Number of items at this level: 154.
B
Brucker, Achim D.,
Petritsch, Helmut and
Weber, Stefan G.
(2010)
Attribute-based Encryption with Break-glass.
In:
Samarati, Pierangela and
Tunstall, Michael and
Posegga, Joachim and
Markantonakis, Konstantinos and
Sauveron, Damien, (eds.)
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings.
Lecture Notes in Computer Science / Security and Cryptology, 6033.
Springer, Berlin, pp. 237-244.
ISBN 978-3-642-12367-2.
Fulltext not available.
Brucker, Achim D. and
Petritsch, Helmut
(2010)
Idea: Efficient Evaluation of Access Control Constraints.
In:
Engineering secure software and systems: second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010; proceedings.
Lecture Notes in Computer Science, 5965.
Springer, Berlin, pp. 157-165.
ISBN 978-3-642-11746-6.
Broser, Christian,
Fritsch, Christoph,
Gmelch, Oliver,
Pernul, Günther,
Schillinger, Rolf and
Wiesbeck, Sandra
(2009)
Analyzing Requirements for Virtual Business Alliances -
the case of SPIKE.
In:
Proceedings of the The First International ICST Conference on Digital Business (DigiBiz 2009), London, UK.
Springer, Heidelberg.
ISBN 978-963-9799-56-1.
Broser, Christian,
Fritsch, Christoph,
Gmelch, Oliver,
Pernul, Günther and
Schillinger, Rolf
(2009)
SPIKE - A Collaboration Platform for Short-Term Virtual Business Alliances.
In:
Proceedings of the Workshop on Technological trends in Enterprise Systems for SMEs and large enterprises: Heading towards the Future Internet, London, UK während der DIGIBIZ 2009.
Springer, Heidelberg.
ISBN 978-963-9799-56-1.
Busch, Sönke,
Muschall, Björn,
Pernul, Günther and
Priebe, Torsten
(2006)
Authrule: A Generic Rule-Based Authorization Module.
In:
Data and Applications Security XX: proceedings / 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31 - August 2, 2006.
Lecture Notes in Computer Science, 4127.
Springer, Berlin, pp. 267-281.
ISBN 978-3-540-36799-4; 978-3-540-36796-3.
Fulltext restricted.
C
Cetto, Alexandra,
Netter, Michael,
Pernul, Günther,
Richthammer, Christian,
Riesner, Moritz,
Roth, Christian and
Sänger, Johannes
(2014)
Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks (Best Paper Award).
In:
Proc. of the 2nd International Workshop on Intelligent Digital Games for Empowerment and Inclusion (IDGEI).
Haifa, Israel.
D
Dietz, Marietheres 
,
Putz, Benedikt 
and
Pernul, Günther
(2019)
A Distributed Ledger Approach to Digital Twin Secure Data Sharing.
In:
Foley, Simon N., (ed.)
Data and Applications Security and Privacy XXXIII. DBSec 2019.
Lecture Notes in Computer Science, 11559.
Springer, Cham (Switzerland), pp. 281-300.
ISBN 978-3-030-22478-3 (print), 978-3-030-22479-0 (online).
Dietz, Marietheres and
Pernul, Günther
(2018)
Big Log Data Stream Processing: Adapting an Anomaly Detection Technique.
In:
Hartmann, S. and
Hameurlain, A. and
Pernul, Günther and
Wagner, R., (eds.)
Database and Expert Systems Applications. DEXA 2018.
Lecture Notes in Computer Science, 11030.
Springer, Cham, 159^166.
ISBN 978-3-319-98811-5 (print), 978-3-319-98812-2 (ebook).
Fulltext not available.
de Meer, Hermann,
Diener, Michael,
Herkenhöner, Ralph,
Kucera, Markus,
Niedermeier, Michael,
Reisser, Andreas,
Guido, Schryen,
Vetter, Michael,
Waas, Thomas and
Yasasin, Emrah
(2013)
Sicherheitsherausforderungen in hochverteilten Systemen.
PIK-Praxis der Informationsverarbeitung und Kommunikation 36 (3), pp. 153-159.
Dobmeier, Wolfgang and
Pernul, Günther
(2007)
Towards Privacy-Aware Handling of Authorizations.
In:
Policy 2007: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks: proceedings: Bologna, Italy, 13-15 June, 2007.
IEEE Computer Society, Los Alamitos, Calif., pp. 70-76.
