Startseite UR

Browsen nach Institutionen der Universität

Exportieren als
[feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppieren nach: Datum | Autoren | Dokumentenart | Keine Gruppierung
Gehe zu: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 1994 | 1992 | 1988 | 1987
Anzahl der Einträge in dieser Kategorie: 139.

2016

Sänger, Johannes und Pernul, Günther (2016) TRIVIA: visualizing reputation profiles to detect malicious sellers in electronic marketplaces. Journal of Trust Management 3 (5).

Sänger, Johannes, Hänsch, Norman, Glass, Brian, Benenson, Zinaida, Landwirth, Robert und Sasse, M. Angela (2016) Look Before You Leap: Improving the Users’ Ability to Detect Fraud in Electronic Marketplaces. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, S. 3870-3882. ISBN 978-1-4503-3362-7.

Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2016) How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. Communications in Computer and Information Science 576 (2), S. 49-67.

2015

Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias und Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, S. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).

Richthammer, Christian, Kunz, Michael, Sänger, Johannes, Hummer, Matthias und Pernul, Günther (2015) Dynamic Trust-based Recertifications in Identity and Access Management. In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS), Vienna, Austria.

Pernul, Günther, Ryan, Peter Y. A. und Weippl, Edgar (2015) Computer Security - ESORICS 2015. In: Pernul, Günther und Ryan, Peter Y. A. und Weippl, Edgar, (eds.) 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture notes in computer science, 9327. Springer, Heidelberg. ISBN 978-3-319-24176-0, 978-3-319-24177-7. Volltext nicht vorhanden.

Weishäupl, Eva, Kunz, Michael, Yasasin, Emrah, Wagner, Gerit, Prester, Julian, Schryen, Guido und Pernul, Günther (2015) Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria. (Im Druck)

Hummer, Matthias, Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2015) Advanced Identity and Access Policy Management using Contextual Data. In: 10th International Conference on Availability, Reliability and Security (ARES '15), August 24th – 28th, 2015, Université Paul Sabatier, Toulouse, France. Volltext nicht vorhanden.

Sänger, Johannes, Richthammer, Christian, Kremser, André und Pernul, Günther (2015) Personalized Composition of Trustful Reputation Systems. In: 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, July 13-15, 2015, Fairfax, VA, USA. Volltext nicht vorhanden.

Sänger, Johannes, Richthammer, Christian und Pernul, Günther (2015) Reusable Components for Online Reputation Systems. Journal of Trust Management 2 (5), S. 1-21.

Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2015) Analyzing Quality Criteria in Role-based Identity and Access Management. In: 1st International Conference on Information Systems Security and Privacy, 09.02.1015 - 11.02.2015, Angers, France.

Netter, Michael, Pernul, Günther, Richthammer, Christian und Riesner, Moritz (2015) Privacy in Social Networks: Existing Challenges and Proposals for Solutions. In: First International Conference on Information Systems Security and Privacy (ICISSP), Revised Selected Papers. Communications in Computer and Information Science. Springer International Publishing, S. 16-27. ISBN 978-3-319-27667-0.

Sänger, Johannes, Richthammer, Christian, Rösch, Artur und Pernul, Günther (2015) Reusable Defense Components for Online Reputation Systems. In: Trust Management IX. 9th IFIP WG 11.11 Int. Conf., IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proc. IFIP Advances in Information and Communication Technology, 454. Springer, Berlin, S. 195-202. ISBN 978-3-319-18491-3 (onl.), 978-3-319-18490-6 (print).

Sänger, Johannes, Richthammer, Christian, Kunz, Michael, Meier, Stefan und Pernul, Günther (2015) Visualizing Unfair Ratings in Online Reputation Systems. In: Proc. of the 23rd European Conference on Information Systems (ECIS), Münster, Germany.

2014

Unland, Rainer und Pernul, Günther (2014) Datenbanken im Einsatz. Analyse, Modellbildung und Umsetzung. De Gruyter Oldenbourg, Berlin; München. ISBN 978-3-486-72141-6 (print), 978-3-11-486-78129-8 (ebook), 978-3-11-486-98970-0 (ePub). Zugang zum Volltext eingeschränkt.

Hassan, Sabri und Pernul, Günther (2014) Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics. In: iiWAS ’14, December 04 - 06 2014, Hanoi, Viet Nam. Volltext nicht vorhanden.

Sänger, Johannes und Pernul, Günther (2014) Reusability for Trust and Reputation Systems. In: 6th IFIP WG 11.11 International Conference, IFIPTM 2014, July 7-10, 2014, Singapore, Singapore.

Sänger, Johannes, Richthammer, Christian und Hassan, Sabri (2014) Trust and Big Data: A Roadmap for Research. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, Munich.

Kunz, Michael, Hummer, Matthias, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2014) Analyzing Recent Trends in Enterprise Identity Management. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, München. (Im Druck)

Eckert, Claudia und Katsikas, Sokratis K. und Pernul, Günther, eds. (2014) Trust, Privacy, and Security in Digital Business: 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science, 8647. Springer, Heidelberg. ISBN 978-3-319-09770-1 (online), 978-3-319-09769-5 (print). Volltext nicht vorhanden.

