Heiko Rossnagel

According to our database1, Heiko Rossnagel authored at least 63 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
LIGHTest.
Datenschutz und Datensicherheit, 2019

Anonymization Is Dead - Long Live Privacy.
Proceedings of the Open Identity Summit 2019, 2019

Unified Data Model for Tuple-Based Trust Scheme Publication.
Proceedings of the Open Identity Summit 2019, 2019

Implementation of Distributed Light weight trust infrastructure for automatic validation of faults in an IOT sensor network.
Proceedings of the Open Identity Summit 2019, 2019

2018
On the possible impact of security technology design on policy adherent user behavior - Results from a controlled empirical experiment.
Proceedings of the Sicherheit 2018, 2018

Leichtgewichtige Infrastruktur zur Schaffung von Sicherheit und Vertrauen in einem digitalen Ökosystem für Agrardaten.
Proceedings of the Informatik in der Land-, 2018

2017
Why Should Only Your Home Be Smart? - A Vision for the Office of Tomorrow.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

A Mechanism for Discovery and Verification of Trust Scheme Memberships: The Lightest Reference Architecture.
Proceedings of the Open Identity Summit 2017, 2017

Towards a Smart Assistant for Enterprise Availability Management.
Proceedings of the Open Identity Summit 2017, 2017

2016
Towards a Decentralized Identity Management Ecosystem for Europe and Beyond.
Proceedings of the Open Identity Summit 2016, 13.-14. October 2016, Rome, Italy, 2016

2015
Evaluating complex identity management systems - the futureid approach.
Proceedings of the Open Identity Summit 2015, 10.-11. November 2015, Berlin, Germany, 2015

SSEDIC.2020 on mobile eid.
Proceedings of the Open Identity Summit 2015, 10.-11. November 2015, Berlin, Germany, 2015

2014
Der ökonomische Einfluss von Privacyverletzungen und Securityvorfällen - Ein Laborexperiment.
Wirtschaftsinformatik, 2014

Users' willingness to pay for web identity management systems.
EJIS, 2014

The Economic Impact of Privacy Violations and Security Breaches - A Laboratory Experiment.
Business & Information Systems Engineering, 2014

ENX ID - an architecture for practical and secure cross company authentication.
Proceedings of the Open Identity Summit 2014, November 4-6, 2014, Stuttgart, Germany, 2014

2013
Service providers' requirements for eid solutions: empirical evidence from the leisure sector.
Proceedings of the Open Identity Summit 2013, September 9th, 2013

2012
Secure mobile sales force automation: the case of independent sales agencies.
Inf. Syst. E-Business Management, 2012

Sichere Verknüpfung von Mashup Widgets durch Identity Based Encryption - Datenschutz in Geschäftsanwendungen.
Datenschutz und Datensicherheit, 2012

On Some Conjectures in IT Security: The Case for Viable Security Solutions.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Interoperability for information systems in public urban transport security: The SECUR-ED interoperability notation.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

A concept for interoperability of security systems in public transport.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

Empirical analysis of passenger trajectories within an urban transport hub.
Proceedings of the 9th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2012

2011
Mobile Emergency Management Services Targeting Large Public Events.
IJSSMET, 2011

Secure Mashup-Providing Platforms - Implementing Encrypted Wiring.
Proceedings of the Current Trends in Web Engineering, 2011

Datenschutz und Identitätsmanagement für Communities - Communities für Datenschutz und Identitätsmanagement.
Proceedings of the Informatik 2011: Informatik schafft Communities, 2011

Entwurf eines multitouch-systems für die organisations- und IT-system- übergreifende zusammenarbeit im krisenmanagement in frühen und späten phasen.
Proceedings of the Informatik 2011: Informatik schafft Communities, 2011

Softwaretechnik und Anwendung moderner Eingabetechnologien.
Proceedings of the Informatik 2011: Informatik schafft Communities, 2011

