Go to content
UR Home

Bibliography of the Universität Regensburg

Export as
[feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Creators | Item type | No Grouping
Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 1994 | 1992 | 1988 | 1987
Number of items at this level: 240.

2024

Baumer, Thomas , Reittinger, Tobias , Kern, Sascha and Pernul, Günther (2024) Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations. In: Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 11 - 13 Aug 2024, Philadelphia, PA, USA.

Baumer, Thomas , Grill, Johannes , Adan, Jacob and Pernul, Günther (2024) A Trust and Reputation System for Examining Compliance with Access Control. In: ARES 2024 The 19th International Conference on Availability, Reliability and Security, July 30 - August 02, 2024, Vienna, Austria.

Puchta, Alexander , Baumer, Thomas , Müller, Mathis and Pernul, Günther (2024) IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. In: DBSec 2024, 15.-17. Jul 2024, San José, CA, USA. Fulltext restricted.

Dietz, Marietheres , Reichvilser, Thomas and Pernul, Günther (2024) A Data-Driven Framework for Digital Twin Creation in Industrial Environments. IEEE Access 12, pp. 93294-93304.

Glas, Magdalena , Messmann, Gerhard and Pernul, Günther (2024) Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises. Computers & Security 144, p. 103965.

Schlette, Daniel , Empl, Philip , Caselli, Marco, Schreck, Thomas and Pernul, Günther (2024) Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors. In: 45th IEEE Symposium on Security and Privacy (SP 2024), MAY 20-23, 2024, San Francisco, CA, USA. Fulltext not available.

Vielberth, Manfred , Raab, Kristina , Glas, Magdalena , Grümer, Patrick and Pernul, Günther (2024) Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment. In: ARES 2024 The 19th International Conference on Availability, Reliability and Security, July 30 - August 02, 2024, Vienna, Austria.

Reittinger, Tobias , Glas, Magdalena , Aminzada, Sarah and Pernul, Günther (2024) Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality. In: IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2024), 9th - 11th July 2024, Skövde, Sweden. Fulltext restricted.

Kimbel, Angelika, Glas, Magdalena and Pernul, Günther (2024) Security and Privacy Perspectives on Using ChatGPT at the Workplace: An Interview Study. In: IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2024), 9th - 11th July 2024, Skövde, Sweden. Fulltext restricted.

2023

Empl, Philip , Schlette, Daniel , Stöger, Lukas and Pernul, Günther (2023) Generating ICS vulnerability playbooks with open standards. International Journal of Information Security 23, pp. 1215-1230.

Schlette, Daniel (2023) Collaborative Security with Cyber Threat Intelligence. PhD, Universität Regensburg.

Baumer, Thomas , Müller, Mathis and Pernul, Günther (2023) System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC. IEEE Access 11, pp. 86872-86894.

Kern, Sascha , Baumer, Thomas , Fuchs, Ludwig and Pernul, Günther (2023) Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach. In: DBSec 2023, 19.-21. Jul 2023, Sophia Antipolis, France.

Glas, Magdalena , Böhm, Fabian , Schönteich, Falko and Pernul, Günther (2023) Cyber Range Exercises: Potentials and Open Challenges for Organizations. In: Furnell, Steven and Clarke, Nathan, (eds.) Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings. IFIP Advances in Information and Communication Technology (IFIPAICT), 674. Springer, Cham, pp. 24-35. ISBN 978-3-031-38532-2, 978-3-031-38530-8. Fulltext not available.

Bauer, Julian (2023) Design und Implementierung eines Identity and Access Management Reporting Moduls basierend auf Metriken. Masters, Universität Regensburg.

Glas, Magdalena , Vielberth, Manfred and Pernul, Günther (2023) Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges. In: CHI '23: CHI Conference on Human Factors in Computing Systems, April 23 - 28, 2023, Hamburg Germany.

Stoiber, Christoph, Stöter, Maximilian, Englbrecht, Ludwig , Schönig, Stefan and Häckel, Björn (2023) Keeping Your Maturity Assessment Alive. Business & Information Systems Engineering 65, pp. 703-721.

Glas, Magdalena , Vielberth, Manfred , Böhm, Fabian , Reittinger, Tobias and Pernul, Günther (2023) Improving Cybersecurity Skill Development through Visual Programming. Information and Computer Security 31 (2).

Philip, Empl and Günther, Pernul (2023) Digital-Twin-Based Security Analytics for the Internet of Things. Information 14 (2), p. 95.

Grill, Johannes, Schlette, Daniel and Pernul, Günther (2023) Cyber Threat Intelligence : Gemeinschaftliche IT-Sicherheit durch den Austausch von Informationen. Blick in die Wissenschaft : Forschungsmagazin der Universität Regensburg 31 (44/45), pp. 23-25. Fulltext not available.

Empl, Philip , Hager, Henric and Pernul, Günther (2023) Digital Twins for IoT Security Management. In: Data and Applications Security and Privac Data and Applications Security and Privacy XXXVII 37th Annual IFIP WG 11.3 Conference, DBSec 2023, July 19–21, 2023, Sophia-Antipolis, France. Fulltext not available.

2022

Putz, Benedikt (2022) Secure Information Sharing with Distributed Ledgers. PhD, Universität Regensburg.

Kern, Sascha , Baumer, Thomas , Groll, Sebastian, Fuchs, Ludwig and Pernul, Günther (2022) Optimization of Access Control Policies. Journal of Information Security and Applications 70, p. 103301.

Dietz, Marietheres (2022) A two-fold Perspective on Enterprise Security in the Digital Twin Context. PhD, Universität Regensburg.

Putz, Benedikt , Vielberth, Manfred and Pernul, Günther (2022) BISCUIT - Blockchain Security Incident Reporting Based on Human Observations. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, 23-26 August 2022, Vienna.

Empl, Philip , Schlette, Daniel , Zupfer, Daniel and Pernul, Günther (2022) SOAR4IoT: Securing IoT Assets with Digital Twins. In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, August 23 - 26, 2022, Vienna Austria.

Böhm, Fabian Konrad (2022) Leveraging Visual Analytics for Cybersecurity. PhD, Universität Regensburg.

Glas, Magdalena , Vielberth, Manfred , Reittinger, Tobias , Böhm, Fabian and Pernul, Günther (2022) Visual Programming in Cyber Range Training to Improve Skill Development. In: Clarke, Nathan and Furnell, Steven, (eds.) Human Aspects of Information Security and Assurance. HAISA 2022. IFIP Advances in Information and Communication Technology, 658. Springer, Cham, Switzerland, pp. 3-13. ISBN 978-3-031-12172-2. Fulltext not available.

Dietz, Marietheres , Schlette, Daniel and Pernul, Günther (2022) Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence. In: The 46th IEEE Computer Society Signature Conference on Computers, Software, and Applications (COMPSAC 2022), June 27 - July 1 2022, Virtual Only. Fulltext restricted.

Böhm, Fabian , Vielberth, Manfred and Pernul, Günther (2022) Formalizing and Integrating User Knowledge into Security Analytics. SN Computer Science 3 (347), pp. 1-17.

Vielberth, Manfred (2022) Harnessing Human Potential for Security Analytics. PhD, Universität Regensburg.

Friedl, Sabrina , Glas, Magdalena , Englbrecht, Ludwig , Böhm, Fabian and Pernul, Günther (2022) ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics. In: Drevin, Lynette and Miloslavskaya, Natalia and Leung, Wai Sze and Solms, Suné von, (eds.) Information Security Education - Adapting to the Fourth Industrial Revolution. IFIP Advances in Information and Communication Technology, 650. Springer International Publishing, Cham, pp. 77-91. ISBN 978-3-031-08172-9, 978-3-031-08171-2. Fulltext restricted.

Dietz, Marietheres , Hageman, Leon, von Hornung, Constantin and Pernul, Günther (2022) Employing Digital Twins for Security-by-Design System Testing. In: CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, 27 April 2022, Baltimore MD USA.

Kellner, Florian (2022) Generating greenhouse gas cutting incentives when allocating carbon dioxide emissions to shipments in road freight transportation. OR Spectrum.