Sänger, Johannes und Pernul, Günther (2014) Visualizing Transaction Context in Trust and Reputation Systems. In: ARES 2014, 08.-12.09.2014, Fribourg, Switzerland.

Richthammer, Christian, Netter, Michael, Riesner, Moritz, Sänger, Johannes und Pernul, Günther (2014) Taxonomy of Social Network Data Types. EURASIP Journal on Information Security 2014 (11).

Atluri, Vijay und Pernul, Günther, eds. (2014) Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture notes in computer science, 8566. Springer, Heidelberg. ISBN 978-3-662-43935-7, 978-366-24393-6-4 (Online). Volltext nicht vorhanden.

Fuchs, Ludwig, Kunz, Michael und Pernul, Günther (2014) Role Model Optimization For Secure Role-based Identity Management. In: European Conference on Information Systems (ECIS), June 9-11, 2014, Tel Aviv, Israel.

Meier, Stefan und Pernul, Günther (2014) Einsatz von digitaler Forensik in Unternehmen und Organisationen. In: Sicherheit 2014, 19.-21. März 2014, Wien. Volltext nicht vorhanden.

Cetto, Alexandra, Netter, Michael, Pernul, Günther, Richthammer, Christian, Riesner, Moritz, Roth, Christian und Sänger, Johannes (2014) Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks (Best Paper Award). In: Proc. of the 2nd International Workshop on Intelligent Digital Games for Empowerment and Inclusion (IDGEI). Haifa, Israel.

Hassan, Sabri, Sänger, Johannes und Pernul, Günther (2014) SoDA: Dynamic Visual Analytics of Big Social Data. In: Proc. of the 1st international Conference on Big Data and Smart Computing. Bangkok, Thailand. Volltext nicht vorhanden.

Netter, Michael, Weber, Michael, Diener, Michael und Pernul, Günther (2014) Visualizing Social Roles - Design and Evaluation of a Bird's-Eye View of Social Network Privacy Settings. In: Proc. of the 22nd European Conference on Information Systems (ECIS). Tel-Aviv, Israel. (Im Druck)

2013

Netter, Michael (2013) Privacy-preserving Infrastructure for Social Identity Management. Dissertation, University of Regensburg. Volltext nicht vorhanden.

Riesner, Moritz, Netter, Michael und Pernul, Günther (2013) Analyzing Settings for Social Identity Management on Social Networking Sites: Classification, Current State, and Proposed Developments. Information Security Technical Report 17 (4), S. 185-198.

Netter, Michael, Riesner, Moritz, Weber, Michael und Pernul, Günther (2013) Privacy Settings in Online Social Networks-Preferences, Perception, and Reality (Best Paper Award Nominee). In: Proc of the 46th Hawaii International Conference on System Science (HICSS). Maui, Hawaii, USA.

Netter, Michael, Herbst, Sebastian und Pernul, Günther (2013) Interdisciplinary Impact Analysis of Privacy in Social Networks. In: Altshuler, Yaniv und Elovici, Yuva und Cremers, Armin B. und Aharony, Nadav und Pentland, Alex, (eds.) Security and Privacy in Social Networks. Springer, S. 7-26. ISBN 978-1-4614-4138-0.

Meier, Stefan, Fuchs, Ludwig und Pernul, Günther (2013) Managing the Access Grid - A Process View to Minimize Insider Misuse Risks. In: 11th International Conference on Wirtschaftsinformatik (WI2013), 27.2.-1.3.13, Leipzig.

Lopez, Javier, Nikova, Svetla, Pashalidis, Andreas, Pernul, Günther und Preneel, Bart (2013) Preface. Computers & Mathematics with Applications 65 (5), S. 747. Volltext nicht vorhanden.

Riesner, Moritz (2013) Provider-Independent Social Identity Management for Personal and Professional Applications. Berichte aus der Wirtschaftsinformatik. Shaker, Aachen. ISBN 978-3844021554. Volltext nicht vorhanden.

Fuchs, Ludwig und Pernul, Günther (2013) Qualitätssicherung im Identity- und Access Management. In: Knoll, Matthias, (ed.) IT-Prüfung und IT-Revision. HMD - Praxis der Wirtschaftsinformatik, 289. dpunkt-verlag, Heidelberg. ISBN 978-3-86490-057-0. Volltext nicht vorhanden.

de Meer, Hermann, Diener, Michael, Herkenhöner, Ralph, Kucera, Markus, Niedermeier, Michael, Reisser, Andreas, Guido, Schryen, Vetter, Michael, Waas, Thomas und Yasasin, Emrah (2013) Sicherheitsherausforderungen in hochverteilten Systemen. PIK-Praxis der Informationsverarbeitung und Kommunikation 36 (3), S. 153-159.

Richthammer, Christian, Netter, Michael, Riesner, Moritz und Pernul, Günther (2013) Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. In: 8th International Conference on Availability, Reliability and Security (ARES).

