Kai Rannenberg

Affiliations:
  • Johann Wolfgang Goethe-Universität Frankfurt am Main, Germany


According to our database1, Kai Rannenberg authored at least 94 papers between 1991 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Discussion on Ethical Cybersecurity Issues in Digital Service Chains.
Proceedings of the Cybersecurity of Digital Service Chains, 2022

2021
Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing.
Proceedings of the CSCS '21: Computer Science in Cars Symposium, 2021

2020
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.
Proc. Priv. Enhancing Technol., 2020

2019
Applying Privacy Patterns to the Internet of Things' (IoT) Architecture.
Mob. Networks Appl., 2019

Revealing the unrevealed: Mining smartphone users privacy perception on app markets.
Comput. Secur., 2019

PrivacyBot: Detecting Privacy Sensitive Information in Unstructured Texts.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Engineering privacy by design: lessons from the design and implementation of an identity wallet platform.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Multilateral Privacy Impact Analysis Method for Android Apps.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
Proceedings of the Sicherheit 2018, 2018

Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping.
Proceedings of the Sicherheit 2018, 2018

Easing the Burden of Security Self-Assessments.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
The changing public sphere on Twitter: Network structure, elites and topics of the #righttobeforgotten.
New Media Soc., 2017

Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
CoRR, 2017

IT Security Status of German Energy Providers.
CoRR, 2017

FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Using Fraud Patterns for Fraud Risk Assessment of E-services.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services.
Proceedings of the Exploring Services Science - 8th International Conference, 2017

2016
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461).
Dagstuhl Reports, 2016

On Gender Specific Perception of Data Sharing in Japan.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
Chancen neuer Sicherheitsanker?
Datenschutz und Datensicherheit, 2015

Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns.
Comput. Secur., 2015

Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

Introduction.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

Further Challenges.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

Establishment and Prospects of Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Technische Sicherheit und Informationssicherheit - Unterschiede und Gemeinsamkeiten.
Inform. Spektrum, 2014

Trust Relationships in Privacy-ABCs' Ecosystems.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Towards a Framework for Benchmarking Privacy-ABC Technologies.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

User Acceptance of Privacy-ABCs: An Exploratory Study.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Privacy-Respecting School Community Interaction Platform.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

2013
Where Security Research Should Go in the Next Decade.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

2012
Attribute-Based Credentials for Trust (ABC4Trust).
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Location-Based Services.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy and Identity Management Requirements: An Application Prototype Perspective.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Towards privacy-enhanced mobile communities - Architecture, concepts and user trials.
J. Syst. Softw., 2011

ISO/IEC standardization of identity management and privacy technologies - Making IT Security and Biometrics contribute to better Identity Management and Privacy.
Datenschutz und Datensicherheit, 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Reports, 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Manifestos, 2011

Privacy Respecting Targeted Advertising for Social Networks.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Privacy by Sustainable Identity Management Enablers.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Enhanced Privacy and Identity Management for Community Services - Demo of the PICOS Project.
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

2009
Mobility and Identity.
Proceedings of the Future of Identity in the Information Society, 2009

Open Challenges - Towards the (Not So Distant) Future of Identity.
Proceedings of the Future of Identity in the Information Society, 2009

2008
Editorial.
Int. J. Crit. Infrastructure Prot., 2008

2007
User-Centric Identity Management: New Trends in Standardization and Regulation.
IEEE Secur. Priv., 2007

Privatsphärenfreundliche topozentrische Dienste unter Berücksichtigung rechtlicher, technischer und wirtschaftlicher Restriktionen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Enabling Privacy of Real-Life LBS.
Proceedings of the New Approaches for Security, 2007

Privacy-Friendly LBS: A Prototype-Supported Case Study.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Von Anforderungen zur verteilten, Privatsphären-respektierenden Infrastruktur. Ein konstruktiver Entwurfsprozess für Location-based Services.
Prax. Inf.verarb. Kommun., 2006

Mobilität, mobile Technologie und Identität - Mobile Identitätsmanagementsysteme.
Datenschutz und Datensicherheit, 2006

2005
Mobile Systeme und Anwendungen - Hammer sucht Nagel.
Wirtschaftsinf., 2005

Mobile Commerce - Forschungsfragen am Scheideweg der Mobilfunkgenerationen.
Proceedings of the Mobile Business - Processes, Platforms, Payment, 2005

Identitätsmanagement in Mobilkommunikationssystemen und ihren Anwendungen.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

Mobile Brokerage Infrastructures - Capabilities and Security Requirements.
Proceedings of the 13th European Conference on Information Systems, 2005

2004
Identity management in mobile cellular networks and related applications.
Inf. Secur. Tech. Rep., 2004

Inviting New Players To The Multimedia M-Commerce Arena: An approach to enhance the current m-Commerce business model with regard to emerging DVB-T networks.
Proceedings of the Mobile Information Systems, 2004

Exploitation of Public and Private WiFi Coverage for New Business Models.
Proceedings of the Building The E-Service Society: E-Commerce, 2004

Potentiale und Sicherheitsanforderungen mobiler Finanzinformationsdienste und deren Systeminfrastrukturen.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004

2003
Identity management in mobile applications - Unobtrusive but already effective.
Datenschutz und Datensicherheit, 2003

Vorwort.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

Mobile Benutzer - Mobiles Wissen - Mobiles Internet.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003

Vorwort der Herausgeber.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003

Earning m-oney - a situation based approach for mobile business models.
Proceedings of the 11th European Conference on Information Systems, 2003

2000
Mehrseitige Sicherheit - Schutz für Unternehmen und ihre Partner im Internet.
Wirtschaftsinf., 2000

Electronic Commerce und Mehrseitige Sicherheit: Baustellen, Fortschritte und Perspektiven.
Inform. Forsch. Entwickl., 2000

IT Security Certification and Criteria. Progress, Problems and Perspectives.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Multilateral security a concept and examples for balanced security.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications.
Proceedings of the Computer Security, 2000

Protection Profiles for Remailer Mixes.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
IT-Sicherheitszertifizierung - Garantier für Sicherheit?
Prax. Inf.verarb. Kommun., 1999

Sicherheit, auch das noch!?!
Prax. Inf.verarb. Kommun., 1999

Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm.
Inform. Forsch. Entwickl., 1999

Sicherung internetbasierter Unternehmenskommunikation.
HMD Prax. Wirtsch., 1999

Privacy Points.
Datenschutz und Datensicherheit, 1999

1998
Zertifizierung mehrseitiger IT-Sicherheit - Kriterien und organisatorische Rahmenbedingungen.
DuD-Fachbeiträge, Vieweg, ISBN: 978-3-528-05666-7, 1998

1997
Pseudonymous audit for privacy enhanced intrusion detection.
Proceedings of the Information Security in Research and Business, 1997

Individual management of personal reachability in mobile communication.
Proceedings of the Information Security in Research and Business, 1997

Kriterien und Zertifizierung mehrseitiger IT-Sicherheit - eine Untersuchung der technischen Grundlagen und der organisatorischen Rahmenbedingungen.
PhD thesis, 1997

1996
Sicherheit, insbesondere mehrseitige IT-Sicherheit.
Informationstechnik Tech. Inform., 1996

1995
Evaluationskriterien zur IT-Sicherheit - Entwicklung und Perspektiven in der Normung und außerhalb.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995

1993
Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for Multilateral Security.
Proceedings of the Security and Control of Information Technology in Society, 1993

1992
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
Proceedings of the Education and Society, 1992

1991
Eine Bewertung der "Information Technology Security Evaluation Criteria".
Proceedings of the VIS'91, 1991


  Loading...