Günther Pernul

Orcid: 0000-0003-1338-9003

Affiliations:
  • University of Regensburg, Germany


According to our database1, Günther Pernul authored at least 218 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Generating ICS vulnerability playbooks with open standards.
Int. J. Inf. Sec., April, 2024

IoT Forensics Readiness - influencing factors.
Forensic Sci. Int. Digit. Investig., 2024

Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises.
Comput. Secur., 2024

A Data-Driven Framework for Digital Twin Creation in Industrial Environments.
IEEE Access, 2024

Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

Forensic Analysis of an IoT ARP Spoofing Attack.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Digital Detectives: A Serious Point-and-Click Game for Digital Forensics.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024

IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

Process-Aware Intrusion Detection in MQTT Networks.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

A Framework for Managing Separation of Duty Policies.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Sustainability in Digital Forensics.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

A Trust and Reputation System for Examining Compliance with Access Control.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Digital-Twin-Based Security Analytics for the Internet of Things.
Inf., February, 2023

Improving cybersecurity skill development through visual programming.
Inf. Comput. Secur., 2023

System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC.
IEEE Access, 2023

Cyber Range Exercises: Potentials and Open Challenges for Organizations.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Digital Twins for IoT Security Management.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Formalizing and Integrating User Knowledge into Security Analytics.
SN Comput. Sci., 2022

Optimization of Access Control Policies.
J. Inf. Secur. Appl., 2022

Support Tool Selection in Digital Forensics Training.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022

Comparing Successful DLT Consortia: A Lifecycle Perspective.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Visual Programming in Cyber Range Training to Improve Skill Development.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

Security Operations Center Roles and Skills: A Comparison of Theory and Practice.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Employing Digital Twins for Security-by-Design System Testing.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

BISCUIT - Blockchain Security Incident Reporting based on Human Observations.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

SOAR4IoT: Securing IoT Assets with Digital Twins.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity.
J. Cybersecur. Priv., September, 2021

A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises.
J. Cyber Secur. Mobil., 2021

EtherTwin: Blockchain-based Secure Digital Twin Information Management.
Inf. Process. Manag., 2021

Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information.
Inf. Comput. Secur., 2021

Measuring and visualizing cyber threat intelligence quality.
Int. J. Inf. Sec., 2021

DEALER: decentralized incentives for threat intelligence reporting and exchange.
Int. J. Inf. Sec., 2021

A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective.
IEEE Commun. Surv. Tutorials, 2021

CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities.
Comput. Secur., 2021

Towards GDPR-compliant data processing in modern SIEM systems.
Comput. Secur., 2021

Visual Decision-Support for Live Digital Forensics.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2021

Monitoring Access Reviews by Crowd Labelling.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

HyperSec: Visual Analytics for Blockchain Security Monitoring.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Enhancing Industrial Control System Forensics Using Replication-Based Digital Twins.
Proceedings of the Advances in Digital Forensics XVII, 2021

Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Bridging Knowledge Gaps in Security Analytics.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

A Digital Twin-Based Cyber Range for SOC Analysts.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

A Flexible Security Analytics Service for the Industrial IoT.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

2020
Towards a capability maturity model for digital forensic readiness.
Wirel. Networks, 2020

Unleashing the Digital Twin's Potential for ICS Security.
IEEE Secur. Priv., 2020

Situation awareness for recommender systems.
Electron. Commer. Res., 2020

Digital Twin: Empowering Enterprises Towards a System-of-Systems Approach.
Bus. Inf. Syst. Eng., 2020

Security Operations Center: A Systematic Study and Open Challenges.
IEEE Access, 2020

A Serious Game-Based Peer-Instruction Digital Forensics Workshop.
Proceedings of the Information Security Education. Information Security in Action, 2020

SSIBAC: Self-Sovereign Identity Based Access Control.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Supporting Process Mining with Recovered Residual Data.
Proceedings of the Practice of Enterprise Modeling, 2020

Security Enumerations for Cyber-Physical Systems.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Designing a Decision-Support Visualization for Live Digital Forensic Investigations.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Detecting Blockchain Security Threats.
Proceedings of the IEEE International Conference on Blockchain, 2020

