Günter Müller

Affiliations:
  • University of Freiburg, Institute of Computer Science and Social Studies


According to our database1, Günter Müller authored at least 99 papers between 1986 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions.
Trans. Petri Nets Other Model. Concurr., 2017

Survey on covert channels in virtual machines and cloud computing.
Trans. Emerg. Telecommun. Technol., 2017

Blockchains als Grundlage digitaler Geschäftsmodelle.
Datenschutz und Datensicherheit, 2017

2016
Vorwort.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2016

An Empirical Analysis of Privacy Dashboard Acceptance: the Google Case.
Proceedings of the 24th European Conference on Information Systems, 2016

Security-Sensitive Tackling of Obstructed Workow Executions.
Proceedings of the International Workshop on Algorithms & Theories for the Analysis of Event Data 2016 Satellite event of the conferences: 37th International Conference on Application and Theory of Petri Nets and Concurrency Petri Nets 2016 and 16th International Conference on Application of Concurrency to System Design ACSD 2016, 2016

2015
Addressing Grand Challenges - Implications for BISE Research.
Bus. Inf. Syst. Eng., 2015

When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Economic Analysis of Cryptocurrency Backed Money Laundering.
Proceedings of the 23rd European Conference on Information Systems, 2015

DPIP: A Demand Response Privacy Preserving Interaction Protocol - For Trusted Third Party Involvement.
Proceedings of the Business Information Systems Workshops, 2015

2014
Vorwort.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2014

Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy.
Proceedings of the Ninth International Conference on Availability, 2014

Datenschutz: Ein Auslaufmodell?
Proceedings of the Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP 2014, 2014

2013
Privacy by Transparency for Data-Centric Services (NII Shonan Meeting 2013-5).
NII Shonan Meet. Rep., 2013

Business Process Security Analysis - Design Time, Run Time, Audit Time.
it Inf. Technol., 2013

Placing Humans in the Feedback Loop of Social Infrastructures - NII Research Strategies on Cyber-Physical Systems.
Inform. Spektrum, 2013

Transaktionspseudonymität für Demand-Response-Anwendungen.
HMD Prax. Wirtsch., 2013

Preventive Inference Control in Data-centric Business Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

On the exploitation of process mining for security audits: the process discovery case.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Resilience - A New Research Field in Business Information Systems?
Proceedings of the Business Information Systems Workshops, 2013

Why Are Business Processes Not Secure?
Proceedings of the Number Theory and Cryptography, 2013

2012
Von Dinosauriern, Tonnenideologen, Separatisten und glücklichen Seelen - Vorschlag und Begründung eines Wegs, um die weltweite IS/WI-Community glücklich zu machen.
Wirtschaftsinf., 2012

Business and Information Systems Engineering: A Complementary Approach to Information Systems - What We Can Learn from the Past and May Conclude from Present Reflection on the Future.
J. Assoc. Inf. Syst., 2012

On Dinosaurs, Measurement Ideologists, Separatists, and Happy Souls - Proposing and Justifying a Way to Make the Global IS/BISE Community Happy.
Bus. Inf. Syst. Eng., 2012

Type Indeterminacy in Privacy Decisions: The Privacy Paradox Revisited.
Proceedings of the Quantum Interaction - 6th International Symposium, 2012

2011
Risikomanagement und Vertrauensbildung im Cloud Computing.
Wirtschaftsinformatik Manag., 2011

Nachhaltiges Computing in Clouds.
Wirtschaftsinf., 2011

WI - Call for Papers - BISE-Workshop im Rahmen der MKWI 2012.
Wirtschaftsinf., 2011

On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking.
J. Inf. Hiding Multim. Signal Process., 2011

Aspects of privacy for electronic health records.
Int. J. Medical Informatics, 2011

Sustainable Cloud Computing.
Bus. Inf. Syst. Eng., 2011

BISE - Call for Papers - BISE Workshop Within the MKWI 2012.
Bus. Inf. Syst. Eng., 2011

2010
Der "gläserne Bürger" im Web 2.0 - Herausforderungen des "virtuellen Striptease".
Wirtschaftsinf., 2010

Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte).
it Inf. Technol., 2010

Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten.
Inform. Spektrum, 2010

L1 - An Intermediate Language for Mixed-Protocol Secure Computation.
IACR Cryptol. ePrint Arch., 2010

The "Transparent Citizen" in Web 2.0 - Challenges of the "Virtual Striptease".
Bus. Inf. Syst. Eng., 2010

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns.
Proceedings of the Privacy and Identity Management for Life, 2010

Vorwort.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2010

Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

FORTES: Forensic Information Flow Analysis of Business Processes.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

2009
War Internet die einzige Option? Welchen Weg soll die Wirtschaftsinformatik gehen?
Wirtschaftsinf., 2009

ICIS 2008 Panel Report: Design Science in Information Systems: Hegemony, Bandwagon, or New Wave?
Commun. Assoc. Inf. Syst., 2009

Was the Internet the Only Option? Which Way Should Business and Information Systems Engineering Go?
Bus. Inf. Syst. Eng., 2009