Putz, Benedikt and Pernul, Günther (2022) Comparing Successful DLT Consortia: A Lifecycle Perspective. In: 55th Hawaii International Conference on System Sciences 2022, Jan 4, 2022 - Jan 7, 2022, virtual.

Tokola, Teemu J., Schaberreiter, Thomas, Quirchmayr, Gerald, Englbrecht, Ludwig , Pernul, Günther , Katsikas, Sokratis K., Preneel, Bart and Tang, Qiang (2022) A Collaborative Cybersecurity Education Program. In: Research Anthology on Advancements in Cybersecurity Education. IGI Global, Hershey, USA, pp. 414-433. ISBN 9781668435540,. Fulltext not available.

2021

Böhm, Fabian , Englbrecht, Ludwig , Friedl, Sabrina and Pernul, Günther (2021) Visual Decision-Support for Live Digital Forensics. In: 2021 IEEE Symposium on Visualization for Cyber Security (VizSec), 27.10.2021, virtuell.

Dietz, Marietheres , Englbrecht, Ludwig and Pernul, Günther (2021) 2. Enhancing Industrial Control System Forensics using replication-based Digital Twins. In: Peterson, Gilbert and Shenoi, Sujeet, (eds.) Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers. IFIP Advances in Information and Communication Technology (IFIPAICT), 612 (2). Springer International Publishing, Cham, pp. 21-38. ISBN 978-3-030-88381-2. Fulltext not available.

Schlette, Daniel , Caselli, Marco and Pernul, Günther (2021) A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective. IEEE Communications Surveys & Tutorials 23 (4), pp. 2525-2556.

Schlette, Daniel , Vielberth, Manfred and Pernul, Günther (2021) CTI-SOC2M2 – The quest for mature, intelligence-driven security operations and incident response capabilities. Computers & Security 111, p. 102482. Fulltext not available.

Böhm, Fabian , Dietz, Marietheres , Preindl, Tobias and Pernul, Günther (2021) Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. Journal of Cybersecurity and Privacy 1 (3), pp. 519-538.

Groll, Sebastian, Kern, Sascha , Fuchs, Ludwig and Pernul, Günther (2021) Monitoring Access Reviews by Crowd Labelling. In: Fischer-Hübner, Simone and Lambrinoudakis, Costas and Kotsis, Gabriele and Khalil, Ismail and Tjoa, A. Min, (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 12927. Springer, Cham, pp. 3-17. ISBN 978-3-030-86586-3, 978-3-030-86585-6. Fulltext restricted.

Vielberth, Manfred , Glas, Magdalena , Dietz, Marietheres , Karagiannis, Stylianos , Magkos, Emmanouil and Pernul, Günther (2021) A Digital Twin-Based Cyber Range for SOC Analysts. In: Barker, Ken and Ghazinour, Kambiz, (eds.) Data and Applications Security and Privacy XXXV, 35th Annual IFIP WG 11.3 Conference, DBSec 2021. Information Systems and Applications, incl. Internet/Web, and HCI, 12840. Springer, Calgary, Canada, pp. 293-311. ISBN 978-3-030-81242-3; 978-3-030-81241-6. Fulltext not available.

Putz, Benedikt , Böhm, Fabian and Pernul, Günther (2021) HyperSec: Visual Analytics for Blockchain Security Monitoring. In: ICT Systems Security and Privacy Protection. SEC 2021., 22 June - 24 June 2021, Oslo, Norway (virtual).

Empl, Philip and Pernul, Günther (2021) A Flexible Security Analytics Service for the Industrial IoT. In: CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 28 April 2021, Virtual Event.

Menges, Florian , Latzo, Tobias, Vielberth, Manfred , Sobola, Sabine, Pöhls, Henrich C., Taubmann, Benjamin, Köstler, Johannes, Puchta, Alexander, Reiser, Hans P., Freiling, Felix and Pernul, Günther (2021) Towards GDPR-compliant data processing in modern SIEM systems. Computers & Security 103, p. 102165. Fulltext not available.

Englbrecht, Ludwig and Pernul, Günther (2021) A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. Journal of Cyber Security and Mobility 10 (1), pp. 27-64. Fulltext not available.

Vielberth, Manfred , Englbrecht, Ludwig and Pernul, Günther (2021) Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information. Information & Computer Security 29 (2), pp. 332-349. Fulltext not available.

Vielberth, Manfred (2021) Security Information and Event Management (SIEM). In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg, pp. 1-3. ISBN 978-3-642-27739-9. Fulltext not available.

Schlette, Daniel (2021) Cyber Threat Intelligence. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. ISBN 978-3-642-27739-9.

Schlette, Daniel (2021) Cyber Threat Intelligence Sharing. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. ISBN 978-3-642-27739-9.

Englbrecht, Ludwig (2021) IT Forensic Readiness. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1-3. ISBN 978-3-642-27739-9. Fulltext not available.

Englbrecht, Ludwig (2021) Security Capability Maturity Model. In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1-4. ISBN 978-3-642-27739-9. Fulltext not available.

Vielberth, Manfred (2021) Security Operations Center (SOC). In: Jajodia, Sushil and Samarati, Pierangela and Yung, Moti, (eds.) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg, pp. 1-3. ISBN 978-3-642-27739-9. Fulltext not available.

Böhm, Fabian (2021) Visual Security Analytics. In: Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin Heidelberg.

Putz, Benedikt , Dietz, Marietheres , Empl, Philip and Pernul, Günther (2021) EtherTwin: Blockchain-based Secure Digital Twin Information Management. Information Processing & Management 58 (1). Fulltext not available.

Böhm, Fabian , Vielberth, Manfred and Pernul, Günther (2021) Bridging Knowledge Gaps in Security Analytics. In: 7th International Conference on Information Systems Security and Privacy, 11.02. - 13.02.2021, Vienna, AT.

2020

Belchior, Rafael, Putz, Benedikt , Pernul, Günther, Correia, Miguel, Vasconcelos, André and Guerreiro, Sérgio (2020) SSIBAC: Self-Sovereign Identity Based Access Control. In: The 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys2020), in Conjunction with IEEE TrustCom 2020, December 29, 2020 - January 1, 2021, Guangzhou, China.

Vielberth, Manfred , Böhm, Fabian , Fichtinger, Ines and Pernul, Günther (2020) Security Operations Center: A Systematic Study and Open Challenges. IEEE Access 2020 (8), pp. 227756-227779.

Menges, Florian , Putz, Benedikt and Pernul, Günther (2020) DEALER: decentralized incentives for threat intelligence reporting and exchange. International Journal of Information Security 2021 (5), pp. 741-761.

Englbrecht, Ludwig , Schönig, Stefan and Pernul, Günther (2020) 27. Supporting Process Mining with Recovered Residual Data. In: Grabis, Jānis and Bork, Dominik, (eds.) The Practice of Enterprise Modeling. Lecture Notes in Business Information Processing (27). Springer International Publishing, Cham, pp. 389-404. ISBN 978-3-030-63479-7. Fulltext not available.

Putz, Benedikt and Pernul, Günther (2020) Detecting Blockchain Security Threats. In: 2020 IEEE International Conference on Blockchain, November 02-06, 2020, (virtual conference).

Menges, Florian (2020) Cyber Threat Intelligence Exchange. PhD, Universität Regensburg.

Englbrecht, Ludwig and Pernul, Günther (2020) A serious game-based peer-instruction digital forensics workshop. In: Drevin, Lynette and von Solms, Suné and Theocharidou, Marianthi, (eds.) Information Security in Action, 13th IFIP WG 11.8 World Conference, WISE 13. IFIP Advances in Information and Communication Technology. Springer International Publishing, Cham.

Dietz, Marietheres , Vielberth, Manfred and Pernul, Günther (2020) Integrating Digital Twin Security Simulations in the Security Operations Center. In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, August 25 - 28, 2020, Virtual Event Ireland. Fulltext not available.

Dietz, Marietheres and Pernul, Günther (2020) Unleashing the Digital Twin’s Potential for ICS Security. IEEE Security & Privacy 18 (4), pp. 20-27. Fulltext not available.

