Günther Pernul
Orcid: 0000-0003-1338-9003Affiliations:
- University of Regensburg, Germany
According to our database1,
Günther Pernul
authored at least 218 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., April, 2024
Forensic Sci. Int. Digit. Investig., 2024
Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises.
Comput. Secur., 2024
IEEE Access, 2024
Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Inf., February, 2023
Inf. Comput. Secur., 2023
System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC.
IEEE Access, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
SN Comput. Sci., 2022
Proceedings of the Ubiquitous Security - Second International Conference, 2022
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the Human Aspects of Information Security and Assurance, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity.
J. Cybersecur. Priv., September, 2021
A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises.
J. Cyber Secur. Mobil., 2021
Inf. Process. Manag., 2021
Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information.
Inf. Comput. Secur., 2021
Int. J. Inf. Sec., 2021
A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective.
IEEE Commun. Surv. Tutorials, 2021
CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities.
Comput. Secur., 2021
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the SAT-CPS@CODASPY 2021, 2021
2020
Wirel. Networks, 2020
Bus. Inf. Syst. Eng., 2020
IEEE Access, 2020
Proceedings of the Information Security Education. Information Security in Action, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Practice of Enterprise Modeling, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An Analytical Study and Evaluation of Popular DLT Frameworks.
Trans. Large Scale Data Knowl. Centered Syst., 2019
J. Inf. Secur. Appl., 2019
Comput. Secur., 2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Contributing to Current Challenges in Identity and Access Management with Visual Analytics.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Enhancing credibility of digital evidence through provenance-based incident response handling.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Interactive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms.
Bus. Inf. Syst. Eng., 2018
Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the Database and Expert Systems Applications, 2018
2017
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the 4th Workshop on Security in Highly Connected IT Systems, 2017
2016
EURASIP J. Inf. Secur., 2016
Proceedings of the E-Commerce and Web Technologies - 17th International Conference, 2016
2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the ICISSP 2015, 2015
Proceedings of the Information Systems Security and Privacy, 2015
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining.
Proceedings of the Information Systems Security and Privacy, 2015
Proceedings of the ICISSP 2015, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the 23rd European Conference on Information Systems, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
CoRR, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Visualizing Social Roles - Design and Evaluation of a Bird's-eye View of Social Network Privacy Settings.
Proceedings of the 22st European Conference on Information Systems, 2014
Proceedings of the 22st European Conference on Information Systems, 2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments.
Inf. Secur. Tech. Rep., 2013
Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the 14th IEEE International Conference on Commerce and Enterprise Computing, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective.
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking Sites.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten.
Inform. Spektrum, 2011
Comput. Secur., 2011
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011
A portal-based approach for user-centric legacy application integration in collaborative environments.
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the E-Commerce and Web Technologies - 12th International Conference, 2011
2010
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution.
Proceedings of the Trust, 2010
Proceedings of the Trust, 2010
Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Advances in Conceptual Modeling - Applications and Challenges, 2010
Supporting Compliance through Enhancing Internal Control Systems by Conceptual Business Process Security Modeling.
Proceedings of the Australasian Conference on Information Systems, 2010
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats.
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Digital Business - First Iternational ICST Conference, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Different Approaches to In-House Identity Management - Justification of an Assumption.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects.
Proceedings of the 16th European Conference on Information Systems, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Trust, 2007
Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
Proceedings of the Data and Applications Security XXI, 2007
Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures.
Proceedings of the 20th Bled eConference: eMergence: Merging and Emerging Technologies, 2007
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management.
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the EMISA 2006, 2006
Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers.
Proceedings of the E-Commerce and Web Technologies, 7th International Conference, 2006
Proceedings of the Data and Applications Security XX, 2006
2005
Trust, privacy and security in digital business.
Comput. Syst. Sci. Eng., 2005
Editorial.
Comput. Syst. Sci. Eng., 2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Proceedings of the Advances in Informatics, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005
Proceedings of the 13th European Conference on Information Systems, 2005
2004
Comput. Secur., 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Comput. Commun., 2003
Proceedings of the Wirtschaftsinformatik 2003, Medien - Märkte - Mobilität, Band II, 2003
CSAP - An Adaptable Security Module for the E-Government System Webocrat.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, 2003
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003
Datenbanken im Unternehmen - Analyse, Modellbildung und Einsatz (2).
Lehrbücher Wirtschaftsinformatik, Oldenbourg, ISBN: 978-3-486-27210-9, 2003
2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2001
Proceedings of the Information Age Economy: 5. Internationale Tagung Wirtschaftsinformatik 2001, 2001
Proceedings of the Conceptual Modeling, 2001
Oldenbourg, ISBN: 3-486-25580-0, 2001
2000
Int. J. Electron. Commer., 2000
Decis. Support Syst., 2000
Proceedings of the Third ACM International Workshop on Data Warehousing and OLAP (DOLAP 2000), 2000
1999
Int. J. Electron. Commer., 1999
Proceedings of the Electronic Business Engineering, 1999
Proceedings of the Advances in Databases and Information Systems, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Neuer Markt - neues Geld?
Wirtschaftsinf., 1997
Zur Bedeutung von Sicherheit in interorganisationellen Workflows.
Wirtschaftsinf., 1997
Access Controls by Object-Oriented Concepts.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
The security architecture of IRO-DB.
Proceedings of the Information Systems Security, 1996
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996
1995
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995
Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma
Proceedings of the Database and Expert Systems Applications, 1995
IT-Sicherheit '94.
Schriftenreihe der Österreichischen Computer Gesellschaft 75, Oldenbourg, 1995
1994
Security Object Modelling for Level-Based Policies.
Proceedings of the Database Security, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht).
Datenbank Rundbr., 1993
Datenbankmanagementsysteme mit hohem Sicherheitsanspruch.
Proceedings of the Verläßliche Informationssysteme, 1993
Proceedings of the Entity-Relationship Approach, 1993
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993
1992
Proceedings of the Computer Security, 1992
Canonical Security Modeling for Federated Databases.
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5), 1992
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
A View Integration Approach for the Design of Multilevel Security.
Proceedings of the 10th International Conference on Entity-Relationship Approach (ER'91), 1991
Relational Database Organization Based on Views and Fragments.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991
Supporting Range Queries in Multilevel-Secure Databases.
Proceedings of the Database Security, 1991
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
1987