Erik Buchmann

Orcid: 0009-0009-5874-4313

According to our database1, Erik Buchmann authored at least 87 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Assessing Privacy Policies with AI: Ethical, Legal, and Technical Challenges.
CoRR, 2024

Fairness Certification for Natural Language Processing and Large Language Models.
CoRR, 2024

ChatAnalysis: Can GPT-4 undermine Privacy in Smart Homes with Data Analysis?
Proceedings of the Mensch und Computer 2024, 2024

ChatSEC - Towards Enhancing Security Vulnerability Reports for Non-Experts.
Proceedings of the Mensch und Computer 2024, 2024

Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs.
Proceedings of the Computational Science - ICCS 2024, 2024

Differentially Private Multi-Label Learning Is Harder Than You'd Think.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Legally Binding but Unfair? Towards Assessing Fairness of Privacy Policies.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024

2023
ChatIDS: Explainable Cybersecurity Using Generative AI.
CoRR, 2023

A Privacy-Preserving Federated Learning Approach for Kernel methods.
CoRR, 2023

A Privacy-Preserving Framework for Collaborative Machine Learning with Kernel Methods.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Is Homomorphic Encryption Feasible for Smart Mobility?
Proceedings of the 18th Conference on Computer Science and Intelligence Systems, 2023

Die Entwicklung eines digitalen Praktikums der Cybersicherheit im Bereich "Smart Home".
Proceedings of the DELFI 2023, 2023

Online Exams in the Era of ChatGPT.
Proceedings of the DELFI 2023, 2023

2022
IoT Security With INFINITE: The 3-Dimensional Internet Of Things Maturity Model.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

2021
Text Mining for Standardized Quality Criteria of Natural-Language IT-Requirements.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

Securing Orchestrated Containers with BSI Module SYS.1.6.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2019
Auskunftsersuchen nach Art. 15 DSGVO.
Datenschutz und Datensicherheit, 2019

IT-Grundschutz für die Container-Virtualisierung mit dem neuen BSI-Baustein SYS 1.6.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

Ende-zu-Ende-Sicherheit für die multimodale Mobilität in einer Smart City.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

How to Extract Workflow Privacy Patterns from Legal Documents.
Proceedings of the Information Technology for Management: Current Research and Future Directions, 2019

Deriving Workflow Privacy Patterns from Legal Documents.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

Fane: A Firewall Appliance For The Smart Home.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
Informationssicherheitskonzept nach IT-Grundschutz für Containervirtualisierung in der Cloud.
Proceedings of the Sicherheit 2018, 2018

Entwicklung eines Beschreibungsschemas für Workflow Privacy Patterns.
Proceedings of the Multikonferenz Wirtschaftsinformatik 2018: Data driven X, 2018

2017
An evaluation of combinations of lossy compression and change-detection approaches for time-series data.
Inf. Syst., 2017

How to Quantify the Impact of Lossy Transformations on Event Detection.
Big Data Res., 2017

Privacy Patterns in Business Processes.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

2016
Privacy-aware and reliable sensor-data management
, 2016

Identifying defective nodes in wireless sensor networks.
Distributed Parallel Databases, 2016

Editorial.
Datenbank-Spektrum, 2016

Towards provable privacy guarantees using rechargeable energy-storage devices.
Proceedings of the Seventh International Conference on Future Energy Systems, Waterloo, ON, Canada, June 21, 2016

TEAL: Transparent Encryption for the Database Abstraction Layer.
Proceedings of the CAiSE'16 Forum, 2016

2015
Efficient and secure exact-match queries in outsourced databases.
World Wide Web, 2015

Deriving Bounds on the Size of Spatial Areas.
Open J. Databases, 2015

Individual privacy constraints on time-series data.
Inf. Syst., 2015

Wie kann man Privatheit messen?
Datenschutz und Datensicherheit, 2015

Deploying and Evaluating Pufferfish Privacy for Smart Meter Data.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

How to quantify the impact of lossy transformations on change detection.
Proceedings of the 27th International Conference on Scientific and Statistical Database Management, 2015

2014
Pattern-sensitive Time-series Anonymization and its Application to Energy-Consumption Data.
Open J. Inf. Syst., 2014

FRESCO: A Framework to Estimate the Energy Consumption of Computers.
Proceedings of the IEEE 16th Conference on Business Informatics, 2014

FACTS: A Framework for Anonymity towards Comparability, Transparency, and Sharing - Exploratory Paper.
Proceedings of the Advanced Information Systems Engineering, 2014

