Gernot Goluch

According to our database1, Gernot Goluch authored at least 16 papers between 2005 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Major Challenges in Structuring and Institutionalizing CERT-Communication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2011
A Formal Approach Enabling Risk-Aware Business Process Modeling and Simulation.
IEEE Trans. Serv. Comput., 2011

2009
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management.
Proceedings of the Database and Expert Systems Applications, 2009

A process model for RFID based Business Process Analysis.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
XML security - A comparative literature review.
J. Syst. Softw., 2008

Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Deriving Resource Requirements Applying Risk-Aware Business Process Modeling and Simulation.
Proceedings of the 16th European Conference on Information Systems, 2008

Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Architectural approach for handling semi-structured data in a user-centred working environment.
Int. J. Web Inf. Syst., 2007

Ontological Mapping of Common Criteria's Security Assurance Requirements.
Proceedings of the New Approaches for Security, 2007

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

A Comparative Literature Review on RFID Security and Privacy.
Proceedings of the iiWAS'2007, 2007

A secure architecture for the pseudonymization of medical data.
Proceedings of the The Second International Conference on Availability, 2007

A research agenda for Autonomous Business Process Management.
Proceedings of the The Second International Conference on Availability, 2007

CASSIS - Computer-based Academy for Security and Safety in Information Systems.
Proceedings of the The Second International Conference on Availability, 2007

2005
Semantic Storage: A Report on Performance and Flexibility.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005


  Loading...