On Privacy-aware Delegation of Personal Data using Digital Watermarking.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking.
Proceedings of the ICE-B 2009, 2009

On Information Flow Forensics in Business Application Scenarios.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

On Observable Delegation of Personal Data by Watermarking.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
IT-Compliance und IT-Governance.
Wirtschaftsinf., 2008

WI - Für Sie gelesen.
Wirtschaftsinf., 2008

On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

Automating Privacy Compliance with ExPDT.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

Vorwort: IT-Risikomangement: IT-Projekte und IT-Compliance.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2008

Design Science in Information Systems: Hegemony, Bandwagon, or New Wave?
Proceedings of the International Conference on Information Systems, 2008

08491 Executive Summary - Theoretical Foundations of Practical Information Security.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

08491 Abstracts Collection - Theoretical Foundations of Practical Information Security.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

2007
Die SIKOSA-Methodik.
Wirtschaftsinf., 2007

Personalisierung und informationelle Selbstbestimmung Ein unauflösbarer Widerspruch?
Wirtschaftsinf., 2007

Enforceable Privacy Promises.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

2006
Budgeting process for information security expenditures.
Wirtschaftsinf., 2006

Grid allein oder Vertrauen in Fremde wird teuer.
Wirtschaftsinf., 2006

Introduction.
Commun. ACM, 2006

Privacy with Delegation of Rights by Identity Management.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Self-Organized Scheduling in Hospitals by Connecting Agents and Mobile Devices.
Proceedings of the Multiagent Engineering, Theory and Applications in Enterprises., 2006

2005
Success factors and impacts of mobile business applications: Results from a mobile e-procurement study.
Wirtschaftsinf., 2005

Die FG - Berichte aus den Instituten.
Prax. Inf.verarb. Kommun., 2005

2004
Case Study on Retail Customer Communication Applying Ubiquitous Computing.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

EMIKA system: architecture and prototypic realization.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Hayeks Katallaxie - Ein zukunftsweisendes Konzept für die Wirtschaftsinformatik?
Wirtschaftsinf., 2003

Sicherheit an der Schnittstelle zum Nutzer.
Prax. Inf.verarb. Kommun., 2003

Mit Sicherheit zukunftsfähig. DFG-Schwerpunktprogramm "Sicherheit in der Informations-und Kommunikationstechnik".
Prax. Inf.verarb. Kommun., 2003

DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik".
it Inf. Technol., 2003

The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2003

Sichere IT-Systeme.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003

Hayek's Catallaxy: A Forward-Looking Concept for Information Systems?
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
EMIKA - Real-Time Controlled Mobile Information Systems in Health Care Applications.
Proceedings of the Mobile Computing in Medicine, 2002

Vertrauen und Reputation in P2P-Netzwerken.
Proceedings of the Peer-to-Peer: Ökonomische, 2002

2001
Erst die neue Technologie, danach die Sicherheit!
Informationstechnik Tech. Inform., 2001

Decentralized Electronic Markets - Economic Coordination of Multi-Agent Systems.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

Security in E-Commerce.
Proceedings of the Lectures in E-Commerce, 2001

2000
Interview.
Wirtschaftsinf., 2000

Sicherheit in der Kommunikations- und Informationstechnik.
Wirtschaftsinf., 2000

Themenheft: Electronic Commerce - Editorial.
Inform. Forsch. Entwickl., 2000

1999
Vernetzte kleine und mittlere Unternhemen.
Wirtschaftsinf., 1999

Sicherheit, auch das noch!?!
Prax. Inf.verarb. Kommun., 1999

Sichere Telekommunikationsdienste mit intelligenten Netzen.
Prax. Inf.verarb. Kommun., 1999

Potentiale und Hürden des Electronic Commerce: Eine Momentaufnahme.
Inform. Spektrum, 1999

Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm.
Inform. Forsch. Entwickl., 1999

1997
Interdisziplinäre Modelle für Entwurf und Einsatz telematischer Systeme: Grundsätzliche Probleme diskutiert am Beispiel des "Freiburger Schichtenmodells der Telematik".
Proceedings of the Informatik '97, 1997

1996
Der Freiburger Kommunikationsassistent.
Prax. Inf.verarb. Kommun., 1996

Sicherheit, insbesondere mehrseitige IT-Sicherheit.
Informationstechnik Tech. Inform., 1996

Sicherheit in der Kommunikationstechnik.
Informationstechnik Tech. Inform., 1996

Wired cities - opportunities for small and medium sized cities on the information highway.
Proceedings of the Advanced IT Tools, 1996

1992
Einführung.
Proceedings of the Informatik cui bono? GI-FB 8 Fachtagung, 1992

1991
Current Trends in Distributed Systems.
Proceedings of the New Results and New Trends in Computer Science, 1991

1987
Datenbanksprachen und Datenbankbenutzung.
Proceedings of the Datenbankhandbuch., 1987

1986
Projektierungsstrategie für Mikrorechner-Automatisierungsanlagen.
PhD thesis, 1986

ENC - IBM European Networking Center.
Proceedings of the Networking in Open Systems, 1986


  Loading...