ISBN 0-7695-2767-1.
Dobmeier, Wolfgang,
Priebe, Torsten and
Pernul, Günther
(2006)
Metamodell attributbasierter Zugriffskontrolle.
In:
Mayr, Heinrich C., (ed.)
Modellierung 2006: 22. - 24. März 2006 in Innsbruck, Austria.
GI-Edition: Proceedings, 82.
Gesellschaft für Informatik, Bonn.
ISBN 3-88579-176-5.
Fulltext not available.
E
Englbrecht, Ludwig 
,
Langner, Gregor,
Pernul, Günther and
Quirchmayr, Gerald
(2019)
26. Enhancing credibility of digital evidence through provenance-based incident response handling.
In:
ARES '19 Proceedings of the 14th International Conference on Availability, Reliability and Security.
ACM, New York, NY, USA.
ISBN 978-1-4503-7164-3.
Erber, Roland,
Schläger, Christian and
Pernul, Günther
(2007)
Patterns for Authentication and Authorisation Infrastructures.
In:
Tjoa, A. Min, (ed.)
Proceedings / 18th International Conference on Database and Expert Systems Applications, DEXA 2007 Regensburg, Germany, 3 - 7 September 2007.
IEEE Computer Society, Los Alamitos, Calif., pp. 755-759.
ISBN 978-0-7695-2932-5.
F
Fuchs, Ludwig and
Pernul, Günther
(2013)
Qualitätssicherung im Identity- und Access Management.
In:
Knoll, Matthias, (ed.)
IT-Prüfung und IT-Revision.
HMD - Praxis der Wirtschaftsinformatik, 289.
dpunkt-verlag, Heidelberg.
ISBN 978-3-86490-057-0.
Fulltext not available.
Fuchs, Ludwig
(2012)
Innovatives Identitätsmanagement.
In:
Studie IT Security.
IT Verlag für Informationstechnik GmbH, Deutschland, pp. 220-236.
ISBN 3-936052-38-7.
Fulltext not available.
Fritsch, Christoph,
Bednar, Peter and
Pernul, Günther
(2011)
DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure.
In:
Huemer, Christian and
Setzer, Thomas, (eds.)
E-Commerce and Web Technologies. 12th International Conference, EC-Web 2011, Toulouse, France, August 30 - September 1, 2011. Proceedings.
Lecture Notes in Business Information Processing, 85, Part 1.
Springer, Berlin, pp. 13-24.
Fuchs, Ludwig and
Meier, S.
(2011)
The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective.
In:
Tjoa, A Min, (ed.)
Availability, reliability and security for business, enterprise and health information systems : IFIP WG 8.4/8.9 international cross domain conference and workshop ; proceedings / ARES 2011, Vienna, Austria, August 22 - 26, 2011.
Lecture notes in computer science, 6908.
Springer, Berlin.
ISBN 978-3-642-23299-2, 978-3-642-23300-5 (online).
Fulltext not available.
Fernandez, Eduardo B.,
Yoshioka, Nobukazu,
Washizaki, Hironori,
Jurjens, Jan,
VanHilst, Michael and
Pernul, Günther
(2011)
Using security patterns to develop secure systems.
In:
Mouratidis, Haralambos, (ed.)
Software engineering for secure systems: Industrial and Research Perspectives.
IGI Global Group, Information Science Reference, New York, pp. 16-31.
ISBN 978-1-615-20837-1; 978-1-615-20838-8.
Fuchs, Ludwig and
Pernul, Günther
(2010)
Großreinemachen fürs IAM.
Die Zeitschrift für Informations-Sicherheit: <kes> (Nr. 6), p. 24.
Fulltext not available.
Fritsch, Christoph,
Netter, Michael,
Reisser, Andreas and
Pernul, Günther
(2010)
Attacking Image Recognition Captchas - A Naive but Effective Approach.
In:
Katsikas, Sokratis and
Lopez, Javier and
Soriano, Miguel, (eds.)
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings.
Lecture notes in computer science, 6264.
Springer, Berlin, pp. 13-25.
ISBN 3-642-15151-5, 978-3-642-15151-4.
Fritsch, Christoph and
Pernul, Günther
(2010)
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution.
In:
Katsikas, Sokratis and
Lopez, Javier and
Soriano, Miguel, (eds.)
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings.
Lecture notes in computer science, 6264.
Springer, Berlin, pp. 214-226.
