubisec/FriedlEBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengesLVSPTKPFR21,
  author       = {Florian Menges and
                  Tobias Latzo and
                  Manfred Vielberth and
                  Sabine Sobola and
                  Henrich C. P{\"{o}}hls and
                  Benjamin Taubmann and
                  Johannes K{\"{o}}stler and
                  Alexander Puchta and
                  Felix C. Freiling and
                  Hans P. Reiser and
                  G{\"{u}}nther Pernul},
  title        = {Towards GDPR-compliant data processing in modern {SIEM} systems},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102165},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102165},
  doi          = {10.1016/J.COSE.2020.102165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MengesLVSPTKPFR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchletteVP21,
  author       = {Daniel Schlette and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  title        = {{CTI-SOC2M2} - The quest for mature, intelligence-driven security
                  operations and incident response capabilities},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102482},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102482},
  doi          = {10.1016/J.COSE.2021.102482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchletteVP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/SchletteCP21,
  author       = {Daniel Schlette and
                  Marco Caselli and
                  G{\"{u}}nther Pernul},
  title        = {A Comparative Study on Cyber Threat Intelligence: The Security Incident
                  Response Perspective},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {23},
  number       = {4},
  pages        = {2525--2556},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMST.2021.3117338},
  doi          = {10.1109/COMST.2021.3117338},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/SchletteCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SchletteBCP21,
  author       = {Daniel Schlette and
                  Fabian B{\"{o}}hm and
                  Marco Caselli and
                  G{\"{u}}nther Pernul},
  title        = {Measuring and visualizing cyber threat intelligence quality},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {1},
  pages        = {21--38},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00490-y},
  doi          = {10.1007/S10207-020-00490-Y},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SchletteBCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MengesPP21,
  author       = {Florian Menges and
                  Benedikt Putz and
                  G{\"{u}}nther Pernul},
  title        = {{DEALER:} decentralized incentives for threat intelligence reporting
                  and exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {5},
  pages        = {741--761},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00528-1},
  doi          = {10.1007/S10207-020-00528-1},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/MengesPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/VielberthEP21,
  author       = {Manfred Vielberth and
                  Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  title        = {Improving data quality for human-as-a-security-sensor. {A} process
                  driven quality improvement approach for user-provided incident information},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {332--349},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-06-2020-0100},
  doi          = {10.1108/ICS-06-2020-0100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/VielberthEP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/PutzDEP21,
  author       = {Benedikt Putz and
                  Marietheres Dietz and
                  Philip Empl and
                  G{\"{u}}nther Pernul},
  title        = {EtherTwin: Blockchain-based Secure Digital Twin Information Management},
  journal      = {Inf. Process. Manag.},
  volume       = {58},
  number       = {1},
  pages        = {102425},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ipm.2020.102425},
  doi          = {10.1016/J.IPM.2020.102425},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/PutzDEP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/EnglbrechtP21,
  author       = {Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  title        = {A Combined Approach for a Privacy-Aware Digital Forensic Investigation
                  in Enterprises},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {27--64},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1012},
  doi          = {10.13052/JCSM2245-1439.1012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/EnglbrechtP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/BohmDPP21,
  author       = {Fabian B{\"{o}}hm and
                  Marietheres Dietz and
                  Tobias Preindl and
                  G{\"{u}}nther Pernul},
  title        = {Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives
                  for Cybersecurity},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {519--538},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030026},
  doi          = {10.3390/JCP1030026},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/BohmDPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/EmplP21,
  author       = {Philip Empl and
                  G{\"{u}}nther Pernul},
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sudip Mittal},
  title        = {A Flexible Security Analytics Service for the Industrial IoT},
  booktitle    = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April
                  28, 2021},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3445969.3450427},
  doi          = {10.1145/3445969.3450427},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/EmplP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VielberthGDKMP21,
  author       = {Manfred Vielberth and
                  Magdalena Glas and
                  Marietheres Dietz and
                  Stylianos Karagiannis and
                  Emmanouil Magkos and
                  G{\"{u}}nther Pernul},
  editor       = {Ken Barker and
                  Kambiz Ghazinour},
  title        = {A Digital Twin-Based Cyber Range for {SOC} Analysts},
  booktitle    = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12840},
  pages        = {293--311},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81242-3\_17},
  doi          = {10.1007/978-3-030-81242-3\_17},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VielberthGDKMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BohmVP21,
  author       = {Fabian B{\"{o}}hm and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Bridging Knowledge Gaps in Security Analytics},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {98--108},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010225400980108},
  doi          = {10.5220/0010225400980108},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BohmVP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PuchtaGP21,
  author       = {Alexander Puchta and
                  Sebastian Groll and
                  G{\"{u}}nther Pernul},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Leveraging Dynamic Information for Identity and Access Management:
                  An Extension of Current Enterprise {IAM} Architecture},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {611--618},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010315706110618},
  doi          = {10.5220/0010315706110618},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PuchtaGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/DietzEP21,
  author       = {Marietheres Dietz and
                  Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Enhancing Industrial Control System Forensics Using Replication-Based
                  Digital Twins},
  booktitle    = {Advances in Digital Forensics {XVII} - 17th {IFIP} {WG} 11.9 International
                  Conference, Virtual Event, February 1-2, 2021, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {612},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88381-2\_2},
  doi          = {10.1007/978-3-030-88381-2\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/DietzEP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PutzBP21,
  author       = {Benedikt Putz and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  editor       = {Audun J{\o}sang and
                  Lynn Futcher and
                  Janne Merete Hagen},
  title        = {HyperSec: Visual Analytics for Blockchain Security Monitoring},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 36th {IFIP} {TC} 11
                  International Conference, {SEC} 2021, Oslo, Norway, June 22-24, 2021,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {625},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78120-0\_11},
  doi          = {10.1007/978-3-030-78120-0\_11},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PutzBP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/GrollKFP21,
  author       = {Sebastian Groll and
                  Sascha Kern and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Monitoring Access Reviews by Crowd Labelling},
  booktitle    = {Trust, Privacy and Security in Digital Business - 18th International
                  Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12927},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86586-3\_1},
  doi          = {10.1007/978-3-030-86586-3\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/GrollKFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BohmEFP21,
  author       = {Fabian B{\"{o}}hm and
                  Ludwig Englbrecht and
                  Sabrina Friedl and
                  G{\"{u}}nther Pernul},
  title        = {Visual Decision-Support for Live Digital Forensics},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {58--67},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00012},
  doi          = {10.1109/VIZSEC53666.2021.00012},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/BohmEFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14414,
  author       = {Benedikt Putz and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  title        = {HyperSec: Visual Analytics for blockchain security monitoring},
  journal      = {CoRR},
  volume       = {abs/2103.14414},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14414},
  eprinttype    = {arXiv},
  eprint       = {2103.14414},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14414.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/VielberthBFP20,
  author       = {Manfred Vielberth and
                  Fabian B{\"{o}}hm and
                  Ines Fichtinger and
                  G{\"{u}}nther Pernul},
  title        = {Security Operations Center: {A} Systematic Study and Open Challenges},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {227756--227779},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3045514},
  doi          = {10.1109/ACCESS.2020.3045514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/VielberthBFP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/DietzP20,
  author       = {Marietheres Dietz and
                  G{\"{u}}nther Pernul},
  title        = {Digital Twin: Empowering Enterprises Towards a System-of-Systems Approach},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {62},
  number       = {2},
  pages        = {179--184},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12599-019-00624-0},
  doi          = {10.1007/S12599-019-00624-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bise/DietzP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecr/RichthammerP20,
  author       = {Christian Richthammer and
                  G{\"{u}}nther Pernul},
  title        = {Situation awareness for recommender systems},
  journal      = {Electron. Commer. Res.},
  volume       = {20},
  number       = {4},
  pages        = {783--806},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10660-018-9321-z},
  doi          = {10.1007/S10660-018-9321-Z},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ecr/RichthammerP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DietzP20,
  author       = {Marietheres Dietz and
                  G{\"{u}}nther Pernul},
  title        = {Unleashing the Digital Twin's Potential for {ICS} Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {4},
  pages        = {20--27},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2019.2961650},
  doi          = {10.1109/MSEC.2019.2961650},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DietzP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/EnglbrechtMP20,
  author       = {Ludwig Englbrecht and
                  Stefan Meier and
                  G{\"{u}}nther Pernul},
  title        = {Towards a capability maturity model for digital forensic readiness},
  journal      = {Wirel. Networks},
  volume       = {26},
  number       = {7},
  pages        = {4895--4907},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11276-018-01920-5},
  doi          = {10.1007/S11276-018-01920-5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/EnglbrechtMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DietzVP20,
  author       = {Marietheres Dietz and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Integrating digital twin security simulations in the security operations
                  center},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {18:1--18:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3407039},
  doi          = {10.1145/3407023.3407039},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DietzVP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/EnglbrechtP20,
  author       = {Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {A privacy-aware digital forensics investigation in enterprises},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {58:1--58:10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3407064},
  doi          = {10.1145/3407023.3407064},
  timestamp    = {Mon, 03 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/EnglbrechtP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/PutzP20,
  author       = {Benedikt Putz and
                  G{\"{u}}nther Pernul},
  title        = {Detecting Blockchain Security Threats},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes,
                  Greece, November 2-6, 2020},
  pages        = {313--320},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/Blockchain50366.2020.00046},
  doi          = {10.1109/BLOCKCHAIN50366.2020.00046},
  timestamp    = {Fri, 30 Apr 2021 12:35:39 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/PutzP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SchletteMBP20,
  author       = {Daniel Schlette and
                  Florian Menges and
                  Thomas Baumer and
