Günther Pernul

According to our database1, Günther Pernul authored at least 151 papers between 1987 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Attribute quality management for dynamic identity and access management.
J. Inf. Sec. Appl., 2019

Unifying Cyber Threat Intelligence.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Contributing to Current Challenges in Identity and Access Management with Visual Analytics.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

A Distributed Ledger Approach to Digital Twin Secure Data Sharing.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Enhancing credibility of digital evidence through provenance-based incident response handling.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
State of the art of reputation-enhanced recommender systems.
Web Intelligence, 2018

Graph-based visual analytics for cyber threat intelligence.
Cybersecurity, 2018

A comparative analysis of incident reporting formats.
Computers & Security, 2018

Interactive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms.
Business & Information Systems Engineering, 2018

Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Big Log Data Stream Processing: Adapting an Anomaly Detection Technique.
Proceedings of the Database and Expert Systems Applications, 2018

2017
New Frontiers: Assessing and Managing Security Risks.
IEEE Computer, 2017

Reputation-Enhanced Recommender Systems.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Interactive Visualization of Recommender Systems Data.
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017

2016
Adaptive identity and access management - contextual data based policies.
EURASIP J. Information Security, 2016

Explorative Analysis of Recommendations Through Interactive Visualization.
Proceedings of the E-Commerce and Web Technologies - 17th International Conference, 2016

2015
Reusable Defense Components for Online Reputation Systems.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Privacy in Social Networks - Existing Challenges and Proposals for Solution.
Proceedings of the ICISSP 2015, 2015

Privacy in Social Networks: Existing Challenges and Proposals for Solutions.
Proceedings of the Information Systems Security and Privacy, 2015

How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining.
Proceedings of the Information Systems Security and Privacy, 2015

Analyzing Quality Criteria in Role-based Identity and Access Management.
Proceedings of the ICISSP 2015, 2015

Introducing Dynamic Identity and Access Management in Organizations.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Visualizing Unfair Ratings in Online Reputation Systems.
Proceedings of the 23rd European Conference on Information Systems, 2015

Personalized Composition of Trustful Reputation Systems.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Advanced Identity and Access Policy Management Using Contextual Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Taxonomy of social network data types.
EURASIP J. Information Security, 2014

Einsatz von digitaler Forensik in Unternehmen und Organisationen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Reusability for Trust and Reputation Systems.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Visualizing Social Roles - Design and Evaluation of a Bird's-eye View of Social Network Privacy Settings.
Proceedings of the 22st European Conference on Information Systems, 2014

Role Model Optimization for Secure Role-Based Identity Management.
Proceedings of the 22st European Conference on Information Systems, 2014

Trust and Big Data: A Roadmap for Research.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

Analyzing Recent Trends in Enterprise Identity Management.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

SoDA: Dynamic visual analytics of big social data.
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014

Visualizing Transaction Context in Trust and Reputation Systems.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments.
Inf. Sec. Techn. Report, 2013

Qualitätssicherung im Identity- und Access Management.
HMD - Praxis Wirtschaftsinform., 2013

Preface.
Computers & Mathematics with Applications, 2013

Managing the Access Grid - A Process View to Minimize Insider Misuse Risks.
Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik, 2013

Privacy Settings in Online Social Networks - Preferences, Perception, and Reality.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Minimizing insider misuse through secure Identity Management.
Security and Communication Networks, 2012

A Generic Architecture for User-Centric Portlet Integration.
Proceedings of the 14th IEEE International Conference on Commerce and Enterprise Computing, 2012

An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective.
Proceedings of the 2012 International Conference on Privacy, 2012

User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking Sites.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Conceptual Design of Secure Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Guest Editorial: Advances in Applied Security.
JoWUA, 2011

Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten.
Informatik Spektrum, 2011

Roles in information security - A survey and classification of the research area.
Computers & Security, 2011

Assisted Social Identity Management.
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011

A portal-based approach for user-centric legacy application integration in collaborative environments.
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011

Analyzing Privacy in Social Networks-An Interdisciplinary Approach.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure.
Proceedings of the E-Commerce and Web Technologies - 12th International Conference, 2011

