Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Günther Pernul
@article{DBLP:journals/ijisec/EmplSSP24, author = {Philip Empl and Daniel Schlette and Lukas St{\"{o}}ger and G{\"{u}}nther Pernul}, title = {Generating {ICS} vulnerability playbooks with open standards}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {2}, pages = {1215--1230}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00760-5}, doi = {10.1007/S10207-023-00760-5}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/EmplSSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BaumerMP23, author = {Thomas Baumer and Mathis M{\"{u}}ller and G{\"{u}}nther Pernul}, title = {System for Cross-Domain Identity Management {(SCIM):} Survey and Enhancement With {RBAC}}, journal = {{IEEE} Access}, volume = {11}, pages = {86872--86894}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3304270}, doi = {10.1109/ACCESS.2023.3304270}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BaumerMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GlasVRBP23, author = {Magdalena Glas and Manfred Vielberth and Tobias Reittinger and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, title = {Improving cybersecurity skill development through visual programming}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {316--330}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0170}, doi = {10.1108/ICS-11-2022-0170}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GlasVRBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/EmplP23, author = {Philip Empl and G{\"{u}}nther Pernul}, title = {Digital-Twin-Based Security Analytics for the Internet of Things}, journal = {Inf.}, volume = {14}, number = {2}, pages = {95}, year = {2023}, url = {https://doi.org/10.3390/info14020095}, doi = {10.3390/INFO14020095}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/EmplP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/GlasVP23, author = {Magdalena Glas and Manfred Vielberth and G{\"{u}}nther Pernul}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {622:1--622:19}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581046}, doi = {10.1145/3544548.3581046}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/GlasVP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/EmplHP23, author = {Philip Empl and Henric Hager and G{\"{u}}nther Pernul}, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {Digital Twins for IoT Security Management}, booktitle = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, pages = {141--149}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6\_9}, doi = {10.1007/978-3-031-37586-6\_9}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/EmplHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KernBFP23, author = {Sascha Kern and Thomas Baumer and Ludwig Fuchs and G{\"{u}}nther Pernul}, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach}, booktitle = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, pages = {223--242}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6\_14}, doi = {10.1007/978-3-031-37586-6\_14}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KernBFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/GlasBSP23, author = {Magdalena Glas and Fabian B{\"{o}}hm and Falko Sch{\"{o}}nteich and G{\"{u}}nther Pernul}, editor = {Steven Furnell and Nathan L. Clarke}, title = {Cyber Range Exercises: Potentials and Open Challenges for Organizations}, booktitle = {Human Aspects of Information Security and Assurance - 17th {IFIP} {WG} 11.12 International Symposium, {HAISA} 2023, Kent, UK, July 4-6, 2023, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {674}, pages = {24--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38530-8\_3}, doi = {10.1007/978-3-031-38530-8\_3}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/GlasBSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KernBGFP22, author = {Sascha Kern and Thomas Baumer and Sebastian Groll and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Optimization of Access Control Policies}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103301}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103301}, doi = {10.1016/J.JISA.2022.103301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KernBGFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/BohmVP22, author = {Fabian B{\"{o}}hm and Manfred Vielberth and G{\"{u}}nther Pernul}, title = {Formalizing and Integrating User Knowledge into Security Analytics}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {5}, pages = {347}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01209-7}, doi = {10.1007/S42979-022-01209-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/BohmVP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/EmplSZP22, author = {Philip Empl and Daniel Schlette and Daniel Zupfer and G{\"{u}}nther Pernul}, title = {SOAR4IoT: Securing IoT Assets with Digital Twins}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {4:1--4:10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538975}, doi = {10.1145/3538969.3538975}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/EmplSZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PutzVP22, author = {Benedikt Putz and Manfred Vielberth and G{\"{u}}nther Pernul}, title = {{BISCUIT} - Blockchain Security Incident Reporting based on Human Observations}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {27:1--27:6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538984}, doi = {10.1145/3538969.3538984}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PutzVP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/DietzHHP22, author = {Marietheres Dietz and Leon Hageman and Constantin von Hornung and G{\"{u}}nther Pernul}, editor = {Maanak Gupta and Sajad Khorsandroo and Mahmoud Abdelsalam}, title = {Employing Digital Twins for Security-by-Design System Testing}, booktitle = {Sat-CPS@CODASPY 2022: Proceedings of the 2022 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 27 April 2022}, pages = {97--106}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510547.3517929}, doi = {10.1145/3510547.3517929}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/DietzHHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/DietzSP22, author = {Marietheres Dietz and Daniel Schlette and G{\"{u}}nther Pernul}, editor = {Hong Va Leong and Sahra Sedigh Sarvestani and Yuuichi Teranishi and Alfredo Cuzzocrea and Hiroki Kashiwazaki and Dave Towey and Ji{-}Jiang Yang and Hossain Shahriar}, title = {Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence}, booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc, {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022}, pages = {789--797}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMPSAC54236.2022.00129}, doi = {10.1109/COMPSAC54236.2022.00129}, timestamp = {Thu, 11 Aug 2022 16:32:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/DietzSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ReisserVFP22, author = {Andreas Reisser and Manfred Vielberth and Sofia Fohringer and G{\"{u}}nther Pernul}, editor = {Shamik Sural and Haibing Lu}, title = {Security Operations Center Roles and Skills: {A} Comparison of Theory and Practice}, booktitle = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP} {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13383}, pages = {316--327}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10684-2\_18}, doi = {10.1007/978-3-031-10684-2\_18}, timestamp = {Thu, 14 Jul 2022 17:34:57 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ReisserVFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/GlasVRBP22, author = {Magdalena Glas and Manfred Vielberth and Tobias Reittinger and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Visual Programming in Cyber Range Training to Improve Skill Development}, booktitle = {Human Aspects of Information Security and Assurance - 16th {IFIP} {WG} 11.12 International Symposium, {HAISA} 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {658}, pages = {3--13}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-12172-2\_1}, doi = {10.1007/978-3-031-12172-2\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/haisa/GlasVRBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PutzP22, author = {Benedikt Putz and G{\"{u}}nther Pernul}, title = {Comparing Successful {DLT} Consortia: {A} Lifecycle Perspective}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--10}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/79896}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/PutzP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/FriedlGEBP22, author = {Sabrina Friedl and Magdalena Glas and Ludwig Englbrecht and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, editor = {Lynette Drevin and Natalia G. Miloslavskaya and Wai Sze Leung and Sun{\'{e}} von Solms}, title = {ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics}, booktitle = {Information Security Education - Adapting to the Fourth Industrial Revolution - 15th {IFIP} {WG} 11.8 World Conference, {WISE} 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {650}, pages = {77--91}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08172-9\_6}, doi = {10.1007/978-3-031-08172-9\_6}, timestamp = {Thu, 25 Aug 2022 08:14:22 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/FriedlGEBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/FriedlEBP22, author = {Sabrina Friedl and Ludwig Englbrecht and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Jie Wu and Ernesto Damiani}, title = {Support Tool Selection in Digital Forensics Training}, booktitle = {Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1768}, pages = {3--21}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-0272-9\_1}, doi = {10.1007/978-981-99-0272-9\_1}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ubisec/FriedlEBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengesLVSPTKPFR21, author = {Florian Menges and Tobias Latzo and Manfred Vielberth and Sabine Sobola and Henrich C. P{\"{o}}hls and Benjamin Taubmann and Johannes K{\"{o}}stler and Alexander Puchta and Felix C. Freiling and Hans P. Reiser and G{\"{u}}nther Pernul}, title = {Towards GDPR-compliant data processing in modern {SIEM} systems}, journal = {Comput. Secur.}, volume = {103}, pages = {102165}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102165}, doi = {10.1016/J.COSE.2020.102165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MengesLVSPTKPFR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchletteVP21, author = {Daniel Schlette and Manfred Vielberth and G{\"{u}}nther Pernul}, title = {{CTI-SOC2M2} - The quest for mature, intelligence-driven security operations and incident response capabilities}, journal = {Comput. Secur.}, volume = {111}, pages = {102482}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102482}, doi = {10.1016/J.COSE.2021.102482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchletteVP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/SchletteCP21, author = {Daniel Schlette and Marco Caselli and G{\"{u}}nther Pernul}, title = {A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {23}, number = {4}, pages = {2525--2556}, year = {2021}, url = {https://doi.org/10.1109/COMST.2021.3117338}, doi = {10.1109/COMST.2021.3117338}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/SchletteCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SchletteBCP21, author = {Daniel Schlette and Fabian B{\"{o}}hm and Marco Caselli and G{\"{u}}nther Pernul}, title = {Measuring and visualizing cyber threat intelligence quality}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {1}, pages = {21--38}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00490-y}, doi = {10.1007/S10207-020-00490-Y}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SchletteBCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MengesPP21, author = {Florian Menges and Benedikt Putz and G{\"{u}}nther Pernul}, title = {{DEALER:} decentralized incentives for threat intelligence reporting and exchange}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {5}, pages = {741--761}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00528-1}, doi = {10.1007/S10207-020-00528-1}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/MengesPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/VielberthEP21, author = {Manfred Vielberth and Ludwig Englbrecht and G{\"{u}}nther Pernul}, title = {Improving data quality for human-as-a-security-sensor. {A} process driven quality improvement approach for user-provided incident information}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {332--349}, year = {2021}, url = {https://doi.org/10.1108/ICS-06-2020-0100}, doi = {10.1108/ICS-06-2020-0100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/VielberthEP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/PutzDEP21, author = {Benedikt Putz and Marietheres Dietz and Philip Empl and G{\"{u}}nther Pernul}, title = {EtherTwin: Blockchain-based Secure Digital Twin Information Management}, journal = {Inf. Process. Manag.