Böhm, Fabian , Englbrecht, Ludwig and Pernul, Günther (2020) 13. Designing a Decision-Support Visualization for Live Digital Forensic Investigations. In: Singhal, Anoop and Vaidya, Jaideep, (eds.) Data and Applications Security and Privacy XXXIV. 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings. Springer International Publishing, Cham, pp. 223-240. ISBN 978-3-030-49669-2. Fulltext not available.

Schlette, Daniel , Menges, Florian , Baumer, Thomas and Pernul, Günther (2020) 4. Security Enumerations for Cyber-Physical Systems. In: Singhal, Anoop and Vaidya, Jaideep, (eds.) Data and Applications Security and Privacy XXXIV. DBSec 2020. Lecture Notes in Computer Science, 12122 (4). Springer International Publishing, Cham, pp. 64-76. ISBN 978-3-030-49668-5 (print)l, 978-3-030-49669-2 (online). Fulltext not available.

Dietz, Marietheres and Pernul, Günther (2020) Digital Twin: Empowering Enterprises Towards a System-of-Systems Approach. Business & Information Systems Engineering 62 (2), pp. 179-184.

Schlette, Daniel , Böhm, Fabian, Caselli, Marco and Pernul, Günther (2020) Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security.

Englbrecht, Ludwig and Pernul, Günther (2020) A privacy-aware digital forensics investigation in enterprises. In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, August 25 - 28, 2020, Virtual Event Ireland. Fulltext not available.

2019

Vielberth, Manfred, Menges, Florian and Pernul, Günther (2019) Human-as-a-security-sensor for harvesting threat intelligence. Cybersecurity 2 (23).

Putz, Benedikt and Pernul, Günther (2019) Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An analytical study and evaluation of popular DLT frameworks. In: Hameurlain, A. and Wagner, R., (eds.) Transactions on Large-Scale Data and Knowledge-Centered Systems XLII. Lecture Notes in Computer Science, 11860. Springer, Berlin, pp. 25-50. ISBN 978-3-662-60530-1 (print), 978-3-662-60531-8 (online).

Putz, Benedikt , Menges, Florian and Pernul, Günther (2019) A secure and auditable logging infrastructure based on a permissioned blockchain. Computers & Security 87.

Englbrecht, Ludwig , Langner, Gregor, Pernul, Günther and Quirchmayr, Gerald (2019) 26. Enhancing credibility of digital evidence through provenance-based incident response handling. In: ARES '19 Proceedings of the 14th International Conference on Availability, Reliability and Security. ACM, New York, NY, USA. ISBN 978-1-4503-7164-3.

Hummer, Matthias (2019) Sustainable Identity and Access Management. PhD, Universität Regensburg.

Dietz, Marietheres , Putz, Benedikt and Pernul, Günther (2019) A Distributed Ledger Approach to Digital Twin Secure Data Sharing. In: Foley, Simon N., (ed.) Data and Applications Security and Privacy XXXIII. DBSec 2019. Lecture Notes in Computer Science, 11559. Springer, Cham (Switzerland), pp. 281-300. ISBN 978-3-030-22478-3 (print), 978-3-030-22479-0 (online).

Puchta, Alexander, Böhm, Fabian and Pernul, Günther (2019) Contributing to Current Challenges in Identity and Access Management with Visual Analytics. In: Foley, S., (ed.) Data and Applications Security and Privacy XXXIII. DBSec 2019. Lecture Notes in Computer Science, 11559. Springer, Cham, pp. 221-239. ISBN 978-3-030-22479-0 (online), 978-3-030-22478-3 (print). Fulltext not available.

Kunz, Michael, Puchta, Alexander, Groll, Sebastian, Fuchs, Ludwig and Pernul, Günther (2019) Attribute Quality Management for Dynamic Identity and Access Management. Elsevier Journal of Information Security and Applications 44, pp. 64-79.

Englbrecht, Ludwig , Meier, Stefan and Pernul, Günther (2019) Towards a capability maturity model for digital forensic readiness. Wireless Networks 26 (7), pp. 4895-4907. Fulltext not available.

Tokola, Teemu J., Schaberreiter, Thomas, Quirchmayr, Gerald, Englbrecht, Ludwig , Pernul, Günther, Katsikas, Sokratis K., Preneel, Bart and Tang, Qiang (2019) 20. A Collaborative Cybersecurity Education Program. In: Cybersecurity Education for Awareness and Compliance. IGI Global, Hershey, USA, pp. 181-200. ISBN 9781522578475, 9781522578482. Fulltext not available.

Englbrecht, Ludwig , Meier, Stefan and Pernul, Günther (2019) Toward a Capability Maturity Model for Digital Forensic Readiness. In: Vasant, P., (ed.) Innovative Computing Trends and Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham, pp. 87-97. ISBN 978-3-030-03898-4. Fulltext not available.

Kunz, Michael, Puchta, Alexander, Groll, Sebastian, Fuchs, Ludwig and Pernul, Günther (2019) Attribute quality management for dynamic identity and access management. Journal of Information Security and Applications 44, pp. 64-79. Fulltext not available.

Menges, Florian , Sperl, Christine and Pernul, Günther (2019) Unifying Cyber Threat Intelligence. In: Trust, Privacy and Security in Digital Business.

2018

Böhm, Fabian , Menges, Florian and Pernul, Günther (2018) Graph-based visual analytics for cyber threat intelligence. Cybersecurity 1 (1), pp. 1-16.

Vielberth, Manfred and Pernul, Günther (2018) A Security Information and Event Management Pattern. In: 12th Latin American Conference on Pattern Languages of Programs (SLPLoP), 20.-23. Nov. 2018, Valparaiso, Chile.

Richthammer, Christian, Weber, Michael and Pernul, Günther (2018) State of the Art of Reputation-Enhanced Recommender Systems. Web Intelligence 16 (4), pp. 273-286.

Richthammer, Christian and Pernul, Günther (2018) Situation Awareness for Recommender Systems. Electronic Commerce Research. Fulltext restricted.

Böhm, Fabian, Rakotondravony, Noëlle, Pernul, Günther and Reiser, Hans (2018) Exploring the role of experts' knowledge in visualizations for cyber security. In: IEEE Symposium on Visualization for Cyber Security, 22.10.2018, Berlin.

Suppan, Santiago Reinhard (2018) Data Protection for the Internet of Things. PhD, Universität Regensburg.

Menges, Florian, Böhm, Fabian, Vielberth, Manfred, Puchta, Alexander, Taubmann, Benjamin, Rakotondravony, Noëlle and Latzo, Tobias (2018) Introducing DINGfest: An architecture for next generation SIEM systems. In: SICHERHEIT 2018, 25.4.2018-27.4.2018, Konstanz, DE.

Dietz, Marietheres and Pernul, Günther (2018) Big Log Data Stream Processing: Adapting an Anomaly Detection Technique. In: Hartmann, S. and Hameurlain, A. and Pernul, Günther and Wagner, R., (eds.) Database and Expert Systems Applications. DEXA 2018. Lecture Notes in Computer Science, 11030. Springer, Cham, 159^166. ISBN 978-3-319-98811-5 (print), 978-3-319-98812-2 (ebook). Fulltext not available.

Nuss, Martin, Puchta, Alexander and Kunz, Michael (2018) Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises. In: Furnell, S. and Mouratidis, H. and Pernul, Günther, (eds.) Trust, Privacy and Security in Digital Business. TrustBus 2018. Lecture Notes in Computer Science, 11033. Springer, Cham (Switzerland), pp. 167-181.

2017

Pernul, Günther and Schryen, Guido and Schillinger, Rolf, eds. (2017) Security in Highly Connected IT Systems: Results of the Bavarian Research Alliance FORSEC. Universität Regensburg, Regensburg. ISBN 978-3-88246-374-3.

Menges, Florian and Pernul, Günther (2017) A comparative analysis of incident reporting formats. Computers & Security. Fulltext not available.

Sänger, Johannes and Pernul, Günther (2017) Interactive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms. Business & Information Systems Engineering.