2010
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data.
JoWUA, 2010

Collaborative privacy management.
Computers & Security, 2010

Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution.
Proceedings of the Trust, 2010

Attacking Image Recognition Captchas - A Naive but Effective Approach.
Proceedings of the Trust, 2010

Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals.
Proceedings of the SECRYPT 2010, 2010

6th International Workshop on Foundations and Practices of UML (FP-UML 2010).
Proceedings of the Advances in Conceptual Modeling - Applications and Challenges, 2010

Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats.
Proceedings of the ARES 2010, 2010

Visualizing Past Personal Data Disclosures.
Proceedings of the ARES 2010, 2010

A Semantic Security Architecture for Web Services.
Proceedings of the ARES 2010, 2010

2009
Collaborative Privacy - A Community-Based Privacy Infrastructure.
Proceedings of the Emerging Challenges for Security, 2009

Analysing Requirements for Virtual Business Alliances - The Case of SPIKE.
Proceedings of the Digital Business - First Iternational ICST Conference, 2009

Integrating Security Patterns into the Electronic Invoicing Process.
Proceedings of the Database and Expert Systems Applications, 2009

Generating User-Understandable Privacy Preferences.
Proceedings of the The Forth International Conference on Availability, 2009

Different Approaches to In-House Identity Management - Justification of an Assumption.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Patterns and Pattern Diagrams for Access Control.
Proceedings of the Trust, 2008

HyDRo - Hybrid Development of Roles.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects.
Proceedings of the 16th European Conference on Information Systems, 2008

Trust Modelling in E-Commerce through Fuzzy Cognitive Maps.
Proceedings of the The Third International Conference on Availability, 2008

Intensive Programme on Information and Communication Security.
Proceedings of the The Third International Conference on Availability, 2008

2007
Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project.
Proceedings of the SECRYPT 2007, 2007

Building a Distributed Semantic-aware Security Architecture.
Proceedings of the New Approaches for Security, 2007

Towards Privacy-Aware Handling of Authorizations.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Patterns for Authentication and Authorisation Infrastructures.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Privacy-Enhanced Attribute-Based Access Control System.
Proceedings of the Data and Applications Security XXI, 2007

Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures.
Proceedings of the 20th Bled eConference: eMergence: Merging and Emerging Technologies, 2007

Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management.
Proceedings of the The Second International Conference on Availability, 2007

2006
Modellierung von Zugriffsrichtlinien für offene Systeme.
Proceedings of the EMISA 2006, 2006

Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers.
Proceedings of the E-Commerce and Web Technologies, 7th International Conference, 2006

Authrule: A Generic Rule-Based Authorization Module.
Proceedings of the Data and Applications Security XX, 2006

2005
Why have public key infrastructures failed so far?
Internet Research, 2005

Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005

Editorial.
Comput. Syst. Sci. Eng., 2005

ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Trust, Privacy and Security in E-Business: Requirements and Solutions.
Proceedings of the Advances in Informatics, 2005

Classifying Public Key Certificates.
Proceedings of the Public Key Infrastructure, 2005

Authentication and Authorisation Infrastructures in b2c e-Commerce.
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005

Panel: Information systems security standards: The solution or the problem?
Proceedings of the 13th European Conference on Information Systems, 2005

2004
Authentication and authorization infrastructures (AAIs): a comparative survey.
Computers & Security, 2004

Administration of an RBAC System.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

A Search Engine for RDF Metadata.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

A Flexible Security System for Enterprise and e-Government Portals.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004

A Pattern System for Access Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Computer Communications, 2003

Ein integrativer Ansatz für unternehmensweite Wissensportale.
Proceedings of the Wirtschaftsinformatik 2003, Medien - Märkte - Mobilität, Band II, 2003

CSAP - An Adaptable Security Module for the E-Government System Webocrat.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Webocrat: Ein Bürgerportal für e-democracy.
Proceedings of the INFORMATIK 2003 - Innovative Informatikanwendungen, Band 2, Beiträge der 33. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 29. September, 2003