A privacy-aware digital forensics investigation in enterprises.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Integrating digital twin security simulations in the security operations center.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An Analytical Study and Evaluation of Popular DLT Frameworks.
Trans. Large Scale Data Knowl. Centered Syst., 2019

Attribute quality management for dynamic identity and access management.
J. Inf. Secur. Appl., 2019

Human-as-a-security-sensor for harvesting threat intelligence.
Cybersecur., 2019

A secure and auditable logging infrastructure based on a permissioned blockchain.
Comput. Secur., 2019

Unifying Cyber Threat Intelligence.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Contributing to Current Challenges in Identity and Access Management with Visual Analytics.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

A Distributed Ledger Approach to Digital Twin Secure Data Sharing.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Enhancing credibility of digital evidence through provenance-based incident response handling.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
State of the art of reputation-enhanced recommender systems.
Web Intell., 2018

Graph-based visual analytics for cyber threat intelligence.
Cybersecur., 2018

A comparative analysis of incident reporting formats.
Comput. Secur., 2018

Interactive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms.
Bus. Inf. Syst. Eng., 2018

Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Big Log Data Stream Processing: Adapting an Anomaly Detection Technique.
Proceedings of the Database and Expert Systems Applications, 2018

2017
New Frontiers: Assessing and Managing Security Risks.
Computer, 2017

Reputation-Enhanced Recommender Systems.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Interactive Visualization of Recommender Systems Data.
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017

2016
Adaptive identity and access management - contextual data based policies.
EURASIP J. Inf. Secur., 2016

Explorative Analysis of Recommendations Through Interactive Visualization.
Proceedings of the E-Commerce and Web Technologies - 17th International Conference, 2016

2015
Reusable Defense Components for Online Reputation Systems.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Privacy in Social Networks - Existing Challenges and Proposals for Solution.
Proceedings of the ICISSP 2015, 2015

Privacy in Social Networks: Existing Challenges and Proposals for Solutions.
Proceedings of the Information Systems Security and Privacy, 2015

How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining.
Proceedings of the Information Systems Security and Privacy, 2015

Analyzing Quality Criteria in Role-based Identity and Access Management.
Proceedings of the ICISSP 2015, 2015

Introducing Dynamic Identity and Access Management in Organizations.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Visualizing Unfair Ratings in Online Reputation Systems.
Proceedings of the 23rd European Conference on Information Systems, 2015

Personalized Composition of Trustful Reputation Systems.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Advanced Identity and Access Policy Management Using Contextual Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Taxonomy of social network data types.
EURASIP J. Inf. Secur., 2014

Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks.
CoRR, 2014

Einsatz von digitaler Forensik in Unternehmen und Organisationen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Reusability for Trust and Reputation Systems.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Visualizing Social Roles - Design and Evaluation of a Bird's-eye View of Social Network Privacy Settings.
Proceedings of the 22st European Conference on Information Systems, 2014

Role Model Optimization for Secure Role-Based Identity Management.
Proceedings of the 22st European Conference on Information Systems, 2014

Trust and Big Data: A Roadmap for Research.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

Analyzing Recent Trends in Enterprise Identity Management.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

SoDA: Dynamic visual analytics of big social data.
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014

Visualizing Transaction Context in Trust and Reputation Systems.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments.
Inf. Secur. Tech. Rep., 2013

Qualitätssicherung im Identity- und Access Management.
HMD Prax. Wirtsch., 2013

Preface.
Comput. Math. Appl., 2013

Managing the Access Grid - A Process View to Minimize Insider Misuse Risks.
Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik, 2013

Privacy Settings in Online Social Networks - Preferences, Perception, and Reality.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Minimizing insider misuse through secure Identity Management.
Secur. Commun. Networks, 2012

A Generic Architecture for User-Centric Portlet Integration.
Proceedings of the 14th IEEE International Conference on Commerce and Enterprise Computing, 2012

An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective.
Proceedings of the 2012 International Conference on Privacy, 2012

User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking Sites.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Conceptual Design of Secure Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Guest Editorial: Advances in Applied Security.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten.
Inform. Spektrum, 2011