Richthammer, Christian and Pernul, Günther (2017) Explorative Analysis of Recommendations Through Interactive Visualization. In: Bridge, Derek and Stuckenschmidt, Heiner, (eds.) E-Commerce and Web Technologies, EC-Web 2016, Revised Selected Papers. Lecture Notes in Business Information Processing, 278. Springer, Cham, pp. 46-57.

Meier, Stefan (2017) Digitale Forensik in Unternehmen. PhD, Universität Regensburg.

Richthammer, Christian, Sänger, Johannes and Pernul, Günther (2017) Interactive Visualization of Recommender Systems Data. In: 4th Workshop on Security in Highly Connected IT Systems (SHCIS), Neuchâtel, Switzerland.

Richthammer, Christian, Weber, Michael and Pernul, Günther (2017) Reputation-Enhanced Recommender Systems (Best Paper Award). In: Steghöfer, Jan-Philipp and Esfandiari, Babak, (eds.) Trust Management XI. IFIPTM 2017. IFIP Advances in Information and Communication Technology, 505. Springer, Cham (Switzerland), pp. 163-179. ISBN 978-3-319-59170-4 (print), 978-3-319-59171-1 (online).

2016

Sänger, Johannes and Pernul, Günther (2016) TRIVIA: visualizing reputation profiles to detect malicious sellers in electronic marketplaces. Journal of Trust Management 3 (5).

Hummer, Matthias, Kunz, Michael, Netter, Michael, Fuchs, Ludwig and Pernul, Günther (2016) Adaptive identity and access management—contextual data based policies. EURASIP Journal on Information Security 19.

Sänger, Johannes, Hänsch, Norman, Glass, Brian, Benenson, Zinaida, Landwirth, Robert and Sasse, M. Angela (2016) Look Before You Leap: Improving the Users’ Ability to Detect Fraud in Electronic Marketplaces. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, pp. 3870-3882. ISBN 978-1-4503-3362-7.

Kunz, Michael, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2016) How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. Communications in Computer and Information Science 576 (2), pp. 49-67.

2015

Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias and Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, pp. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).

Richthammer, Christian, Kunz, Michael, Sänger, Johannes, Hummer, Matthias and Pernul, Günther (2015) Dynamic Trust-based Recertifications in Identity and Access Management. In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS), Vienna, Austria.

Pernul, Günther, Ryan, Peter Y. A. and Weippl, Edgar (2015) Computer Security - ESORICS 2015. In: Pernul, Günther and Ryan, Peter Y. A. and Weippl, Edgar, (eds.) 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture notes in computer science, 9327. Springer, Heidelberg. ISBN 978-3-319-24176-0, 978-3-319-24177-7. Fulltext not available.

Weishäupl, Eva, Kunz, Michael, Yasasin, Emrah, Wagner, Gerit, Prester, Julian, Schryen, Guido and Pernul, Günther (2015) Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria. (In Press)

Hummer, Matthias, Kunz, Michael, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2015) Advanced Identity and Access Policy Management using Contextual Data. In: 10th International Conference on Availability, Reliability and Security (ARES '15), August 24th – 28th, 2015, Université Paul Sabatier, Toulouse, France. Fulltext not available.

Sänger, Johannes, Richthammer, Christian, Kremser, André and Pernul, Günther (2015) Personalized Composition of Trustful Reputation Systems. In: 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, July 13-15, 2015, Fairfax, VA, USA. Fulltext not available.

Sänger, Johannes, Richthammer, Christian and Pernul, Günther (2015) Reusable Components for Online Reputation Systems. Journal of Trust Management 2 (5), pp. 1-21.

Kunz, Michael, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2015) Analyzing Quality Criteria in Role-based Identity and Access Management. In: 1st International Conference on Information Systems Security and Privacy, 09.02.1015 - 11.02.2015, Angers, France.

Netter, Michael, Pernul, Günther, Richthammer, Christian and Riesner, Moritz (2015) Privacy in Social Networks: Existing Challenges and Proposals for Solutions. In: First International Conference on Information Systems Security and Privacy (ICISSP), Revised Selected Papers. Communications in Computer and Information Science. Springer International Publishing, pp. 16-27. ISBN 978-3-319-27667-0.

Sänger, Johannes, Richthammer, Christian, Rösch, Artur and Pernul, Günther (2015) Reusable Defense Components for Online Reputation Systems. In: Trust Management IX. 9th IFIP WG 11.11 Int. Conf., IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proc. IFIP Advances in Information and Communication Technology, 454. Springer, Berlin, pp. 195-202. ISBN 978-3-319-18491-3 (onl.), 978-3-319-18490-6 (print).

Sänger, Johannes, Richthammer, Christian, Kunz, Michael, Meier, Stefan and Pernul, Günther (2015) Visualizing Unfair Ratings in Online Reputation Systems. In: Proc. of the 23rd European Conference on Information Systems (ECIS), Münster, Germany.

2014

Unland, Rainer and Pernul, Günther (2014) Datenbanken im Einsatz. Analyse, Modellbildung und Umsetzung. De Gruyter Oldenbourg, Berlin; München. ISBN 978-3-486-72141-6 (print), 978-3-11-486-78129-8 (ebook), 978-3-11-486-98970-0 (ePub). Fulltext restricted.

Hassan, Sabri and Pernul, Günther (2014) Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics. In: iiWAS ’14, December 04 - 06 2014, Hanoi, Viet Nam. Fulltext not available.

Sänger, Johannes and Pernul, Günther (2014) Reusability for Trust and Reputation Systems. In: 6th IFIP WG 11.11 International Conference, IFIPTM 2014, July 7-10, 2014, Singapore, Singapore.

Sänger, Johannes, Richthammer, Christian and Hassan, Sabri (2014) Trust and Big Data: A Roadmap for Research. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, Munich.

Kunz, Michael, Hummer, Matthias, Fuchs, Ludwig, Netter, Michael and Pernul, Günther (2014) Analyzing Recent Trends in Enterprise Identity Management. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, München. (In Press)

Eckert, Claudia and Katsikas, Sokratis K. and Pernul, Günther, eds. (2014) Trust, Privacy, and Security in Digital Business: 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science, 8647. Springer, Heidelberg. ISBN 978-3-319-09770-1 (online), 978-3-319-09769-5 (print). Fulltext not available.

Sänger, Johannes and Pernul, Günther (2014) Visualizing Transaction Context in Trust and Reputation Systems. In: ARES 2014, 08.-12.09.2014, Fribourg, Switzerland.

Richthammer, Christian, Netter, Michael, Riesner, Moritz, Sänger, Johannes and Pernul, Günther (2014) Taxonomy of Social Network Data Types. EURASIP Journal on Information Security 2014 (11).

Atluri, Vijay and Pernul, Günther, eds. (2014) Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture notes in computer science, 8566. Springer, Heidelberg. ISBN 978-3-662-43935-7, 978-366-24393-6-4 (Online). Fulltext not available.

Fuchs, Ludwig, Kunz, Michael and Pernul, Günther (2014) Role Model Optimization For Secure Role-based Identity Management. In: European Conference on Information Systems (ECIS), June 9-11, 2014, Tel Aviv, Israel.

Meier, Stefan and Pernul, Günther (2014) Einsatz von digitaler Forensik in Unternehmen und Organisationen. In: Sicherheit 2014, 19.-21. März 2014, Wien. Fulltext not available.

Cetto, Alexandra, Netter, Michael, Pernul, Günther, Richthammer, Christian, Riesner, Moritz, Roth, Christian and Sänger, Johannes (2014) Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks (Best Paper Award). In: Proc. of the 2nd International Workshop on Intelligent Digital Games for Empowerment and Inclusion (IDGEI). Haifa, Israel.

Hassan, Sabri, Sänger, Johannes and Pernul, Günther (2014) SoDA: Dynamic Visual Analytics of Big Social Data. In: Proc. of the 1st international Conference on Big Data and Smart Computing. Bangkok, Thailand. Fulltext not available.

Netter, Michael, Weber, Michael, Diener, Michael and Pernul, Günther (2014) Visualizing Social Roles - Design and Evaluation of a Bird's-Eye View of Social Network Privacy Settings. In: Proc. of the 22nd European Conference on Information Systems (ECIS). Tel-Aviv, Israel. (In Press)

2013

Netter, Michael (2013) Privacy-preserving Infrastructure for Social Identity Management. PhD, University of Regensburg. Fulltext not available.

