Stefan Fenz

According to our database1, Stefan Fenz
  • authored at least 56 papers between 2005 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2016
Recognition and pseudonymisation of medical records for secondary use.
Med. Biol. Engineering and Computing, 2016

Mapping information security standard ISO 27002 to an ontological structure.
Inf. & Comput. Security, 2016

Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners.
IJSSE, 2016

SEMERGY.net: automatically identifying and optimizing energy-efficient building designs.
Computer Science - R&D, 2016

2015
A taxonomy for privacy enhancing technologies.
Computers & Security, 2015

How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
A Structured Comparison of Security Standards.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Current challenges in information security risk management.
Inf. Manag. Comput. Security, 2014

How to Assess Confidentiality Requirements of Corporate Assets?
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Robustness against data availability problems in urban energy planning support software.
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014

Evaluation of User Interface Design of Semergy System.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Visualisation of User-Generated Event Information: Towards Geospatial Situation Awareness Using Hierarchical Granularity Levels.
Proceedings of the Joint Proceedings of the 1th Workshop on Semantic Sentiment Analysis (SSA2014), 2014

Multi-Actor Urban Energy Planning Support: Building refurbishment & Building-integrated Solar PV.
Proceedings of the 28th International Conference on Informatics for Environmental Protection: ICT for Energy Effieciency, 2014

2013
Toward web-based information security knowledge sharing.
Inf. Sec. Techn. Report, 2013

FORISK: Formalizing information security risk and compliance management.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
SIEM-based framework for security controls automation.
Inf. Manag. Comput. Security, 2012

Enhancing ontology-based antipattern detection using Bayesian networks.
Expert Syst. Appl., 2012

An ontology-based approach for constructing Bayesian networks.
Data Knowl. Eng., 2012

Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation.
Proceedings of the Cloud Computing - Third International Conference, 2012

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records.
Proceedings of the Business Information Systems - 15th International Conference, 2012

Automated Transformation of Semi-Structured Text Elements.
Proceedings of the 18th Americas Conference on Information Systems, 2012

Challenges of Web-Based Information Security Knowledge Sharing.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Verification, Validation, and Evaluation in Information Security Risk Management.
IEEE Security & Privacy, 2011

Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
CAIS, 2011

Towards Automatic Generation of Ontology-Based Antipattern Bayesian Network Models.
Proceedings of the 9th International Conference on Software Engineering Research, 2011

Automation Possibilities in Information Security Management.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

An ontology- and Bayesian-based approach for determining threat probabilities.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Information Security Automation: How Far Can We Go?
Proceedings of the Sixth International Conference on Availability, 2011

2010
Ontology-based generation of IT-security metrics.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

From the Resource to the Business Process Risk Level.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
Automated Risk and Utility Management.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Ontology-Based Decision Support for Information Security Risk Management.
Proceedings of the Fourth International Conference on Systems, 2009

AURUM: A Framework for Information Security Risk Management.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

How to determine threat probabilities using ontologies and Bayesian networks.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Ontology-Based Generation of Bayesian Networks.
Proceedings of the 2009 International Conference on Complex, 2009

Formalizing information security knowledge.
Proceedings of the 2009 ACM Symposium on Information, 2009

Business Process-Based Resource Importance Determination.
Proceedings of the Business Process Management, 7th International Conference, 2009

Ontological Mapping of Information Security Best-Practice Guidelines.
Proceedings of the Business Information Systems, 12th International Conference, 2009

2008
XML security - A comparative literature review.
Journal of Systems and Software, 2008

Interactive Selection of ISO 27001 Controls under Multiple Objectives.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Pseudonymization for improving the Privacy in E-Health Applications.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Fortification of IT Security by Automatic Security Advisory Processing.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Architectural approach for handling semi-structured data in a user-centred working environment.
IJWIS, 2007

Ontological Mapping of Common Criteria's Security Assurance Requirements.
Proceedings of the New Approaches for Security, 2007

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Security aspects in Semantic Web Services Filtering.
Proceedings of the iiWAS'2007, 2007

Formal threat descriptions for enhancing governmental risk assessment.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Security Ontologies: Improving Quantitative Risk Analysis.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Security Issues for the Use of Semantic Web in E-Commerce.
Proceedings of the Business Information Systems, 10th International Conference, 2007

CASSIS - Computer-based Academy for Security and Safety in Information Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
Ontology based IT-security planning.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets.
Proceedings of the Practical Aspects of Knowledge Management, 6th International Conference, 2006

The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps.
Proceedings of the Ontologies-Based Databases and Information Systems, 2006

Security Ontology: Simulating Threats to Corporate Assets.
Proceedings of the Information Systems Security, Second International Conference, 2006

2005
Semantic Storage: A Report on Performance and Flexibility.
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005


  Loading...