2012

Gmelch, Oliver und Pernul, Günther (2012) A Generic Architecture for User-Centric Portlet Integration. In: 14th IEEE Intern. Conference on Business Informatics (IEEE CEC 2012) , 9.-11.9.2012, Hangzhou, China.

Netter, Michael, Hassan, Sabri und Pernul, Günther (2012) An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. In: 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012), 4-6 sept. 2012, Vienna, Austria.

Riesner, Moritz und Pernul, Günther (2012) Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective. In: Proc of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, Workshop on Security and Privacy in Social Networks (SPSN at SocialCom). IEEE Computer Society Press, Boston, USA, S. 860-867. Volltext nicht vorhanden.

Fritsch, Christoph und Pernul, Günther (2012) User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. In: IEEE 9th International Conference on e-Business Engineering, September 9-11, 2012, Hangzhou, China.

Riesner, Moritz, Netter, Michael und Pernul, Günther (2012) An Analysis of Implemented and Desirable Settings for Identity
Management on Social Networking Sites.
In: 7th International Conference on Availability, Reliability and Security (ARES 2012), August 20th - 24th, 2012, University of Economics, Prague, Czech Republic.

Fuchs, Ludwig und Pernul, Günther (2012) Minimizing insider misuse through secure Identity Management. Security and Communication Networks 5 (8), S. 847-862.

Gmelch, Oliver (2012) User-Centric Application Integration in Enterprise Portal Systems. Electronic Commerce, 42. EUL-Verlag, Lohmar. ISBN 978-3-8441-0175-1. Volltext nicht vorhanden.

Dürbeck, Stefan (2012) Cross-Domain Identity Management : A maturity model for globally interoperable eIDM frameworks in the European Union. Dürbeck Verlag. ISBN 978-3-00-037283-4. Volltext nicht vorhanden.

Riesner, Moritz und Pernul, Günther (2012) Provider-Independent Online Social Identity Management -
Enhancing Privacy Consistently Across Multiple Social Networking Sites.
In: Proc of the 45th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, USA, , 4 - 7 January 2012. IEEE, Piscataway, NJ. ISBN 978-0-7695-4525-7. Volltext nicht vorhanden.

Netter, Michael (2012) Conceptualizing Transparency on Online Social Networks. Tiny Transactions on Computer Science (TinyToCS) 1.

Fuchs, Ludwig (2012) Innovatives Identitätsmanagement. In: Studie IT Security. IT Verlag für Informationstechnik GmbH, Deutschland, S. 220-236. ISBN 3-936052-38-7. Volltext nicht vorhanden.

Petkova-Nikova, Svetla und Pashalidis, Andreas und Pernul, Günther, eds. (2012) Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science, 7163. Springer. ISBN 978-3-642-29803-5(Print), 978-3-642-29804-2 (Online). Volltext nicht vorhanden.

2011

Weippl, Edgar, Tjoa, A Min und Pernul, Günther (2011) Advances in Applied Security. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependabe Applications Vol. 2 (No. 4).

Netter, Michael, Herbst, Sebastian und Pernul, Günther (2011) Analyzing Privacy in Social Networks - An Interdisciplinary Approach. In: Proc. of the Third IEEE International Conference on Social Computing Workshop on Security and Privacy in Social Networks (SPSN at SocialCom). IEEE Computer Society Press, Boston, USA.

Petkova-Nikova, Svetla und Pashalidis, Andreas und Pernul, Günther, eds. (2011) Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011. Lecture Notes in Computer Science, 7163. Springer, Leuven, Belgium. ISBN 978-3-642-29803-5. Volltext nicht vorhanden.

Furdik, Karol, Bednar, Peter, Lukac, Gabriel und Fritsch, Christoph (2011) Support of Semantic Interoperability in a Service-based Business Collaboration Platform. Scientific International Journal for Parallel and Distributed Computing: Scalable Computing: Practice and Experience 12 (3), S. 293-305.

Furnell, Steven und Lambrinoudakis, Costas und Pernul, Günther, eds. (2011) Trust, Privacy and Security in Digital Business: 8th International Conference / TrustBus 2011, Toulouse, France. Prodeedings. Lecture Notes in Computer Science, 6863. Springer, Berlin. ISBN 978-3-642-22889-6. Volltext nicht vorhanden.

Fuchs, Ludwig, Pernul, Günther und Sandhu, Ravi (2011) Roles In Information Security - A Survey And Classification Of The Research Area. Computers & Security.

Fritsch, Christoph, Bednar, Peter und Pernul, Günther (2011) DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure. In: Huemer, Christian und Setzer, Thomas, (eds.) E-Commerce and Web Technologies. 12th International Conference, EC-Web 2011, Toulouse, France, August 30 - September 1, 2011. Proceedings. Lecture Notes in Business Information Processing, 85, Part 1. Springer, Berlin, S. 13-24.

Fuchs, Ludwig und Meier, S. (2011) The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective. In: Tjoa, A Min, (ed.) Availability, reliability and security for business, enterprise and health information systems : IFIP WG 8.4/8.9 international cross domain conference and workshop ; proceedings / ARES 2011, Vienna, Austria, August 22 - 26, 2011. Lecture notes in computer science, 6908. Springer, Berlin. ISBN 978-3-642-23299-2, 978-3-642-23300-5 (online). Volltext nicht vorhanden.