Geschäftsmodelle für privatsphärenfreundliche soziale Online-Netzwerke.
Proceedings of the Informatik 2011: Informatik schafft Communities, 2011

Designing Viable Security Solutions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Mobiles ortsbezogenes Projektmanagement
CoRR, 2010

The Market Failure of Anonymity Services.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Diffusion of Federated Identity Management.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Mobile Dienste für die Einbindung von Bürgern und Hilfseinsatzkräften.
Proceedings of the Software Engineering 2010, 2010

Ein Konzept zur organisationsübergreifenden Integration von IT-Systemen für die zivile Sicherheit.
Proceedings of the Software Engineering 2010, 2010

eTourismus und Katastrophenschutz: Neue mobile Mehrwertdienste durch IKTIntegration.
Proceedings of the Informatik 2010: Service Science - Neue Perspektiven für die Informatik, Beiträge der 40. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Band 1, 27.09., 2010

Informations- und Kommunikationsdienste im Notfallmanagement (Vorwort).
Proceedings of the Informatik 2010: Service Science - Neue Perspektiven für die Informatik, Beiträge der 40. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Band 1, 27.09., 2010

Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Agent-Based Simulation for Evaluation of a Mobile Emergency Management System.
Proceedings of the Sustainable e-Business Management, 2010

2009
Facilitating the Adoption of Tor by Focusing on a Promising Target Group.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services.
Proceedings of the Identity and Privacy in the Internet Age, 2009

On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Integrating value-adding mobile services into an emergency management system for tourist destinations.
Proceedings of the 17th European Conference on Information Systems, 2009

Secure Mobile Support of Independent Sales Agencies.
Proceedings of the Value Creation in E-Business Management. 15th Americas Conference on Information Systems, 2009

2008
Umsetzung starker Authentifizierung auf Basis von Passwort-Mechanismen.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

2007
Zahlungsbereitschaft für elektronische Signaturen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Implementing Strong Authentication Interoperability with Legacy Systems.
Proceedings of the Policies and Research in Identity Management, 2007

2006
Single Sign On mit Signaturen - Integration von elektronischen Signaturen und Passwortsystemen.
Datenschutz und Datensicherheit, 2006

On Diffusion and Confusion - Why Electronic Signatures Have Failed.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Wirtschaftlichkeit mobiler qualifizierter Signaturen im E-Government.
Proceedings of the Informatik 2006, 2006

Secure Mobile Notifications of Civilians in Case of a Disaster.
Proceedings of the Communications and Multimedia Security, 2006

2005
Geschäftsmodelle für signaturgesetzkonforme Trust Center.
Proceedings of the Wirtschaftsinformatik 2005: eEconomy, eGovernment, eSociety, 7. Internationale Tagung Wirtschaftsinformatik 2005, Bamberg, 23.2.2005, 2005

Making Money with Mobile Qualified Electronic Signatures.
Proceedings of the Trust, 2005

Sicherheitsanalyse von Betriebssystemen für Mobile Endgeräte.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Die Krise des Signaturmarktes: Lösungsansätze aus betriebswirtschaftlicher Sicht.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Profitability of Mobile Qualified Electronic Signatures.
Proceedings of the Pacific Asia Conference on Information Systems, 2005

Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen.
Proceedings of the Mobile Business - Processes, Platforms, Payment, 2005

Mobile Brokerage Infrastructures - Capabilities and Security Requirements.
Proceedings of the 13th European Conference on Information Systems, 2005

Investigating in Security Solutions - Can Qualified Electronic Signatures be Profitable for Mobile Operators?
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Mobile Qualified Electronic Signatures and Certification on Demand.
Proceedings of the Public Key Infrastructure, 2004

Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004

How Secure are Current Mobile Operating Systems?
Proceedings of the Communications and Multimedia Security, 2004

2003
M-Signaturen aus rechtlicher Sicht.
Datenschutz und Datensicherheit, 2003


  Loading...