}, volume = {58}, number = {1}, pages = {102425}, year = {2021}, url = {https://doi.org/10.1016/j.ipm.2020.102425}, doi = {10.1016/J.IPM.2020.102425}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/PutzDEP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/EnglbrechtP21, author = {Ludwig Englbrecht and G{\"{u}}nther Pernul}, title = {A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {27--64}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1012}, doi = {10.13052/JCSM2245-1439.1012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/EnglbrechtP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BohmDPP21, author = {Fabian B{\"{o}}hm and Marietheres Dietz and Tobias Preindl and G{\"{u}}nther Pernul}, title = {Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {3}, pages = {519--538}, year = {2021}, url = {https://doi.org/10.3390/jcp1030026}, doi = {10.3390/JCP1030026}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BohmDPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/EmplP21, author = {Philip Empl and G{\"{u}}nther Pernul}, editor = {Maanak Gupta and Mahmoud Abdelsalam and Sudip Mittal}, title = {A Flexible Security Analytics Service for the Industrial IoT}, booktitle = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April 28, 2021}, pages = {23--32}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3445969.3450427}, doi = {10.1145/3445969.3450427}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/EmplP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VielberthGDKMP21, author = {Manfred Vielberth and Magdalena Glas and Marietheres Dietz and Stylianos Karagiannis and Emmanouil Magkos and G{\"{u}}nther Pernul}, editor = {Ken Barker and Kambiz Ghazinour}, title = {A Digital Twin-Based Cyber Range for {SOC} Analysts}, booktitle = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP} {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12840}, pages = {293--311}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81242-3\_17}, doi = {10.1007/978-3-030-81242-3\_17}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VielberthGDKMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BohmVP21, author = {Fabian B{\"{o}}hm and Manfred Vielberth and G{\"{u}}nther Pernul}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Bridging Knowledge Gaps in Security Analytics}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {98--108}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010225400980108}, doi = {10.5220/0010225400980108}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BohmVP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PuchtaGP21, author = {Alexander Puchta and Sebastian Groll and G{\"{u}}nther Pernul}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise {IAM} Architecture}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {611--618}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010315706110618}, doi = {10.5220/0010315706110618}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PuchtaGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/DietzEP21, author = {Marietheres Dietz and Ludwig Englbrecht and G{\"{u}}nther Pernul}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Enhancing Industrial Control System Forensics Using Replication-Based Digital Twins}, booktitle = {Advances in Digital Forensics {XVII} - 17th {IFIP} {WG} 11.9 International Conference, Virtual Event, February 1-2, 2021, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {612}, pages = {21--38}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88381-2\_2}, doi = {10.1007/978-3-030-88381-2\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/DietzEP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PutzBP21, author = {Benedikt Putz and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, editor = {Audun J{\o}sang and Lynn Futcher and Janne Merete Hagen}, title = {HyperSec: Visual Analytics for Blockchain Security Monitoring}, booktitle = {{ICT} Systems Security and Privacy Protection - 36th {IFIP} {TC} 11 International Conference, {SEC} 2021, Oslo, Norway, June 22-24, 2021, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {625}, pages = {165--180}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78120-0\_11}, doi = {10.1007/978-3-030-78120-0\_11}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PutzBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/GrollKFP21, author = {Sebastian Groll and Sascha Kern and Ludwig Fuchs and G{\"{u}}nther Pernul}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Monitoring Access Reviews by Crowd Labelling}, booktitle = {Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12927}, pages = {3--17}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86586-3\_1}, doi = {10.1007/978-3-030-86586-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/GrollKFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BohmEFP21, author = {Fabian B{\"{o}}hm and Ludwig Englbrecht and Sabrina Friedl and G{\"{u}}nther Pernul}, title = {Visual Decision-Support for Live Digital Forensics}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {58--67}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00012}, doi = {10.1109/VIZSEC53666.2021.00012}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/BohmEFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14414, author = {Benedikt Putz and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, title = {HyperSec: Visual Analytics for blockchain security monitoring}, journal = {CoRR}, volume = {abs/2103.14414}, year = {2021}, url = {https://arxiv.org/abs/2103.14414}, eprinttype = {arXiv}, eprint = {2103.14414}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14414.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/VielberthBFP20, author = {Manfred Vielberth and Fabian B{\"{o}}hm and Ines Fichtinger and G{\"{u}}nther Pernul}, title = {Security Operations Center: {A} Systematic Study and Open Challenges}, journal = {{IEEE} Access}, volume = {8}, pages = {227756--227779}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3045514}, doi = {10.1109/ACCESS.2020.3045514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/VielberthBFP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/DietzP20, author = {Marietheres Dietz and G{\"{u}}nther Pernul}, title = {Digital Twin: Empowering Enterprises Towards a System-of-Systems Approach}, journal = {Bus. Inf. Syst. Eng.}, volume = {62}, number = {2}, pages = {179--184}, year = {2020}, url = {https://doi.org/10.1007/s12599-019-00624-0}, doi = {10.1007/S12599-019-00624-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bise/DietzP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/RichthammerP20, author = {Christian Richthammer and G{\"{u}}nther Pernul}, title = {Situation awareness for recommender systems}, journal = {Electron. Commer. Res.}, volume = {20}, number = {4}, pages = {783--806}, year = {2020}, url = {https://doi.org/10.1007/s10660-018-9321-z}, doi = {10.1007/S10660-018-9321-Z}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ecr/RichthammerP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DietzP20, author = {Marietheres Dietz and G{\"{u}}nther Pernul}, title = {Unleashing the Digital Twin's Potential for {ICS} Security}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {4}, pages = {20--27}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2019.2961650}, doi = {10.1109/MSEC.2019.2961650}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DietzP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/EnglbrechtMP20, author = {Ludwig Englbrecht and Stefan Meier and G{\"{u}}nther Pernul}, title = {Towards a capability maturity model for digital forensic readiness}, journal = {Wirel. Networks}, volume = {26}, number = {7}, pages = {4895--4907}, year = {2020}, url = {https://doi.org/10.1007/s11276-018-01920-5}, doi = {10.1007/S11276-018-01920-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/EnglbrechtMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DietzVP20, author = {Marietheres Dietz and Manfred Vielberth and G{\"{u}}nther Pernul}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Integrating digital twin security simulations in the security operations center}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {18:1--18:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407039}, doi = {10.1145/3407023.3407039}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DietzVP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/EnglbrechtP20, author = {Ludwig Englbrecht and G{\"{u}}nther Pernul}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {A privacy-aware digital forensics investigation in enterprises}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {58:1--58:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407064}, doi = {10.1145/3407023.3407064}, timestamp = {Mon, 03 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/EnglbrechtP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/PutzP20, author = {Benedikt Putz and G{\"{u}}nther Pernul}, title = {Detecting Blockchain Security Threats}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020}, pages = {313--320}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/Blockchain50366.2020.00046}, doi = {10.1109/BLOCKCHAIN50366.2020.00046}, timestamp = {Fri, 30 Apr 2021 12:35:39 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/PutzP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SchletteMBP20, author = {Daniel Schlette and Florian Menges and Thomas Baumer and G{\"{u}}nther Pernul}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Security Enumerations for Cyber-Physical Systems}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {64--76}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_4}, doi = {10.1007/978-3-030-49669-2\_4}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SchletteMBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BohmEP20, author = {Fabian B{\"{o}}hm and Ludwig Englbrecht and G{\"{u}}nther Pernul}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Designing a Decision-Support Visualization for Live Digital Forensic Investigations}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {223--240}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_13}, doi = {10.1007/978-3-030-49669-2\_13}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BohmEP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8-1/EnglbrechtSP20, author = {Ludwig Englbrecht and Stefan Sch{\"{o}}nig and G{\"{u}}nther Pernul}, editor = {Janis Grabis and Dominik Bork}, title = {Supporting Process Mining with Recovered Residual Data}, booktitle = {The Practice of Enterprise Modeling - 13th {IFIP} Working Conference, PoEM 2020, Riga, Latvia, November 25-27, 2020, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {400}, pages = {389--404}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63479-7\_27}, doi = {10.1007/978-3-030-63479-7\_27}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip8-1/EnglbrechtSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BelchiorPP0VG20, author = {Rafael Belchior and Benedikt Putz and G{\"{u}}nther Pernul and Miguel Correia and Andr{\'{e}} Vasconcelos and S{\'{e}}rgio Guerreiro}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {{SSIBAC:} Self-Sovereign Identity Based Access Control}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1935--1943}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00264}, doi = {10.1109/TRUSTCOM50675.2020.00264}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BelchiorPP0VG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/EnglbrechtP20, author = {Ludwig Englbrecht and G{\"{u}}nther Pernul}, editor = {Lynette Drevin and Sun{\'{e}} von Solms and Marianthi Theocharidou}, title = {A Serious Game-Based Peer-Instruction Digital Forensics Workshop}, booktitle = {Information Security Education. Information Security in Action - 13th {IFIP} {WG} 11.8 World Conference, {WISE} 13, Maribor, Slovenia, September 21-23, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {579}, pages = {127--141}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59291-2\_9}, doi = {10.1007/978-3-030-59291-2\_9}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/EnglbrechtP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PutzMP19, author = {Benedikt Putz and Florian Menges and G{\"{u}}nther Pernul}, title = {A secure and auditable logging infrastructure based on a permissioned blockchain}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101602}, doi = {10.1016/J.COSE.2019.101602}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PutzMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/Vielberth19, author = {Manfred Vielberth and Florian Menges and G{\"{u}}nther Pernul}, title = {Human-as-a-security-sensor for harvesting threat intelligence}, journal = {Cybersecur.}, volume = {2}, number = {1}, pages = {23}, year = {2019}, url = {https://doi.org/10.1186/s42400-019-0040-0}, doi = {10.1186/S42400-019-0040-0}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/Vielberth19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunzPGFP19, author = {Michael Kunz and Alexander Puchta and Sebastian Groll and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Attribute quality management for dynamic identity and access management}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {64--79}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.11.004}, doi = {10.1016/J.JISA.2018.11.