                  G{\"{u}}nther Pernul},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Security Enumerations for Cyber-Physical Systems},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {64--76},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_4},
  doi          = {10.1007/978-3-030-49669-2\_4},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SchletteMBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BohmEP20,
  author       = {Fabian B{\"{o}}hm and
                  Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Designing a Decision-Support Visualization for Live Digital Forensic
                  Investigations},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {223--240},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_13},
  doi          = {10.1007/978-3-030-49669-2\_13},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BohmEP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8-1/EnglbrechtSP20,
  author       = {Ludwig Englbrecht and
                  Stefan Sch{\"{o}}nig and
                  G{\"{u}}nther Pernul},
  editor       = {Janis Grabis and
                  Dominik Bork},
  title        = {Supporting Process Mining with Recovered Residual Data},
  booktitle    = {The Practice of Enterprise Modeling - 13th {IFIP} Working Conference,
                  PoEM 2020, Riga, Latvia, November 25-27, 2020, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {400},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63479-7\_27},
  doi          = {10.1007/978-3-030-63479-7\_27},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip8-1/EnglbrechtSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BelchiorPP0VG20,
  author       = {Rafael Belchior and
                  Benedikt Putz and
                  G{\"{u}}nther Pernul and
                  Miguel Correia and
                  Andr{\'{e}} Vasconcelos and
                  S{\'{e}}rgio Guerreiro},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {{SSIBAC:} Self-Sovereign Identity Based Access Control},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1935--1943},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00264},
  doi          = {10.1109/TRUSTCOM50675.2020.00264},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BelchiorPP0VG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/EnglbrechtP20,
  author       = {Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  editor       = {Lynette Drevin and
                  Sun{\'{e}} von Solms and
                  Marianthi Theocharidou},
  title        = {A Serious Game-Based Peer-Instruction Digital Forensics Workshop},
  booktitle    = {Information Security Education. Information Security in Action - 13th
                  {IFIP} {WG} 11.8 World Conference, {WISE} 13, Maribor, Slovenia, September
                  21-23, 2020, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {579},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59291-2\_9},
  doi          = {10.1007/978-3-030-59291-2\_9},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/EnglbrechtP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PutzMP19,
  author       = {Benedikt Putz and
                  Florian Menges and
                  G{\"{u}}nther Pernul},
  title        = {A secure and auditable logging infrastructure based on a permissioned
                  blockchain},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101602},
  doi          = {10.1016/J.COSE.2019.101602},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PutzMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/Vielberth19,
  author       = {Manfred Vielberth and
                  Florian Menges and
                  G{\"{u}}nther Pernul},
  title        = {Human-as-a-security-sensor for harvesting threat intelligence},
  journal      = {Cybersecur.},
  volume       = {2},
  number       = {1},
  pages        = {23},
  year         = {2019},
  url          = {https://doi.org/10.1186/s42400-019-0040-0},
  doi          = {10.1186/S42400-019-0040-0},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/Vielberth19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunzPGFP19,
  author       = {Michael Kunz and
                  Alexander Puchta and
                  Sebastian Groll and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Attribute quality management for dynamic identity and access management},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {64--79},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.004},
  doi          = {10.1016/J.JISA.2018.11.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KunzPGFP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/PutzP19,
  author       = {Benedikt Putz and
                  G{\"{u}}nther Pernul},
  title        = {Trust Factors and Insider Threats in Permissioned Distributed Ledgers
                  - An Analytical Study and Evaluation of Popular {DLT} Frameworks},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {42},
  pages        = {25--50},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-662-60531-8\_2},
  doi          = {10.1007/978-3-662-60531-8\_2},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/PutzP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/EnglbrechtLPQ19,
  author       = {Ludwig Englbrecht and
                  Gregor Langner and
                  G{\"{u}}nther Pernul and
                  Gerald Quirchmayr},
  title        = {Enhancing credibility of digital evidence through provenance-based
                  incident response handling},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {26:1--26:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339275},
  doi          = {10.1145/3339252.3339275},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/EnglbrechtLPQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PuchtaBP19,
  author       = {Alexander Puchta and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  editor       = {Simon N. Foley},
  title        = {Contributing to Current Challenges in Identity and Access Management
                  with Visual Analytics},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {221--239},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_12},
  doi          = {10.1007/978-3-030-22479-0\_12},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/PuchtaBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DietzPP19,
  author       = {Marietheres Dietz and
                  Benedikt Putz and
                  G{\"{u}}nther Pernul},
  editor       = {Simon N. Foley},
  title        = {A Distributed Ledger Approach to Digital Twin Secure Data Sharing},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {281--300},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_15},
  doi          = {10.1007/978-3-030-22479-0\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DietzPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/MengesSP19,
  author       = {Florian Menges and
                  Christine Sperl and
                  G{\"{u}}nther Pernul},
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Sokratis K. Katsikas and
                  Gabriele Anderst{-}Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Unifying Cyber Threat Intelligence},
  booktitle    = {Trust, Privacy and Security in Digital Business - 16th International
                  Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11711},
  pages        = {161--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27813-7\_11},
  doi          = {10.1007/978-3-030-27813-7\_11},
  timestamp    = {Tue, 29 Dec 2020 18:28:24 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/MengesSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/SangerP18,
  author       = {Johannes S{\"{a}}nger and
                  G{\"{u}}nther Pernul},
  title        = {Interactive Reputation Systems - How to Cope with Malicious Behavior
                  in Feedback Mechanisms},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {60},
  number       = {4},
  pages        = {273--287},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12599-017-0493-1},
  doi          = {10.1007/S12599-017-0493-1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/SangerP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengesP18,
  author       = {Florian Menges and
                  G{\"{u}}nther Pernul},
  title        = {A comparative analysis of incident reporting formats},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {87--101},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.009},
  doi          = {10.1016/J.COSE.2017.10.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MengesP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/BohmMP18,
  author       = {Fabian B{\"{o}}hm and
                  Florian Menges and
                  G{\"{u}}nther Pernul},
  title        = {Graph-based visual analytics for cyber threat intelligence},
  journal      = {Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {16},
  year         = {2018},
  url          = {https://doi.org/10.1186/s42400-018-0017-4},
  doi          = {10.1186/S42400-018-0017-4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/BohmMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wias/RichthammerWP18,
  author       = {Christian Richthammer and
                  Michael Weber and
                  G{\"{u}}nther Pernul},
  title        = {State of the art of reputation-enhanced recommender systems},
  journal      = {Web Intell.},
  volume       = {16},
  number       = {4},
  pages        = {273--286},
  year         = {2018},
  url          = {https://doi.org/10.3233/WEB-180394},
  doi          = {10.3233/WEB-180394},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wias/RichthammerWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/DietzP18,
  author       = {Marietheres Dietz and
                  G{\"{u}}nther Pernul},
  editor       = {Sven Hartmann and
                  Hui Ma and
                  Abdelkader Hameurlain and
                  G{\"{u}}nther Pernul and
                  Roland R. Wagner},
  title        = {Big Log Data Stream Processing: Adapting an Anomaly Detection Technique},
  booktitle    = {Database and Expert Systems Applications - 29th International Conference,
                  {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11030},
  pages        = {159--166},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98812-2\_12},
  doi          = {10.1007/978-3-319-98812-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/DietzP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HummerGKFP18,
  author       = {Matthias Hummer and
                  Sebastian Groll and
                  Michael Kunz and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Measuring Identity and Access Management Performance - An Expert Survey
                  on Possible Performance Indicators},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {233--240},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006557702330240},
  doi          = {10.5220/0006557702330240},
  timestamp    = {Wed, 11 Apr 2018 15:27:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HummerGKFP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexa/2018-1,
  editor       = {Sven Hartmann and
                  Hui Ma and
                  Abdelkader Hameurlain and
                  G{\"{u}}nther Pernul and
                  Roland R. Wagner},
  title        = {Database and Expert Systems Applications - 29th International Conference,
                  {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11029},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98809-2},
  doi          = {10.1007/978-3-319-98809-2},
  isbn         = {978-3-319-98808-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexa/2018-2,
  editor       = {Sven Hartmann and
                  Hui Ma and
                  Abdelkader Hameurlain and
                  G{\"{u}}nther Pernul and
                  Roland R. Wagner},
  title        = {Database and Expert Systems Applications - 29th International Conference,
                  {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11030},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98812-2},
  doi          = {10.1007/978-3-319-98812-2},
  isbn         = {978-3-319-98811-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2018,
  editor       = {Steven Furnell and
                  Haralambos Mouratidis and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy and Security in Digital Business - 15th International
                  Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11033},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98385-1},
  doi          = {10.1007/978-3-319-98385-1},
  isbn         = {978-3-319-98384-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OppligerPK17,
  author       = {Rolf Oppliger and
                  G{\"{u}}nther Pernul and
                  Sokratis K. Katsikas},
  title        = {New Frontiers: Assessing and Managing Security Risks},
  journal      = {Computer},
  volume       = {50},
  number       = {4},
  pages        = {48--51},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.93},
  doi          = {10.1109/MC.2017.93},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/OppligerPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dais/RichthammerSP17,
  author       = {Christian Richthammer and
                  Johannes S{\"{a}}nger and
                  G{\"{u}}nther Pernul},
  title        = {Interactive Visualization of Recommender Systems Data},
  booktitle    = {Proceedings of the 4th Workshop on Security in Highly Connected {IT}
                  Systems, SHCIS@DAIS 2017, Neuch{\^{a}}tel, Switzerland, June 21 -
                  22, 2017},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3099012.3099014},
  doi          = {10.1145/3099012.3099014},
  timestamp    = {Fri, 21 Dec 2018 12:51:05 +0100},
  biburl       = {https://dblp.org/rec/conf/dais/RichthammerSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/RichthammerWP17,
  author       = {Christian Richthammer and
                  Michael Weber and
                  G{\"{u}}nther Pernul},
  editor       = {Jan{-}Philipp Stegh{\"{o}}fer and
                  Babak Esfandiari},
  title        = {Reputation-Enhanced Recommender Systems},
  booktitle    = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {505},
  pages        = {163--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59171-1\_13},
  doi          = {10.1007/978-3-319-59171-1\_13},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/RichthammerWP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HummerKNFP16,
  author       = {Matthias Hummer and
                  Michael Kunz and
                  Michael Netter and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Adaptive identity and access management - contextual data based policies},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {19},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0043-2},