Dürbeck, Stefan, Kolter, Jan, Pernul, Günther und Schillinger, Rolf (2011) Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten. Informatik-Spektrum 34 (3), S. 265-275.

Gmelch, Oliver und Pernul, Günther (2011) A portal-based approach for user-centric legacy application integration in collaborative environments. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011). Schweiz.

Netter, Michael, Riesner, Moritz und Pernul, Günther (2011) Assisted Social Identity Management - Enhancing Privacy in the Social Web. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011), 16.-18.Februar 2011, Zürich. Schweiz.

Priebe, Torsten, Reisser, Andreas und Hoang, Duong Thi Anh (2011) Reinventing the Wheel?! Why Harmonization and Reuse Fail in Complex Data Warehouse Environments and a Proposed Solution to the Problem. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011). Schweiz.

Pernul, Günther und Riesner, Moritz (2011) Conceptual Design of Secure Databases. In: van Tilborg, Henk C. A. und Jajodia, Sushil, (eds.) Encyclopedia of Cryptography and Security. 2. Auflage. Springer, New York, S. 245-248. ISBN 978-1-441-95906-5; 978-1-4419-5905-8 (ISBN der Printausgabe). Volltext nicht vorhanden.

Fernandez, Eduardo B., Yoshioka, Nobukazu, Washizaki, Hironori, Jurjens, Jan, VanHilst, Michael und Pernul, Günther (2011) Using security patterns to develop secure systems. In: Mouratidis, Haralambos , (ed.) Software engineering for secure systems: Industrial and Research Perspectives. IGI Global Group, Information Science Reference, New York, S. 16-31. ISBN 978-1-615-20837-1; 978-1-615-20838-8.

2010

Fuchs, Ludwig und Pernul, Günther (2010) Großreinemachen fürs IAM. Die Zeitschrift für Informations-Sicherheit: <kes> (Nr. 6), S. 24. Volltext nicht vorhanden.

Riesner, Moritz und Pernul, Günther (2010) Supporting Compliance through Enhancing Internal Control Systems by Conceptual Business Process Security Modeling. In: Proceedings of the 21st Australasian Conference on Information Systems (ACIS). AISel, Brisbane, Australia.

Fritsch, Christoph, Netter, Michael, Reisser, Andreas und Pernul, Günther (2010) Attacking Image Recognition Captchas - A Naive but Effective Approach. In: Katsikas , Sokratis und Lopez, Javier und Soriano, Miguel , (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Lecture notes in computer science, 6264. Springer, Berlin, S. 13-25. ISBN 3-642-15151-5, 978-3-642-15151-4.

Fritsch, Christoph und Pernul, Günther (2010) Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. In: Katsikas, Sokratis und Lopez, Javier und Soriano, Miguel, (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Lecture notes in computer science, 6264. Springer, Berlin, S. 214-226. ISBN 3-642-15151-5, 978-3-642-15151-4.

Pernul, Günther, Kolter, Jan und Kernchen, Thomas (2010) Collaborative Privacy Management. Computers & Security 29 (5), S. 580-591.

Gmelch, Oliver und Pernul, Günther (2010) Preventing malicious Portlets from Communication and Intercepting in Collaboration Portals. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT). (Im Druck)

Brucker, Achim D., Petritsch, Helmut und Weber, Stefan G. (2010) Attribute-based Encryption with Break-glass. In: Samarati, Pierangela und Tunstall, Michael und Posegga, Joachim und Markantonakis, Konstantinos und Sauveron, Damien, (eds.) Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings. Lecture Notes in Computer Science / Security and Cryptology , 6033. Springer, Berlin, S. 237-244. ISBN 978-3-642-12367-2. Volltext nicht vorhanden.

Pernul, Günther und Fuchs, Ludwig (2010) Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data. In: 2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Morioka, Iwate, Japan.

Dürbeck, Stefan, Fritsch, Christoph, Pernul, Günther und Schillinger, Rolf (2010) A Semantic Security Architecture for Web Services - the Access-eGov Solution. In: Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Brucker, Achim D. und Petritsch, Helmut (2010) Idea: Efficient Evaluation of Access Control Constraints. In: Engineering secure software and systems: second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010; proceedings. Lecture Notes in Computer Science, 5965. Springer, Berlin, S. 157-165. ISBN 978-3-642-11746-6.

Netter, Michael, Pernul, Günther und Fernandez, Eduardo B. (2010) Refining the pattern-based reference model for electronic invoices by incorporating threats. In: Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Kolter, Jan, Netter, Michael und Pernul, Günther (2010) Visualizing Past Personal Data Disclosures. In: Proc. of the Fifth International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Fuchs, Ludwig (2010) Methodology for Hybrid Role Development. Wirtschaftsinformatik, 69. EUL-Verlag, Lohmar. ISBN 978-3-89936-978-6. Volltext nicht vorhanden.