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KunzPGFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/PutzP19, author = {Benedikt Putz and G{\"{u}}nther Pernul}, title = {Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An Analytical Study and Evaluation of Popular {DLT} Frameworks}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {42}, pages = {25--50}, year = {2019}, url = {https://doi.org/10.1007/978-3-662-60531-8\_2}, doi = {10.1007/978-3-662-60531-8\_2}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tlsdkcs/PutzP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/EnglbrechtLPQ19, author = {Ludwig Englbrecht and Gregor Langner and G{\"{u}}nther Pernul and Gerald Quirchmayr}, title = {Enhancing credibility of digital evidence through provenance-based incident response handling}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {26:1--26:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339275}, doi = {10.1145/3339252.3339275}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/EnglbrechtLPQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/PuchtaBP19, author = {Alexander Puchta and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, editor = {Simon N. Foley}, title = {Contributing to Current Challenges in Identity and Access Management with Visual Analytics}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {221--239}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_12}, doi = {10.1007/978-3-030-22479-0\_12}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/PuchtaBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DietzPP19, author = {Marietheres Dietz and Benedikt Putz and G{\"{u}}nther Pernul}, editor = {Simon N. Foley}, title = {A Distributed Ledger Approach to Digital Twin Secure Data Sharing}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {281--300}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_15}, doi = {10.1007/978-3-030-22479-0\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DietzPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/MengesSP19, author = {Florian Menges and Christine Sperl and G{\"{u}}nther Pernul}, editor = {Stefanos Gritzalis and Edgar R. Weippl and Sokratis K. Katsikas and Gabriele Anderst{-}Kotsis and A Min Tjoa and Ismail Khalil}, title = {Unifying Cyber Threat Intelligence}, booktitle = {Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11711}, pages = {161--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27813-7\_11}, doi = {10.1007/978-3-030-27813-7\_11}, timestamp = {Tue, 29 Dec 2020 18:28:24 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/MengesSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/SangerP18, author = {Johannes S{\"{a}}nger and G{\"{u}}nther Pernul}, title = {Interactive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms}, journal = {Bus. Inf. Syst. Eng.}, volume = {60}, number = {4}, pages = {273--287}, year = {2018}, url = {https://doi.org/10.1007/s12599-017-0493-1}, doi = {10.1007/S12599-017-0493-1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/SangerP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengesP18, author = {Florian Menges and G{\"{u}}nther Pernul}, title = {A comparative analysis of incident reporting formats}, journal = {Comput. Secur.}, volume = {73}, pages = {87--101}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.009}, doi = {10.1016/J.COSE.2017.10.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MengesP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/BohmMP18, author = {Fabian B{\"{o}}hm and Florian Menges and G{\"{u}}nther Pernul}, title = {Graph-based visual analytics for cyber threat intelligence}, journal = {Cybersecur.}, volume = {1}, number = {1}, pages = {16}, year = {2018}, url = {https://doi.org/10.1186/s42400-018-0017-4}, doi = {10.1186/S42400-018-0017-4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/BohmMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/RichthammerWP18, author = {Christian Richthammer and Michael Weber and G{\"{u}}nther Pernul}, title = {State of the art of reputation-enhanced recommender systems}, journal = {Web Intell.}, volume = {16}, number = {4}, pages = {273--286}, year = {2018}, url = {https://doi.org/10.3233/WEB-180394}, doi = {10.3233/WEB-180394}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wias/RichthammerWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/DietzP18, author = {Marietheres Dietz and G{\"{u}}nther Pernul}, editor = {Sven Hartmann and Hui Ma and Abdelkader Hameurlain and G{\"{u}}nther Pernul and Roland R. Wagner}, title = {Big Log Data Stream Processing: Adapting an Anomaly Detection Technique}, booktitle = {Database and Expert Systems Applications - 29th International Conference, {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11030}, pages = {159--166}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98812-2\_12}, doi = {10.1007/978-3-319-98812-2\_12}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/DietzP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HummerGKFP18, author = {Matthias Hummer and Sebastian Groll and Michael Kunz and Ludwig Fuchs and G{\"{u}}nther Pernul}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {233--240}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006557702330240}, doi = {10.5220/0006557702330240}, timestamp = {Wed, 11 Apr 2018 15:27:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HummerGKFP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dexa/2018-1, editor = {Sven Hartmann and Hui Ma and Abdelkader Hameurlain and G{\"{u}}nther Pernul and Roland R. Wagner}, title = {Database and Expert Systems Applications - 29th International Conference, {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11029}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98809-2}, doi = {10.1007/978-3-319-98809-2}, isbn = {978-3-319-98808-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dexa/2018-2, editor = {Sven Hartmann and Hui Ma and Abdelkader Hameurlain and G{\"{u}}nther Pernul and Roland R. Wagner}, title = {Database and Expert Systems Applications - 29th International Conference, {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11030}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98812-2}, doi = {10.1007/978-3-319-98812-2}, isbn = {978-3-319-98811-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2018, editor = {Steven Furnell and Haralambos Mouratidis and G{\"{u}}nther Pernul}, title = {Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11033}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98385-1}, doi = {10.1007/978-3-319-98385-1}, isbn = {978-3-319-98384-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OppligerPK17, author = {Rolf Oppliger and G{\"{u}}nther Pernul and Sokratis K. Katsikas}, title = {New Frontiers: Assessing and Managing Security Risks}, journal = {Computer}, volume = {50}, number = {4}, pages = {48--51}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.93}, doi = {10.1109/MC.2017.93}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OppligerPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dais/RichthammerSP17, author = {Christian Richthammer and Johannes S{\"{a}}nger and G{\"{u}}nther Pernul}, title = {Interactive Visualization of Recommender Systems Data}, booktitle = {Proceedings of the 4th Workshop on Security in Highly Connected {IT} Systems, SHCIS@DAIS 2017, Neuch{\^{a}}tel, Switzerland, June 21 - 22, 2017}, pages = {19--24}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3099012.3099014}, doi = {10.1145/3099012.3099014}, timestamp = {Fri, 21 Dec 2018 12:51:05 +0100}, biburl = {https://dblp.org/rec/conf/dais/RichthammerSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/RichthammerWP17, author = {Christian Richthammer and Michael Weber and G{\"{u}}nther Pernul}, editor = {Jan{-}Philipp Stegh{\"{o}}fer and Babak Esfandiari}, title = {Reputation-Enhanced Recommender Systems}, booktitle = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {505}, pages = {163--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59171-1\_13}, doi = {10.1007/978-3-319-59171-1\_13}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/RichthammerWP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HummerKNFP16, author = {Matthias Hummer and Michael Kunz and Michael Netter and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Adaptive identity and access management - contextual data based policies}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {19}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0043-2}, doi = {10.1186/S13635-016-0043-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HummerKNFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/RichthammerP16, author = {Christian Richthammer and G{\"{u}}nther Pernul}, editor = {Derek Bridge and Heiner Stuckenschmidt}, title = {Explorative Analysis of Recommendations Through Interactive Visualization}, booktitle = {E-Commerce and Web Technologies - 17th International Conference, EC-Web 2016, Porto, Portugal, September 5-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {278}, pages = {46--57}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53676-7\_4}, doi = {10.1007/978-3-319-53676-7\_4}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/RichthammerP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HummerKNFP15, author = {Matthias Hummer and Michael Kunz and Michael Netter and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Advanced Identity and Access Policy Management Using Contextual Data}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {40--49}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.40}, doi = {10.1109/ARES.2015.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HummerKNFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SangerRKP15, author = {Johannes S{\"{a}}nger and Christian Richthammer and Andr{\'{e}} Kremser and G{\"{u}}nther Pernul}, editor = {Pierangela Samarati}, title = {Personalized Composition of Trustful Reputation Systems}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {207--214}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_13}, doi = {10.1007/978-3-319-20810-7\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SangerRKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/SangerRKMP15, author = {Johannes S{\"{a}}nger and Christian Richthammer and Michael Kunz and Stefan Meier and G{\"{u}}nther Pernul}, editor = {J{\"{o}}rg Becker and Jan vom Brocke and Marco de Marco}, title = {Visualizing Unfair Ratings in Online Reputation Systems}, booktitle = {23rd European Conference on Information Systems, {ECIS} 2015, M{\"{u}}nster, Germany, May 26-29, 2015}, year = {2015}, url = {http://aisel.aisnet.org/ecis2015\_cr/159}, timestamp = {Thu, 22 Feb 2018 16:52:21 +0100}, biburl = {https://dblp.org/rec/conf/ecis/SangerRKMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KunzFHP15, author = {Michael Kunz and Ludwig Fuchs and Matthias Hummer and G{\"{u}}nther Pernul}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Introducing Dynamic Identity and Access Management in Organizations}, booktitle = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {139--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0\_9}, doi = {10.1007/978-3-319-26961-0\_9}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/KunzFHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NetterPRR15, author = {Michael Netter and G{\"{u}}nther Pernul and Christian Richthammer and Moritz Riesner}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Privacy in Social Networks: Existing Challenges and Proposals for Solutions}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {16--27}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_2}, doi = {10.1007/978-3-319-27668-7\_2}, timestamp = {Thu, 16 May 2019 16:43:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NetterPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunzFNP15a, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {How to Discover High-Quality Roles? {A} Survey and Dependency Analysis of Quality Criteria in Role Mining}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {49--67}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_4}, doi = {10.1007/978-3-319-27668-7\_4}, timestamp = {Thu, 16 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunzFNP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/KunzFNP15, author = {Michael Kunz and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Analyzing Quality Criteria in Role-based Identity and Access Management}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {64--72}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005232100640072}, doi = {10.5220/0005232100640072}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/KunzFNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Pernul15, author = {G{\"{u}}nther Pernul}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Privacy in Social Networks - Existing Challenges and Proposals for Solution}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {IS--11}, publisher = {SciTePress}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7509911/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Pernul15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/SangerRRP15, author = {Johannes S{\"{a}}nger and Christian Richthammer and Artur R{\"{o}}sch and G{\"{u}}nther Pernul}, editor = {Christian Damsgaard Jensen and Stephen Marsh and Theo Dimitrakos and Yuko Murayama}, title = {Reusable Defense Components for Online Reputation Systems}, booktitle = {Trust Management {IX} - 9th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {454}, pages = {195--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18491-3\_15}, doi = {10.1007/978-3-319-18491-3\_15}, timestamp = {Sun, 02 Oct 2022 16:07:38 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/SangerRRP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015-1, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6}, doi = {10.1007/978-3-319-24174-6}, isbn = {978-3-319-24173-9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015-2, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7}, doi = {10.1007/978-3-319-24177-7}, isbn = {978-3-319-24176-0}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RichthammerNRSP14, author = {Christian Richthammer and Michael Netter and Moritz Riesner and Johannes S{\"{a}}nger and G{\"{u}}nther Pernul}, title = {Taxonomy of social network data types}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {11}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0011-7}, doi = {10.1186/S13635-014-0011-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RichthammerNRSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SangerP14, author = {Johannes S{\"{a}}nger and G{\"{u}}nther Pernul}, title = {Visualizing Transaction Context in Trust and Reputation Systems}, booktitle = {Ninth International Conference on Availability, Reliability and Security, {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014}, pages = {94--103}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ARES.2014.19}, doi = {10.1109/ARES.2014.