Riesner, Moritz, Netter, Michael and Pernul, Günther (2013) Analyzing Settings for Social Identity Management on Social Networking Sites: Classification, Current State, and Proposed Developments. Information Security Technical Report 17 (4), pp. 185-198.

Netter, Michael, Riesner, Moritz, Weber, Michael and Pernul, Günther (2013) Privacy Settings in Online Social Networks-Preferences, Perception, and Reality (Best Paper Award Nominee). In: Proc of the 46th Hawaii International Conference on System Science (HICSS). Maui, Hawaii, USA.

Netter, Michael, Herbst, Sebastian and Pernul, Günther (2013) Interdisciplinary Impact Analysis of Privacy in Social Networks. In: Altshuler, Yaniv and Elovici, Yuva and Cremers, Armin B. and Aharony, Nadav and Pentland, Alex, (eds.) Security and Privacy in Social Networks. Springer, pp. 7-26. ISBN 978-1-4614-4138-0.

Meier, Stefan, Fuchs, Ludwig and Pernul, Günther (2013) Managing the Access Grid - A Process View to Minimize Insider Misuse Risks. In: 11th International Conference on Wirtschaftsinformatik (WI2013), 27.2.-1.3.13, Leipzig.

Lopez, Javier, Nikova, Svetla, Pashalidis, Andreas, Pernul, Günther and Preneel, Bart (2013) Preface. Computers & Mathematics with Applications 65 (5), p. 747. Fulltext not available.

Riesner, Moritz (2013) Provider-Independent Social Identity Management for Personal and Professional Applications. Shaker, Aachen. ISBN 978-3844021554. Fulltext not available.

Fuchs, Ludwig and Pernul, Günther (2013) Qualitätssicherung im Identity- und Access Management. In: Knoll, Matthias, (ed.) IT-Prüfung und IT-Revision. HMD - Praxis der Wirtschaftsinformatik, 289. dpunkt-verlag, Heidelberg. ISBN 978-3-86490-057-0. Fulltext not available.

de Meer, Hermann, Diener, Michael, Herkenhöner, Ralph, Kucera, Markus, Niedermeier, Michael, Reisser, Andreas, Schryen, Guido, Vetter, Michael, Waas, Thomas and Yasasin, Emrah (2013) Sicherheitsherausforderungen in hochverteilten Systemen. PIK-Praxis der Informationsverarbeitung und Kommunikation 36 (3), pp. 153-159.

Richthammer, Christian, Netter, Michael, Riesner, Moritz and Pernul, Günther (2013) Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. In: 8th International Conference on Availability, Reliability and Security (ARES).

2012

Gmelch, Oliver and Pernul, Günther (2012) A Generic Architecture for User-Centric Portlet Integration. In: 14th IEEE Intern. Conference on Business Informatics (IEEE CEC 2012), 9.-11.9.2012, Hangzhou, China.

Netter, Michael, Hassan, Sabri and Pernul, Günther (2012) An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. In: 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012), 4-6 sept. 2012, Vienna, Austria.

Riesner, Moritz and Pernul, Günther (2012) Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective. In: Proc of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, Workshop on Security and Privacy in Social Networks (SPSN at SocialCom). IEEE Computer Society Press, Boston, USA, pp. 860-867. Fulltext not available.

Fritsch, Christoph and Pernul, Günther (2012) User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. In: IEEE 9th International Conference on e-Business Engineering, September 9-11, 2012, Hangzhou, China.

Riesner, Moritz, Netter, Michael and Pernul, Günther (2012) An Analysis of Implemented and Desirable Settings for Identity
Management on Social Networking Sites.
In: 7th International Conference on Availability, Reliability and Security (ARES 2012), August 20th - 24th, 2012, University of Economics, Prague, Czech Republic.

Fuchs, Ludwig and Pernul, Günther (2012) Minimizing insider misuse through secure Identity Management. Security and Communication Networks 5 (8), pp. 847-862.

Gmelch, Oliver (2012) User-Centric Application Integration in Enterprise Portal Systems. Electronic Commerce, 42. EUL-Verlag, Lohmar. ISBN 978-3-8441-0175-1. Fulltext not available.

Dürbeck, Stefan (2012) Cross-Domain Identity Management : A maturity model for globally interoperable eIDM frameworks in the European Union. Dürbeck Verlag. ISBN 978-3-00-037283-4. Fulltext not available.

Riesner, Moritz and Pernul, Günther (2012) Provider-Independent Online Social Identity Management -
Enhancing Privacy Consistently Across Multiple Social Networking Sites.
In: Proc of the 45th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, USA, , 4 - 7 January 2012. IEEE, Piscataway, NJ. ISBN 978-0-7695-4525-7. Fulltext not available.

Netter, Michael (2012) Conceptualizing Transparency on Online Social Networks. Tiny Transactions on Computer Science (TinyToCS) 1.

Fuchs, Ludwig (2012) Innovatives Identitätsmanagement. In: Studie IT Security. IT Verlag für Informationstechnik GmbH, Deutschland, pp. 220-236. ISBN 3-936052-38-7. Fulltext not available.

Petkova-Nikova, Svetla and Pashalidis, Andreas and Pernul, Günther, eds. (2012) Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science, 7163. Springer. ISBN 978-3-642-29803-5(Print), 978-3-642-29804-2 (Online). Fulltext not available.

2011

Weippl, Edgar, Tjoa, A. Min and Pernul, Günther (2011) Advances in Applied Security. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependabe Applications Vol. 2 (No. 4).

Netter, Michael, Herbst, Sebastian and Pernul, Günther (2011) Analyzing Privacy in Social Networks - An Interdisciplinary Approach. In: Proc. of the Third IEEE International Conference on Social Computing Workshop on Security and Privacy in Social Networks (SPSN at SocialCom). IEEE Computer Society Press, Boston, USA.

Petkova-Nikova, Svetla and Pashalidis, Andreas and Pernul, Günther, eds. (2011) Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011. Lecture Notes in Computer Science, 7163. Springer, Leuven, Belgium. ISBN 978-3-642-29803-5. Fulltext not available.

Furdik, Karol, Bednar, Peter, Lukac, Gabriel and Fritsch, Christoph (2011) Support of Semantic Interoperability in a Service-based Business Collaboration Platform. Scientific International Journal for Parallel and Distributed Computing: Scalable Computing: Practice and Experience 12 (3), pp. 293-305.

Furnell, Steven and Lambrinoudakis, Costas and Pernul, Günther, eds. (2011) Trust, Privacy and Security in Digital Business: 8th International Conference / TrustBus 2011, Toulouse, France. Prodeedings. Lecture Notes in Computer Science, 6863. Springer, Berlin. ISBN 978-3-642-22889-6. Fulltext not available.

Fuchs, Ludwig, Pernul, Günther and Sandhu, Ravi (2011) Roles In Information Security - A Survey And Classification Of The Research Area. Computers & Security.

Fritsch, Christoph, Bednar, Peter and Pernul, Günther (2011) DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure. In: Huemer, Christian and Setzer, Thomas, (eds.) E-Commerce and Web Technologies. 12th International Conference, EC-Web 2011, Toulouse, France, August 30 - September 1, 2011. Proceedings. Lecture Notes in Business Information Processing, 85, Part 1. Springer, Berlin, pp. 13-24.

Fuchs, Ludwig and Meier, S. (2011) The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective. In: Tjoa, A. Min, (ed.) Availability, reliability and security for business, enterprise and health information systems : IFIP WG 8.4/8.9 international cross domain conference and workshop ; proceedings / ARES 2011, Vienna, Austria, August 22 - 26, 2011. Lecture notes in computer science, 6908. Springer, Berlin. ISBN 978-3-642-23299-2, 978-3-642-23300-5 (online). Fulltext not available.

Dürbeck, Stefan, Kolter, Jan, Pernul, Günther and Schillinger, Rolf (2011) Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten. Informatik-Spektrum 34 (3), pp. 265-275.