Roles in information security - A survey and classification of the research area.
Comput. Secur., 2011

Assisted Social Identity Management.
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011

A portal-based approach for user-centric legacy application integration in collaborative environments.
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011

Analyzing Privacy in Social Networks-An Interdisciplinary Approach.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure.
Proceedings of the E-Commerce and Web Technologies - 12th International Conference, 2011

2010
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Collaborative privacy management.
Comput. Secur., 2010

Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution.
Proceedings of the Trust, 2010

Attacking Image Recognition Captchas - A Naive but Effective Approach.
Proceedings of the Trust, 2010

Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals.
Proceedings of the SECRYPT 2010, 2010

6th International Workshop on Foundations and Practices of UML (FP-UML 2010).
Proceedings of the Advances in Conceptual Modeling - Applications and Challenges, 2010

Supporting Compliance through Enhancing Internal Control Systems by Conceptual Business Process Security Modeling.
Proceedings of the Australasian Conference on Information Systems, 2010

Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats.
Proceedings of the ARES 2010, 2010

Visualizing Past Personal Data Disclosures.
Proceedings of the ARES 2010, 2010

A Semantic Security Architecture for Web Services.
Proceedings of the ARES 2010, 2010

2009
Collaborative Privacy - A Community-Based Privacy Infrastructure.
Proceedings of the Emerging Challenges for Security, 2009

Analysing Requirements for Virtual Business Alliances - The Case of SPIKE.
Proceedings of the Digital Business - First Iternational ICST Conference, 2009

Integrating Security Patterns into the Electronic Invoicing Process.
Proceedings of the Database and Expert Systems Applications, 2009

Generating User-Understandable Privacy Preferences.
Proceedings of the The Forth International Conference on Availability, 2009

Different Approaches to In-House Identity Management - Justification of an Assumption.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Patterns and Pattern Diagrams for Access Control.
Proceedings of the Trust, 2008

HyDRo - Hybrid Development of Roles.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects.
Proceedings of the 16th European Conference on Information Systems, 2008

Trust Modelling in E-Commerce through Fuzzy Cognitive Maps.
Proceedings of the The Third International Conference on Availability, 2008

Intensive Programme on Information and Communication Security.
Proceedings of the The Third International Conference on Availability, 2008

2007
Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project.
Proceedings of the SECRYPT 2007, 2007

Building a Distributed Semantic-aware Security Architecture.
Proceedings of the New Approaches for Security, 2007

Towards Privacy-Aware Handling of Authorizations.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Patterns for Authentication and Authorisation Infrastructures.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Privacy-Enhanced Attribute-Based Access Control System.
Proceedings of the Data and Applications Security XXI, 2007

Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures.
Proceedings of the 20th Bled eConference: eMergence: Merging and Emerging Technologies, 2007

Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management.
Proceedings of the The Second International Conference on Availability, 2007

2006
Modellierung von Zugriffsrichtlinien für offene Systeme.
Proceedings of the EMISA 2006, 2006

Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers.
Proceedings of the E-Commerce and Web Technologies, 7th International Conference, 2006

Authrule: A Generic Rule-Based Authorization Module.
Proceedings of the Data and Applications Security XX, 2006

2005
Why have public key infrastructures failed so far?
Internet Res., 2005

Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005

Editorial.
Comput. Syst. Sci. Eng., 2005

ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Trust, Privacy and Security in E-Business: Requirements and Solutions.
Proceedings of the Advances in Informatics, 2005

Classifying Public Key Certificates.
Proceedings of the Public Key Infrastructure, 2005

Authentication and Authorisation Infrastructures in b2c e-Commerce.
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005

Panel: Information systems security standards: The solution or the problem?
Proceedings of the 13th European Conference on Information Systems, 2005

2004
Authentication and authorization infrastructures (AAIs): a comparative survey.
Comput. Secur., 2004

Administration of an RBAC System.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

A Search Engine for RDF Metadata.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

A Flexible Security System for Enterprise and e-Government Portals.
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004

A Pattern System for Access Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Comput. Commun., 2003

Ein integrativer Ansatz für unternehmensweite Wissensportale.
Proceedings of the Wirtschaftsinformatik 2003, Medien - Märkte - Mobilität, Band II, 2003