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SangerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/HassanSP14, author = {Sabri Hassan and Johannes S{\"{a}}nger and G{\"{u}}nther Pernul}, title = {SoDA: Dynamic visual analytics of big social data}, booktitle = {International Conference on Big Data and Smart Computing, {BIGCOMP} 2014, Bangkok, Thailand, January 15-17, 2014}, pages = {183--188}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/BIGCOMP.2014.6741433}, doi = {10.1109/BIGCOMP.2014.6741433}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigcomp/HassanSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/KunzHFNP14, author = {Michael Kunz and Matthias Hummer and Ludwig Fuchs and Michael Netter and G{\"{u}}nther Pernul}, title = {Analyzing Recent Trends in Enterprise Identity Management}, booktitle = {25th International Workshop on Database and Expert Systems Applications, {DEXA} 2014, Munich, Germany, September 1-5, 2014}, pages = {273--277}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DEXA.2014.62}, doi = {10.1109/DEXA.2014.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/KunzHFNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/SangerRHP14, author = {Johannes S{\"{a}}nger and Christian Richthammer and Sabri Hassan and G{\"{u}}nther Pernul}, title = {Trust and Big Data: {A} Roadmap for Research}, booktitle = {25th International Workshop on Database and Expert Systems Applications, {DEXA} 2014, Munich, Germany, September 1-5, 2014}, pages = {278--282}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DEXA.2014.63}, doi = {10.1109/DEXA.2014.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/SangerRHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/FuchsKP14, author = {Ludwig Fuchs and Michael Kunz and G{\"{u}}nther Pernul}, editor = {Michel Avital and Jan Marco Leimeister and Ulrike Schultze}, title = {Role Model Optimization for Secure Role-Based Identity Management}, booktitle = {22st European Conference on Information Systems, {ECIS} 2014, Tel Aviv, Israel, June 9-11, 2014}, year = {2014}, url = {http://aisel.aisnet.org/ecis2014/proceedings/track14/7}, timestamp = {Mon, 30 Jun 2014 19:17:09 +0200}, biburl = {https://dblp.org/rec/conf/ecis/FuchsKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/NetterWDP14, author = {Michael Netter and Michael Weber and Michael Diener and G{\"{u}}nther Pernul}, editor = {Michel Avital and Jan Marco Leimeister and Ulrike Schultze}, title = {Visualizing Social Roles - Design and Evaluation of a Bird's-eye View of Social Network Privacy Settings}, booktitle = {22st European Conference on Information Systems, {ECIS} 2014, Tel Aviv, Israel, June 9-11, 2014}, year = {2014}, url = {http://aisel.aisnet.org/ecis2014/proceedings/track14/13}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecis/NetterWDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/SangerP14, author = {Johannes S{\"{a}}nger and G{\"{u}}nther Pernul}, editor = {Jianying Zhou and Nurit Gal{-}Oz and Jie Zhang and Ehud Gudes}, title = {Reusability for Trust and Reputation Systems}, booktitle = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {430}, pages = {28--43}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43813-8\_3}, doi = {10.1007/978-3-662-43813-8\_3}, timestamp = {Thu, 23 Sep 2021 11:47:43 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/SangerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/HassanP14, author = {Sabri Hassan and G{\"{u}}nther Pernul}, editor = {Maria Indrawan{-}Santiago and Matthias Steinbauer and Hong{-}Quang Nguyen and A Min Tjoa and Ismail Khalil and Gabriele Anderst{-}Kotsis}, title = {Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics}, booktitle = {Proceedings of the 16th International Conference on Information Integration and Web-based Applications {\&} Services, Hanoi, Vietnam, December 4-6, 2014}, pages = {180--184}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2684200.2684333}, doi = {10.1145/2684200.2684333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiwas/HassanP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MeierP14, author = {Stefan Meier and G{\"{u}}nther Pernul}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Einsatz von digitaler Forensik in Unternehmen und Organisationen}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {103--114}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20072}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MeierP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2014, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4}, doi = {10.1007/978-3-662-43936-4}, isbn = {978-3-662-43935-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2014, editor = {Claudia Eckert and Sokratis K. Katsikas and G{\"{u}}nther Pernul}, title = {Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8647}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09770-1}, doi = {10.1007/978-3-319-09770-1}, isbn = {978-3-319-09769-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CettoNPRRRS14, author = {Alexandra Cetto and Michael Netter and G{\"{u}}nther Pernul and Christian Richthammer and Moritz Riesner and Christian Roth and Johannes S{\"{a}}nger}, title = {Friend Inspector: {A} Serious Game to Enhance Privacy Awareness in Social Networks}, journal = {CoRR}, volume = {abs/1402.5878}, year = {2014}, url = {http://arxiv.org/abs/1402.5878}, eprinttype = {arXiv}, eprint = {1402.5878}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CettoNPRRRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/LopezNPPP13, author = {Javier L{\'{o}}pez and Svetla Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul and Bart Preneel}, title = {Preface}, journal = {Comput. Math. Appl.}, volume = {65}, number = {5}, pages = {747}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2013.02.001}, doi = {10.1016/J.CAMWA.2013.02.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/LopezNPPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/FuchsP13, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Qualit{\"{a}}tssicherung im Identity- und Access Management}, journal = {{HMD} Prax. Wirtsch.}, volume = {289}, pages = {88--97}, year = {2013}, url = {http://www.dpunkt.de/hmdissues/289/09.php}, doi = {10.1007/BF03340780}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/FuchsP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RiesnerNP13, author = {Moritz Riesner and Michael Netter and G{\"{u}}nther Pernul}, title = {Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {185--198}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.005}, doi = {10.1016/J.ISTR.2013.02.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RiesnerNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RichthammerNRP13, author = {Christian Richthammer and Michael Netter and Moritz Riesner and G{\"{u}}nther Pernul}, title = {Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {141--150}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.18}, doi = {10.1109/ARES.2013.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RichthammerNRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/NetterRWP13, author = {Michael Netter and Moritz Riesner and Michael Weber and G{\"{u}}nther Pernul}, title = {Privacy Settings in Online Social Networks - Preferences, Perception, and Reality}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {3219--3228}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.455}, doi = {10.1109/HICSS.2013.455}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/NetterRWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wirtschaftsinformatik/MeierFP13, author = {Stefan Meier and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Managing the Access Grid - {A} Process View to Minimize Insider Misuse Risks}, booktitle = {11. Internationale Tagung Wirtschaftsinformatik, Leipzig, Germany, February 27 -- March 1, 2013}, pages = {66}, year = {2013}, url = {http://aisel.aisnet.org/wi2013/66}, timestamp = {Fri, 10 May 2013 20:30:17 +0200}, biburl = {https://dblp.org/rec/conf/wirtschaftsinformatik/MeierFP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FuchsP12, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Minimizing insider misuse through secure Identity Management}, journal = {Secur. Commun. Networks}, volume = {5}, number = {8}, pages = {847--862}, year = {2012}, url = {https://doi.org/10.1002/sec.314}, doi = {10.1002/SEC.314}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FuchsP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RiesnerNP12, author = {Moritz Riesner and Michael Netter and G{\"{u}}nther Pernul}, title = {An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {103--112}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.20}, doi = {10.1109/ARES.2012.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RiesnerNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/RiesnerP12, author = {Moritz Riesner and G{\"{u}}nther Pernul}, title = {Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking Sites}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {800--809}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.490}, doi = {10.1109/HICSS.2012.490}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/RiesnerP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/FritschP12, author = {Christoph Fritsch and G{\"{u}}nther Pernul}, title = {User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection}, booktitle = {Ninth {IEEE} International Conference on e-Business Engineering, {ICEBE} 2012, Hangzhou, China, September 9-11, 2012}, pages = {193--200}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICEBE.2012.39}, doi = {10.1109/ICEBE.2012.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/FritschP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/RiesnerP12, author = {Moritz Riesner and G{\"{u}}nther Pernul}, title = {Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - {A} Data-centric Perspective}, booktitle = {2012 International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012}, pages = {860--867}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SocialCom-PASSAT.2012.15}, doi = {10.1109/SOCIALCOM-PASSAT.2012.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/RiesnerP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/NetterHP12, author = {Michael Netter and Sabri Hassan and G{\"{u}}nther Pernul}, editor = {Simone Fischer{-}H{\"{u}}bner and Sokratis K. Katsikas and Gerald Quirchmayr}, title = {An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control}, booktitle = {Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7449}, pages = {65--78}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32287-7\_6}, doi = {10.1007/978-3-642-32287-7\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/NetterHP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/GmelchP12, author = {Oliver Gmelch and G{\"{u}}nther Pernul}, title = {A Generic Architecture for User-Centric Portlet Integration}, booktitle = {14th {IEEE} International Conference on Commerce and Enterprise Computing, {CEC} 2012, Hangzhou, China, September 9-11, 2012}, pages = {70--77}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CEC.2012.20}, doi = {10.1109/CEC.2012.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/GmelchP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2011, editor = {Svetla Petkova{-}Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul}, title = {Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7163}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29804-2}, doi = {10.1007/978-3-642-29804-2}, isbn = {978-3-642-29803-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FuchsPS11, author = {Ludwig Fuchs and G{\"{u}}nther Pernul and Ravi S. Sandhu}, title = {Roles in information security - {A} survey and classification of the research area}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {748--769}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.08.002}, doi = {10.1016/J.COSE.2011.08.