2013
Re-identification of Smart Meter data.
Pers. Ubiquitous Comput., 2013

The Costs of Privacy in Local Energy Markets.
Proceedings of the IEEE 15th Conference on Business Informatics, 2013

Privacy through Uncertainty in Location-Based Services.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

2011
Query processing in sensor networks.
Distributed Parallel Databases, 2011

2010
Impact assessment in public policy: Towards a Web 2.0 application.
Inf. Polity, 2010

Software als Institution und ihre Gestaltbarkeit.
Inform. Spektrum, 2010

Fault-tolerant query processing in structured P2P-systems.
Distributed Parallel Databases, 2010

Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption.
Ad Hoc Sens. Wirel. Networks, 2010

Tackling Compliance Deficits of Data-Protection Law with User Collaboration - A Feasibility Demonstration with Human Participants.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010

Deriving Spatio-temporal Query Results in Sensor Networks.
Proceedings of the Scientific and Statistical Database Management, 2010

Processing continuous join queries in sensor networks: a filtering approach.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

Data Privacy in Novel Ubiquitous Computing Applications.
Proceedings of the Emerging Research Directions in Computer Science, Karlsruhe, Germany, July 26-27, 2010. Proceedings, 2010

Energy-efficient processing of spatio-temporal queries in wireless sensor networks.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

Privacy-Aware Folksonomies.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2010

Collaborative data privacy for the web.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

Finding misplaced items in retail by clustering RFID data.
Proceedings of the EDBT 2010, 2010

2009
A Wavelet Transform for Efficient Consolidation of Sensor Relations with Quality Guarantees.
Proc. VLDB Endow., 2009

Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Towards Efficient Processing of General-Purpose Joins in Sensor Networks.
Proceedings of the 25th International Conference on Data Engineering, 2009

A Study on the Lack of Enforcement of Data Protection Acts.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Towards materialized view selection for distributed databases.
Proceedings of the EDBT 2009, 2009

Towards collaborative web-based impact assessment.
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009

2008
Discovering the Scope of Privacy Needs in Collaborative Search.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

Tagmark: reliable estimations of RFID tags for business processes.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

Privacy2.0: Towards Collaborative Data-Privacy Protection.
Proceedings of the Trust Management II, 2008

Towards Compact Operator Trees for Query Indexing.
Proceedings of the ICSOFT 2008, 2008

PRIMO - Towards Privacy Aware Image Sharing.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

Collaborative Search and User Privacy: How Can They Be Reconciled?.
Proceedings of the Collaborative Computing: Networking, 2008

Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
Free riding-aware forwarding in Content-Addressable Networks.
VLDB J., 2007

Trust Mechanisms and Reputation Systems.
Proceedings of the Algorithms for Sensor and Ad Hoc Networks, 2007

2006
Towards Truthful Feedback in P2P Data Structures.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Erkennung und Vermeidung von unkooperativem Verhalten in Peer-to-Peer-Datenstrukturen.
Proceedings of the Ausgezeichnete Informatikdissertationen 2006, 2006

Towards Dependable Agent Systems.
Proceedings of the Multiagent Engineering, Theory and Applications in Enterprises., 2006

Erkennung und Vermeidung von unkooperativem Verhalten in Peer-to-Peer-Datenstrukturen.
PhD thesis, 2006

2005
Biology-Inspired Optimizations of Peer-to-Peer Overlay Networks.
Prax. Inf.verarb. Kommun., 2005

Piggyback Meta-Data Propagation in Distributed Hash Tables.
Proceedings of the WEBIST 2005, 2005

Best Effort Query Processing in DHT-based P2P Systems.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Malicious Behaviour in Content-Addressable Peer-to-Peer Networks.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

Verteilte Anfrageverarbeitung in DHT-basierten P2P-Systemen.
Proceedings of the Datenbanksysteme in Business, 2005

Efficient Evaluation of Nearest-Neighbor Queries in Content-Addressable Networks.
Proceedings of the From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, 2005

2004
How to Run Experiments with Large Peer-to-Peer Data Structure.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

FairNet - How to Counter Free Riding in Peer-to-Peer Data Structures.
Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, 2004

2003
Effizientes Routing in verteilten skalierbaren Datenstrukturen.
Proceedings of the BTW 2003, 2003

2002
Konzeption eines erweiterbaren Speichermanagers für leichtgewichtige, mobile DBMS.
Proceedings of the Tagungsband zum 14. GI-Workshop Grundlagen von Datenbanken, 2002

An Extensible Storage Manager for Mobile DBMS.
Proceedings of the Baltic Conference, 2002


  Loading...