  doi          = {10.1186/S13635-016-0043-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HummerKNFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/RichthammerP16,
  author       = {Christian Richthammer and
                  G{\"{u}}nther Pernul},
  editor       = {Derek Bridge and
                  Heiner Stuckenschmidt},
  title        = {Explorative Analysis of Recommendations Through Interactive Visualization},
  booktitle    = {E-Commerce and Web Technologies - 17th International Conference, EC-Web
                  2016, Porto, Portugal, September 5-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {278},
  pages        = {46--57},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53676-7\_4},
  doi          = {10.1007/978-3-319-53676-7\_4},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/RichthammerP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HummerKNFP15,
  author       = {Matthias Hummer and
                  Michael Kunz and
                  Michael Netter and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Advanced Identity and Access Policy Management Using Contextual Data},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.40},
  doi          = {10.1109/ARES.2015.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HummerKNFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SangerRKP15,
  author       = {Johannes S{\"{a}}nger and
                  Christian Richthammer and
                  Andr{\'{e}} Kremser and
                  G{\"{u}}nther Pernul},
  editor       = {Pierangela Samarati},
  title        = {Personalized Composition of Trustful Reputation Systems},
  booktitle    = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
                  {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9149},
  pages        = {207--214},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20810-7\_13},
  doi          = {10.1007/978-3-319-20810-7\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SangerRKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/SangerRKMP15,
  author       = {Johannes S{\"{a}}nger and
                  Christian Richthammer and
                  Michael Kunz and
                  Stefan Meier and
                  G{\"{u}}nther Pernul},
  editor       = {J{\"{o}}rg Becker and
                  Jan vom Brocke and
                  Marco de Marco},
  title        = {Visualizing Unfair Ratings in Online Reputation Systems},
  booktitle    = {23rd European Conference on Information Systems, {ECIS} 2015, M{\"{u}}nster,
                  Germany, May 26-29, 2015},
  year         = {2015},
  url          = {http://aisel.aisnet.org/ecis2015\_cr/159},
  timestamp    = {Thu, 22 Feb 2018 16:52:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/SangerRKMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KunzFHP15,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Matthias Hummer and
                  G{\"{u}}nther Pernul},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Introducing Dynamic Identity and Access Management in Organizations},
  booktitle    = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {139--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26961-0\_9},
  doi          = {10.1007/978-3-319-26961-0\_9},
  timestamp    = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/KunzFHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NetterPRR15,
  author       = {Michael Netter and
                  G{\"{u}}nther Pernul and
                  Christian Richthammer and
                  Moritz Riesner},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Privacy in Social Networks: Existing Challenges and Proposals for
                  Solutions},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_2},
  doi          = {10.1007/978-3-319-27668-7\_2},
  timestamp    = {Thu, 16 May 2019 16:43:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NetterPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KunzFNP15a,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {How to Discover High-Quality Roles? {A} Survey and Dependency Analysis
                  of Quality Criteria in Role Mining},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {49--67},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_4},
  doi          = {10.1007/978-3-319-27668-7\_4},
  timestamp    = {Thu, 16 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KunzFNP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/KunzFNP15,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Analyzing Quality Criteria in Role-based Identity and Access Management},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {64--72},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005232100640072},
  doi          = {10.5220/0005232100640072},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/KunzFNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Pernul15,
  author       = {G{\"{u}}nther Pernul},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Privacy in Social Networks - Existing Challenges and Proposals for
                  Solution},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {IS--11},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7509911/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Pernul15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/SangerRRP15,
  author       = {Johannes S{\"{a}}nger and
                  Christian Richthammer and
                  Artur R{\"{o}}sch and
                  G{\"{u}}nther Pernul},
  editor       = {Christian Damsgaard Jensen and
                  Stephen Marsh and
                  Theo Dimitrakos and
                  Yuko Murayama},
  title        = {Reusable Defense Components for Online Reputation Systems},
  booktitle    = {Trust Management {IX} - 9th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {454},
  pages        = {195--202},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18491-3\_15},
  doi          = {10.1007/978-3-319-18491-3\_15},
  timestamp    = {Sun, 02 Oct 2022 16:07:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/SangerRRP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-1,
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6},
  doi          = {10.1007/978-3-319-24174-6},
  isbn         = {978-3-319-24173-9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-2,
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7},
  doi          = {10.1007/978-3-319-24177-7},
  isbn         = {978-3-319-24176-0},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2015-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RichthammerNRSP14,
  author       = {Christian Richthammer and
                  Michael Netter and
                  Moritz Riesner and
                  Johannes S{\"{a}}nger and
                  G{\"{u}}nther Pernul},
  title        = {Taxonomy of social network data types},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {11},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0011-7},
  doi          = {10.1186/S13635-014-0011-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RichthammerNRSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SangerP14,
  author       = {Johannes S{\"{a}}nger and
                  G{\"{u}}nther Pernul},
  title        = {Visualizing Transaction Context in Trust and Reputation Systems},
  booktitle    = {Ninth International Conference on Availability, Reliability and Security,
                  {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014},
  pages        = {94--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ARES.2014.19},
  doi          = {10.1109/ARES.2014.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SangerP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/HassanSP14,
  author       = {Sabri Hassan and
                  Johannes S{\"{a}}nger and
                  G{\"{u}}nther Pernul},
  title        = {SoDA: Dynamic visual analytics of big social data},
  booktitle    = {International Conference on Big Data and Smart Computing, {BIGCOMP}
                  2014, Bangkok, Thailand, January 15-17, 2014},
  pages        = {183--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BIGCOMP.2014.6741433},
  doi          = {10.1109/BIGCOMP.2014.6741433},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigcomp/HassanSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/KunzHFNP14,
  author       = {Michael Kunz and
                  Matthias Hummer and
                  Ludwig Fuchs and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  title        = {Analyzing Recent Trends in Enterprise Identity Management},
  booktitle    = {25th International Workshop on Database and Expert Systems Applications,
                  {DEXA} 2014, Munich, Germany, September 1-5, 2014},
  pages        = {273--277},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DEXA.2014.62},
  doi          = {10.1109/DEXA.2014.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/KunzHFNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/SangerRHP14,
  author       = {Johannes S{\"{a}}nger and
                  Christian Richthammer and
                  Sabri Hassan and
                  G{\"{u}}nther Pernul},
  title        = {Trust and Big Data: {A} Roadmap for Research},
  booktitle    = {25th International Workshop on Database and Expert Systems Applications,
                  {DEXA} 2014, Munich, Germany, September 1-5, 2014},
  pages        = {278--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DEXA.2014.63},
  doi          = {10.1109/DEXA.2014.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/SangerRHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/FuchsKP14,
  author       = {Ludwig Fuchs and
                  Michael Kunz and
                  G{\"{u}}nther Pernul},
  editor       = {Michel Avital and
                  Jan Marco Leimeister and
                  Ulrike Schultze},
  title        = {Role Model Optimization for Secure Role-Based Identity Management},
  booktitle    = {22st European Conference on Information Systems, {ECIS} 2014, Tel
                  Aviv, Israel, June 9-11, 2014},
  year         = {2014},
  url          = {http://aisel.aisnet.org/ecis2014/proceedings/track14/7},
  timestamp    = {Mon, 30 Jun 2014 19:17:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/FuchsKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/NetterWDP14,
  author       = {Michael Netter and
                  Michael Weber and
                  Michael Diener and
                  G{\"{u}}nther Pernul},
  editor       = {Michel Avital and
                  Jan Marco Leimeister and
                  Ulrike Schultze},
  title        = {Visualizing Social Roles - Design and Evaluation of a Bird's-eye View
                  of Social Network Privacy Settings},
  booktitle    = {22st European Conference on Information Systems, {ECIS} 2014, Tel
                  Aviv, Israel, June 9-11, 2014},
  year         = {2014},
  url          = {http://aisel.aisnet.org/ecis2014/proceedings/track14/13},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/NetterWDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/SangerP14,
  author       = {Johannes S{\"{a}}nger and
                  G{\"{u}}nther Pernul},
  editor       = {Jianying Zhou and
                  Nurit Gal{-}Oz and
                  Jie Zhang and
                  Ehud Gudes},
  title        = {Reusability for Trust and Reputation Systems},
  booktitle    = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {430},
  pages        = {28--43},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43813-8\_3},
  doi          = {10.1007/978-3-662-43813-8\_3},
  timestamp    = {Thu, 23 Sep 2021 11:47:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/SangerP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/HassanP14,
  author       = {Sabri Hassan and
                  G{\"{u}}nther Pernul},
  editor       = {Maria Indrawan{-}Santiago and
                  Matthias Steinbauer and
                  Hong{-}Quang Nguyen and
                  A Min Tjoa and
                  Ismail Khalil and
                  Gabriele Anderst{-}Kotsis},
  title        = {Efficiently Managing the Security and Costs of Big Data Storage using
                  Visual Analytics},
  booktitle    = {Proceedings of the 16th International Conference on Information Integration
                  and Web-based Applications {\&} Services, Hanoi, Vietnam, December
                  4-6, 2014},
  pages        = {180--184},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2684200.2684333},
  doi          = {10.1145/2684200.2684333},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiwas/HassanP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MeierP14,
  author       = {Stefan Meier and
                  G{\"{u}}nther Pernul},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Einsatz von digitaler Forensik in Unternehmen und Organisationen},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {103--114},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20072},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MeierP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2014,
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4},
  doi          = {10.1007/978-3-662-43936-4},
  isbn         = {978-3-662-43935-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2014,
  editor       = {Claudia Eckert and
                  Sokratis K. Katsikas and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy, and Security in Digital Business - 11th International
                  Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8647},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09770-1},
  doi          = {10.1007/978-3-319-09770-1},
  isbn         = {978-3-319-09769-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CettoNPRRRS14,
  author       = {Alexandra Cetto and
                  Michael Netter and
                  G{\"{u}}nther Pernul and
                  Christian Richthammer and
                  Moritz Riesner and
                  Christian Roth and
                  Johannes S{\"{a}}nger},
  title        = {Friend Inspector: {A} Serious Game to Enhance Privacy Awareness in
                  Social Networks},
  journal      = {CoRR},
  volume       = {abs/1402.5878},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.5878},
  eprinttype    = {arXiv},
  eprint       = {1402.5878},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CettoNPRRRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/LopezNPPP13,
  author       = {Javier L{\'{o}}pez and
                  Svetla Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul and
                  Bart Preneel},
  title        = {Preface},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {5},