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FuchsPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/DurbeckKPS11, author = {Stefan D{\"{u}}rbeck and Jan Paul Kolter and G{\"{u}}nther Pernul and Rolf Schillinger}, title = {Eine verteilte Autorisierungsinfrastruktur unter Ber{\"{u}}cksichtigung von Datenschutzaspekten}, journal = {Inform. Spektrum}, volume = {34}, number = {3}, pages = {265--275}, year = {2011}, url = {https://doi.org/10.1007/s00287-009-0411-0}, doi = {10.1007/S00287-009-0411-0}, timestamp = {Sun, 05 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/DurbeckKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WeipplTP11, author = {Edgar R. Weippl and A Min Tjoa and G{\"{u}}nther Pernul}, title = {Guest Editorial: Advances in Applied Security}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.001}, doi = {10.22667/JOWUA.2011.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WeipplTP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/FritschBP11, author = {Christoph Fritsch and Peter Bedn{\'{a}}r and G{\"{u}}nther Pernul}, editor = {Christian Huemer and Thomas Setzer}, title = {{DS3I} - {A} Dynamic Semantically Enhanced Service Selection Infrastructure}, booktitle = {E-Commerce and Web Technologies - 12th International Conference, EC-Web 2011, Toulouse, France, August 30 - September 1, 2011. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {85}, pages = {13--24}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23014-1\_2}, doi = {10.1007/978-3-642-23014-1\_2}, timestamp = {Mon, 03 Jan 2022 22:18:47 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/FritschBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/NetterHP11, author = {Michael Netter and Sebastian Herbst and G{\"{u}}nther Pernul}, title = {Analyzing Privacy in Social Networks-An Interdisciplinary Approach}, booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011}, pages = {1327--1334}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PASSAT/SocialCom.2011.22}, doi = {10.1109/PASSAT/SOCIALCOM.2011.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/NetterHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wirtschaftsinformatik/NetterRP11, author = {Michael Netter and Moritz Riesner and G{\"{u}}nther Pernul}, title = {Assisted Social Identity Management}, booktitle = {10. Internationale Tagung Wirtschaftsinformatik, Z{\"{u}}rich, 16.-18. Februar 2011}, pages = {6}, year = {2011}, url = {http://aisel.aisnet.org/wi2011/6}, timestamp = {Mon, 27 Feb 2012 21:21:41 +0100}, biburl = {https://dblp.org/rec/conf/wirtschaftsinformatik/NetterRP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wirtschaftsinformatik/GmelchP11, author = {Oliver Gmelch and G{\"{u}}nther Pernul}, title = {A portal-based approach for user-centric legacy application integration in collaborative environments}, booktitle = {10. Internationale Tagung Wirtschaftsinformatik, Z{\"{u}}rich, 16.-18. Februar 2011}, pages = {45}, year = {2011}, url = {http://aisel.aisnet.org/wi2011/45}, timestamp = {Mon, 27 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wirtschaftsinformatik/GmelchP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2011, editor = {Steven Furnell and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6863}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22890-2}, doi = {10.1007/978-3-642-22890-2}, isbn = {978-3-642-22889-6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/PernulR11, author = {G{\"{u}}nther Pernul and Moritz Riesner}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Conceptual Design of Secure Databases}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {245--248}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_673}, doi = {10.1007/978-1-4419-5906-5\_673}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/PernulR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KolterKP10, author = {Jan Paul Kolter and Thomas Kernchen and G{\"{u}}nther Pernul}, title = {Collaborative privacy management}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {580--591}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.007}, doi = {10.1016/J.COSE.2009.12.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KolterKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FuchsP10, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {14--28}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.014}, doi = {10.22667/JOWUA.2010.06.31.014}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FuchsP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KolterNP10, author = {Jan Paul Kolter and Michael Netter and G{\"{u}}nther Pernul}, title = {Visualizing Past Personal Data Disclosures}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {131--139}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.51}, doi = {10.1109/ARES.2010.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KolterNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DurbeckFPS10, author = {Stefan Durbeck and Christoph Fritsch and G{\"{u}}nther Pernul and Rolf Schillinger}, title = {A Semantic Security Architecture for Web Services}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {222--227}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.117}, doi = {10.1109/ARES.2010.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DurbeckFPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NetterFP10, author = {Michael Netter and Eduardo B. Fern{\'{a}}ndez and G{\"{u}}nther Pernul}, title = {Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {560--564}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.50}, doi = {10.1109/ARES.2010.50}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NetterFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/PernulR10, author = {G{\"{u}}nther Pernul and Matti Rossi}, editor = {Juan Trujillo and Gillian Dobbie and Hannu Kangassalo and Sven Hartmann and Markus Kirchberg and Matti Rossi and Iris Reinhartz{-}Berger and Esteban Zim{\'{a}}nyi and Flavius Frasincar}, title = {6th International Workshop on Foundations and Practices of {UML} {(FP-UML} 2010)}, booktitle = {Advances in Conceptual Modeling - Applications and Challenges, {ER} 2010 Workshops ACM-L, CMLSA, CMS, DE@ER, FP-UML, SeCoGIS, WISM, Vancouver, BC, Canada, November 1-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6413}, pages = {242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16385-2\_30}, doi = {10.1007/978-3-642-16385-2\_30}, timestamp = {Wed, 09 Jun 2021 08:38:38 +0200}, biburl = {https://dblp.org/rec/conf/er/PernulR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GmelchP10, author = {Oliver Gmelch and G{\"{u}}nther Pernul}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {177--182}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/GmelchP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/FritschNRP10, author = {Christoph Fritsch and Michael Netter and Andreas Reisser and G{\"{u}}nther Pernul}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Miguel Soriano}, title = {Attacking Image Recognition Captchas - {A} Naive but Effective Approach}, booktitle = {Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6264}, pages = {13--25}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15152-1\_2}, doi = {10.1007/978-3-642-15152-1\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/FritschNRP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/FritschP10, author = {Christoph Fritsch and G{\"{u}}nther Pernul}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Miguel Soriano}, title = {Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution}, booktitle = {Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6264}, pages = {214--226}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15152-1\_19}, doi = {10.1007/978-3-642-15152-1\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/FritschP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FuchsBP09, author = {Ludwig Fuchs and Christian Broser and G{\"{u}}nther Pernul}, title = {Different Approaches to In-House Identity Management - Justification of an Assumption}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {122--129}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.154}, doi = {10.1109/ARES.2009.154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FuchsBP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KolterP09, author = {Jan Paul Kolter and G{\"{u}}nther Pernul}, title = {Generating User-Understandable Privacy Preferences}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {299--306}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.89}, doi = {10.1109/ARES.2009.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KolterP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/NetterP09, author = {Michael Netter and G{\"{u}}nther Pernul}, editor = {A Min Tjoa and Roland R. Wagner}, title = {Integrating Security Patterns into the Electronic Invoicing Process}, booktitle = {Database and Expert Systems Applications, DEXA, International Workshops, Linz, Austria, August 31-September 4, 2009, Proceedings}, pages = {150--154}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DEXA.2009.12}, doi = {10.1109/DEXA.2009.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/NetterP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/digibiz/BroserFGPSW09, author = {Christian Broser and Christoph Fritsch and Oliver Gmelch and G{\"{u}}nther Pernul and Rolf Schillinger and Sandra Wiesbeck}, editor = {Luigi Telesca and Katarina Stanoevska{-}Slabeva and Veselin Rakocevic}, title = {Analysing Requirements for Virtual Business Alliances - The Case of {SPIKE}}, booktitle = {Digital Business - First Iternational {ICST} Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {21}, pages = {35--44}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11532-5\_5}, doi = {10.1007/978-3-642-11532-5\_5}, timestamp = {Fri, 19 May 2017 01:25:18 +0200}, biburl = {https://dblp.org/rec/conf/digibiz/BroserFGPSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KolterKP09, author = {Jan Paul Kolter and Thomas Kernchen and G{\"{u}}nther Pernul}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Collaborative Privacy - {A} Community-Based Privacy Infrastructure}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {226--236}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_20}, doi = {10.1007/978-3-642-01244-0\_20}, timestamp = {Sun, 05 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KolterKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/er/2009w, editor = {Carlos A. Heuser and G{\"{u}}nther Pernul}, title = {Advances in Conceptual Modeling - Challenging Perspectives, {ER} 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5833}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04947-7}, doi = {10.1007/978-3-642-04947-7}, isbn = {978-3-642-04946-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/2009w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2009, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5695}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03748-1}, doi = {10.1007/978-3-642-03748-1}, isbn = {978-3-642-03747-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchlagerP08, author = {Christian Schl{\"{a}}ger and G{\"{u}}nther Pernul}, title = {Trust Modelling in E-Commerce through Fuzzy Cognitive Maps}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {344--351}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.23}, doi = {10.1109/ARES.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SchlagerP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SchlagerFP08, author = {Christian Schl{\"{a}}ger and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Intensive Programme on Information and Communication Security}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {752--757}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.73}, doi = {10.1109/ARES.2008.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SchlagerFP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/FuchsP08, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, editor = {Willie Golden and Thomas Acton and Kieran Conboy and Hans van der Heijden and Virpi Kristiina Tuunainen}, title = {Prorole: {A} Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects}, booktitle = {16th European Conference on Information Systems, {ECIS} 2008, Galway, Ireland, 2008}, pages = {1322--1333}, year = {2008}, url = {http://aisel.aisnet.org/ecis2008/111}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/FuchsP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/FuchsP08, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, editor = {R. Sekar and Arun K. Pujari}, title = {HyDRo - Hybrid Development of Roles}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {287--302}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_24}, doi = {10.1007/978-3-540-89862-7\_24}, timestamp = {Thu, 18 Nov 2021 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/iciss/FuchsP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/FernandezPL08, author = {Eduardo B. Fern{\'{a}}ndez and G{\"{u}}nther Pernul and Mar{\'{\i}}a M. Larrondo{-}Petrie}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Patterns and Pattern Diagrams for Access Control}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {38--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_5}, doi = {10.1007/978-3-540-85735-8\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/FernandezPL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FuchsP07, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Supporting Compliant and Secure User Handling - {A} Structured Approach for In-House Identity Management}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {374--384}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.145}, doi = {10.1109/ARES.2007.145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FuchsP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bled/SchlagerPLP07, author = {Christian Schl{\"{a}}ger and Torsten Priebe and Manuel Liewald and G{\"{u}}nther Pernul}, title = {Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures}, booktitle = {20th Bled eConference: eMergence: Merging and Emerging Technologies, Processes, and Institutions, Bled, Slovenia, June 3-6, 2007}, pages = {3}, year = {2007}, url = {http://aisel.aisnet.org/bled2007/3}, timestamp = {Mon, 28 Nov 2016 08:13:49 +0100}, biburl = {https://dblp.org/rec/conf/bled/SchlagerPLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KolterSP07, author = {Jan Paul Kolter and Rolf Schillinger and G{\"{u}}nther Pernul}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {A Privacy-Enhanced Attribute-Based Access Control System}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {129--143}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_11}, doi = {10.1007/978-3-540-73538-0\_11}, timestamp = {Sun, 05 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KolterSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/ErberSP07, author = {Roland Erber and Christian Schl{\"{a}}ger and G{\"{u}}nther Pernul}, title = {Patterns for Authentication and Authorisation Infrastructures}, booktitle = {18th International Workshop on Database and Expert Systems Applications {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany}, pages = {755--759}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DEXA.2007.4}, doi = {10.1109/DEXA.2007.