CSAP - An Adaptable Security Module for the E-Government System Webocrat.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Webocrat: Ein Bürgerportal für e-democracy.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003

Trust for Digital Products.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Ontology-based Integration of OLAP and Information Retrieval.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Towards integrative enterprise knowledge portals.
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, 2003

An Administration Console for the CSAP System.
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003

Datenbanken im Unternehmen - Analyse, Modellbildung und Einsatz (2).
Lehrbücher Wirtschaftsinformatik, Oldenbourg, ISBN: 978-3-486-27210-9, 2003

2002
Message from the TrustBus Workshop Chairs.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
Metadaten-gestützter Data-Warehouse-Entwurf mit ADAPTed UML.
Proceedings of the Information Age Economy: 5. Internationale Tagung Wirtschaftsinformatik 2001, 2001

A Pragmatic Approach to Conceptual Modeling of OLAP Security.
Proceedings of the Conceptual Modeling, 2001

Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz
Oldenbourg, ISBN: 3-486-25580-0, 2001

2000
Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection.
Int. J. Electron. Commer., 2000

COPS: a model and infrastructure for secure and fair electronic markets.
Decis. Support Syst., 2000

Towards OLAP Security Design - Survey and Research Issues.
Proceedings of the Third ACM International Workshop on Data Warehousing and OLAP (DOLAP 2000), 2000

1999
Viewing Business-Process Security from Different Perspectives.
Int. J. Electron. Commer., 1999

Sichere Geschäftstransaktionen auf Elektronischen Märkten.
Proceedings of the Electronic Business Engineering, 1999

Trust for Electronic Commerce Transactions.
Proceedings of the Advances in Databases and Information Systems, 1999

A Language for Modeling Secure Business Transactions.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Modelling Data Secrecy and Integrity.
Data Knowl. Eng., 1998

Towards Security Semantics in Workflow Management.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Enterprise-Wide Security Administration.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

Modeling Secure and Fair Electronic Commerce.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
Neuer Markt - neues Geld?
Wirtschaftsinf., 1997

Zur Bedeutung von Sicherheit in interorganisationellen Workflows.
Wirtschaftsinf., 1997

Access Controls by Object-Oriented Concepts.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
The security architecture of IRO-DB.
Proceedings of the Information Systems Security, 1996

Authorization and Access Control in IRO-DB.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

Automatic Classification of Semantic Concepts in View Specifications.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996

1995
Neural Network Technology to Support View Integration.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma
Proceedings of the Database and Expert Systems Applications, 1995

IT-Sicherheit '94.
Schriftenreihe der Österreichischen Computer Gesellschaft 75, Oldenbourg, 1995

1994
Security for next generation hypertext systems.
Hypermedia, 1994

Database Security.
Adv. Comput., 1994

Security Object Modelling for Level-Based Policies.
Proceedings of the Database Security, 1994

Organizing MLS databases from a data modelling point of view.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht).
Datenbank Rundbr., 1993

Datenbankmanagementsysteme mit hohem Sicherheitsanspruch.
Proceedings of the Verläßliche Informationssysteme, 1993

The Entity-Relationship Model for Multilevel Security.
Proceedings of the Entity-Relationship Approach, 1993

The deductive filter approach to MLS database prototyping.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Bibliography on Database Security.
SIGMOD Rec., 1992

Conceptual and Logical Design of Relational Databases.
Adv. Comput., 1992

Security Constraint Processing in Multilevel Secure AMAC Schemata.
Proceedings of the Computer Security, 1992

Canonical Security Modeling for Federated Databases.
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5), 1992

Security constraint processing during multilevel secure database design.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
A View Integration Approach for the Design of Multilevel Security.
Proceedings of the 10th International Conference on Entity-Relationship Approach (ER'91), 1991

Relational Database Organization Based on Views and Fragments.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991

Supporting Range Queries in Multilevel-Secure Databases.
Proceedings of the Database Security, 1991

A multilevel secure relational data model based on views.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1987
An Unnormalized Relational Data Model Based On User Views.
SIGMOD Rec., 1987


  Loading...