Kolter, Jan (2010) User-Centric Privacy. Electronic Commerce, 41. EUL-Verlag, Lohmar. ISBN 978-3-89936-917-5. Volltext nicht vorhanden.

2009

Heuser, Carlos Alberto und Pernul, Günther, eds. (2009) Advances in Conceptual Modeling - Challenging Perspectives:
ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009, Proceedings.
Lecture notes in computer science, 5833. Springer. ISBN 978-3-642-04946-0. Volltext nicht vorhanden.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver und Pernul, Günther (2009) Impact Analysis of Collaborative Platforms - The Case of SPIKE. In: IFAC, Workshop SWIIS (Supplementary Ways for Improving International Stability).

Netter, Michael und Pernul, Günther (2009) Integrating security patterns into the electronic invoicing process. In: Tjoa, A Min und Wagner, Roland, (eds.) Proc. of the 20th International Workshop on Database and Expert Systems Applications (DEXA 2009). IEEE Computer Society Press, Los Alamitos, Calif., S. 150-154. ISBN 978-0-7695-3763-4.

Petritsch, Helmut, Brucker, Achim D. und Schaad, Andreas (2009) Delegation Assistance. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). IEEE. Volltext nicht vorhanden.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther, Schillinger, Rolf und Wiesbeck, Sandra (2009) Analyzing Requirements for Virtual Business Alliances -
the case of SPIKE.
In: Proceedings of the The First International ICST Conference on Digital Business (DigiBiz 2009), London, UK. Springer, Heidelberg. ISBN 978-963-9799-56-1.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther und Schillinger, Rolf (2009) SPIKE - A Collaboration Platform for Short-Term Virtual Business Alliances. In: Proceedings of the Workshop on Technological trends in Enterprise Systems for SMEs and large enterprises: Heading towards the Future Internet, London, UK während der DIGIBIZ 2009. Springer, Heidelberg. ISBN 978-963-9799-56-1.

Kolter, Jan, Kernchen, Thomas und Pernul, Günther (2009) Collaborative Privacy - A Community-based Privacy Infrastructure. In: Gritzalis, Dimitris und Lopez, Javier, (eds.) Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings. IFIP International Federation for Information Processing, 297. Springer, Berlin. ISBN 978-3-642-01243-3.

Fuchs, Ludwig, Pernul, Günther und Broser, Christian (2009) Different Approaches to in-house Identity Management. In: Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan. ISBN 978-07695-35647.

Kolter, Jan und Pernul, Günther (2009) Generating User-understandable Privacy Preferences. In: Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan. ISBN 978-07695-35647.

Schillinger, Rolf, Dürbeck, Stefan und Bednar, Peter (2009) Access-eGov - a real-world Semantic Service-oriented Architecture for e-Government. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Fuchs, Ludwig und Müller, Christian (2009) Automating Periodic Role-Checks: A Tool-based Approach. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Sneed, Harry M. (2009) Wiedergewinnung von Web Services aus vorhandenen Altsystemen. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Petritsch, Helmut und Brucker, Achim D. (2009) Extending access control models with break-glass. In: Proceedings of the 14th ACM symposium on Access control models and technologies. ACM, S. 197-206. ISBN 978-1-60558-537-6.

Fischer-Hübner, Simone und Lambrinoudakis, Costas und Pernul, Günther, eds. (2009) Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings. Lecture Notes in Computer Science, 5695. Springer, Berlin. ISBN 978-3-642-03747-4. Volltext nicht vorhanden.

2008

Fuchs, Ludwig und Pernul, Günther (2008) HyDRo - Hybrid Development of Roles. In: Sekar, R. und Pujari, Arun K., (eds.) Information systems security: 4th international conference; proceedings / ICISS 2008, Hyderabad, India, December 16 - 20, 2008. Lecture Notes in Computer Science, 5352. Springer, Berlin, S. 287-302. ISBN 978-3-540-89861-0.

Fuchs, Ludwig und Preis, Anton (2008) BusiROLE: A Model for Integrating Business Roles into Identity Management. In: Furnell, Steven, (ed.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Lecture Notes in Computer Science, 5185. Springer, Berlin, S. 128-138. ISBN 978-3-540-85734-1.

Fernandez, Eduardo B., Pernul, Günther und Larrando-Petrie, Maria M. (2008) Patterns and Pattern Diagrams for Access Control. In: Furnell, Steven, (ed.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Lecture Notes in Computer Science, 5185. Springer, Berlin, S. 38-47. ISBN 978-3-540-85734-1.

Sneed, Harry M. (2008) Static and Dynamic Analysis of an Internet Security System. In: Software & Systems Quality Conferences, 15. - 18. April 2008, Düsseldorf, Germany.

Schläger, Christian, Fuchs, Ludwig und Pernul, Günther (2008) Intensive Programme on Information and Communication Security. In: Jakoubi, Stefan, (ed.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., S. 752-757. ISBN 978-0-7695-3102-1.

Schläger, Christian und Pernul, Günther (2008) Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. In: Jakoubi, Stefan, (ed.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., S. 344-351. ISBN 978-0-7695-3102-1; 0-7695-3102-4.