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/ErberSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/DobmeierP07, author = {Wolfgang Dobmeier and G{\"{u}}nther Pernul}, title = {Towards Privacy-Aware Handling of Authorizations}, booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy}, pages = {70--76}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/POLICY.2007.47}, doi = {10.1109/POLICY.2007.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/DobmeierP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KolterSP07, author = {Jan Paul Kolter and Rolf Schillinger and G{\"{u}}nther Pernul}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Building a Distributed Semantic-aware Security Architecture}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {397--408}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_34}, doi = {10.1007/978-0-387-72367-9\_34}, timestamp = {Sun, 05 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KolterSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Pernul07, author = {G{\"{u}}nther Pernul}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {17}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Pernul07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PernulMFKKO07, author = {G{\"{u}}nther Pernul and Marco Casassa Mont and Eduardo B. Fern{\'{a}}ndez and Sokratis K. Katsikas and Alfred Kobsa and Rolf Oppliger}, editor = {Costas Lambrinoudakis and G{\"{u}}nther Pernul and A Min Tjoa}, title = {Panel Discussion: Managing Digital Identities - Challenges and Opportunities}, booktitle = {Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4657}, pages = {2}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74409-2\_2}, doi = {10.1007/978-3-540-74409-2\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/PernulMFKKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dexa/2007, editor = {Roland R. Wagner and Norman Revell and G{\"{u}}nther Pernul}, title = {Database and Expert Systems Applications, 18th International Conference, {DEXA} 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4653}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74469-6}, doi = {10.1007/978-3-540-74469-6}, isbn = {978-3-540-74467-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2007, editor = {Costas Lambrinoudakis and G{\"{u}}nther Pernul and A Min Tjoa}, title = {Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4657}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74409-2}, doi = {10.1007/978-3-540-74409-2}, isbn = {978-3-540-74408-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BuschMPP06, author = {S{\"{o}}nke Busch and Bj{\"{o}}rn Muschall and G{\"{u}}nther Pernul and Torsten Priebe}, editor = {Ernesto Damiani and Peng Liu}, title = {Authrule: {A} Generic Rule-Based Authorization Module}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {267--281}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_19}, doi = {10.1007/11805588\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BuschMPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/SchlagerSMP06, author = {Christian Schl{\"{a}}ger and Manuel Sojer and Bj{\"{o}}rn Muschall and G{\"{u}}nther Pernul}, editor = {Kurt Bauknecht and Birgit Pr{\"{o}}ll and Hannes Werthner}, title = {Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers}, booktitle = {E-Commerce and Web Technologies, 7th International Conference, EC-Web 2006, Krakow, Poland, September 5-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4082}, pages = {132--141}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11823865\_14}, doi = {10.1007/11823865\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/SchlagerSMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emisa/DobmeierP06, author = {Wolfgang Dobmeier and G{\"{u}}nther Pernul}, editor = {Mathias Weske and Markus N{\"{u}}ttgens}, title = {Modellierung von Zugriffsrichtlinien f{\"{u}}r offene Systeme}, booktitle = {{EMISA} 2006 - Methoden, Konzepte und Technologien f{\"{u}}r die Entwicklung von dienstbasierten Informationssystemen, Beitr{\"{a}}ge des Workshops der GI-Fachgruppe Entwicklungsmethoden f{\"{u}}r Informationssysteme und deren Anwendung (EMISA), 17.-18. Oktober 2006 in Hamburg}, series = {{LNI}}, volume = {{P-95}}, pages = {35--47}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/23485}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emisa/DobmeierP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/KatsikasLP05, author = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Editorial}, journal = {Comput. Syst. Sci. Eng.}, volume = {20}, number = {6}, year = {2005}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/KatsikasLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/KatsikasLP05a, author = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Trust, privacy and security in digital business}, journal = {Comput. Syst. Sci. Eng.}, volume = {20}, number = {6}, year = {2005}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/KatsikasLP05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/LopezOP05, author = {Javier L{\'{o}}pez and Rolf Oppliger and G{\"{u}}nther Pernul}, title = {Why have public key infrastructures failed so far?}, journal = {Internet Res.}, volume = {15}, number = {5}, pages = {544--556}, year = {2005}, url = {https://doi.org/10.1108/10662240510629475}, doi = {10.1108/10662240510629475}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/LopezOP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/BaskervilleDPS05, author = {Richard L. Baskerville and Gurpreet Dhillon and G{\"{u}}nther Pernul and Filipe de S{\'{a}}{-}Soares}, editor = {Dieter Bartmann and Federico Rajola and Jannis Kallinikos and David E. Avison and Robert Winter and Phillip Ein{-}Dor and J{\"{o}}rg Becker and Freimut Bodendorf and Christof Weinhardt}, title = {Panel: Information systems security standards: The solution or the problem?}, booktitle = {Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg, Germany, May 26-28, 2005}, pages = {1780--1782}, year = {2005}, url = {http://aisel.aisnet.org/ecis2005/159}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/BaskervilleDPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/SchlagerP05, author = {Christian Schl{\"{a}}ger and G{\"{u}}nther Pernul}, editor = {Kurt Bauknecht and Birgit Pr{\"{o}}ll and Hannes Werthner}, title = {Authentication and Authorisation Infrastructures in b2c e-Commerce}, booktitle = {E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3590}, pages = {306--315}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545163\_31}, doi = {10.1007/11545163\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/SchlagerP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LopezOP05, author = {Javier L{\'{o}}pez and Rolf Oppliger and G{\"{u}}nther Pernul}, editor = {David W. Chadwick and Gansen Zhao}, title = {Classifying Public Key Certificates}, booktitle = {Public Key Infrastructure, Second European {PKI} Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3545}, pages = {135--143}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533733\_9}, doi = {10.1007/11533733\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/LopezOP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/KatsikasLP05, author = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, editor = {Panayiotis Bozanis and Elias N. Houstis}, title = {Trust, Privacy and Security in E-Business: Requirements and Solutions}, booktitle = {Advances in Informatics, 10th Panhellenic Conference on Informatics, {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3746}, pages = {548--558}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11573036\_52}, doi = {10.1007/11573036\_52}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/pci/KatsikasLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PriebeDMP05, author = {Torsten Priebe and Wolfgang Dobmeier and Bj{\"{o}}rn Muschall and G{\"{u}}nther Pernul}, editor = {Hannes Federrath}, title = {{ABAC} - Ein Referenzmodell f{\"{u}}r attributbasierte Zugriffskontrolle}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {285--296}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28384}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PriebeDMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2005, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3592}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11537878}, doi = {10.1007/11537878}, isbn = {3-540-28224-6}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LopezOP04, author = {Javier L{\'{o}}pez and Rolf Oppliger and G{\"{u}}nther Pernul}, title = {Authentication and authorization infrastructures (AAIs): a comparative survey}, journal = {Comput. Secur.}, volume = {23}, number = {7}, pages = {578--590}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.06.013}, doi = {10.1016/J.COSE.2004.06.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LopezOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/PriebeFMP04, author = {Torsten Priebe and Eduardo B. Fern{\'{a}}ndez and Jens Ingo Mehlau and G{\"{u}}nther Pernul}, editor = {Csilla Farkas and Pierangela Samarati}, title = {A Pattern System for Access Control}, booktitle = {Research Directions in Data and Applications Security XVIII, {IFIP} {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain}, series = {{IFIP}}, volume = {144}, pages = {235--249}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8128-6\_16}, doi = {10.1007/1-4020-8128-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/PriebeFMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PriebeMDP04, author = {Torsten Priebe and Bj{\"{o}}rn Muschall and Wolfgang Dobmeier and G{\"{u}}nther Pernul}, editor = {Fernando Galindo and Makoto Takizawa and Roland Traunm{\"{u}}ller}, title = {A Flexible Security System for Enterprise and e-Government Portals}, booktitle = {Database and Expert Systems Applications, 15th International Conference, {DEXA} 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3180}, pages = {884--893}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30075-5\_85}, doi = {10.1007/978-3-540-30075-5\_85}, timestamp = {Sat, 30 Sep 2023 09:38:52 +0200}, biburl = {https://dblp.org/rec/conf/dexa/PriebeMDP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/PriebeSP04, author = {Torsten Priebe and Christian Schl{\"{a}}ger and G{\"{u}}nther Pernul}, title = {A Search Engine for {RDF} Metadata}, booktitle = {15th International Workshop on Database and Expert Systems Applications {(DEXA} 2004), with CD-ROM, 30 August - 3 September 2004, Zaragoza, Spain}, pages = {168--172}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/DEXA.2004.1333468}, doi = {10.1109/DEXA.2004.1333468}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/PriebeSP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DridiMP04, author = {Fredj Dridi and Bj{\"{o}}rn Muschall and G{\"{u}}nther Pernul}, title = {Administration of an {RBAC} System}, booktitle = {37th Hawaii International Conference on System Sciences {(HICSS-37} 2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/HICSS.2004.1265447}, doi = {10.1109/HICSS.2004.1265447}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DridiMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2004, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3184}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99832}, doi = {10.1007/B99832}, isbn = {3-540-22919-1}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0008789, author = {G{\"{u}}nther Pernul and Rainer Unland}, title = {Datenbanken im Unternehmen - Analyse, Modellbildung und Einsatz {(2)}}, series = {Lehrb{\"{u}}cher Wirtschaftsinformatik}, publisher = {Oldenbourg}, year = {2003}, isbn = {978-3-486-27210-9}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0008789.