  pages        = {747},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2013.02.001},
  doi          = {10.1016/J.CAMWA.2013.02.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/LopezNPPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/FuchsP13,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Qualit{\"{a}}tssicherung im Identity- und Access Management},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {289},
  pages        = {88--97},
  year         = {2013},
  url          = {http://www.dpunkt.de/hmdissues/289/09.php},
  doi          = {10.1007/BF03340780},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/FuchsP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RiesnerNP13,
  author       = {Moritz Riesner and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  title        = {Analyzing settings for social identity management on Social Networking
                  Sites: Classification, current state, and proposed developments},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {185--198},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.005},
  doi          = {10.1016/J.ISTR.2013.02.005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RiesnerNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RichthammerNRP13,
  author       = {Christian Richthammer and
                  Michael Netter and
                  Moritz Riesner and
                  G{\"{u}}nther Pernul},
  title        = {Taxonomy for Social Network Data Types from the Viewpoint of Privacy
                  and User Control},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {141--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.18},
  doi          = {10.1109/ARES.2013.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RichthammerNRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/NetterRWP13,
  author       = {Michael Netter and
                  Moritz Riesner and
                  Michael Weber and
                  G{\"{u}}nther Pernul},
  title        = {Privacy Settings in Online Social Networks - Preferences, Perception,
                  and Reality},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {3219--3228},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.455},
  doi          = {10.1109/HICSS.2013.455},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/NetterRWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wirtschaftsinformatik/MeierFP13,
  author       = {Stefan Meier and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Managing the Access Grid - {A} Process View to Minimize Insider Misuse
                  Risks},
  booktitle    = {11. Internationale Tagung Wirtschaftsinformatik, Leipzig, Germany,
                  February 27 -- March 1, 2013},
  pages        = {66},
  year         = {2013},
  url          = {http://aisel.aisnet.org/wi2013/66},
  timestamp    = {Fri, 10 May 2013 20:30:17 +0200},
  biburl       = {https://dblp.org/rec/conf/wirtschaftsinformatik/MeierFP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FuchsP12,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Minimizing insider misuse through secure Identity Management},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {8},
  pages        = {847--862},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.314},
  doi          = {10.1002/SEC.314},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FuchsP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RiesnerNP12,
  author       = {Moritz Riesner and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  title        = {An Analysis of Implemented and Desirable Settings for Identity Management
                  on Social Networking Sites},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {103--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.20},
  doi          = {10.1109/ARES.2012.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RiesnerNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/RiesnerP12,
  author       = {Moritz Riesner and
                  G{\"{u}}nther Pernul},
  title        = {Provider-Independent Online Social Identity Management-Enhancing Privacy
                  Consistently Across Multiple Social Networking Sites},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {800--809},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.490},
  doi          = {10.1109/HICSS.2012.490},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/RiesnerP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/FritschP12,
  author       = {Christoph Fritsch and
                  G{\"{u}}nther Pernul},
  title        = {User-Controlled Dynamic Access Credential Enrichment for Run-time
                  Service Selection},
  booktitle    = {Ninth {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2012, Hangzhou, China, September 9-11, 2012},
  pages        = {193--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICEBE.2012.39},
  doi          = {10.1109/ICEBE.2012.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/FritschP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/RiesnerP12,
  author       = {Moritz Riesner and
                  G{\"{u}}nther Pernul},
  title        = {Maintaining a Consistent Representation of Self across Multiple Social
                  Networking Sites - {A} Data-centric Perspective},
  booktitle    = {2012 International Conference on Privacy, Security, Risk and Trust,
                  {PASSAT} 2012, and 2012 International Confernece on Social Computing,
                  SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
  pages        = {860--867},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SocialCom-PASSAT.2012.15},
  doi          = {10.1109/SOCIALCOM-PASSAT.2012.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/RiesnerP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/NetterHP12,
  author       = {Michael Netter and
                  Sabri Hassan and
                  G{\"{u}}nther Pernul},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Sokratis K. Katsikas and
                  Gerald Quirchmayr},
  title        = {An Autonomous Social Web Privacy Infrastructure with Context-Aware
                  Access Control},
  booktitle    = {Trust, Privacy and Security in Digital Business - 9th International
                  Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7449},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32287-7\_6},
  doi          = {10.1007/978-3-642-32287-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/NetterHP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/GmelchP12,
  author       = {Oliver Gmelch and
                  G{\"{u}}nther Pernul},
  title        = {A Generic Architecture for User-Centric Portlet Integration},
  booktitle    = {14th {IEEE} International Conference on Commerce and Enterprise Computing,
                  {CEC} 2012, Hangzhou, China, September 9-11, 2012},
  pages        = {70--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CEC.2012.20},
  doi          = {10.1109/CEC.2012.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/GmelchP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2011,
  editor       = {Svetla Petkova{-}Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul},
  title        = {Public Key Infrastructures, Services and Applications - 8th European
                  Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7163},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29804-2},
  doi          = {10.1007/978-3-642-29804-2},
  isbn         = {978-3-642-29803-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FuchsPS11,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul and
                  Ravi S. Sandhu},
  title        = {Roles in information security - {A} survey and classification of the
                  research area},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {8},
  pages        = {748--769},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.08.002},
  doi          = {10.1016/J.COSE.2011.08.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FuchsPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/DurbeckKPS11,
  author       = {Stefan D{\"{u}}rbeck and
                  Jan Paul Kolter and
                  G{\"{u}}nther Pernul and
                  Rolf Schillinger},
  title        = {Eine verteilte Autorisierungsinfrastruktur unter Ber{\"{u}}cksichtigung
                  von Datenschutzaspekten},
  journal      = {Inform. Spektrum},
  volume       = {34},
  number       = {3},
  pages        = {265--275},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00287-009-0411-0},
  doi          = {10.1007/S00287-009-0411-0},
  timestamp    = {Sun, 05 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/DurbeckKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WeipplTP11,
  author       = {Edgar R. Weippl and
                  A Min Tjoa and
                  G{\"{u}}nther Pernul},
  title        = {Guest Editorial: Advances in Applied Security},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.001},
  doi          = {10.22667/JOWUA.2011.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WeipplTP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/FritschBP11,
  author       = {Christoph Fritsch and
                  Peter Bedn{\'{a}}r and
                  G{\"{u}}nther Pernul},
  editor       = {Christian Huemer and
                  Thomas Setzer},
  title        = {{DS3I} - {A} Dynamic Semantically Enhanced Service Selection Infrastructure},
  booktitle    = {E-Commerce and Web Technologies - 12th International Conference, EC-Web
                  2011, Toulouse, France, August 30 - September 1, 2011. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {85},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23014-1\_2},
  doi          = {10.1007/978-3-642-23014-1\_2},
  timestamp    = {Mon, 03 Jan 2022 22:18:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/FritschBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/NetterHP11,
  author       = {Michael Netter and
                  Sebastian Herbst and
                  G{\"{u}}nther Pernul},
  title        = {Analyzing Privacy in Social Networks-An Interdisciplinary Approach},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {1327--1334},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.22},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/NetterHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wirtschaftsinformatik/NetterRP11,
  author       = {Michael Netter and
                  Moritz Riesner and
                  G{\"{u}}nther Pernul},
  title        = {Assisted Social Identity Management},
  booktitle    = {10. Internationale Tagung Wirtschaftsinformatik, Z{\"{u}}rich,
                  16.-18. Februar 2011},
  pages        = {6},
  year         = {2011},
  url          = {http://aisel.aisnet.org/wi2011/6},
  timestamp    = {Mon, 27 Feb 2012 21:21:41 +0100},
  biburl       = {https://dblp.org/rec/conf/wirtschaftsinformatik/NetterRP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wirtschaftsinformatik/GmelchP11,
  author       = {Oliver Gmelch and
                  G{\"{u}}nther Pernul},
  title        = {A portal-based approach for user-centric legacy application integration
                  in collaborative environments},
  booktitle    = {10. Internationale Tagung Wirtschaftsinformatik, Z{\"{u}}rich,
                  16.-18. Februar 2011},
  pages        = {45},
  year         = {2011},
  url          = {http://aisel.aisnet.org/wi2011/45},
  timestamp    = {Mon, 27 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wirtschaftsinformatik/GmelchP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2011,
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy and Security in Digital Business - 8th International
                  Conference, TrustBus 2011, Toulouse, France, August 29 - September
                  2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6863},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22890-2},
  doi          = {10.1007/978-3-642-22890-2},
  isbn         = {978-3-642-22889-6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/PernulR11,
  author       = {G{\"{u}}nther Pernul and
                  Moritz Riesner},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Conceptual Design of Secure Databases},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {245--248},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_673},
  doi          = {10.1007/978-1-4419-5906-5\_673},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/PernulR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KolterKP10,
  author       = {Jan Paul Kolter and
                  Thomas Kernchen and
                  G{\"{u}}nther Pernul},
  title        = {Collaborative privacy management},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {580--591},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.007},
  doi          = {10.1016/J.COSE.2009.12.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KolterKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FuchsP10,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Reducing the Risk of Insider Misuse by Revising Identity Management
                  and User Account Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {14--28},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.014},
  doi          = {10.22667/JOWUA.2010.06.31.014},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FuchsP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KolterNP10,
  author       = {Jan Paul Kolter and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  title        = {Visualizing Past Personal Data Disclosures},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {131--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.51},
  doi          = {10.1109/ARES.2010.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KolterNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DurbeckFPS10,
  author       = {Stefan Durbeck and
                  Christoph Fritsch and
                  G{\"{u}}nther Pernul and
                  Rolf Schillinger},
  title        = {A Semantic Security Architecture for Web Services},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {222--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.117},
  doi          = {10.1109/ARES.2010.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DurbeckFPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NetterFP10,
  author       = {Michael Netter and
                  Eduardo B. Fern{\'{a}}ndez and
                  G{\"{u}}nther Pernul},
  title        = {Refining the Pattern-Based Reference Model for Electronic Invoices
                  by Incorporating Threats},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {560--564},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.50},
  doi          = {10.1109/ARES.2010.50},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NetterFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/PernulR10,
