![]() | 2009 | |
---|---|---|
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings Springer 2009 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Carlos A. Heuser, Günther Pernul: Advances in Conceptual Modeling - Challenging Perspectives, ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009. Proceedings Springer 2009 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Ludwig Fuchs, C. Broser, Günther Pernul: Different Approaches to In-House Identity Management - Justification of an Assumption. ARES 2009: 122-129 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Kolter, Günther Pernul: Generating User-Understandable Privacy Preferences. ARES 2009: 299-306 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Netter, Günther Pernul: Integrating Security Patterns into the Electronic Invoicing Process. DEXA Workshops 2009: 150-154 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Kolter, Thomas Kernchen, Günther Pernul: Collaborative Privacy - A Community-Based Privacy Infrastructure. SEC 2009: 226-236 |
2008 | ||
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Schläger, Günther Pernul: Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. ARES 2008: 344-351 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Schläger, Ludwig Fuchs, Günther Pernul: Intensive Programme on Information and Communication Security. ARES 2008: 752-757 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Ludwig Fuchs, Günther Pernul: HyDRo - Hybrid Development of Roles. ICISS 2008: 287-302 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie: Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47 |
2007 | ||
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Roland Wagner, Norman Revell, Günther Pernul: Database and Expert Systems Applications, 18th International Conference, DEXA 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Springer 2007 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Costas Lambrinoudakis, Günther Pernul, A. Min Tjoa: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Springer 2007 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Ludwig Fuchs, Günther Pernul: Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. ARES 2007: 374-384 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Kolter, Rolf Schillinger, Günther Pernul: A Privacy-Enhanced Attribute-Based Access Control System. DBSec 2007: 129-143 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Roland Erber, Christian Schläger, Günther Pernul: Patterns for Authentication and Authorisation Infrastructures. DEXA Workshops 2007: 755-759 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Wolfgang Dobmeier, Günther Pernul: Towards Privacy-Aware Handling of Authorizations. POLICY 2007: 70-76 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan Kolter, Rolf Schillinger, Günther Pernul: Building a Distributed Semantic-aware Security Architecture. SEC 2007: 397-408 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. SECRYPT 2007: 17 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger: Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 |
2006 | ||
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe: Authrule: A Generic Rule-Based Authorization Module. DBSec 2006: 267-281 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul: Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. EC-Web 2006: 132-141 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Wolfgang Dobmeier, Günther Pernul: Modellierung von Zugriffsrichtlinien für offene Systeme. EMISA 2006: 35-47 |
2005 | ||
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings Springer 2005 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Schläger, Günther Pernul: Authentication and Authorisation Infrastructures in b2c e-Commerce. EC-Web 2005: 306-315 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Richard Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares: Panel: Information systems security standards: The solution or the problem? ECIS 2005 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Javier Lopez, Rolf Oppliger, Günther Pernul: Classifying Public Key Certificates. EuroPKI 2005: 135-143 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Wolfgang Dobmeier, Björn Muschall, Günther Pernul: ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle. Sicherheit 2005: 285-296 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Editorial. Comput. Syst. Sci. Eng. 20(6): (2005) |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6): (2005) |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Javier Lopez, Rolf Oppliger, Günther Pernul: Why have public key infrastructures failed so far? Internet Research 15(5): 544-556 (2005) |
2004 | ||
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings Springer 2004 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul: A Pattern System for Access Control. DBSec 2004: 235-249 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Björn Muschall, Wolfgang Dobmeier, Günther Pernul: A Flexible Security System for Enterprise and e-Government Portals. DEXA 2004: 884-893 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Christian Schläger, Günther Pernul: A Search Engine for RDF Metadata. DEXA Workshops 2004: 168-172 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Fredj Dridi, Björn Muschall, Günther Pernul: Administration of an RBAC System. HICSS 2004 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Javier Lopez, Rolf Oppliger, Günther Pernul: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7): 578-590 (2004) |
2003 | ||