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LambrinoudakisGDP03, author = {Costas Lambrinoudakis and Stefanos Gritzalis and Fredj Dridi and G{\"{u}}nther Pernul}, title = {Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1873--1883}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00082-3}, doi = {10.1016/S0140-3664(03)00082-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LambrinoudakisGDP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/DridiMP03, author = {Fredj Dridi and Bj{\"{o}}rn Muschall and G{\"{u}}nther Pernul}, editor = {Johann Eder and Tatjana Welzer}, title = {An Administration Console for the {CSAP} System}, booktitle = {The 15th Conference on Advanced Information Systems Engineering (CAiSE '03), Klagenfurt/Velden, Austria, 16-20 June, 2003, CAiSE Forum, Short Paper Proceedings, Information Systems for a Connected Society}, series = {{CEUR} Workshop Proceedings}, volume = {74}, publisher = {CEUR-WS.org}, year = {2003}, url = {https://ceur-ws.org/Vol-74/files/FORUM\_15.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:33 +0100}, biburl = {https://dblp.org/rec/conf/caise/DridiMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/PriebeP03, author = {Torsten Priebe and G{\"{u}}nther Pernul}, title = {Towards integrative enterprise knowledge portals}, booktitle = {Proceedings of the 2003 {ACM} {CIKM} International Conference on Information and Knowledge Management, New Orleans, Louisiana, USA, November 2-8, 2003}, pages = {216--223}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/956863.956906}, doi = {10.1145/956863.956906}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/PriebeP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/PriebeP03, author = {Torsten Priebe and G{\"{u}}nther Pernul}, title = {Ontology-based Integration of {OLAP} and Information Retrieval}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {610--614}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232089}, doi = {10.1109/DEXA.2003.1232089}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/PriebeP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/Pernul03, author = {G{\"{u}}nther Pernul}, editor = {Kurt Bauknecht and A Min Tjoa and Gerald Quirchmayr}, title = {Trust for Digital Products}, booktitle = {E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2738}, pages = {1--5}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45229-4\_1}, doi = {10.1007/978-3-540-45229-4\_1}, timestamp = {Tue, 29 Dec 2020 18:30:42 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/Pernul03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/DridiP03, author = {Fredj Dridi and G{\"{u}}nther Pernul}, editor = {Klaus R. Dittrich and Wolfgang K{\"{o}}nig and Andreas Oberweis and Kai Rannenberg and Wolfgang Wahlster}, title = {Webocrat: Ein B{\"{u}}rgerportal f{\"{u}}r e-democracy}, booktitle = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Innovative Informatikanwendungen, {INFORMATIK} 2003, Frankfurt am Main, Germany, September 29 - October 2, 2003, Band 2}, series = {{LNI}}, volume = {{P-35}}, pages = {229--231}, publisher = {{GI}}, year = {2003}, url = {https://dl.gi.de/handle/20.500.12116/29694}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/DridiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DridiFP03, author = {Fredj Dridi and Michael Fischer and G{\"{u}}nther Pernul}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {{CSAP} - An Adaptable Security Module for the E-Government System Webocrat}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {301--312}, publisher = {Kluwer}, year = {2003}, timestamp = {Tue, 18 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/DridiFP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wirtschaftsinformatik/PriebePK03, author = {Torsten Priebe and G{\"{u}}nther Pernul and Peter Krause}, editor = {Wolfgang Uhr and Werner Esswein and Eric Schoop}, title = {Ein integrativer Ansatz f{\"{u}}r unternehmensweite Wissensportale}, booktitle = {Wirtschaftsinformatik 2003, Medien - M{\"{a}}rkte - Mobilit{\"{a}}t, Band {II}}, pages = {277--292}, publisher = {Physica-Verlag}, year = {2003}, url = {http://aisel.aisnet.org/wi2003/67}, timestamp = {Mon, 27 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wirtschaftsinformatik/PriebePK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/LopezP02, author = {Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Message from the TrustBus Workshop Chairs}, booktitle = {13th International Workshop on Database and Expert Systems Applications {(DEXA} 2002), 2-6 September 2002, Aix-en-Provence, France}, pages = {409--412}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.ieeecomputersociety.org/10.1109/DEXA.2002.10003}, doi = {10.1109/DEXA.2002.10003}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/LopezP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ol/PernulU01, author = {G{\"{u}}nther Pernul and Rainer Unland}, title = {Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz}, publisher = {Oldenbourg}, year = {2001}, url = {http://www.wi-inf.uni-essen.de/\%7Eifs/DBSiU/}, isbn = {3-486-25580-0}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ol/PernulU01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/PriebeP01, author = {Torsten Priebe and G{\"{u}}nther Pernul}, editor = {Hideko S. Kunii and Sushil Jajodia and Arne S{\o}lvberg}, title = {A Pragmatic Approach to Conceptual Modeling of {OLAP} Security}, booktitle = {Conceptual Modeling - {ER} 2001, 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2224}, pages = {311--324}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45581-7\_24}, doi = {10.1007/3-540-45581-7\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/PriebeP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wirtschaftsinformatik/PriebeP01, author = {Torsten Priebe and G{\"{u}}nther Pernul}, editor = {Hans Ulrich Buhl and Andreas Huther and Bernd Reitwiesner}, title = {Metadaten-gest{\"{u}}tzter Data-Warehouse-Entwurf mit ADAPTed {UML}}, booktitle = {Information Age Economy: 5. Internationale Tagung Wirtschaftsinformatik 2001, Augsburg, Germany}, pages = {8}, publisher = {Physica Verlag / Springer}, year = {2001}, url = {http://aisel.aisnet.org/wi2001/8}, timestamp = {Mon, 27 Feb 2012 21:33:31 +0100}, biburl = {https://dblp.org/rec/conf/wirtschaftsinformatik/PriebeP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecweb/2001, editor = {Kurt Bauknecht and Sanjay Kumar Madria and G{\"{u}}nther Pernul}, title = {Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2115}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44700-8}, doi = {10.1007/3-540-44700-8}, isbn = {3-540-42517-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/RohmP00, author = {Alexander W. R{\"{o}}hm and G{\"{u}}nther Pernul}, title = {{COPS:} a model and infrastructure for secure and fair electronic markets}, journal = {Decis. Support Syst.}, volume = {29}, number = {4}, pages = {343--355}, year = {2000}, url = {https://doi.org/10.1016/S0167-9236(00)00082-8}, doi = {10.1016/S0167-9236(00)00082-8}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/RohmP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijecommerce/MandryPR00, author = {Torsten Mandry and G{\"{u}}nther Pernul and Alexander W. R{\"{o}}hm}, title = {Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection}, journal = {Int. J. Electron. Commer.}, volume = {5}, number = {2}, pages = {47--60}, year = {2000}, url = {https://doi.org/10.1080/10864415.2000.11044203}, doi = {10.1080/10864415.2000.11044203}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijecommerce/MandryPR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dolap/PriebeP00, author = {Torsten Priebe and G{\"{u}}nther Pernul}, editor = {Rokia Missaoui and Il{-}Yeol Song}, title = {Towards {OLAP} Security Design - Survey and Research Issues}, booktitle = {Third {ACM} International Workshop on Data Warehousing and {OLAP} {(DOLAP} 2000), Washington, DC, USA, November 10, 2000}, pages = {33--40}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/355068.355313}, doi = {10.1145/355068.355313}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dolap/PriebeP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecweb/2000, editor = {Kurt Bauknecht and Sanjay Kumar Madria and G{\"{u}}nther Pernul}, title = {Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1875}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44463-7}, doi = {10.1007/3-540-44463-7}, isbn = {3-540-67981-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijecommerce/HerrmannP99, author = {Gaby Herrmann and G{\"{u}}nther Pernul}, title = {Viewing Business-Process Security from Different Perspectives}, journal = {Int. J. Electron. Commer.}, volume = {3}, number = {3}, pages = {89--103}, year = {1999}, url = {https://doi.org/10.1080/10864415.1999.11518343}, doi = {10.1080/10864415.1999.11518343}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijecommerce/HerrmannP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RohmHP99, author = {Alexander W. R{\"{o}}hm and Gaby Herrmann and G{\"{u}}nther Pernul}, title = {A Language for Modeling Secure Business Transactions}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {22--31}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816010}, doi = {10.1109/CSAC.1999.816010}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RohmHP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adbis/PernulRH99, author = {G{\"{u}}nther Pernul and Alexander W. R{\"{o}}hm and Gaby Herrmann}, editor = {Johann Eder and Ivan Rozman and Tatjana Welzer}, title = {Trust for Electronic Commerce Transactions}, booktitle = {Advances in Databases and Information Systems, Third East European Conference, ADBIS'99, Maribor, Slovenia, September 13-16, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1691}, pages = {1--13}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48252-0\_1}, doi = {10.1007/3-540-48252-0\_1}, timestamp = {Tue, 21 Mar 2023 20:54:24 +0100}, biburl = {https://dblp.org/rec/conf/adbis/PernulRH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PernulR99, author = {G{\"{u}}nther Pernul and Alexander W. R{\"{o}}hm}, title = {{COPS:} {A} Model and Infrastructure for Secure and Fair Electronic Markets}, booktitle = {32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/HICSS.1999.773052}, doi = {10.1109/HICSS.1999.773052}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/PernulR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wirtschaftsinformatik/HerrmannRP99, author = {Gaby Herrmann and Alexander W. R{\"{o}}hm and G{\"{u}}nther Pernul}, editor = {August{-}Wilhelm Scheer and Markus N{\"{u}}ttgens}, title = {Sichere Gesch{\"{a}}ftstransaktionen auf Elektronischen M{\"{a}}rkten}, booktitle = {Electronic Business Engineering, 4. Internationale Tagung Wirtschaftsinformatik, Saarbr{\"{u}}cken, 3.-5. M{\"{a}}rz 1999}, pages = {12}, publisher = {Physica-Verlag}, year = {1999}, url = {http://aisel.aisnet.org/wi1999/12}, timestamp = {Mon, 27 Feb 2012 21:42:18 +0100}, biburl = {https://dblp.org/rec/conf/wirtschaftsinformatik/HerrmannRP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/PernulTW98, author = {G{\"{u}}nther Pernul and A Min Tjoa and Werner Winiwarter}, title = {Modelling Data Secrecy and Integrity}, journal = {Data Knowl. Eng.}, volume = {26}, number = {3}, pages = {291--308}, year = {1998}, url = {https://doi.org/10.1016/S0169-023X(97)00045-1}, doi = {10.1016/S0169-023X(97)00045-1}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dke/PernulTW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RohmPH98, author = {Alexander W. R{\"{o}}hm and G{\"{u}}nther Pernul and Gaby Herrmann}, title = {Modeling Secure and Fair Electronic Commerce}, booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998), 7-11 December 1998, Scottsdale, AZ, {USA}}, pages = {155--164}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSAC.1998.738608}, doi = {10.1109/CSAC.1998.738608}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RohmPH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/EsssmayrKWPT98, author = {Wolfgang E{\ss}mayr and Elisabeth Kapsammer and Roland R. Wagner and G{\"{u}}nther Pernul and A Min Tjoa}, editor = {Roland R. Wagner}, title = {Enterprise-Wide Security Administration}, booktitle = {Ninth International Workshop on Database and Expert Systems Applications, Vienna, Austria, August 24-28, 1998, Proceedings}, pages = {267--272}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/DEXA.1998.707412}, doi = {10.1109/DEXA.1998.707412}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/EsssmayrKWPT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/HerrmannP98, author = {Gaby Herrmann and G{\"{u}}nther Pernul}, title = {Towards Security Semantics in Workflow Management}, booktitle = {Thirty-First Annual Hawaii International Conference on System Sciences, Kohala Coast, Hawaii, USA, January 6-9, 1998}, pages = {766--769}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/HICSS.1998.649280}, doi = {10.1109/HICSS.1998.649280}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/HerrmannP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/HerrmannP97, author = {Gaby Herrmann and G{\"{u}}nther Pernul}, title = {Zur Bedeutung von Sicherheit in interorganisationellen Workflows}, journal = {Wirtschaftsinf.