Schläger, Christian (2008) Attribute-based Infrastructures for Authentication and Authorisation. Electronic Commerce, 36. EUL-Verlag, Lohmar. ISBN 978-3-89936-670-9. Volltext nicht vorhanden.

Priebe, Torsten (2008) Authorization and Access Control. In: Furnell, Steven und Katsikas, Sokratis K. und Lopez, Javier und Patel, Ahmed, (eds.) Securing Information and Communication Systems: Principles, Technologies and Applications. Artech House information security and privacy series; Artech House computer security series. Artech House, Boston, S. 61-86. ISBN 978-1-59693-228-9; 1-59693-228-7. Volltext nicht vorhanden.

Pernul, Günther (2008) Data-Centric Applications. In: Furnell, Steven und Katsikas, Sokratis K. und Lopez, Javier und Patel, Ahmed, (eds.) Securing Information and Communication Systems: Principles, Technologies and Applications. Artech House information security and privacy series; Artech House computer security series. Artech House, Boston, S. 87-103. ISBN 978-1-59693-228-9; 1-59693-228-7. Volltext nicht vorhanden.

Gaude, Michael (2008) Zukünftige Verbreitung der Digitalen Signatur in Geschäftsprozessen - Ergebnisse einer Delphi-Studie. In: Bichler, Martin und Hess, Thomas und Krcmar, Helmut und Lechner, Ulrike und Matthes, Florian und Picot, Arnold und Speitkamp, Benjamin und Wolf, Petra, (eds.) Multikonferenz Wirtschaftsinformatik 2008. GITO-Verlag, Berlin, S. 1223-1237. ISBN 978-3-940019-34-9; 3-940019-34-8. Volltext nicht vorhanden.

Fuchs, Ludwig und Pernul, Günther (2008) proROLE: A Process-oriented Lifecycle Model for Role Systems. In: Proceedings of the 16th European Conference on Information Systems (ECIS 2008), Galway, Ireland, June 9-11, 2008. Springer, Berlin, S. 1322-1333. ISBN 9780955315923.

2007

Gaude, Michael (2007) Future Diffusion of PK1-Technology — A German Delphi Study. In: Pohlmann, Norbert und Reimer, Helmut und Schneider, Wolfgang, (eds.) Securing electronic business processes: highlights of the Information Security Solutions Europe/SECURE 2007 Conference / ISSE/SECURE 2007. Vieweg, Wiesbaden, S. 386-395. ISBN 978-3-8348-0346-7.

Erber, Roland, Schläger, Christian und Pernul, Günther (2007) Patterns for Authentication and Authorisation Infrastructures. In: Tjoa, A. Min, (ed.) Proceedings / 18th International Conference on Database and Expert Systems Applications, DEXA 2007 Regensburg, Germany, 3 - 7 September 2007. IEEE Computer Society, Los Alamitos, Calif., S. 755-759. ISBN 978-0-7695-2932-5.

Lambrinoudakis, Costas und Pernul, Günther und Tjoa, A Min, eds. (2007) Trust, privacy and security in digital business: 4th international conference; proceedings / TrustBus 2007, Regensburg, Germany, September 4-6, 2007. Lecture Notes in Computer Science, 4657. Springer, Heidelberg. ISBN 978-3-540-74408-5. Volltext nicht vorhanden.

Schläger, Christian, Priebe, Torsten, Liewald, Manuel und Pernul, Günther (2007) Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures. In: Markus, M. Lynne und Hampe, J. Felix und Gricar, Joze und Pucihar, Andreja und Lenart, Gregor, (eds.) Proceedings of the 20th Bled eConference "eMergence" (Bled'07), Bled, Slovenia, June 3 - 6 2007. Faculty of Organizational Sciences, Kranj. ISBN 978-961-232-204-5.

Dobmeier, Wolfgang und Pernul, Günther (2007) Towards Privacy-Aware Handling of Authorizations. In: Policy 2007: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks: proceedings: Bologna, Italy, 13-15 June, 2007. IEEE Computer Society, Los Alamitos, Calif., S. 70-76. ISBN 0-7695-2767-1.

Kolter, Jan, Schillinger, Rolf und Pernul, Günther (2007) Building a Distributed Semantic-aware Security Architecture. In: Venter, Hein und Eloff, Mariki und Labuschagne, Les und Eloff, Jan und Solms, Rossouw von, (eds.) New approaches for security, privacy and trust in complex environments: proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. Springer, New York, S. 397-408. ISBN 978-0-387-72366-2; 0-387-72366-8.

Priebe, Torsten, Dobmeier, Wolfgang, Schläger, Christian und Kamprath, Nora (2007) Supporting Attribute-based Access Control in Authentication and Authorization Infrastructures with Ontologies. Journal of software: JSW 2 (1), S. 27-38.

Kolter, Jan, Schillinger, Rolf und Pernul, Günther (2007) A Privacy-enhanced Attribute-based Access Control System. In: Barker, Steve, (ed.) Data and applications security XXI: proceedings / 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Lecture Notes in Computer Science, 4602. Springer, Berlin. ISBN 978-3-540-73533-5; 3-540-73533-X. Volltext nicht vorhanden.