ISBN 3-642-15151-5, 978-3-642-15151-4.
Fuchs, Ludwig,
Pernul, Günther and
Broser, Christian
(2009)
Different Approaches to in-house Identity Management.
In:
Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009).
IEEE Computer Society, Fukuoka, Japan.
ISBN 978-07695-35647.
Fuchs, Ludwig and
Müller, Christian
(2009)
Automating Periodic Role-Checks: A Tool-based Approach.
In:
Hansen, Hans Robert, (ed.)
Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009.
Booksocg.at, 246.
Oesterreichische Computer Gesellschaft, Wien.
ISBN 978-3-85403-246-5.
Fuchs, Ludwig and
Pernul, Günther
(2008)
HyDRo - Hybrid Development of Roles.
In:
Sekar, R. and
Pujari, Arun K., (eds.)
Information systems security: 4th international conference; proceedings / ICISS 2008, Hyderabad, India, December 16 - 20, 2008.
Lecture Notes in Computer Science, 5352.
Springer, Berlin, pp. 287-302.
ISBN 978-3-540-89861-0.
Fuchs, Ludwig and
Preis, Anton
(2008)
BusiROLE: A Model for Integrating Business Roles into Identity Management.
In:
Furnell, Steven, (ed.)
Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008.
Lecture Notes in Computer Science, 5185.
Springer, Berlin, pp. 128-138.
ISBN 978-3-540-85734-1.
Fernandez, Eduardo B.,
Pernul, Günther and
Larrando-Petrie, Maria M.
(2008)
Patterns and Pattern Diagrams for Access Control.
In:
Furnell, Steven, (ed.)
Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008.
Lecture Notes in Computer Science, 5185.
Springer, Berlin, pp. 38-47.
ISBN 978-3-540-85734-1.
Fernandez, Eduardo B. and
Pernul, Günther
(2006)
Patterns for session-based access control.
In:
Proceedings of the 2006 conference on Pattern language.
ACM International Conference Proceeding Series.
ACM, NewYork.
ISBN 978-1-60558-372-3.
G
Gaude, Michael
(2008)
Zukünftige Verbreitung der Digitalen Signatur in Geschäftsprozessen - Ergebnisse einer Delphi-Studie.
In:
Bichler, Martin and
Hess, Thomas and
Krcmar, Helmut and
Lechner, Ulrike and
Matthes, Florian and
Picot, Arnold and
Speitkamp, Benjamin and
Wolf, Petra, (eds.)
Multikonferenz Wirtschaftsinformatik 2008.
GITO-Verlag, Berlin, pp. 1223-1237.
ISBN 978-3-940019-34-9; 3-940019-34-8.
Fulltext not available.
Gaude, Michael
(2007)
Future Diffusion of PK1-Technology — A German Delphi Study.
In:
Pohlmann, Norbert and
Reimer, Helmut and
Schneider, Wolfgang, (eds.)
Securing electronic business processes: highlights of the Information Security Solutions Europe/SECURE 2007 Conference / ISSE/SECURE 2007.
Vieweg, Wiesbaden, pp. 386-395.
ISBN 978-3-8348-0346-7.
H
Hummer, Matthias,
Kunz, Michael,
Fuchs, Ludwig,
Netter, Michael and
Pernul, Günther
(2015)
Advanced Identity and Access Policy Management using Contextual Data.
In: 10th International Conference on Availability, Reliability and Security (ARES '15), August 24th – 28th, 2015, Université Paul Sabatier, Toulouse, France.
Fulltext not available.
K
Kunz, Michael,
Fuchs, Ludwig,
Hummer, Matthias and
Pernul, Günther
(2015)
Introducing Dynamic Identity and Access Management in Organizations.
In:
Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings.
Lecture Notes in Computer Science, 9478.
Springer, pp. 139-158.
ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).
Kunz, Michael,
Hummer, Matthias,
Fuchs, Ludwig,
Netter, Michael and
Pernul, Günther
(2014)
Analyzing Recent Trends in Enterprise Identity Management.
In: Workshop on Security in highly connected IT systems, September 1-5, 2014, München.
(In Press)
Kolter, Jan,
Netter, Michael and
Pernul, Günther
(2010)
Visualizing Past Personal Data Disclosures.
In:
Proc. of the Fifth International Conference on Availability, Reliability and Security (ARES 2010).
IEEE Computer Society, Krakow, Poland.
