Ludwig Fuchs
Orcid: 0009-0002-8432-6755
According to our database1,
Ludwig Fuchs
authored at least 26 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
2022
2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
2019
J. Inf. Secur. Appl., 2019
2018
Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2016
EURASIP J. Inf. Secur., 2016
2015
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining.
Proceedings of the Information Systems Security and Privacy, 2015
Proceedings of the ICISSP 2015, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the 22st European Conference on Information Systems, 2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
2013
Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik, 2013
2012
Secur. Commun. Networks, 2012
2011
Comput. Secur., 2011
The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
2009
Proceedings of the Business Services: Konzepte, 2009
Different Approaches to In-House Identity Management - Justification of an Assumption.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Trust, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects.
Proceedings of the 16th European Conference on Information Systems, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management.
Proceedings of the The Second International Conference on Availability, 2007