  author       = {G{\"{u}}nther Pernul and
                  Matti Rossi},
  editor       = {Juan Trujillo and
                  Gillian Dobbie and
                  Hannu Kangassalo and
                  Sven Hartmann and
                  Markus Kirchberg and
                  Matti Rossi and
                  Iris Reinhartz{-}Berger and
                  Esteban Zim{\'{a}}nyi and
                  Flavius Frasincar},
  title        = {6th International Workshop on Foundations and Practices of {UML} {(FP-UML}
                  2010)},
  booktitle    = {Advances in Conceptual Modeling - Applications and Challenges, {ER}
                  2010 Workshops ACM-L, CMLSA, CMS, DE@ER, FP-UML, SeCoGIS, WISM, Vancouver,
                  BC, Canada, November 1-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6413},
  pages        = {242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16385-2\_30},
  doi          = {10.1007/978-3-642-16385-2\_30},
  timestamp    = {Wed, 09 Jun 2021 08:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/er/PernulR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GmelchP10,
  author       = {Oliver Gmelch and
                  G{\"{u}}nther Pernul},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Preventing Malicious Portlets from Communicating and Intercepting
                  in Collaboration Portals},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {177--182},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/GmelchP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/FritschNRP10,
  author       = {Christoph Fritsch and
                  Michael Netter and
                  Andreas Reisser and
                  G{\"{u}}nther Pernul},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Miguel Soriano},
  title        = {Attacking Image Recognition Captchas - {A} Naive but Effective Approach},
  booktitle    = {Trust, Privacy and Security in Digital Business, 7th International
                  Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6264},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15152-1\_2},
  doi          = {10.1007/978-3-642-15152-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/FritschNRP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/FritschP10,
  author       = {Christoph Fritsch and
                  G{\"{u}}nther Pernul},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Miguel Soriano},
  title        = {Security for Dynamic Service-Oriented eCollaboration - Architectural
                  Alternatives and Proposed Solution},
  booktitle    = {Trust, Privacy and Security in Digital Business, 7th International
                  Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6264},
  pages        = {214--226},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15152-1\_19},
  doi          = {10.1007/978-3-642-15152-1\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/FritschP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FuchsBP09,
  author       = {Ludwig Fuchs and
                  Christian Broser and
                  G{\"{u}}nther Pernul},
  title        = {Different Approaches to In-House Identity Management - Justification
                  of an Assumption},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {122--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.154},
  doi          = {10.1109/ARES.2009.154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FuchsBP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KolterP09,
  author       = {Jan Paul Kolter and
                  G{\"{u}}nther Pernul},
  title        = {Generating User-Understandable Privacy Preferences},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {299--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.89},
  doi          = {10.1109/ARES.2009.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KolterP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/NetterP09,
  author       = {Michael Netter and
                  G{\"{u}}nther Pernul},
  editor       = {A Min Tjoa and
                  Roland R. Wagner},
  title        = {Integrating Security Patterns into the Electronic Invoicing Process},
  booktitle    = {Database and Expert Systems Applications, DEXA, International Workshops,
                  Linz, Austria, August 31-September 4, 2009, Proceedings},
  pages        = {150--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DEXA.2009.12},
  doi          = {10.1109/DEXA.2009.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/NetterP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/digibiz/BroserFGPSW09,
  author       = {Christian Broser and
                  Christoph Fritsch and
                  Oliver Gmelch and
                  G{\"{u}}nther Pernul and
                  Rolf Schillinger and
                  Sandra Wiesbeck},
  editor       = {Luigi Telesca and
                  Katarina Stanoevska{-}Slabeva and
                  Veselin Rakocevic},
  title        = {Analysing Requirements for Virtual Business Alliances - The Case of
                  {SPIKE}},
  booktitle    = {Digital Business - First Iternational {ICST} Conference, DigiBiz 2009,
                  London, UK, June 17-19, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {21},
  pages        = {35--44},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11532-5\_5},
  doi          = {10.1007/978-3-642-11532-5\_5},
  timestamp    = {Fri, 19 May 2017 01:25:18 +0200},
  biburl       = {https://dblp.org/rec/conf/digibiz/BroserFGPSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KolterKP09,
  author       = {Jan Paul Kolter and
                  Thomas Kernchen and
                  G{\"{u}}nther Pernul},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Collaborative Privacy - {A} Community-Based Privacy Infrastructure},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {226--236},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_20},
  doi          = {10.1007/978-3-642-01244-0\_20},
  timestamp    = {Sun, 05 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KolterKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/er/2009w,
  editor       = {Carlos A. Heuser and
                  G{\"{u}}nther Pernul},
  title        = {Advances in Conceptual Modeling - Challenging Perspectives, {ER} 2009
                  Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS,
                  Gramado, Brazil, November 9-12, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5833},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04947-7},
  doi          = {10.1007/978-3-642-04947-7},
  isbn         = {978-3-642-04946-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/2009w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2009,
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy and Security in Digital Business, 6th International
                  Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5695},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03748-1},
  doi          = {10.1007/978-3-642-03748-1},
  isbn         = {978-3-642-03747-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchlagerP08,
  author       = {Christian Schl{\"{a}}ger and
                  G{\"{u}}nther Pernul},
  title        = {Trust Modelling in E-Commerce through Fuzzy Cognitive Maps},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {344--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.23},
  doi          = {10.1109/ARES.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchlagerP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SchlagerFP08,
  author       = {Christian Schl{\"{a}}ger and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Intensive Programme on Information and Communication Security},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {752--757},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.73},
  doi          = {10.1109/ARES.2008.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SchlagerFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/FuchsP08,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  editor       = {Willie Golden and
                  Thomas Acton and
                  Kieran Conboy and
                  Hans van der Heijden and
                  Virpi Kristiina Tuunainen},
  title        = {Prorole: {A} Process-Oriented Lifecycle Model for Role Systems Leveraging
                  Identity Management and Guiding Role Projects},
  booktitle    = {16th European Conference on Information Systems, {ECIS} 2008, Galway,
                  Ireland, 2008},
  pages        = {1322--1333},
  year         = {2008},
  url          = {http://aisel.aisnet.org/ecis2008/111},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/FuchsP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FuchsP08,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {HyDRo - Hybrid Development of Roles},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_24},
  doi          = {10.1007/978-3-540-89862-7\_24},
  timestamp    = {Thu, 18 Nov 2021 17:21:37 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/FuchsP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/FernandezPL08,
  author       = {Eduardo B. Fern{\'{a}}ndez and
                  G{\"{u}}nther Pernul and
                  Mar{\'{\i}}a M. Larrondo{-}Petrie},
  editor       = {Steven Furnell and
                  Sokratis K. Katsikas and
                  Antonio Lioy},
  title        = {Patterns and Pattern Diagrams for Access Control},
  booktitle    = {Trust, Privacy and Security in Digital Business, 5th International
                  Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5185},
  pages        = {38--47},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85735-8\_5},
  doi          = {10.1007/978-3-540-85735-8\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/FernandezPL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FuchsP07,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Supporting Compliant and Secure User Handling - {A} Structured Approach
                  for In-House Identity Management},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {374--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.145},
  doi          = {10.1109/ARES.2007.145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FuchsP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bled/SchlagerPLP07,
  author       = {Christian Schl{\"{a}}ger and
                  Torsten Priebe and
                  Manuel Liewald and
                  G{\"{u}}nther Pernul},
  title        = {Enabling Attribute-based Access Control in Authentication and Authorisation
                  Infrastructures},
  booktitle    = {20th Bled eConference: eMergence: Merging and Emerging Technologies,
                  Processes, and Institutions, Bled, Slovenia, June 3-6, 2007},
  pages        = {3},
  year         = {2007},
  url          = {http://aisel.aisnet.org/bled2007/3},
  timestamp    = {Mon, 28 Nov 2016 08:13:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bled/SchlagerPLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KolterSP07,
  author       = {Jan Paul Kolter and
                  Rolf Schillinger and
                  G{\"{u}}nther Pernul},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {A Privacy-Enhanced Attribute-Based Access Control System},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_11},
  doi          = {10.1007/978-3-540-73538-0\_11},
  timestamp    = {Sun, 05 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KolterSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/ErberSP07,
  author       = {Roland Erber and
                  Christian Schl{\"{a}}ger and
                  G{\"{u}}nther Pernul},
  title        = {Patterns for Authentication and Authorisation Infrastructures},
  booktitle    = {18th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany},
  pages        = {755--759},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/DEXA.2007.4},
  doi          = {10.1109/DEXA.2007.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/ErberSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/DobmeierP07,
  author       = {Wolfgang Dobmeier and
                  G{\"{u}}nther Pernul},
  title        = {Towards Privacy-Aware Handling of Authorizations},
  booktitle    = {8th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages        = {70--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/POLICY.2007.47},
  doi          = {10.1109/POLICY.2007.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/DobmeierP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KolterSP07,
  author       = {Jan Paul Kolter and
                  Rolf Schillinger and
                  G{\"{u}}nther Pernul},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {Building a Distributed Semantic-aware Security Architecture},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {397--408},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_34},
  doi          = {10.1007/978-0-387-72367-9\_34},
  timestamp    = {Sun, 05 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KolterSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Pernul07,
  author       = {G{\"{u}}nther Pernul},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Infrastructures for Authentication, Authorization and Privilege Management
                  Scope, Evaluation and use in the Access-eGov Project},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {17},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Pernul07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PernulMFKKO07,
  author       = {G{\"{u}}nther Pernul and
                  Marco Casassa Mont and
                  Eduardo B. Fern{\'{a}}ndez and
                  Sokratis K. Katsikas and
                  Alfred Kobsa and
                  Rolf Oppliger},
  editor       = {Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {Panel Discussion: Managing Digital Identities - Challenges and Opportunities},
  booktitle    = {Trust, Privacy and Security in Digital Business, 4th International
                  Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4657},
  pages        = {2},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74409-2\_2},
  doi          = {10.1007/978-3-540-74409-2\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/PernulMFKKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexa/2007,
  editor       = {Roland R. Wagner and
                  Norman Revell and
                  G{\"{u}}nther Pernul},
  title        = {Database and Expert Systems Applications, 18th International Conference,
                  {DEXA} 2007, Regensburg, Germany, September 3-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4653},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74469-6},
  doi          = {10.1007/978-3-540-74469-6},
  isbn         = {978-3-540-74467-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2007,