Gmelch, Oliver and Pernul, Günther (2011) A portal-based approach for user-centric legacy application integration in collaborative environments. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011). Schweiz.

Netter, Michael, Riesner, Moritz and Pernul, Günther (2011) Assisted Social Identity Management - Enhancing Privacy in the Social Web. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011), 16.-18.Februar 2011, Zürich. Schweiz.

Priebe, Torsten, Reisser, Andreas and Hoang, Duong Thi Anh (2011) Reinventing the Wheel?! Why Harmonization and Reuse Fail in Complex Data Warehouse Environments and a Proposed Solution to the Problem. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011). Schweiz.

Pernul, Günther and Riesner, Moritz (2011) Conceptual Design of Secure Databases. In: van Tilborg, Henk C. A. and Jajodia, Sushil, (eds.) Encyclopedia of Cryptography and Security. 2. Auflage. Springer, New York, pp. 245-248. ISBN 978-1-441-95906-5; 978-1-4419-5905-8 (ISBN der Printausgabe). Fulltext not available.

Fernandez, Eduardo B., Yoshioka, Nobukazu, Washizaki, Hironori, Jurjens, Jan, VanHilst, Michael and Pernul, Günther (2011) Using security patterns to develop secure systems. In: Mouratidis, Haralambos, (ed.) Software engineering for secure systems: Industrial and Research Perspectives. IGI Global Group, Information Science Reference, New York, pp. 16-31. ISBN 978-1-615-20837-1; 978-1-615-20838-8.

2010

Fuchs, Ludwig and Pernul, Günther (2010) Großreinemachen fürs IAM. Die Zeitschrift für Informations-Sicherheit: <kes> (Nr. 6), p. 24. Fulltext not available.

Riesner, Moritz and Pernul, Günther (2010) Supporting Compliance through Enhancing Internal Control Systems by Conceptual Business Process Security Modeling. In: Proceedings of the 21st Australasian Conference on Information Systems (ACIS). AISel, Brisbane, Australia.

Fritsch, Christoph, Netter, Michael, Reisser, Andreas and Pernul, Günther (2010) Attacking Image Recognition Captchas - A Naive but Effective Approach. In: Katsikas, Sokratis and Lopez, Javier and Soriano, Miguel, (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Lecture notes in computer science, 6264. Springer, Berlin, pp. 13-25. ISBN 3-642-15151-5, 978-3-642-15151-4.

Fritsch, Christoph and Pernul, Günther (2010) Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. In: Katsikas, Sokratis and Lopez, Javier and Soriano, Miguel, (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Lecture notes in computer science, 6264. Springer, Berlin, pp. 214-226. ISBN 3-642-15151-5, 978-3-642-15151-4.

Pernul, Günther, Kolter, Jan and Kernchen, Thomas (2010) Collaborative Privacy Management. Computers & Security 29 (5), pp. 580-591.

Gmelch, Oliver and Pernul, Günther (2010) Preventing malicious Portlets from Communication and Intercepting in Collaboration Portals. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT). (In Press)

Brucker, Achim D., Petritsch, Helmut and Weber, Stefan G. (2010) Attribute-based Encryption with Break-glass. In: Samarati, Pierangela and Tunstall, Michael and Posegga, Joachim and Markantonakis, Konstantinos and Sauveron, Damien, (eds.) Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings. Lecture Notes in Computer Science / Security and Cryptology, 6033. Springer, Berlin, pp. 237-244. ISBN 978-3-642-12367-2. Fulltext not available.

Pernul, Günther and Fuchs, Ludwig (2010) Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data. In: 2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Morioka, Iwate, Japan.

Dürbeck, Stefan, Fritsch, Christoph, Pernul, Günther and Schillinger, Rolf (2010) A Semantic Security Architecture for Web Services - the Access-eGov Solution. In: Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Brucker, Achim D. and Petritsch, Helmut (2010) Idea: Efficient Evaluation of Access Control Constraints. In: Engineering secure software and systems: second international symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010; proceedings. Lecture Notes in Computer Science, 5965. Springer, Berlin, pp. 157-165. ISBN 978-3-642-11746-6.

Netter, Michael, Pernul, Günther and Fernandez, Eduardo B. (2010) Refining the pattern-based reference model for electronic invoices by incorporating threats. In: Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Kolter, Jan, Netter, Michael and Pernul, Günther (2010) Visualizing Past Personal Data Disclosures. In: Proc. of the Fifth International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland.

Fuchs, Ludwig (2010) Methodology for Hybrid Role Development. Wirtschaftsinformatik, 69. EUL-Verlag, Lohmar. ISBN 978-3-89936-978-6. Fulltext not available.

Kolter, Jan (2010) User-Centric Privacy. Electronic Commerce, 41. EUL-Verlag, Lohmar. ISBN 978-3-89936-917-5. Fulltext not available.

2009

Heuser, Carlos Alberto and Pernul, Günther, eds. (2009) Advances in Conceptual Modeling - Challenging Perspectives:
ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009, Proceedings.
Lecture notes in computer science, 5833. Springer. ISBN 978-3-642-04946-0. Fulltext not available.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver and Pernul, Günther (2009) Impact Analysis of Collaborative Platforms - The Case of SPIKE. In: IFAC, Workshop SWIIS (Supplementary Ways for Improving International Stability).

Netter, Michael and Pernul, Günther (2009) Integrating security patterns into the electronic invoicing process. In: Tjoa, A. Min and Wagner, Roland, (eds.) Proc. of the 20th International Workshop on Database and Expert Systems Applications (DEXA 2009). IEEE Computer Society Press, Los Alamitos, Calif., pp. 150-154. ISBN 978-0-7695-3763-4.

Petritsch, Helmut, Brucker, Achim D. and Schaad, Andreas (2009) Delegation Assistance. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). IEEE. Fulltext not available.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther, Schillinger, Rolf and Wiesbeck, Sandra (2009) Analyzing Requirements for Virtual Business Alliances -
the case of SPIKE.
In: Proceedings of the The First International ICST Conference on Digital Business (DigiBiz 2009), London, UK. Springer, Heidelberg. ISBN 978-963-9799-56-1.

Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther and Schillinger, Rolf (2009) SPIKE - A Collaboration Platform for Short-Term Virtual Business Alliances. In: Proceedings of the Workshop on Technological trends in Enterprise Systems for SMEs and large enterprises: Heading towards the Future Internet, London, UK während der DIGIBIZ 2009. Springer, Heidelberg. ISBN 978-963-9799-56-1.

Kolter, Jan, Kernchen, Thomas and Pernul, Günther (2009) Collaborative Privacy - A Community-based Privacy Infrastructure. In: Gritzalis, Dimitris and Lopez, Javier, (eds.) Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings. IFIP International Federation for Information Processing, 297. Springer, Berlin. ISBN 978-3-642-01243-3.

Fuchs, Ludwig, Pernul, Günther and Broser, Christian (2009) Different Approaches to in-house Identity Management. In: Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan. ISBN 978-07695-35647.

Kolter, Jan and Pernul, Günther (2009) Generating User-understandable Privacy Preferences. In: Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan. ISBN 978-07695-35647.

Schillinger, Rolf, Dürbeck, Stefan and Bednar, Peter (2009) Access-eGov - a real-world Semantic Service-oriented Architecture for e-Government. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Fuchs, Ludwig and Müller, Christian (2009) Automating Periodic Role-Checks: A Tool-based Approach. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Sneed, Harry M. (2009) Wiedergewinnung von Web Services aus vorhandenen Altsystemen. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.

Petritsch, Helmut and Brucker, Achim D. (2009) Extending access control models with break-glass. In: Proceedings of the 14th ACM symposium on Access control models and technologies. ACM, pp. 197-206. ISBN 978-1-60558-537-6.

Fischer-Hübner, Simone and Lambrinoudakis, Costas and Pernul, Günther, eds. (2009) Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings. Lecture Notes in Computer Science, 5695. Springer, Berlin. ISBN 978-3-642-03747-4. Fulltext not available.

