Michael Kunz

According to our database1, Michael Kunz authored at least 20 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Attribute quality management for dynamic identity and access management.
J. Inf. Secur. Appl., 2019

2018
Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

A Zero-Entry Cyber Range Environment for Future Learning Ecosystems.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
An empirical investigation of signaling in reward-based crowdfunding.
Electron. Commer. Res., 2017

Build Your City! - Engaging Citizens in Crowdfunding Projects.
Proceedings of the 25th European Conference on Information Systems, 2017

2016
Adaptive identity and access management - contextual data based policies.
EURASIP J. Inf. Secur., 2016

Sometimes You Win, Sometimes You Learn - Success Factors in Reward-Based Crowdfunding.
Proceedings of the Multikonferenz Wirtschaftsinformatik, 2016

Woohoo TinkerBots! The Marketing Effect of Crowdfunding.
Proceedings of the International Conference on Information Systems, 2016

2015
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining.
Proceedings of the Information Systems Security and Privacy, 2015

Analyzing Quality Criteria in Role-based Identity and Access Management.
Proceedings of the ICISSP 2015, 2015

Introducing Dynamic Identity and Access Management in Organizations.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Visualizing Unfair Ratings in Online Reputation Systems.
Proceedings of the 23rd European Conference on Information Systems, 2015

Advanced Identity and Access Policy Management Using Contextual Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
An FPGA-optimized architecture of horn and schunck optical flow algorithm for real-time applications.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

Role Model Optimization for Secure Role-Based Identity Management.
Proceedings of the 22st European Conference on Information Systems, 2014

Analyzing Recent Trends in Enterprise Identity Management.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Near real-time forensic disaster analysis.
Proceedings of the 10th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2013

2012
An implementation of 3D Electron Tomography on FPGAs.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2012

Area estimation of look-up table based fixed-point computations on the example of a real-time high dynamic range imaging system.
Proceedings of the 22nd International Conference on Field Programmable Logic and Applications (FPL), 2012


  Loading...