}, volume = {39}, number = {3}, pages = {217--224}, year = {1997}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/HerrmannP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/PernulR97, author = {G{\"{u}}nther Pernul and Alexander W. R{\"{o}}hm}, title = {Neuer Markt - neues Geld?}, journal = {Wirtschaftsinf.}, volume = {39}, number = {4}, pages = {345--355}, year = {1997}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/PernulR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/EssmayrPT97, author = {Wolfgang E{\ss}mayr and G{\"{u}}nther Pernul and A Min Tjoa}, editor = {Tsau Young Lin and Shelly Qian}, title = {Access Controls by Object-Oriented Concepts}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {325--340}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Mon, 13 Oct 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/EssmayrPT97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/EllmerHMP96, author = {Ernst Ellmer and Christian Huemer and Dieter Merkl and G{\"{u}}nther Pernul}, editor = {Roland Wagner and Helmut Thoma}, title = {Automatic Classification of Semantic Concepts in View Specifications}, booktitle = {Database and Expert Systems Applications, 7th International Conference, {DEXA} '96, Zurich, Switzerland, September 9-13, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1134}, pages = {824--833}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034734}, doi = {10.1007/BFB0034734}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexa/EllmerHMP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/EsmayrKPPT96, author = {Wolfgang E{\ss}mayr and Fritz Kastner and G{\"{u}}nther Pernul and Stefan Preishuber and A Min Tjoa}, editor = {Stanley Y. W. Su}, title = {Authorization and Access Control in {IRO-DB}}, booktitle = {Proceedings of the Twelfth International Conference on Data Engineering, February 26 - March 1, 1996, New Orleans, Louisiana, {USA}}, pages = {40--47}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/ICDE.1996.492087}, doi = {10.1109/ICDE.1996.492087}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/EsmayrKPPT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/EssmayrKPT96, author = {Wolfgang E{\ss}mayr and Fritz Kastner and G{\"{u}}nther Pernul and A Min Tjoa}, editor = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {The security architecture of {IRO-DB}}, booktitle = {Information Systems Security, Facing the information society of the 21st Century}, series = {{IFIP} Conference Proceedings}, volume = {54}, pages = {249--258}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Mon, 13 Oct 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/EssmayrKPT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0084576, author = {G{\"{u}}nther Pernul}, title = {IT-Sicherheit '94}, series = {Schriftenreihe der {\"{O}}sterreichischen Computer Gesellschaft}, volume = {75}, publisher = {Oldenbourg}, year = {1995}, timestamp = {Fri, 19 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0084576.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PernulH95, author = {G{\"{u}}nther Pernul and Hubert Hasenauer}, editor = {Norman Revell and A Min Tjoa}, title = {Combining Reverse with Classical Forward Database Engineering - {A} Step Forward to Solve the Legacy System Dilemma}, booktitle = {Database and Expert Systems Applications, 6th International Conference, DEXA'95, London, United Kingdom, September 4-8, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {978}, pages = {177--186}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0049116}, doi = {10.1007/BFB0049116}, timestamp = {Tue, 29 Dec 2020 18:31:18 +0100}, biburl = {https://dblp.org/rec/conf/dexa/PernulH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/EllmerHMP95, author = {Ernst Ellmer and Christian Huemer and Dieter Merkl and G{\"{u}}nther Pernul}, editor = {Mike P. Papazoglou}, title = {Neural Network Technology to Support View Integration}, booktitle = {OOER'95: Object-Oriented and Entity-Relationship Modelling, 14th International Conference, Gold Coast, Australia, December 12-15, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1021}, pages = {181--190}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0020531}, doi = {10.1007/BFB0020531}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/er/EllmerHMP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Pernul94, author = {G{\"{u}}nther Pernul}, title = {Database Security}, journal = {Adv. Comput.}, volume = {38}, pages = {1--72}, year = {1994}, url = {https://doi.org/10.1016/S0065-2458(08)60175-8}, doi = {10.1016/S0065-2458(08)60175-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Pernul94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hm/MerklP94, author = {Dieter Merkl and G{\"{u}}nther Pernul}, title = {Security for next generation hypertext systems}, journal = {Hypermedia}, volume = {6}, number = {1}, pages = {1--18}, year = {1994}, url = {https://doi.org/10.1080/09558543.1994.12031224}, doi = {10.1080/09558543.1994.12031224}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hm/MerklP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PernulQ94, author = {G{\"{u}}nther Pernul and Gerald Quirchmayr}, title = {Organizing {MLS} databases from a data modelling point of view}, booktitle = {10th Annual Computer Security Applications Conference, {ACSAC} 1994, 5-9 December, 1994 Orlando, FL, {USA}}, pages = {96--105}, publisher = {{IEEE}}, year = {1994}, url = {https://doi.org/10.1109/CSAC.1994.367317}, doi = {10.1109/CSAC.1994.367317}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PernulQ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Pernul94, author = {G{\"{u}}nther Pernul}, editor = {Joachim Biskup and Matthew Morgenstern and Carl E. Landwehr}, title = {Security Object Modelling for Level-Based Policies}, booktitle = {Database Security, {VIII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994}, series = {{IFIP} Transactions}, volume = {{A-60}}, pages = {374}, publisher = {North-Holland}, year = {1994}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Pernul94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gidr/Pernul93, author = {G{\"{u}}nther Pernul}, title = {11th International Conference on the Entity-Relationship Approach {(ER} 92), Karlsruhe (Tagungsbericht)}, journal = {Datenbank Rundbr.}, volume = {11}, pages = {9}, year = {1993}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gidr/Pernul93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PernulWT93, author = {G{\"{u}}nther Pernul and Werner Winiwarter and A Min Tjoa}, title = {The deductive filter approach to {MLS} database prototyping}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {244--253}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315435}, doi = {10.1109/CSAC.1993.315435}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PernulWT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/PernulWT93, author = {G{\"{u}}nther Pernul and Werner Winiwarter and A Min Tjoa}, editor = {Ramez Elmasri and Vram Kouramajian and Bernhard Thalheim}, title = {The Entity-Relationship Model for Multilevel Security}, booktitle = {Entity-Relationship Approach - ER'93, 12th International Conference on the Entity-Relationship Approach, Arlington, Texas, USA, December 15-17, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {823}, pages = {166--177}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/BFb0024365}, doi = {10.1007/BFB0024365}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/er/PernulWT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vis/PernulTH93, author = {G{\"{u}}nther Pernul and A Min Tjoa and J. T. Hotz{-}Behofsits}, editor = {Gerhard Weck and Patrick Horster}, title = {Datenbankmanagementsysteme mit hohem Sicherheitsanspruch}, booktitle = {Verl{\"{a}}{\ss}liche Informationssysteme, Proceedings der GI-Fachtagung VIS'93, 11.-13.05.1993, M{\"{u}}nchen, Germany}, series = {DuD-Fachbeitr{\"{a}}ge}, volume = {16}, pages = {371--393}, publisher = {Vieweg}, year = {1993}, timestamp = {Tue, 15 Nov 2016 13:03:51 +0100}, biburl = {https://dblp.org/rec/conf/vis/PernulTH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/NavatheP92, author = {Shamkant B. Navathe and G{\"{u}}nther Pernul}, title = {Conceptual and Logical Design of Relational Databases}, journal = {Adv. Comput.}, volume = {35}, pages = {1--80}, year = {1992}, url = {https://doi.org/10.1016/S0065-2458(08)60593-8}, doi = {10.1016/S0065-2458(08)60593-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/NavatheP92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/PernulL92, author = {G{\"{u}}nther Pernul and Gottfried Luef}, title = {Bibliography on Database Security}, journal = {{SIGMOD} Rec.}, volume = {21}, number = {1}, pages = {105--122}, year = {1992}, url = {https://doi.org/10.1145/130868.130884}, doi = {10.1145/130868.130884}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/PernulL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Pernul92, author = {G{\"{u}}nther Pernul}, title = {Security constraint processing during multilevel secure database design}, booktitle = {Eighth Annual Computer Security Applications Conference, {ACSAC} 1992, November 30 - December 4, 1992, San Antonio, Texas, {USA}}, pages = {75--84}, publisher = {{IEEE}}, year = {1992}, url = {https://doi.org/10.1109/CSAC.1992.228231}, doi = {10.1109/CSAC.1992.228231}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Pernul92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ds/Pernul92, author = {G{\"{u}}nther Pernul}, editor = {David K. Hsiao and Erich J. Neuhold and Ron Sacks{-}Davis}, title = {Canonical Security Modeling for Federated Databases}, booktitle = {Proceedings of the {IFIP} {WG} 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5), Lorne, Victoria, Australia, 16-20 November 1992}, series = {{IFIP} Transactions}, volume = {{A-25}}, pages = {207--222}, publisher = {North-Holland}, year = {1992}, timestamp = {Thu, 03 Jan 2002 11:56:49 +0100}, biburl = {https://dblp.org/rec/conf/ds/Pernul92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Pernul92, author = {G{\"{u}}nther Pernul}, editor = {Yves Deswarte and G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, title = {Security Constraint Processing in Multilevel Secure {AMAC} Schemata}, booktitle = {Computer Security - {ESORICS} 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {648}, pages = {349--370}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013907}, doi = {10.1007/BFB0013907}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Pernul92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/er/92, editor = {G{\"{u}}nther Pernul and A Min Tjoa}, title = {Entity-Relationship Approach - ER'92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7-9, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {645}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-56023-8}, doi = {10.1007/3-540-56023-8}, isbn = {3-540-56023-8}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/er/92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PernulL91, author = {G{\"{u}}nther Pernul and Gottfried Luef}, title = {A multilevel secure relational data model based on views}, booktitle = {Seventh Annual Computer Security Applications Conference, {ACSAC} 1991, 2-6 December, 1991, San Antonio, Texas, {USA}}, pages = {166--177}, publisher = {{IEEE}}, year = {1991}, url = {https://doi.org/10.1109/CSAC.1991.213008}, doi = {10.1109/CSAC.1991.213008}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/PernulL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LuefP91, author = {Gottfried Luef and G{\"{u}}nther Pernul}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {Supporting Range Queries in Multilevel-Secure Databases}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {117--130}, publisher = {North-Holland}, year = {1991}, timestamp = {Fri, 15 Feb 2002 12:14:34 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LuefP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PernulKN91, author = {G{\"{u}}nther Pernul and Kamalakar Karlapalem and Shamkant B. Navathe}, editor = {Dimitris Karagiannis}, title = {Relational Database Organization Based on Views and Fragments}, booktitle = {Proceedings of the International Conference on Database and Expert Systems Applications, Berlin, Germany, 1991}, pages = {380--386}, publisher = {Springer-Verlag, Wien}, year = {1991}, timestamp = {Mon, 24 Nov 2014 16:44:16 +0100}, biburl = {https://dblp.org/rec/conf/dexa/PernulKN91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/PernulT91, author = {G{\"{u}}nther Pernul and A Min Tjoa}, editor = {Toby J. Teorey}, title = {A View Integration Approach for the Design of Multilevel Security}, booktitle = {Proceedings of the 10th International Conference on Entity-Relationship Approach (ER'91), 23-25 October, 1991, San Mateo, California, {USA}}, pages = {483--509}, publisher = {{ER} Institute}, year = {1991}, timestamp = {Mon, 13 Oct 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/PernulT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/Pernul87, author = {G{\"{u}}nther Pernul}, title = {An Unnormalized Relational Data Model Based On User Views}, journal = {{SIGMOD} Rec.}, volume = {16}, number = {2}, pages = {51--60}, year = {1987}, url = {https://doi.org/10.1145/988598.988602}, doi = {10.1145/988598.988602}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/Pernul87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.