2008

Fuchs, Ludwig and Pernul, Günther (2008) HyDRo - Hybrid Development of Roles. In: Sekar, R. and Pujari, Arun K., (eds.) Information systems security: 4th international conference; proceedings / ICISS 2008, Hyderabad, India, December 16 - 20, 2008. Lecture Notes in Computer Science, 5352. Springer, Berlin, pp. 287-302. ISBN 978-3-540-89861-0.

Fuchs, Ludwig and Preis, Anton (2008) BusiROLE: A Model for Integrating Business Roles into Identity Management. In: Furnell, Steven, (ed.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Lecture Notes in Computer Science, 5185. Springer, Berlin, pp. 128-138. ISBN 978-3-540-85734-1.

Fernandez, Eduardo B., Pernul, Günther and Larrando-Petrie, Maria M. (2008) Patterns and Pattern Diagrams for Access Control. In: Furnell, Steven, (ed.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Lecture Notes in Computer Science, 5185. Springer, Berlin, pp. 38-47. ISBN 978-3-540-85734-1.

Sneed, Harry M. (2008) Static and Dynamic Analysis of an Internet Security System. In: Software & Systems Quality Conferences, 15. - 18. April 2008, Düsseldorf, Germany.

Schläger, Christian, Fuchs, Ludwig and Pernul, Günther (2008) Intensive Programme on Information and Communication Security. In: Jakoubi, Stefan, (ed.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., pp. 752-757. ISBN 978-0-7695-3102-1.

Schläger, Christian and Pernul, Günther (2008) Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. In: Jakoubi, Stefan, (ed.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., pp. 344-351. ISBN 978-0-7695-3102-1; 0-7695-3102-4.

Schläger, Christian (2008) Attribute-based Infrastructures for Authentication and Authorisation. Electronic Commerce, 36. EUL-Verlag, Lohmar. ISBN 978-3-89936-670-9. Fulltext not available.

Priebe, Torsten (2008) Authorization and Access Control. In: Furnell, Steven and Katsikas, Sokratis K. and Lopez, Javier and Patel, Ahmed, (eds.) Securing Information and Communication Systems: Principles, Technologies and Applications. Artech House information security and privacy series; Artech House computer security series. Artech House, Boston, pp. 61-86. ISBN 978-1-59693-228-9; 1-59693-228-7. Fulltext not available.

Pernul, Günther (2008) Data-Centric Applications. In: Furnell, Steven and Katsikas, Sokratis K. and Lopez, Javier and Patel, Ahmed, (eds.) Securing Information and Communication Systems: Principles, Technologies and Applications. Artech House information security and privacy series; Artech House computer security series. Artech House, Boston, pp. 87-103. ISBN 978-1-59693-228-9; 1-59693-228-7. Fulltext not available.

Gaude, Michael (2008) Zukünftige Verbreitung der Digitalen Signatur in Geschäftsprozessen - Ergebnisse einer Delphi-Studie. In: Bichler, Martin and Hess, Thomas and Krcmar, Helmut and Lechner, Ulrike and Matthes, Florian and Picot, Arnold and Speitkamp, Benjamin and Wolf, Petra, (eds.) Multikonferenz Wirtschaftsinformatik 2008. GITO-Verlag, Berlin, pp. 1223-1237. ISBN 978-3-940019-34-9; 3-940019-34-8. Fulltext not available.

Fuchs, Ludwig and Pernul, Günther (2008) proROLE: A Process-oriented Lifecycle Model for Role Systems. In: Proceedings of the 16th European Conference on Information Systems (ECIS 2008), Galway, Ireland, June 9-11, 2008. Springer, Berlin, pp. 1322-1333. ISBN 9780955315923.

2007

Gaude, Michael (2007) Future Diffusion of PK1-Technology — A German Delphi Study. In: Pohlmann, Norbert and Reimer, Helmut and Schneider, Wolfgang, (eds.) Securing electronic business processes: highlights of the Information Security Solutions Europe/SECURE 2007 Conference / ISSE/SECURE 2007. Vieweg, Wiesbaden, pp. 386-395. ISBN 978-3-8348-0346-7.

Erber, Roland, Schläger, Christian and Pernul, Günther (2007) Patterns for Authentication and Authorisation Infrastructures. In: Tjoa, A. Min, (ed.) Proceedings / 18th International Conference on Database and Expert Systems Applications, DEXA 2007 Regensburg, Germany, 3 - 7 September 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 755-759. ISBN 978-0-7695-2932-5.

Lambrinoudakis, Costas and Pernul, Günther and Tjoa, A. Min, eds. (2007) Trust, privacy and security in digital business: 4th international conference; proceedings / TrustBus 2007, Regensburg, Germany, September 4-6, 2007. Lecture Notes in Computer Science, 4657. Springer, Heidelberg. ISBN 978-3-540-74408-5. Fulltext not available.

Schläger, Christian, Priebe, Torsten, Liewald, Manuel and Pernul, Günther (2007) Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures. In: Markus, M. Lynne and Hampe, J. Felix and Gricar, Joze and Pucihar, Andreja and Lenart, Gregor, (eds.) Proceedings of the 20th Bled eConference "eMergence" (Bled'07), Bled, Slovenia, June 3 - 6 2007. Faculty of Organizational Sciences, Kranj. ISBN 978-961-232-204-5.

Dobmeier, Wolfgang and Pernul, Günther (2007) Towards Privacy-Aware Handling of Authorizations. In: Policy 2007: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks: proceedings: Bologna, Italy, 13-15 June, 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 70-76. ISBN 0-7695-2767-1.

Kolter, Jan, Schillinger, Rolf and Pernul, Günther (2007) Building a Distributed Semantic-aware Security Architecture. In: Venter, Hein and Eloff, Mariki and Labuschagne, Les and Eloff, Jan and von Solms, Rossouw, (eds.) New approaches for security, privacy and trust in complex environments: proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. Springer, New York, pp. 397-408. ISBN 978-0-387-72366-2; 0-387-72366-8.

Priebe, Torsten, Dobmeier, Wolfgang, Schläger, Christian and Kamprath, Nora (2007) Supporting Attribute-based Access Control in Authentication and Authorization Infrastructures with Ontologies. Journal of software: JSW 2 (1), pp. 27-38.

Kolter, Jan, Schillinger, Rolf and Pernul, Günther (2007) A Privacy-enhanced Attribute-based Access Control System. In: Barker, Steve, (ed.) Data and applications security XXI: proceedings / 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Lecture Notes in Computer Science, 4602. Springer, Berlin. ISBN 978-3-540-73533-5; 3-540-73533-X. Fulltext not available.

Wagner, Roland and Revell, Norman and Pernul, Günther, eds. (2007) Database and expert systems applications: 18th international conference; proceedings / DEXA 2007, Regensburg, Germany, September 3-7, 2007. Lecture Notes in Computer Science, 4653. Springer, Berlin. ISBN 978-3-540-74467-2. Fulltext not available.

Schläger, Christian and Ganslmayer, Monika (2007) Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. In: The Second International Conference on Availability, Reliability and Security: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 230-237. ISBN 0-7695-2775-2.

Schläger, Christian and Nowey, Thomas (2007) On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments. International Journal of Computer Systems Science and Engineering.

Dürbeck, Stefan, Schillinger, Rolf and Kolter, Jan (2007) Security Requirements for a Semantic Service-oriented Architecture. In: The Second International Conference on Availability, Reliability and Security: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 366-373. ISBN 0-7695-2775-2; 978-0-7695-2775-8.

Fuchs, Ludwig and Pernul, Günther (2007) Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. In: The Second International Conference on Availability, Reliability and Security, 2007: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., pp. 374-384. ISBN 0-7695-2775-2; 978-0-7695-2775-8.

2006

Pernul, Günther and Dobmeier, Wolfgang (2006) Modellierung von Zugriffsrichtlinien für offene Systeme. In: Weske, Mathias and Nüttgens, Markus, (eds.) EMISA 2006: Methoden, Konzepte und Technologie für die Entwicklung von dienstbasierten Informationssystemen. GI-Edition : Proceedings, 95. Ges. für Informatik, Bonn. ISBN 978-3-88579-189-8; 3-88579-189-7.

