Johannes Heurix

According to our database1, Johannes Heurix authored at least 21 papers between 2007 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Recognition and pseudonymisation of medical records for secondary use.
Medical Biol. Eng. Comput., 2016

SEMERGY.net: automatically identifying and optimizing energy-efficient building designs.
Comput. Sci. Res. Dev., 2016

2015
SEMERGY: Application of semantic web technologies in performance-guided building design optimization.
J. Inf. Technol. Constr., 2015

A taxonomy for privacy enhancing technologies.
Comput. Secur., 2015

How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
Current challenges in information security risk management.
Inf. Manag. Comput. Secur., 2014

2013
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records.
Proceedings of the Business Information Systems - 15th International Conference, 2012

Automated Transformation of Semi-Structured Text Elements.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
A methodology for the pseudonymization of medical data.
Int. J. Medical Informatics, 2011

Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Model-Driven Development Meets Security: An Evaluation of Current Approaches.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Data Models for the Pseudonymization of DICOM Data.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten.
Elektrotech. Informationstechnik, 2010

On the Security of Outsourced and Untrusted Databases.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2008
Multiobjective decision support for defining secure business processes: a case study.
Int. J. Bus. Intell. Data Min., 2008

Defining Secure Business Processes with Respect to Multiple Objectives.
Proceedings of the The Third International Conference on Availability, 2008

Objective Types for the Valuation of Secure Business Processes.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Multiobjective Decision Support for defining Secure Business Processes.
Proceedings of the iiWAS'2007, 2007


  Loading...