Wagner, Roland und Revell, Norman und Pernul, Günther, eds. (2007) Database and expert systems applications: 18th international conference; proceedings / DEXA 2007, Regensburg, Germany, September 3-7, 2007. Lecture Notes in Computer Science, 4653. Springer, Berlin. ISBN 978-3-540-74467-2. Volltext nicht vorhanden.

Schläger, Christian und Ganslmayer, Monika (2007) Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. In: The Second International Conference on Availability, Reliability and Security: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., S. 230-237. ISBN 0-7695-2775-2.

Schläger, Christian und Nowey, Thomas (2007) On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments. International Journal of Computer Systems Science and Engineering.

Dürbeck, Stefan, Schillinger, Rolf und Kolter, Jan (2007) Security Requirements for a Semantic Service-oriented Architecture. In: The Second International Conference on Availability, Reliability and Security: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., S. 366-373. ISBN 0-7695-2775-2; 978-0-7695-2775-8.

Fuchs, Ludwig und Pernul, Günther (2007) Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. In: The Second International Conference on Availability, Reliability and Security, 2007: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., S. 374-384. ISBN 0-7695-2775-2; 978-0-7695-2775-8.

2006

Pernul, Günther und Dobmeier, Wolfgang (2006) Modellierung von Zugriffsrichtlinien für offene Systeme. In: Weske, Mathias und Nüttgens, Markus, (eds.) EMISA 2006: Methoden, Konzepte und Technologie für die Entwicklung von dienstbasierten Informationssystemen. GI-Edition : Proceedings, 95. Ges. für Informatik, Bonn. ISBN 978-3-88579-189-8; 3-88579-189-7.

Fernandez, Eduardo B. und Pernul, Günther (2006) Patterns for session-based access control. In: Proceedings of the 2006 conference on Pattern language. ACM International Conference Proceeding Series. ACM, NewYork. ISBN 978-1-60558-372-3.

Priebe, Torsten, Kolter, Jan, Herrmann, Dominik, Bednar, Peter und Paralic, Jan (2006) Supporting Semantic Annotation of Text Documents with Text Mining Techniques. In: Proceedings of the 7th International Workshop on Data Analysis (WDA 2006), Kosice, Slovakia, 01.-3. Juli 2006. Elfa Academic Press, Kosice, Slovakia. ISBN 80-969224-8-3. Volltext nicht vorhanden.

Schläger, Christian, Nowey, Thomas und Montenegro, Jose A. (2006) A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c eCommerce. In: Proceedings of The First International Conference on Availability, Reliability and Security (ARES'06). IEEE Computer Society, Los Alamitos, Calif.. ISBN 0-7695-2567-9.

Revell, Norman, Wagner, Roland, Pernul, Günther, Takizawa, Makoto, Quirchmayer, Gerald und Tjoa, A Min (2006) First International Conference on Availability, Reliability and Security (ARES´06). IEEE Computer Society Press, Los Alamitos. ISBN 0-7695-2567-9. Volltext nicht vorhanden.

Priebe, Torsten, Dobmeier, Wolfgang und Kamprath, Nora (2006) Supporting Attribute-based Access Control with Ontologies. In: First International Conference on Availability, Reliability and Security (ARES'06). IEEE Computer Society Press, S. 465-472. ISBN 0-7695-2567-9. Volltext nicht vorhanden.

Dobmeier, Wolfgang, Priebe, Torsten und Pernul, Günther (2006) Metamodell attributbasierter Zugriffskontrolle. In: Mayr, Heinrich C., (ed.) Modellierung 2006: 22. - 24. März 2006 in Innsbruck, Austria. GI-Edition: Proceedings, 82. Gesellschaft für Informatik, Bonn. ISBN 3-88579-176-5. Volltext nicht vorhanden.

Kolter, Jan, Schillinger, Rolf, Dobmeier, Wolfgang und Pernul, Günther (2006) AN ARCHITECTURE INTEGRATING SEMANTIC E-GOVERNMENT SERVICES. In: Communications Proceedings of the 5th International eGovernment Conference (EGOV '06), Krakow. Trauner Druck. (Im Druck) Zugang zum Volltext eingeschränkt.

Schläger, Christian, Sojer, Manuel, Muschall, Björn und Pernul, Günther (2006) Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. In: Bauknecht, Kurt, (ed.) E-Commerce and Web Technologies: 7th International Conference, EC-Web 2006, Krakow, Poland, 05.-07 September 2006; proceedings. Lecture Notes in Computer Science, 4082. Springer, Heidelberg, S. 132-141. ISBN 978-3-540-37743-6. Zugang zum Volltext eingeschränkt.

Busch, Sönke, Muschall, Björn, Pernul, Günther und Priebe, Torsten (2006) Authrule: A Generic Rule-Based Authorization Module. In: Data and Applications Security XX: proceedings / 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31 - August 2, 2006. Lecture Notes in Computer Science, 4127. Springer, Berlin, S. 267-281. ISBN 978-3-540-36799-4; 978-3-540-36796-3. Zugang zum Volltext eingeschränkt.