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Fredj Dridi, Björn Muschall, Günther Pernul: An Administration Console for the CSAP System. CAiSE Short Paper Proceedings 2003 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Günther Pernul: Towards integrative enterprise knowledge portals. CIKM 2003: 216-223 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Günther Pernul: Ontology-based Integration of OLAP and Information Retrieval. DEXA Workshops 2003: 610-614 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: Trust for Digital Products. EC-Web 2003: 1-5 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Fredj Dridi, Günther Pernul: Webocrat: Ein Bürgerportal für e-democracy. GI Jahrestagung (2) 2003: 229-231 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Fredj Dridi, Michael Fischer, Günther Pernul: CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003: 301-312 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Günther Pernul, Peter Krause: Ein integrativer Ansatz für unternehmensweite Wissensportale. Wirtschaftsinformatik (2) 2003: 277-292 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26(16): 1873-1883 (2003) |
2002 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Javier Lopez, Günther Pernul: Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412 |
2001 | ||
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Rainer Unland: Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz Oldenbourg 2001 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul: Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings Springer 2001 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Günther Pernul: A Pragmatic Approach to Conceptual Modeling of OLAP Security. ER 2001: 311-324 |
2000 | ||
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul: Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings Springer 2000 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Torsten Priebe, Günther Pernul: Towards OLAP Security Design - Survey and Research Issues. DOLAP 2000: 33-40 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Alexander W. Röhm, Günther Pernul: COPS: a model and infrastructure for secure and fair electronic markets. Decision Support Systems 29(4): 343-355 (2000) |
1999 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Alexander W. Röhm, Gaby Herrmann, Günther Pernul: A Language for Modeling Secure Business Transactions. ACSAC 1999: 22- |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Alexander W. Röhm, Gaby Herrmann: Trust for Electronic Commerce Transactions. ADBIS 1999: 1-13 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Alexander W. Röhm: COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. HICSS 1999 |
1998 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Alexander W. Röhm, Günther Pernul, Gaby Herrmann: Modeling Secure and Fair Electronic Commerce. ACSAC 1998: 155- |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa: Enterprise-Wide Security Administration. DEXA Workshop 1998: 267-272 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, A. Min Tjoa, Werner Winiwarter: Modelling Data Secrecy and Integrity. Data Knowl. Eng. 26(3): 291-308 (1998) |
1997 | ||
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa: Access Controls by Object-Oriented Concepts. DBSec 1997: 325-340 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Gaby Herrmann, Günther Pernul: Zur Bedeutung von Sicherheit in interorganisationellen Workflows. Wirtschaftsinformatik 39(3): 217-224 (1997) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Alexander W. Röhm: Neuer Markt - neues Geld? Wirtschaftsinformatik 39(4): 345-355 (1997) |
1996 | ||
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul: Automatic Classification of Semantic Concepts in View Specifications. DEXA 1996: 824-833 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa: Authorization and Access Control in IRO-DB. ICDE 1996: 40-47 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa: The security architecture of IRO-DB. SEC 1996: 249-258 |
1995 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Hubert Hasenauer: Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma DEXA 1995: 177-186 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul: Neural Network Technology to Support View Integration. OOER 1995: 181-190 |
1994 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: Security Object Modelling for Level-Based Policies. DBSec 1994: 374 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: Database Security. Advances in Computers 38: 1-72 (1994) |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Dieter Merkl, Günther Pernul: Security for next generation hypertext systems. Hypermedia 6(1): 1-18 (1994) |
1993 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Werner Winiwarter, A. Min Tjoa: The Entity-Relationship Model for Multilevel Security. ER 1993: 166-177 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, A. Min Tjoa, J. T. Hotz-Behofsits: Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. VIS 1993: 371-393 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: 11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). Datenbank Rundbrief 11: 9 (1993) |
1992 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, A. Min Tjoa: Entity-Relationship Approach - ER'92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7-9, 1992, Proceedings Springer 1992 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: Canonical Security Modeling for Federated Databases. DS-5 1992: 207-222 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: Security Constraint Processing in Multilevel Secure AMAC Schemata. ESORICS 1992: 349-370 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Shamkant B. Navathe, Günther Pernul: Conceptual and Logical Design of Relational Databases. Advances in Computers 35: 1-80 (1992) |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Gottfried Luef: Bibliography on Database Security. SIGMOD Record 21(1): 105-122 (1992) |
1991 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Gottfried Luef, Günther Pernul: Supporting Range Queries in Multilevel-Secure Databases. DBSec 1991: 117-130 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, Kamalakar Karlapalem, Shamkant B. Navathe: Relational Database Organization Based on Views and Fragments. DEXA 1991: 380-386 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul, A. Min Tjoa: A View Integration Approach for the Design of Multilevel Security. ER 1991: 483-509 |
1987 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Günther Pernul: An Unnormalized Relational Data Model Based On User Views. SIGMOD Record 16(2): 51-60 (1987) |