Trust for Digital Products.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Ontology-based Integration of OLAP and Information Retrieval.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Towards integrative enterprise knowledge portals.
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, 2003

An Administration Console for the CSAP System.
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003

Datenbanken im Unternehmen - Analyse, Modellbildung und Einsatz (2).
Lehrbücher Wirtschaftsinformatik, Oldenbourg, ISBN: 978-3-486-27210-9, 2003

2002
Message from the TrustBus Workshop Chairs.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Metadaten-gestützter Data-Warehouse-Entwurf mit ADAPTed UML.
Proceedings of the Information Age Economy: 5. Internationale Tagung Wirtschaftsinformatik 2001, 2001

A Pragmatic Approach to Conceptual Modeling of OLAP Security.
Proceedings of the Conceptual Modeling, 2001

Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz
Oldenbourg, ISBN: 3-486-25580-0, 2001

2000
Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection.
Int. J. Electronic Commerce, 2000

COPS: a model and infrastructure for secure and fair electronic markets.
Decision Support Systems, 2000

Towards OLAP Security Design - Survey and Research Issues.
Proceedings of the Third ACM International Workshop on Data Warehousing and OLAP (DOLAP 2000), 2000

1999
Viewing Business-Process Security from Different Perspectives.
Int. J. Electronic Commerce, 1999

Sichere Geschäftstransaktionen auf Elektronischen Märkten.
Proceedings of the Electronic Business Engineering, 1999

COPS: A Model and Infrastructure for Secure and Fair Electronic Markets.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Trust for Electronic Commerce Transactions.
Proceedings of the Advances in Databases and Information Systems, 1999

A Language for Modeling Secure Business Transactions.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Modelling Data Secrecy and Integrity.
Data Knowl. Eng., 1998

Towards Security Semantics in Workflow Management.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Enterprise-Wide Security Administration.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

Modeling Secure and Fair Electronic Commerce.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
Neuer Markt - neues Geld?
Wirtschaftsinformatik, 1997

Zur Bedeutung von Sicherheit in interorganisationellen Workflows.
Wirtschaftsinformatik, 1997

Access Controls by Object-Oriented Concepts.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
The security architecture of IRO-DB.
Proceedings of the Information Systems Security, 1996

Authorization and Access Control in IRO-DB.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

Automatic Classification of Semantic Concepts in View Specifications.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996

1995
Neural Network Technology to Support View Integration.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma
Proceedings of the Database and Expert Systems Applications, 1995

IT-Sicherheit '94.
Schriftenreihe der Österreichischen Computer Gesellschaft 75, Oldenbourg, 1995

1994
Security for next generation hypertext systems.
Hypermedia, 1994

Database Security.
Advances in Computers, 1994

Security Object Modelling for Level-Based Policies.
Proceedings of the Database Security, 1994

Organizing MLS databases from a data modelling point of view.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht).
Datenbank Rundbrief, 1993

Datenbankmanagementsysteme mit hohem Sicherheitsanspruch.
Proceedings of the Verläßliche Informationssysteme, 1993

The Entity-Relationship Model for Multilevel Security.
Proceedings of the Entity-Relationship Approach, 1993

The deductive filter approach to MLS database prototyping.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Bibliography on Database Security.
SIGMOD Record, 1992

Conceptual and Logical Design of Relational Databases.
Advances in Computers, 1992

Security Constraint Processing in Multilevel Secure AMAC Schemata.
Proceedings of the Computer Security, 1992

Canonical Security Modeling for Federated Databases.
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5), 1992

Security constraint processing during multilevel secure database design.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
A View Integration Approach for the Design of Multilevel Security.
Proceedings of the 10th International Conference on Entity-Relationship Approach (ER'91), 1991

Relational Database Organization Based on Views and Fragments.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991

Supporting Range Queries in Multilevel-Secure Databases.
Proceedings of the Database Security, 1991

A multilevel secure relational data model based on views.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1987
An Unnormalized Relational Data Model Based On User Views.
SIGMOD Record, 1987


  Loading...