Fernandez, Eduardo B. and Pernul, Günther (2006) Patterns for session-based access control. In: Proceedings of the 2006 conference on Pattern language. ACM International Conference Proceeding Series. ACM, NewYork. ISBN 978-1-60558-372-3.

Priebe, Torsten, Kolter, Jan, Herrmann, Dominik, Bednar, Peter and Paralic, Jan (2006) Supporting Semantic Annotation of Text Documents with Text Mining Techniques. In: Proceedings of the 7th International Workshop on Data Analysis (WDA 2006), Kosice, Slovakia, 01.-3. Juli 2006. Elfa Academic Press, Kosice, Slovakia. ISBN 80-969224-8-3. Fulltext not available.

Schläger, Christian, Nowey, Thomas and Montenegro, Jose A. (2006) A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c eCommerce. In: Proceedings of The First International Conference on Availability, Reliability and Security (ARES'06). IEEE Computer Society, Los Alamitos, Calif.. ISBN 0-7695-2567-9.

Revell, Norman, Wagner, Roland, Pernul, Günther, Takizawa, Makoto, Quirchmayer, Gerald and Tjoa, A. Min (2006) First International Conference on Availability, Reliability and Security (ARES´06). IEEE Computer Society Press, Los Alamitos. ISBN 0-7695-2567-9. Fulltext not available.

Priebe, Torsten, Dobmeier, Wolfgang and Kamprath, Nora (2006) Supporting Attribute-based Access Control with Ontologies. In: First International Conference on Availability, Reliability and Security (ARES'06). IEEE Computer Society Press, pp. 465-472. ISBN 0-7695-2567-9. Fulltext not available.

Dobmeier, Wolfgang, Priebe, Torsten and Pernul, Günther (2006) Metamodell attributbasierter Zugriffskontrolle. In: Mayr, Heinrich C., (ed.) Modellierung 2006: 22. - 24. März 2006 in Innsbruck, Austria. GI-Edition: Proceedings, 82. Gesellschaft für Informatik, Bonn. ISBN 3-88579-176-5. Fulltext not available.

Kolter, Jan, Schillinger, Rolf, Dobmeier, Wolfgang and Pernul, Günther (2006) AN ARCHITECTURE INTEGRATING SEMANTIC E-GOVERNMENT SERVICES. In: Communications Proceedings of the 5th International eGovernment Conference (EGOV '06), Krakow. Trauner Druck. (In Press) Fulltext restricted.

Schläger, Christian, Sojer, Manuel, Muschall, Björn and Pernul, Günther (2006) Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. In: Bauknecht, Kurt, (ed.) E-Commerce and Web Technologies: 7th International Conference, EC-Web 2006, Krakow, Poland, 05.-07 September 2006; proceedings. Lecture Notes in Computer Science, 4082. Springer, Heidelberg, pp. 132-141. ISBN 978-3-540-37743-6. Fulltext restricted.

Busch, Sönke, Muschall, Björn, Pernul, Günther and Priebe, Torsten (2006) Authrule: A Generic Rule-Based Authorization Module. In: Data and Applications Security XX: proceedings / 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31 - August 2, 2006. Lecture Notes in Computer Science, 4127. Springer, Berlin, pp. 267-281. ISBN 978-3-540-36799-4; 978-3-540-36796-3. Fulltext restricted.

Sojer, Manuel, Schläger, Christian and Locher, Christian (2006) The CIO - Hype, Science and Reality. In: Ljungberg, Jan, (ed.) 14th European Conference on Information Systems: 2006 ECIS Göteborg; Göteborg, June 12 - 14, 2006; proceedings. kein Verlag, Göteborg. ISBN 978-91-631-9894-6. Fulltext not available.

Schläger, Christian and Nowey, Thomas (2006) Towards a Risk Management Perspective on AAIs. In: Fischer-Hübner, Simone and Furnell, Steven and Lambrinoudakis, Costas, (eds.) Trust and Privacy in Digital Business: Session 2: Security and Risk Management. TrustBus 2006, Krakau, Polen, 04.-08.September 2006. Lecture Notes in Computer Science, 4083. Springer, Heidelberg, pp. 41-50. ISBN 978-3-540-37750-4.

2005

Schläger, Christian and Pernul, Günther (2005) Authentication and Authorisation Infrastructures in b2c e-Commerce. In: Bauknecht, Kurt, (ed.) E-Commerce and Web Technologies. Lecture Notes in Computer Science, 3590. Springer, Berlin, pp. 306-315. ISBN 978-3-540-28467-3. Fulltext restricted.

Lopez, Javier, Oppliger, Rolf and Pernul, Günther (2005) Classifying Public Key Certificates. In: Chadwick, David, (ed.) Public Key Infrastructure. Lecture Notes in Computer Science, 3545. Springer, Berlin, pp. 135-143. ISBN 978-3-540-28062-0. Fulltext restricted.

Katsikas, Sokratis K., Lopez, Javier and Pernul, Günther (2005) Trust, Privacy and Security in E-Business: Requirements and Solutions. In: Bozanis, Panayiotis and Houstis, Elias N., (eds.) Advances in Informatics. Lecture Notes in Computer Science, 3746. Springer, Berlin, pp. 548-558. ISBN 978-3-540-29673-7. Fulltext restricted.

Katsikas, Sokratis and Lopez, Javier and Pernul, Günther, eds. (2005) Trust, privacy and security in digital business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22 - 26, 2005; proceedings. Lecture Notes in Computer Science, 3592. Springer, Berlin. ISBN 3-540-28224-6; 978-3-540-28224-2. Fulltext not available.

2004

Priebe, Torsten, Muschall, Björn, Dobmeier, Wolfgang and Pernul, Günther (2004) A Flexible Security System for Enterprise and e-Government Portals. In: Galindo, Fernando, (ed.) Database and Expert Systems Applications. Lecture notes in computer science, 3180. Springer, Berlin, pp. 884-893. ISBN 3-540-22936-1; 978-3-540-22936-0. Fulltext restricted.

2003

Priebe, Torsten, Pernul, Günther and Krause, Peter (2003) Ein integrativer Ansatz für unternehmensweite Wissensportale. In: Uhr, Wolfgang, (ed.) Wirtschaftsinformatik 2003: Medien - Märkte - Mobilität; 6. Internationale Tagung Wirtschaftsinformatik (WI 2003). Band 2. Physica-Verlag, Heidelberg, pp. 277-292. ISBN 3-7908-0116-X. Fulltext not available.

Pernul, Günther (2003) Trust for Digital Products. In: Bauknecht, Kurt, (ed.) E-Commerce and Web Technologies. Lecture Notes in Computer Science, 2738. Springer, Berlin, pp. 1-5. ISBN 978-3-540-40808-6; 3-540-40808-8. Fulltext restricted.

1994

Pernul, Günther (1994) Security for next generation hypertext systems. Hypermedia 6 (1), pp. 1-18. Fulltext not available.

1992

Pernul, Günther, ed. (1992) Entity-relationship approach : proceedings / ER '92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7 - 9, 1992. Lecture Notes in Computer Science, 645. Springer, Berlin. ISBN 3-540-56023-8, 0-387-56023-8. Fulltext not available.

1988

Pernul, Günther (1988) Relationales Datenbankdesign aufgrund von Benutzersichtstrukturen. PhD, Wien, Univ.. Fulltext not available.

1987

Pernul, Günther, ed. (1987) Berichte aus Informatikforschungsinstitutionen : [Beiträge der 10. Tagung "Berichte aus Informatikforschungsinstitutionen", Wien, 25.-27. Februar 1987]. Schriftenreihe der Österreichischen Computer-Gesellschaft, 37. Oldenbourg, Wien. ISBN 3-486-20382-7, 3-7029-0231-7. Fulltext not available.

This list was generated on Fri Sep 13 20:04:14 2024 CEST.
  1. Homepage UR

University Library

Publication Server

Contact:

Publishing: oa@ur.de
0941 943 -4239 or -69394

Dissertations: dissertationen@ur.de
0941 943 -3904

Research data: datahub@ur.de
0941 943 -5707

Contact persons