Kolter, Jan
(2010)
User-Centric Privacy.
Electronic Commerce, 41.
EUL-Verlag, Lohmar.
ISBN 978-3-89936-917-5.
Fulltext not available.
Kolter, Jan,
Kernchen, Thomas and
Pernul, Günther
(2009)
Collaborative Privacy - A Community-based Privacy Infrastructure.
In:
Gritzalis, Dimitris and
Lopez, Javier, (eds.)
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings.
IFIP International Federation for Information Processing, 297.
Springer, Berlin.
ISBN 978-3-642-01243-3.
Kolter, Jan,
Schillinger, Rolf and
Pernul, Günther
(2007)
Building a Distributed Semantic-aware Security Architecture.
In:
Venter, Hein and
Eloff, Mariki and
Labuschagne, Les and
Eloff, Jan and
Solms, Rossouw von, (eds.)
New approaches for security, privacy and trust in complex environments: proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa.
Springer, New York, pp. 397-408.
ISBN 978-0-387-72366-2; 0-387-72366-8.
Kolter, Jan,
Schillinger, Rolf and
Pernul, Günther
(2007)
A Privacy-enhanced Attribute-based Access Control System.
In:
Barker, Steve, (ed.)
Data and applications security XXI: proceedings / 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007.
Lecture Notes in Computer Science, 4602.
Springer, Berlin.
ISBN 978-3-540-73533-5; 3-540-73533-X.
Fulltext not available.
Katsikas, Sokratis K.,
Lopez, Javier and
Pernul, Günther
(2005)
Trust, Privacy and Security in E-Business: Requirements and Solutions.
In:
Bozanis, Panayiotis and
Houstis, Elias N., (eds.)
Advances in Informatics.
Lecture Notes in Computer Science, 3746.
Springer, Berlin, pp. 548-558.
ISBN 978-3-540-29673-7.
Fulltext restricted.
L
Lopez, Javier,
Nikova, Svetla,
Pashalidis, Andreas,
Pernul, Günther and
Preneel, Bart
(2013)
Preface.
Computers & Mathematics with Applications 65 (5), p. 747.
Fulltext not available.
Lopez, Javier,
Oppliger, Rolf and
Pernul, Günther
(2005)
Classifying Public Key Certificates.
In:
Chadwick, David, (ed.)
Public Key Infrastructure.
Lecture Notes in Computer Science, 3545.
Springer, Berlin, pp. 135-143.
ISBN 978-3-540-28062-0.
Fulltext restricted.
M
Menges, Florian,
Böhm, Fabian,
Vielberth, Manfred,
Puchta, Alexander,
Taubmann, Benjamin,
Rakotondravony, Noëlle and
Latzo, Tobias
(2018)
Introducing DINGfest: An architecture for next generation SIEM systems.
In: SICHERHEIT 2018, 25.4.2018-27.4.2018, Konstanz, DE.
N
Nuss, Martin,
Puchta, Alexander and
Kunz, Michael
(2018)
Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises.
In:
Furnell, S. and
Mouratidis, H. and
Pernul, Günther, (eds.)
Trust, Privacy and Security in Digital Business. TrustBus 2018.
Lecture Notes in Computer Science, 11033.
Springer, Cham (Switzerland), pp. 167-181.
Netter, Michael,
Pernul, Günther,
Richthammer, Christian and
Riesner, Moritz
(2015)
Privacy in Social Networks: Existing Challenges and Proposals for Solutions.
In:
First International Conference on Information Systems Security and Privacy (ICISSP), Revised Selected Papers.
Communications in Computer and Information Science.
Springer International Publishing, pp. 16-27.
ISBN 978-3-319-27667-0.
Netter, Michael,
Riesner, Moritz,
Weber, Michael and
Pernul, Günther
(2013)
Privacy Settings in Online Social Networks-Preferences, Perception, and Reality (Best Paper Award Nominee).
In:
Proc of the 46th Hawaii International Conference on System Science (HICSS).
Maui, Hawaii, USA.
Netter, Michael,
Herbst, Sebastian and
Pernul, Günther
(2013)
Interdisciplinary Impact Analysis of Privacy in Social Networks.
In:
Altshuler, Yaniv and
Elovici, Yuva and
Cremers, Armin B. and
Aharony, Nadav and
Pentland, Alex, (eds.)
Security and Privacy in Social Networks.
Springer, pp. 7-26.
ISBN 978-1-4614-4138-0.