Sojer, Manuel, Schläger, Christian und Locher, Christian (2006) The CIO - Hype, Science and Reality. In: Ljungberg, Jan, (ed.) 14th European Conference on Information Systems: 2006 ECIS Göteborg; Göteborg, June 12 - 14, 2006; proceedings. kein Verlag, Göteborg. ISBN 978-91-631-9894-6. Volltext nicht vorhanden.

Schläger, Christian und Nowey, Thomas (2006) Towards a Risk Management Perspective on AAIs. In: Fischer-Hübner, Simone und Furnell, Steven und Lambrinoudakis, Costas, (eds.) Trust and Privacy in Digital Business: Session 2: Security and Risk Management. TrustBus 2006, Krakau, Polen, 04.-08.September 2006. Lecture Notes in Computer Science, 4083. Springer, Heidelberg, S. 41-50. ISBN 978-3-540-37750-4.

2005

Schläger, Christian und Pernul, Günther (2005) Authentication and Authorisation Infrastructures in b2c e-Commerce. In: Bauknecht, Kurt, (ed.) E-Commerce and Web Technologies. Lecture Notes in Computer Science, 3590. Springer, Berlin, S. 306-315. ISBN 978-3-540-28467-3. Zugang zum Volltext eingeschränkt.

Lopez, Javier, Oppliger, Rolf und Pernul, Günther (2005) Classifying Public Key Certificates. In: Chadwick, David, (ed.) Public Key Infrastructure. Lecture Notes in Computer Science, 3545. Springer, Berlin, S. 135-143. ISBN 978-3-540-28062-0. Zugang zum Volltext eingeschränkt.

Katsikas, Sokratis K., Lopez, Javier und Pernul, Günther (2005) Trust, Privacy and Security in E-Business: Requirements and Solutions. In: Bozanis, Panayiotis und Houstis, Elias N., (eds.) Advances in Informatics. Lecture Notes in Computer Science, 3746. Springer, Berlin, S. 548-558. ISBN 978-3-540-29673-7. Zugang zum Volltext eingeschränkt.

Katsikas, Sokratis und Lopez, Javier und Pernul, Günther, eds. (2005) Trust, privacy and security in digital business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22 - 26, 2005; proceedings. Lecture Notes in Computer Science, 3592. Springer, Berlin. ISBN 3-540-28224-6; 978-3-540-28224-2. Volltext nicht vorhanden.

2004

Priebe, Torsten, Muschall, Björn, Dobmeier, Wolfgang und Pernul, Günther (2004) A Flexible Security System for Enterprise and e-Government Portals. In: Galindo, Fernando, (ed.) Database and Expert Systems Applications. Lecture notes in computer science, 3180. Springer, Berlin, S. 884-893. ISBN 3-540-22936-1; 978-3-540-22936-0. Zugang zum Volltext eingeschränkt.

2003

Priebe, Torsten, Pernul, Günther und Krause, Peter (2003) Ein integrativer Ansatz für unternehmensweite Wissensportale. In: Uhr, Wolfgang, (ed.) Wirtschaftsinformatik 2003: Medien - Märkte - Mobilität; 6. Internationale Tagung Wirtschaftsinformatik (WI 2003). Band 2. Physica-Verlag, Heidelberg, S. 277-292. ISBN 3-7908-0116-X. Volltext nicht vorhanden.

Pernul, Günther (2003) Trust for Digital Products. In: Bauknecht, Kurt, (ed.) E-Commerce and Web Technologies. Lecture Notes in Computer Science, 2738. Springer, Berlin, S. 1-5. ISBN 978-3-540-40808-6; 3-540-40808-8. Zugang zum Volltext eingeschränkt.

1994

Pernul, Günther (1994) Security for next generation hypertext systems. Hypermedia 6 (1), S. 1-18. Volltext nicht vorhanden.

1992

Pernul, Günther, ed. (1992) Entity-relationship approach : proceedings / ER '92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7 - 9, 1992. Lecture Notes in Computer Science, 645. Springer, Berlin. ISBN 3-540-56023-8, 0-387-56023-8. Volltext nicht vorhanden.

1988

Pernul, Günther (1988) Relationales Datenbankdesign aufgrund von Benutzersichtstrukturen. Dissertation, Wien, Univ.. Volltext nicht vorhanden.

1987

Pernul, Günther, ed. (1987) Berichte aus Informatikforschungsinstitutionen : [Beiträge der 10. Tagung "Berichte aus Informatikforschungsinstitutionen", Wien, 25.-27. Februar 1987]. Schriftenreihe der Österreichischen Computer-Gesellschaft, 37. Oldenbourg, Wien. ISBN 3-486-20382-7, 3-7029-0231-7. Volltext nicht vorhanden.

Diese Liste wurde erzeugt am Sat Dec 10 19:33:04 2016 CET.
  1. Universität

Universitätsbibliothek

Publikationsserver

Kontakt:

Publizieren: oa@ur.de

Dissertationen: dissertationen@ur.de

Forschungsdaten: daten@ur.de

Ansprechpartner