  editor       = {Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {Trust, Privacy and Security in Digital Business, 4th International
                  Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4657},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74409-2},
  doi          = {10.1007/978-3-540-74409-2},
  isbn         = {978-3-540-74408-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BuschMPP06,
  author       = {S{\"{o}}nke Busch and
                  Bj{\"{o}}rn Muschall and
                  G{\"{u}}nther Pernul and
                  Torsten Priebe},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Authrule: {A} Generic Rule-Based Authorization Module},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {267--281},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_19},
  doi          = {10.1007/11805588\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BuschMPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/SchlagerSMP06,
  author       = {Christian Schl{\"{a}}ger and
                  Manuel Sojer and
                  Bj{\"{o}}rn Muschall and
                  G{\"{u}}nther Pernul},
  editor       = {Kurt Bauknecht and
                  Birgit Pr{\"{o}}ll and
                  Hannes Werthner},
  title        = {Attribute-Based Authentication and Authorisation Infrastructures for
                  E-Commerce Providers},
  booktitle    = {E-Commerce and Web Technologies, 7th International Conference, EC-Web
                  2006, Krakow, Poland, September 5-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4082},
  pages        = {132--141},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11823865\_14},
  doi          = {10.1007/11823865\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/SchlagerSMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emisa/DobmeierP06,
  author       = {Wolfgang Dobmeier and
                  G{\"{u}}nther Pernul},
  editor       = {Mathias Weske and
                  Markus N{\"{u}}ttgens},
  title        = {Modellierung von Zugriffsrichtlinien f{\"{u}}r offene Systeme},
  booktitle    = {{EMISA} 2006 - Methoden, Konzepte und Technologien f{\"{u}}r
                  die Entwicklung von dienstbasierten Informationssystemen, Beitr{\"{a}}ge
                  des Workshops der GI-Fachgruppe Entwicklungsmethoden f{\"{u}}r
                  Informationssysteme und deren Anwendung (EMISA), 17.-18. Oktober 2006
                  in Hamburg},
  series       = {{LNI}},
  volume       = {{P-95}},
  pages        = {35--47},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/23485},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emisa/DobmeierP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/KatsikasLP05,
  author       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Editorial},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {20},
  number       = {6},
  year         = {2005},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/KatsikasLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/KatsikasLP05a,
  author       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Trust, privacy and security in digital business},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {20},
  number       = {6},
  year         = {2005},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/KatsikasLP05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/LopezOP05,
  author       = {Javier L{\'{o}}pez and
                  Rolf Oppliger and
                  G{\"{u}}nther Pernul},
  title        = {Why have public key infrastructures failed so far?},
  journal      = {Internet Res.},
  volume       = {15},
  number       = {5},
  pages        = {544--556},
  year         = {2005},
  url          = {https://doi.org/10.1108/10662240510629475},
  doi          = {10.1108/10662240510629475},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/LopezOP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/BaskervilleDPS05,
  author       = {Richard L. Baskerville and
                  Gurpreet Dhillon and
                  G{\"{u}}nther Pernul and
                  Filipe de S{\'{a}}{-}Soares},
  editor       = {Dieter Bartmann and
                  Federico Rajola and
                  Jannis Kallinikos and
                  David E. Avison and
                  Robert Winter and
                  Phillip Ein{-}Dor and
                  J{\"{o}}rg Becker and
                  Freimut Bodendorf and
                  Christof Weinhardt},
  title        = {Panel: Information systems security standards: The solution or the
                  problem?},
  booktitle    = {Proceedings of the 13th European Conference on Information Systems,
                  Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg,
                  Germany, May 26-28, 2005},
  pages        = {1780--1782},
  year         = {2005},
  url          = {http://aisel.aisnet.org/ecis2005/159},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/BaskervilleDPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/SchlagerP05,
  author       = {Christian Schl{\"{a}}ger and
                  G{\"{u}}nther Pernul},
  editor       = {Kurt Bauknecht and
                  Birgit Pr{\"{o}}ll and
                  Hannes Werthner},
  title        = {Authentication and Authorisation Infrastructures in b2c e-Commerce},
  booktitle    = {E-Commerce and Web Technologies: 6th International Conference, EC-Web
                  2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3590},
  pages        = {306--315},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545163\_31},
  doi          = {10.1007/11545163\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/SchlagerP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LopezOP05,
  author       = {Javier L{\'{o}}pez and
                  Rolf Oppliger and
                  G{\"{u}}nther Pernul},
  editor       = {David W. Chadwick and
                  Gansen Zhao},
  title        = {Classifying Public Key Certificates},
  booktitle    = {Public Key Infrastructure, Second European {PKI} Workshop: Research
                  and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1,
                  2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3545},
  pages        = {135--143},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533733\_9},
  doi          = {10.1007/11533733\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LopezOP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/KatsikasLP05,
  author       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  editor       = {Panayiotis Bozanis and
                  Elias N. Houstis},
  title        = {Trust, Privacy and Security in E-Business: Requirements and Solutions},
  booktitle    = {Advances in Informatics, 10th Panhellenic Conference on Informatics,
                  {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3746},
  pages        = {548--558},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11573036\_52},
  doi          = {10.1007/11573036\_52},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/KatsikasLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/PriebeDMP05,
  author       = {Torsten Priebe and
                  Wolfgang Dobmeier and
                  Bj{\"{o}}rn Muschall and
                  G{\"{u}}nther Pernul},
  editor       = {Hannes Federrath},
  title        = {{ABAC} - Ein Referenzmodell f{\"{u}}r attributbasierte Zugriffskontrolle},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {285--296},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28384},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/PriebeDMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2005,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy and Security in Digital Business: Second International
                  Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3592},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11537878},
  doi          = {10.1007/11537878},
  isbn         = {3-540-28224-6},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LopezOP04,
  author       = {Javier L{\'{o}}pez and
                  Rolf Oppliger and
                  G{\"{u}}nther Pernul},
  title        = {Authentication and authorization infrastructures (AAIs): a comparative
                  survey},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {7},
  pages        = {578--590},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.06.013},
  doi          = {10.1016/J.COSE.2004.06.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LopezOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PriebeFMP04,
  author       = {Torsten Priebe and
                  Eduardo B. Fern{\'{a}}ndez and
                  Jens Ingo Mehlau and
                  G{\"{u}}nther Pernul},
  editor       = {Csilla Farkas and
                  Pierangela Samarati},
  title        = {A Pattern System for Access Control},
  booktitle    = {Research Directions in Data and Applications Security XVIII, {IFIP}
                  {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
                  Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series       = {{IFIP}},
  volume       = {144},
  pages        = {235--249},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8128-6\_16},
  doi          = {10.1007/1-4020-8128-6\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/PriebeFMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PriebeMDP04,
  author       = {Torsten Priebe and
                  Bj{\"{o}}rn Muschall and
                  Wolfgang Dobmeier and
                  G{\"{u}}nther Pernul},
  editor       = {Fernando Galindo and
                  Makoto Takizawa and
                  Roland Traunm{\"{u}}ller},
  title        = {A Flexible Security System for Enterprise and e-Government Portals},
  booktitle    = {Database and Expert Systems Applications, 15th International Conference,
                  {DEXA} 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3180},
  pages        = {884--893},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30075-5\_85},
  doi          = {10.1007/978-3-540-30075-5\_85},
  timestamp    = {Sat, 30 Sep 2023 09:38:52 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/PriebeMDP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/PriebeSP04,
  author       = {Torsten Priebe and
                  Christian Schl{\"{a}}ger and
                  G{\"{u}}nther Pernul},
  title        = {A Search Engine for {RDF} Metadata},
  booktitle    = {15th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2004), with CD-ROM, 30 August - 3 September 2004, Zaragoza,
                  Spain},
  pages        = {168--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/DEXA.2004.1333468},
  doi          = {10.1109/DEXA.2004.1333468},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/PriebeSP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DridiMP04,
  author       = {Fredj Dridi and
                  Bj{\"{o}}rn Muschall and
                  G{\"{u}}nther Pernul},
  title        = {Administration of an {RBAC} System},
  booktitle    = {37th Hawaii International Conference on System Sciences {(HICSS-37}
                  2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/HICSS.2004.1265447},
  doi          = {10.1109/HICSS.2004.1265447},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DridiMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2004,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Trust and Privacy in Digital Business, First International Conference,
                  TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3184},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b99832},
  doi          = {10.1007/B99832},
  isbn         = {3-540-22919-1},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0008789,
  author       = {G{\"{u}}nther Pernul and
                  Rainer Unland},
  title        = {Datenbanken im Unternehmen - Analyse, Modellbildung und Einsatz {(2)}},
  series       = {Lehrb{\"{u}}cher Wirtschaftsinformatik},
  publisher    = {Oldenbourg},
  year         = {2003},
  isbn         = {978-3-486-27210-9},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0008789.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LambrinoudakisGDP03,
  author       = {Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Fredj Dridi and
                  G{\"{u}}nther Pernul},
  title        = {Security requirements for e-government services: a methodological
                  approach for developing a common PKI-based security policy},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {16},
  pages        = {1873--1883},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00082-3},
  doi          = {10.1016/S0140-3664(03)00082-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LambrinoudakisGDP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/DridiMP03,
  author       = {Fredj Dridi and
                  Bj{\"{o}}rn Muschall and
                  G{\"{u}}nther Pernul},
  editor       = {Johann Eder and
                  Tatjana Welzer},
  title        = {An Administration Console for the {CSAP} System},
  booktitle    = {The 15th Conference on Advanced Information Systems Engineering (CAiSE
                  '03), Klagenfurt/Velden, Austria, 16-20 June, 2003, CAiSE Forum, Short
                  Paper Proceedings, Information Systems for a Connected Society},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {74},
  publisher    = {CEUR-WS.org},
  year         = {2003},
  url          = {https://ceur-ws.org/Vol-74/files/FORUM\_15.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:33 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/DridiMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/PriebeP03,
  author       = {Torsten Priebe and
                  G{\"{u}}nther Pernul},
  title        = {Towards integrative enterprise knowledge portals},
  booktitle    = {Proceedings of the 2003 {ACM} {CIKM} International Conference on Information
                  and Knowledge Management, New Orleans, Louisiana, USA, November 2-8,
                  2003},
  pages        = {216--223},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/956863.956906},
  doi          = {10.1145/956863.956906},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/PriebeP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/PriebeP03,
  author       = {Torsten Priebe and
                  G{\"{u}}nther Pernul},
  title        = {Ontology-based Integration of {OLAP} and Information Retrieval},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {610--614},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232089},
  doi          = {10.1109/DEXA.2003.1232089},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/PriebeP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/Pernul03,
  author       = {G{\"{u}}nther Pernul},
  editor       = {Kurt Bauknecht and