Netter, Michael and
Pernul, Günther
(2009)
Integrating security patterns into the electronic invoicing process.
In:
Tjoa, A Min and
Wagner, Roland, (eds.)
Proc. of the 20th International Workshop on Database and Expert Systems Applications (DEXA 2009).
IEEE Computer Society Press, Los Alamitos, Calif., pp. 150-154.
ISBN 978-0-7695-3763-4.
P
Puchta, Alexander,
Böhm, Fabian 
and
Pernul, Günther
(2019)
Contributing to Current Challenges in Identity and Access Management with Visual Analytics.
In:
Foley, S., (ed.)
Data and Applications Security and Privacy XXXIII. DBSec 2019.
Lecture Notes in Computer Science, 11559.
Springer, Cham, pp. 221-239.
ISBN 978-3-030-22479-0 (online), 978-3-030-22478-3 (print).
Fulltext not available.
Pernul, Günther,
Ryan, Peter Y. A. and
Weippl, Edgar
(2015)
Computer Security - ESORICS 2015.
In:
Pernul, Günther and
Ryan, Peter Y. A. and
Weippl, Edgar, (eds.)
20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II.
Lecture notes in computer science, 9327.
Springer, Heidelberg.
ISBN 978-3-319-24176-0, 978-3-319-24177-7.
Fulltext not available.
Pernul, Günther and
Riesner, Moritz
(2011)
Conceptual Design of Secure Databases.
In:
van Tilborg, Henk C. A. and
Jajodia, Sushil, (eds.)
Encyclopedia of Cryptography and Security. 2. Auflage.
Springer, New York, pp. 245-248.
ISBN 978-1-441-95906-5; 978-1-4419-5905-8 (ISBN der Printausgabe).
Fulltext not available.
Petritsch, Helmut,
Brucker, Achim D. and
Schaad, Andreas
(2009)
Delegation Assistance.
In:
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY).
IEEE.
Fulltext not available.
Priebe, Torsten
(2008)
Authorization and Access Control.
In:
Furnell, Steven and
Katsikas, Sokratis K. and
Lopez, Javier and
Patel, Ahmed, (eds.)
Securing Information and Communication Systems: Principles, Technologies and Applications.
Artech House information security and privacy series; Artech House computer security series.
Artech House, Boston, pp. 61-86.
ISBN 978-1-59693-228-9; 1-59693-228-7.
Fulltext not available.
Pernul, Günther
(2008)
Data-Centric Applications.
In:
Furnell, Steven and
Katsikas, Sokratis K. and
Lopez, Javier and
Patel, Ahmed, (eds.)
Securing Information and Communication Systems: Principles, Technologies and Applications.
Artech House information security and privacy series; Artech House computer security series.
Artech House, Boston, pp. 87-103.
ISBN 978-1-59693-228-9; 1-59693-228-7.
Fulltext not available.
Pernul, Günther and
Dobmeier, Wolfgang
(2006)
Modellierung von Zugriffsrichtlinien für offene Systeme.
In:
Weske, Mathias and
Nüttgens, Markus, (eds.)
EMISA 2006: Methoden, Konzepte und Technologie für die Entwicklung von dienstbasierten Informationssystemen.
GI-Edition : Proceedings, 95.
Ges. für Informatik, Bonn.
ISBN 978-3-88579-189-8; 3-88579-189-7.
Priebe, Torsten,
Kolter, Jan,
Herrmann, Dominik,
Bednar, Peter and
Paralic, Jan
(2006)
Supporting Semantic Annotation of Text Documents with Text Mining Techniques.
In:
Proceedings of the 7th International Workshop on Data Analysis (WDA 2006), Kosice, Slovakia, 01.-3. Juli 2006.
Elfa Academic Press, Kosice, Slovakia.
ISBN 80-969224-8-3.
Fulltext not available.
Priebe, Torsten,
Dobmeier, Wolfgang and
Kamprath, Nora
(2006)
Supporting Attribute-based Access Control with Ontologies.
In:
First International Conference on Availability, Reliability and Security (ARES'06).
IEEE Computer Society Press, pp. 465-472.
ISBN 0-7695-2567-9.
Fulltext not available.
Priebe, Torsten,
Muschall, Björn,
Dobmeier, Wolfgang and
Pernul, Günther
(2004)
A Flexible Security System for Enterprise and e-Government Portals.
In:
Galindo, Fernando, (ed.)
