Michael Netter

According to our database1, Michael Netter authored at least 22 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Adaptive identity and access management - contextual data based policies.
EURASIP J. Inf. Secur., 2016

2015
Privacy in Social Networks: Existing Challenges and Proposals for Solutions.
Proceedings of the Information Systems Security and Privacy, 2015

How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining.
Proceedings of the Information Systems Security and Privacy, 2015

Analyzing Quality Criteria in Role-based Identity and Access Management.
Proceedings of the ICISSP 2015, 2015

Advanced Identity and Access Policy Management Using Contextual Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Taxonomy of social network data types.
EURASIP J. Inf. Secur., 2014

Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks.
CoRR, 2014

Visualizing Social Roles - Design and Evaluation of a Bird's-eye View of Social Network Privacy Settings.
Proceedings of the 22st European Conference on Information Systems, 2014

Analyzing Recent Trends in Enterprise Identity Management.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Privacy-preserving infrastructure for social identity management.
PhD thesis, 2013

Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments.
Inf. Secur. Tech. Rep., 2013

Privacy Settings in Online Social Networks - Preferences, Perception, and Reality.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Conceptualizing Transparency on Online Social Networks.
Adv. Math. Commun., 2012

An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Assisted Social Identity Management.
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011

Analyzing Privacy in Social Networks-An Interdisciplinary Approach.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

2010
Attacking Image Recognition Captchas - A Naive but Effective Approach.
Proceedings of the Trust, 2010

Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats.
Proceedings of the ARES 2010, 2010

Visualizing Past Personal Data Disclosures.
Proceedings of the ARES 2010, 2010

2009
Integrating Security Patterns into the Electronic Invoicing Process.
Proceedings of the Database and Expert Systems Applications, 2009


  Loading...