                  A Min Tjoa and
                  Gerald Quirchmayr},
  title        = {Trust for Digital Products},
  booktitle    = {E-Commerce and Web Technologies, 4th International Conference, EC-Web,
                  Prague, Czech Republic, September 2-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2738},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45229-4\_1},
  doi          = {10.1007/978-3-540-45229-4\_1},
  timestamp    = {Tue, 29 Dec 2020 18:30:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/Pernul03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/DridiP03,
  author       = {Fredj Dridi and
                  G{\"{u}}nther Pernul},
  editor       = {Klaus R. Dittrich and
                  Wolfgang K{\"{o}}nig and
                  Andreas Oberweis and
                  Kai Rannenberg and
                  Wolfgang Wahlster},
  title        = {Webocrat: Ein B{\"{u}}rgerportal f{\"{u}}r e-democracy},
  booktitle    = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Innovative
                  Informatikanwendungen, {INFORMATIK} 2003, Frankfurt am Main, Germany,
                  September 29 - October 2, 2003, Band 2},
  series       = {{LNI}},
  volume       = {{P-35}},
  pages        = {229--231},
  publisher    = {{GI}},
  year         = {2003},
  url          = {https://dl.gi.de/handle/20.500.12116/29694},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/DridiP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DridiFP03,
  author       = {Fredj Dridi and
                  Michael Fischer and
                  G{\"{u}}nther Pernul},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {{CSAP} - An Adaptable Security Module for the E-Government System
                  Webocrat},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {301--312},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Tue, 18 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DridiFP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wirtschaftsinformatik/PriebePK03,
  author       = {Torsten Priebe and
                  G{\"{u}}nther Pernul and
                  Peter Krause},
  editor       = {Wolfgang Uhr and
                  Werner Esswein and
                  Eric Schoop},
  title        = {Ein integrativer Ansatz f{\"{u}}r unternehmensweite Wissensportale},
  booktitle    = {Wirtschaftsinformatik 2003, Medien - M{\"{a}}rkte - Mobilit{\"{a}}t,
                  Band {II}},
  pages        = {277--292},
  publisher    = {Physica-Verlag},
  year         = {2003},
  url          = {http://aisel.aisnet.org/wi2003/67},
  timestamp    = {Mon, 27 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wirtschaftsinformatik/PriebePK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/LopezP02,
  author       = {Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Message from the TrustBus Workshop Chairs},
  booktitle    = {13th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France},
  pages        = {409--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DEXA.2002.10003},
  doi          = {10.1109/DEXA.2002.10003},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/LopezP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ol/PernulU01,
  author       = {G{\"{u}}nther Pernul and
                  Rainer Unland},
  title        = {Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz},
  publisher    = {Oldenbourg},
  year         = {2001},
  url          = {http://www.wi-inf.uni-essen.de/\%7Eifs/DBSiU/},
  isbn         = {3-486-25580-0},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ol/PernulU01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/PriebeP01,
  author       = {Torsten Priebe and
                  G{\"{u}}nther Pernul},
  editor       = {Hideko S. Kunii and
                  Sushil Jajodia and
                  Arne S{\o}lvberg},
  title        = {A Pragmatic Approach to Conceptual Modeling of {OLAP} Security},
  booktitle    = {Conceptual Modeling - {ER} 2001, 20th International Conference on
                  Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2224},
  pages        = {311--324},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45581-7\_24},
  doi          = {10.1007/3-540-45581-7\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/PriebeP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wirtschaftsinformatik/PriebeP01,
  author       = {Torsten Priebe and
                  G{\"{u}}nther Pernul},
  editor       = {Hans Ulrich Buhl and
                  Andreas Huther and
                  Bernd Reitwiesner},
  title        = {Metadaten-gest{\"{u}}tzter Data-Warehouse-Entwurf mit ADAPTed
                  {UML}},
  booktitle    = {Information Age Economy: 5. Internationale Tagung Wirtschaftsinformatik
                  2001, Augsburg, Germany},
  pages        = {8},
  publisher    = {Physica Verlag / Springer},
  year         = {2001},
  url          = {http://aisel.aisnet.org/wi2001/8},
  timestamp    = {Mon, 27 Feb 2012 21:33:31 +0100},
  biburl       = {https://dblp.org/rec/conf/wirtschaftsinformatik/PriebeP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecweb/2001,
  editor       = {Kurt Bauknecht and
                  Sanjay Kumar Madria and
                  G{\"{u}}nther Pernul},
  title        = {Electronic Commerce and Web Technologies, Second International Conference,
                  EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2115},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44700-8},
  doi          = {10.1007/3-540-44700-8},
  isbn         = {3-540-42517-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/RohmP00,
  author       = {Alexander W. R{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  title        = {{COPS:} a model and infrastructure for secure and fair electronic
                  markets},
  journal      = {Decis. Support Syst.},
  volume       = {29},
  number       = {4},
  pages        = {343--355},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-9236(00)00082-8},
  doi          = {10.1016/S0167-9236(00)00082-8},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/RohmP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijecommerce/MandryPR00,
  author       = {Torsten Mandry and
                  G{\"{u}}nther Pernul and
                  Alexander W. R{\"{o}}hm},
  title        = {Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection},
  journal      = {Int. J. Electron. Commer.},
  volume       = {5},
  number       = {2},
  pages        = {47--60},
  year         = {2000},
  url          = {https://doi.org/10.1080/10864415.2000.11044203},
  doi          = {10.1080/10864415.2000.11044203},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijecommerce/MandryPR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dolap/PriebeP00,
  author       = {Torsten Priebe and
                  G{\"{u}}nther Pernul},
  editor       = {Rokia Missaoui and
                  Il{-}Yeol Song},
  title        = {Towards {OLAP} Security Design - Survey and Research Issues},
  booktitle    = {Third {ACM} International Workshop on Data Warehousing and {OLAP}
                  {(DOLAP} 2000), Washington, DC, USA, November 10, 2000},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/355068.355313},
  doi          = {10.1145/355068.355313},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dolap/PriebeP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecweb/2000,
  editor       = {Kurt Bauknecht and
                  Sanjay Kumar Madria and
                  G{\"{u}}nther Pernul},
  title        = {Electronic Commerce and Web Technologies, First International Conference,
                  EC-Web 2000, London, UK, September 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1875},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44463-7},
  doi          = {10.1007/3-540-44463-7},
  isbn         = {3-540-67981-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijecommerce/HerrmannP99,
  author       = {Gaby Herrmann and
                  G{\"{u}}nther Pernul},
  title        = {Viewing Business-Process Security from Different Perspectives},
  journal      = {Int. J. Electron. Commer.},
  volume       = {3},
  number       = {3},
  pages        = {89--103},
  year         = {1999},
  url          = {https://doi.org/10.1080/10864415.1999.11518343},
  doi          = {10.1080/10864415.1999.11518343},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijecommerce/HerrmannP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RohmHP99,
  author       = {Alexander W. R{\"{o}}hm and
                  Gaby Herrmann and
                  G{\"{u}}nther Pernul},
  title        = {A Language for Modeling Secure Business Transactions},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {22--31},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816010},
  doi          = {10.1109/CSAC.1999.816010},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RohmHP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adbis/PernulRH99,
  author       = {G{\"{u}}nther Pernul and
                  Alexander W. R{\"{o}}hm and
                  Gaby Herrmann},
  editor       = {Johann Eder and
                  Ivan Rozman and
                  Tatjana Welzer},
  title        = {Trust for Electronic Commerce Transactions},
  booktitle    = {Advances in Databases and Information Systems, Third East European
                  Conference, ADBIS'99, Maribor, Slovenia, September 13-16, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1691},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48252-0\_1},
  doi          = {10.1007/3-540-48252-0\_1},
  timestamp    = {Tue, 21 Mar 2023 20:54:24 +0100},
  biburl       = {https://dblp.org/rec/conf/adbis/PernulRH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PernulR99,
  author       = {G{\"{u}}nther Pernul and
                  Alexander W. R{\"{o}}hm},
  title        = {{COPS:} {A} Model and Infrastructure for Secure and Fair Electronic
                  Markets},
  booktitle    = {32nd Annual Hawaii International Conference on System Sciences (HICSS-32),
                  January 5-8, 1999, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/HICSS.1999.773052},
  doi          = {10.1109/HICSS.1999.773052},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/PernulR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wirtschaftsinformatik/HerrmannRP99,
  author       = {Gaby Herrmann and
                  Alexander W. R{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  editor       = {August{-}Wilhelm Scheer and
                  Markus N{\"{u}}ttgens},
  title        = {Sichere Gesch{\"{a}}ftstransaktionen auf Elektronischen M{\"{a}}rkten},
  booktitle    = {Electronic Business Engineering, 4. Internationale Tagung Wirtschaftsinformatik,
                  Saarbr{\"{u}}cken, 3.-5. M{\"{a}}rz 1999},
  pages        = {12},
  publisher    = {Physica-Verlag},
  year         = {1999},
  url          = {http://aisel.aisnet.org/wi1999/12},
  timestamp    = {Mon, 27 Feb 2012 21:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/wirtschaftsinformatik/HerrmannRP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/PernulTW98,
  author       = {G{\"{u}}nther Pernul and
                  A Min Tjoa and
                  Werner Winiwarter},
  title        = {Modelling Data Secrecy and Integrity},
  journal      = {Data Knowl. Eng.},
  volume       = {26},
  number       = {3},
  pages        = {291--308},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0169-023X(97)00045-1},
  doi          = {10.1016/S0169-023X(97)00045-1},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dke/PernulTW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RohmPH98,
  author       = {Alexander W. R{\"{o}}hm and
                  G{\"{u}}nther Pernul and
                  Gaby Herrmann},
  title        = {Modeling Secure and Fair Electronic Commerce},
  booktitle    = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
                  7-11 December 1998, Scottsdale, AZ, {USA}},
  pages        = {155--164},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSAC.1998.738608},
  doi          = {10.1109/CSAC.1998.738608},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RohmPH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/EsssmayrKWPT98,
  author       = {Wolfgang E{\ss}mayr and
                  Elisabeth Kapsammer and
                  Roland R. Wagner and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  editor       = {Roland R. Wagner},
  title        = {Enterprise-Wide Security Administration},
  booktitle    = {Ninth International Workshop on Database and Expert Systems Applications,
                  Vienna, Austria, August 24-28, 1998, Proceedings},
  pages        = {267--272},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/DEXA.1998.707412},
  doi          = {10.1109/DEXA.1998.707412},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/EsssmayrKWPT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/HerrmannP98,
  author       = {Gaby Herrmann and
                  G{\"{u}}nther Pernul},
  title        = {Towards Security Semantics in Workflow Management},
  booktitle    = {Thirty-First Annual Hawaii International Conference on System Sciences,
                  Kohala Coast, Hawaii, USA, January 6-9, 1998},
  pages        = {766--769},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/HICSS.1998.649280},
  doi          = {10.1109/HICSS.1998.649280},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/HerrmannP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/HerrmannP97,
  author       = {Gaby Herrmann and
                  G{\"{u}}nther Pernul},
  title        = {Zur Bedeutung von Sicherheit in interorganisationellen Workflows},
  journal      = {Wirtschaftsinf.},
  volume       = {39},
  number       = {3},
  pages        = {217--224},
  year         = {1997},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/HerrmannP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/PernulR97,
  author       = {G{\"{u}}nther Pernul and
                  Alexander W. R{\"{o}}hm},
  title        = {Neuer Markt - neues Geld?},
  journal      = {Wirtschaftsinf.},
  volume       = {39},
  number       = {4},
  pages        = {345--355},
  year         = {1997},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/PernulR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/EssmayrPT97,
  author       = {Wolfgang E{\ss}mayr and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {Access Controls by Object-Oriented Concepts},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {325--340},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Mon, 13 Oct 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/EssmayrPT97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/EllmerHMP96,
  author       = {Ernst Ellmer and
                  Christian Huemer and
                  Dieter Merkl and
                  G{\"{u}}nther Pernul},