Database and Expert Systems Applications.
Lecture notes in computer science, 3180.
Springer, Berlin, pp. 884-893.
ISBN 3-540-22936-1; 978-3-540-22936-0.
Fulltext restricted.
Priebe, Torsten,
Pernul, Günther and
Krause, Peter
(2003)
Ein integrativer Ansatz für unternehmensweite Wissensportale.
In:
Uhr, Wolfgang, (ed.)
Wirtschaftsinformatik 2003: Medien - Märkte - Mobilität; 6. Internationale Tagung Wirtschaftsinformatik (WI 2003). Band 2.
Physica-Verlag, Heidelberg, pp. 277-292.
ISBN 3-7908-0116-X.
Fulltext not available.
Pernul, Günther
(2003)
Trust for Digital Products.
In:
Bauknecht, Kurt, (ed.)
E-Commerce and Web Technologies.
Lecture Notes in Computer Science, 2738.
Springer, Berlin, pp. 1-5.
ISBN 978-3-540-40808-6; 3-540-40808-8.
Fulltext restricted.
R
Richthammer, Christian and
Pernul, Günther
(2017)
Explorative Analysis of Recommendations Through Interactive Visualization.
In:
Bridge, Derek and
Stuckenschmidt, Heiner, (eds.)
E-Commerce and Web Technologies, EC-Web 2016, Revised Selected Papers.
Lecture Notes in Business Information Processing, 278.
Springer, Cham, pp. 46-57.
Richthammer, Christian,
Weber, Michael and
Pernul, Günther
(2017)
Reputation-Enhanced Recommender Systems (Best Paper Award).
In:
Steghöfer, Jan-Philipp and
Esfandiari, Babak, (eds.)
Trust Management XI. IFIPTM 2017.
IFIP Advances in Information and Communication Technology, 505.
Springer, Cham (Switzerland), pp. 163-179.
ISBN 978-3-319-59170-4 (print), 978-3-319-59171-1 (online).
Richthammer, Christian,
Kunz, Michael,
Sänger, Johannes,
Hummer, Matthias and
Pernul, Günther
(2015)
Dynamic Trust-based Recertifications in Identity and Access Management.
In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS), Vienna, Austria.
Richthammer, Christian,
Netter, Michael,
Riesner, Moritz,
Sänger, Johannes and
Pernul, Günther
(2014)
Taxonomy of Social Network Data Types.
EURASIP Journal on Information Security 2014 (11).
Riesner, Moritz,
Netter, Michael and
Pernul, Günther
(2012)
An Analysis of Implemented and Desirable Settings for Identity
Management on Social Networking Sites.
In: 7th International Conference on Availability, Reliability and Security (ARES 2012), August 20th - 24th, 2012, University of Economics, Prague, Czech Republic.
Revell, Norman,
Wagner, Roland,
Pernul, Günther,
Takizawa, Makoto,
Quirchmayer, Gerald and
Tjoa, A Min
(2006)
First International Conference on Availability, Reliability and Security (ARES´06).
IEEE Computer Society Press, Los Alamitos.
ISBN 0-7695-2567-9.
Fulltext not available.
S
Sänger, Johannes,
Hänsch, Norman,
Glass, Brian,
Benenson, Zinaida,
Landwirth, Robert and
Sasse, M. Angela
(2016)
Look Before You Leap: Improving the Users’ Ability to Detect Fraud in Electronic Marketplaces.
In:
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems.
ACM, New York, NY, USA, pp. 3870-3882.
ISBN 978-1-4503-3362-7.
Sänger, Johannes,
Richthammer, Christian,
Kremser, André and
Pernul, Günther
(2015)
Personalized Composition of Trustful Reputation Systems.
In: 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, July 13-15, 2015, Fairfax, VA, USA.
Fulltext not available.
Sänger, Johannes,
Richthammer, Christian,
Rösch, Artur and
Pernul, Günther
(2015)
Reusable Defense Components for Online Reputation Systems.
In:
Trust Management IX. 9th IFIP WG 11.11 Int. Conf., IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proc.
IFIP Advances in Information and Communication Technology, 454.
Springer, Berlin, pp. 195-202.
ISBN 978-3-319-18491-3 (onl.), 978-3-319-18490-6 (print).
Sänger, Johannes,
Richthammer, Christian,
Kunz, Michael,
Meier, Stefan and
Pernul, Günther
(2015)
Visualizing Unfair Ratings in Online Reputation Systems.
In: Proc. of the 23rd European Conference on Information Systems (ECIS), Münster, Germany.
Schillinger, Rolf,
Dürbeck, Stefan and
Bednar, Peter
(2009)
Access-eGov - a real-world Semantic Service-oriented Architecture for e-Government.
In:
Hansen, Hans Robert, (ed.)
Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009.
Booksocg.at, 246.
Oesterreichische Computer Gesellschaft, Wien.
ISBN 978-3-85403-246-5.
Sneed, Harry M.
(2009)
Wiedergewinnung von Web Services aus vorhandenen Altsystemen.
In:
Hansen, Hans Robert, (ed.)
Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009.
Booksocg.at, 246.
Oesterreichische Computer Gesellschaft, Wien.
ISBN 978-3-85403-246-5.
Schläger, Christian,
Fuchs, Ludwig and
Pernul, Günther
(2008)
Intensive Programme on Information and Communication Security.
In:
Jakoubi, Stefan, (ed.)
ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008.
IEEE Computer Society, Los Alamitos, Calif., pp. 752-757.
ISBN 978-0-7695-3102-1.
Schläger, Christian and
Pernul, Günther
(2008)
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps.
In:
Jakoubi, Stefan, (ed.)
ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008.
IEEE Computer Society, Los Alamitos, Calif., pp. 344-351.
ISBN 978-0-7695-3102-1; 0-7695-3102-4.
Schläger, Christian,
Priebe, Torsten,
Liewald, Manuel and
Pernul, Günther
(2007)
Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures.
In:
Markus, M. Lynne and
Hampe, J. Felix and
Gricar, Joze and
Pucihar, Andreja and
Lenart, Gregor, (eds.)
Proceedings of the 20th Bled eConference "eMergence" (Bled'07), Bled, Slovenia, June 3 - 6 2007.
Faculty of Organizational Sciences, Kranj.
ISBN 978-961-232-204-5.
Schläger, Christian,
Sojer, Manuel,
Muschall, Björn and
Pernul, Günther
(2006)
Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers.
In:
Bauknecht, Kurt, (ed.)
E-Commerce and Web Technologies: 7th International Conference, EC-Web 2006, Krakow, Poland, 05.-07 September 2006; proceedings.
Lecture Notes in Computer Science, 4082.
Springer, Heidelberg, pp. 132-141.
ISBN 978-3-540-37743-6.
Fulltext restricted.
Sojer, Manuel,
Schläger, Christian and
Locher, Christian
(2006)
The CIO - Hype, Science and Reality.
In:
Ljungberg, Jan, (ed.)
14th European Conference on Information Systems: 2006 ECIS Göteborg; Göteborg, June 12 - 14, 2006; proceedings.
kein Verlag, Göteborg.
ISBN 978-91-631-9894-6.
Fulltext not available.
Schläger, Christian and
Nowey, Thomas
(2006)
Towards a Risk Management Perspective on AAIs.
In:
Fischer-Hübner, Simone and
Furnell, Steven and
Lambrinoudakis, Costas, (eds.)
Trust and Privacy in Digital Business: Session 2: Security and Risk Management. TrustBus 2006, Krakau, Polen, 04.-08.September 2006.
Lecture Notes in Computer Science, 4083.
Springer, Heidelberg, pp. 41-50.
ISBN 978-3-540-37750-4.
T
Tokola, Teemu J.,
Schaberreiter, Thomas,
Quirchmayr, Gerald,
Englbrecht, Ludwig 
,
Pernul, Günther,
Katsikas, Sokratis K.,
Preneel, Bart and
Tang, Qiang
(2019)
20. A Collaborative Cybersecurity Education Program.
In:
Cybersecurity Education for Awareness and Compliance.
IGI Global, Hershey, USA, pp. 181-200.
ISBN 9781522578475, 9781522578482.
Fulltext not available.
U
V
W
Weishäupl, Eva,
Kunz, Michael,
Yasasin, Emrah,
Wagner, Gerit,
Prester, Julian,
Schryen, Guido and
Pernul, Günther
(2015)
Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory.
In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria.
(In Press)
Weippl, Edgar,
Tjoa, A Min and
Pernul, Günther
(2011)
Advances in Applied Security.
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependabe Applications Vol. 2 (No. 4).
This list was generated on Fri Dec 6 17:01:22 2019 CET.