Ludwig Fuchs

According to our database1, Ludwig Fuchs authored at least 25 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

2022
Optimization of Access Control Policies.
J. Inf. Secur. Appl., 2022

2021
Monitoring Access Reviews by Crowd Labelling.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

2019
Attribute quality management for dynamic identity and access management.
J. Inf. Secur. Appl., 2019

2018
Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2016
Adaptive identity and access management - contextual data based policies.
EURASIP J. Inf. Secur., 2016

2015
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining.
Proceedings of the Information Systems Security and Privacy, 2015

Analyzing Quality Criteria in Role-based Identity and Access Management.
Proceedings of the ICISSP 2015, 2015

Introducing Dynamic Identity and Access Management in Organizations.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Advanced Identity and Access Policy Management Using Contextual Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Role Model Optimization for Secure Role-Based Identity Management.
Proceedings of the 22st European Conference on Information Systems, 2014

Analyzing Recent Trends in Enterprise Identity Management.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Qualitätssicherung im Identity- und Access Management.
HMD Prax. Wirtsch., 2013

Managing the Access Grid - A Process View to Minimize Insider Misuse Risks.
Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik, 2013

2012
Minimizing insider misuse through secure Identity Management.
Secur. Commun. Networks, 2012

2011
Roles in information security - A survey and classification of the research area.
Comput. Secur., 2011

The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

2009
Automating Periodic Role-Checks - A Tool-based Approach.
Proceedings of the Business Services: Konzepte, 2009

Different Approaches to In-House Identity Management - Justification of an Assumption.
Proceedings of the The Forth International Conference on Availability, 2009

2008
BusiROLE: A Model for Integrating Business Roles into Identity Management.
Proceedings of the Trust, 2008

HyDRo - Hybrid Development of Roles.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects.
Proceedings of the 16th European Conference on Information Systems, 2008

Intensive Programme on Information and Communication Security.
Proceedings of the The Third International Conference on Availability, 2008

2007
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management.
Proceedings of the The Second International Conference on Availability, 2007


  Loading...