  editor       = {Roland Wagner and
                  Helmut Thoma},
  title        = {Automatic Classification of Semantic Concepts in View Specifications},
  booktitle    = {Database and Expert Systems Applications, 7th International Conference,
                  {DEXA} '96, Zurich, Switzerland, September 9-13, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1134},
  pages        = {824--833},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034734},
  doi          = {10.1007/BFB0034734},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/EllmerHMP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/EsmayrKPPT96,
  author       = {Wolfgang E{\ss}mayr and
                  Fritz Kastner and
                  G{\"{u}}nther Pernul and
                  Stefan Preishuber and
                  A Min Tjoa},
  editor       = {Stanley Y. W. Su},
  title        = {Authorization and Access Control in {IRO-DB}},
  booktitle    = {Proceedings of the Twelfth International Conference on Data Engineering,
                  February 26 - March 1, 1996, New Orleans, Louisiana, {USA}},
  pages        = {40--47},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICDE.1996.492087},
  doi          = {10.1109/ICDE.1996.492087},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/EsmayrKPPT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/EssmayrKPT96,
  author       = {Wolfgang E{\ss}mayr and
                  Fritz Kastner and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  editor       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {The security architecture of {IRO-DB}},
  booktitle    = {Information Systems Security, Facing the information society of the
                  21st Century},
  series       = {{IFIP} Conference Proceedings},
  volume       = {54},
  pages        = {249--258},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Mon, 13 Oct 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/EssmayrKPT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0084576,
  author       = {G{\"{u}}nther Pernul},
  title        = {IT-Sicherheit '94},
  series       = {Schriftenreihe der {\"{O}}sterreichischen Computer Gesellschaft},
  volume       = {75},
  publisher    = {Oldenbourg},
  year         = {1995},
  timestamp    = {Fri, 19 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0084576.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PernulH95,
  author       = {G{\"{u}}nther Pernul and
                  Hubert Hasenauer},
  editor       = {Norman Revell and
                  A Min Tjoa},
  title        = {Combining Reverse with Classical Forward Database Engineering - {A}
                  Step Forward to Solve the Legacy System Dilemma},
  booktitle    = {Database and Expert Systems Applications, 6th International Conference,
                  DEXA'95, London, United Kingdom, September 4-8, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {978},
  pages        = {177--186},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0049116},
  doi          = {10.1007/BFB0049116},
  timestamp    = {Tue, 29 Dec 2020 18:31:18 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/PernulH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/EllmerHMP95,
  author       = {Ernst Ellmer and
                  Christian Huemer and
                  Dieter Merkl and
                  G{\"{u}}nther Pernul},
  editor       = {Mike P. Papazoglou},
  title        = {Neural Network Technology to Support View Integration},
  booktitle    = {OOER'95: Object-Oriented and Entity-Relationship Modelling, 14th International
                  Conference, Gold Coast, Australia, December 12-15, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1021},
  pages        = {181--190},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0020531},
  doi          = {10.1007/BFB0020531},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/er/EllmerHMP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/Pernul94,
  author       = {G{\"{u}}nther Pernul},
  title        = {Database Security},
  journal      = {Adv. Comput.},
  volume       = {38},
  pages        = {1--72},
  year         = {1994},
  url          = {https://doi.org/10.1016/S0065-2458(08)60175-8},
  doi          = {10.1016/S0065-2458(08)60175-8},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/Pernul94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hm/MerklP94,
  author       = {Dieter Merkl and
                  G{\"{u}}nther Pernul},
  title        = {Security for next generation hypertext systems},
  journal      = {Hypermedia},
  volume       = {6},
  number       = {1},
  pages        = {1--18},
  year         = {1994},
  url          = {https://doi.org/10.1080/09558543.1994.12031224},
  doi          = {10.1080/09558543.1994.12031224},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hm/MerklP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PernulQ94,
  author       = {G{\"{u}}nther Pernul and
                  Gerald Quirchmayr},
  title        = {Organizing {MLS} databases from a data modelling point of view},
  booktitle    = {10th Annual Computer Security Applications Conference, {ACSAC} 1994,
                  5-9 December, 1994 Orlando, FL, {USA}},
  pages        = {96--105},
  publisher    = {{IEEE}},
  year         = {1994},
  url          = {https://doi.org/10.1109/CSAC.1994.367317},
  doi          = {10.1109/CSAC.1994.367317},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PernulQ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Pernul94,
  author       = {G{\"{u}}nther Pernul},
  editor       = {Joachim Biskup and
                  Matthew Morgenstern and
                  Carl E. Landwehr},
  title        = {Security Object Modelling for Level-Based Policies},
  booktitle    = {Database Security, {VIII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth,
                  Germany, 23-26 August, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-60}},
  pages        = {374},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Pernul94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gidr/Pernul93,
  author       = {G{\"{u}}nther Pernul},
  title        = {11th International Conference on the Entity-Relationship Approach
                  {(ER} 92), Karlsruhe (Tagungsbericht)},
  journal      = {Datenbank Rundbr.},
  volume       = {11},
  pages        = {9},
  year         = {1993},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/gidr/Pernul93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PernulWT93,
  author       = {G{\"{u}}nther Pernul and
                  Werner Winiwarter and
                  A Min Tjoa},
  title        = {The deductive filter approach to {MLS} database prototyping},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {244--253},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315435},
  doi          = {10.1109/CSAC.1993.315435},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PernulWT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/PernulWT93,
  author       = {G{\"{u}}nther Pernul and
                  Werner Winiwarter and
                  A Min Tjoa},
  editor       = {Ramez Elmasri and
                  Vram Kouramajian and
                  Bernhard Thalheim},
  title        = {The Entity-Relationship Model for Multilevel Security},
  booktitle    = {Entity-Relationship Approach - ER'93, 12th International Conference
                  on the Entity-Relationship Approach, Arlington, Texas, USA, December
                  15-17, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {823},
  pages        = {166--177},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/BFb0024365},
  doi          = {10.1007/BFB0024365},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/er/PernulWT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vis/PernulTH93,
  author       = {G{\"{u}}nther Pernul and
                  A Min Tjoa and
                  J. T. Hotz{-}Behofsits},
  editor       = {Gerhard Weck and
                  Patrick Horster},
  title        = {Datenbankmanagementsysteme mit hohem Sicherheitsanspruch},
  booktitle    = {Verl{\"{a}}{\ss}liche Informationssysteme, Proceedings der GI-Fachtagung
                  VIS'93, 11.-13.05.1993, M{\"{u}}nchen, Germany},
  series       = {DuD-Fachbeitr{\"{a}}ge},
  volume       = {16},
  pages        = {371--393},
  publisher    = {Vieweg},
  year         = {1993},
  timestamp    = {Tue, 15 Nov 2016 13:03:51 +0100},
  biburl       = {https://dblp.org/rec/conf/vis/PernulTH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/NavatheP92,
  author       = {Shamkant B. Navathe and
                  G{\"{u}}nther Pernul},
  title        = {Conceptual and Logical Design of Relational Databases},
  journal      = {Adv. Comput.},
  volume       = {35},
  pages        = {1--80},
  year         = {1992},
  url          = {https://doi.org/10.1016/S0065-2458(08)60593-8},
  doi          = {10.1016/S0065-2458(08)60593-8},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/NavatheP92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/PernulL92,
  author       = {G{\"{u}}nther Pernul and
                  Gottfried Luef},
  title        = {Bibliography on Database Security},
  journal      = {{SIGMOD} Rec.},
  volume       = {21},
  number       = {1},
  pages        = {105--122},
  year         = {1992},
  url          = {https://doi.org/10.1145/130868.130884},
  doi          = {10.1145/130868.130884},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmod/PernulL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Pernul92,
  author       = {G{\"{u}}nther Pernul},
  title        = {Security constraint processing during multilevel secure database design},
  booktitle    = {Eighth Annual Computer Security Applications Conference, {ACSAC} 1992,
                  November 30 - December 4, 1992, San Antonio, Texas, {USA}},
  pages        = {75--84},
  publisher    = {{IEEE}},
  year         = {1992},
  url          = {https://doi.org/10.1109/CSAC.1992.228231},
  doi          = {10.1109/CSAC.1992.228231},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Pernul92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ds/Pernul92,
  author       = {G{\"{u}}nther Pernul},
  editor       = {David K. Hsiao and
                  Erich J. Neuhold and
                  Ron Sacks{-}Davis},
  title        = {Canonical Security Modeling for Federated Databases},
  booktitle    = {Proceedings of the {IFIP} {WG} 2.6 Database Semantics Conference on
                  Interoperable Database Systems (DS-5), Lorne, Victoria, Australia,
                  16-20 November 1992},
  series       = {{IFIP} Transactions},
  volume       = {{A-25}},
  pages        = {207--222},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Thu, 03 Jan 2002 11:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ds/Pernul92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Pernul92,
  author       = {G{\"{u}}nther Pernul},
  editor       = {Yves Deswarte and
                  G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  title        = {Security Constraint Processing in Multilevel Secure {AMAC} Schemata},
  booktitle    = {Computer Security - {ESORICS} 92, Second European Symposium on Research
                  in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {648},
  pages        = {349--370},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013907},
  doi          = {10.1007/BFB0013907},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Pernul92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/er/92,
  editor       = {G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {Entity-Relationship Approach - ER'92, 11th International Conference
                  on the Entity-Relationship Approach, Karlsruhe, Germany, October 7-9,
                  1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {645},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-56023-8},
  doi          = {10.1007/3-540-56023-8},
  isbn         = {3-540-56023-8},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/er/92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PernulL91,
  author       = {G{\"{u}}nther Pernul and
                  Gottfried Luef},
  title        = {A multilevel secure relational data model based on views},
  booktitle    = {Seventh Annual Computer Security Applications Conference, {ACSAC}
                  1991, 2-6 December, 1991, San Antonio, Texas, {USA}},
  pages        = {166--177},
  publisher    = {{IEEE}},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSAC.1991.213008},
  doi          = {10.1109/CSAC.1991.213008},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/PernulL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LuefP91,
  author       = {Gottfried Luef and
                  G{\"{u}}nther Pernul},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {Supporting Range Queries in Multilevel-Secure Databases},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {117--130},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Fri, 15 Feb 2002 12:14:34 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LuefP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PernulKN91,
  author       = {G{\"{u}}nther Pernul and
                  Kamalakar Karlapalem and
                  Shamkant B. Navathe},
  editor       = {Dimitris Karagiannis},
  title        = {Relational Database Organization Based on Views and Fragments},
  booktitle    = {Proceedings of the International Conference on Database and Expert
                  Systems Applications, Berlin, Germany, 1991},
  pages        = {380--386},
  publisher    = {Springer-Verlag, Wien},
  year         = {1991},
  timestamp    = {Mon, 24 Nov 2014 16:44:16 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/PernulKN91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/PernulT91,
  author       = {G{\"{u}}nther Pernul and
                  A Min Tjoa},
  editor       = {Toby J. Teorey},
  title        = {A View Integration Approach for the Design of Multilevel Security},
  booktitle    = {Proceedings of the 10th International Conference on Entity-Relationship
                  Approach (ER'91), 23-25 October, 1991, San Mateo, California, {USA}},
  pages        = {483--509},
  publisher    = {{ER} Institute},
  year         = {1991},
  timestamp    = {Mon, 13 Oct 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/PernulT91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/Pernul87,
  author       = {G{\"{u}}nther Pernul},
  title        = {An Unnormalized Relational Data Model Based On User Views},
  journal      = {{SIGMOD} Rec.},
  volume       = {16},
  number       = {2},
  pages        = {51--60},
  year         = {1987},
  url          = {https://doi.org/10.1145/988598.988602},
  doi          = {10.1145/988598.988602},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmod/Pernul87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics