2009 | ||
---|---|---|
81 | Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings Springer 2009 | |
80 | Carlos A. Heuser, Günther Pernul: Advances in Conceptual Modeling - Challenging Perspectives, ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009. Proceedings Springer 2009 | |
79 | Ludwig Fuchs, C. Broser, Günther Pernul: Different Approaches to In-House Identity Management - Justification of an Assumption. ARES 2009: 122-129 | |
78 | Jan Kolter, Günther Pernul: Generating User-Understandable Privacy Preferences. ARES 2009: 299-306 | |
77 | Michael Netter, Günther Pernul: Integrating Security Patterns into the Electronic Invoicing Process. DEXA Workshops 2009: 150-154 | |
76 | Jan Kolter, Thomas Kernchen, Günther Pernul: Collaborative Privacy - A Community-Based Privacy Infrastructure. SEC 2009: 226-236 | |
2008 | ||
75 | Christian Schläger, Günther Pernul: Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. ARES 2008: 344-351 | |
74 | Christian Schläger, Ludwig Fuchs, Günther Pernul: Intensive Programme on Information and Communication Security. ARES 2008: 752-757 | |
73 | Ludwig Fuchs, Günther Pernul: HyDRo - Hybrid Development of Roles. ICISS 2008: 287-302 | |
72 | Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie: Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47 | |
2007 | ||
71 | Roland Wagner, Norman Revell, Günther Pernul: Database and Expert Systems Applications, 18th International Conference, DEXA 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Springer 2007 | |
70 | Costas Lambrinoudakis, Günther Pernul, A. Min Tjoa: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Springer 2007 | |
69 | Ludwig Fuchs, Günther Pernul: Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. ARES 2007: 374-384 | |
68 | Jan Kolter, Rolf Schillinger, Günther Pernul: A Privacy-Enhanced Attribute-Based Access Control System. DBSec 2007: 129-143 | |
67 | Roland Erber, Christian Schläger, Günther Pernul: Patterns for Authentication and Authorisation Infrastructures. DEXA Workshops 2007: 755-759 | |
66 | Wolfgang Dobmeier, Günther Pernul: Towards Privacy-Aware Handling of Authorizations. POLICY 2007: 70-76 | |
65 | Jan Kolter, Rolf Schillinger, Günther Pernul: Building a Distributed Semantic-aware Security Architecture. SEC 2007: 397-408 | |
64 | Günther Pernul: Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. SECRYPT 2007: 17 | |
63 | Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger: Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 | |
2006 | ||
62 | Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe: Authrule: A Generic Rule-Based Authorization Module. DBSec 2006: 267-281 | |
61 | Christian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul: Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. EC-Web 2006: 132-141 | |
60 | Wolfgang Dobmeier, Günther Pernul: Modellierung von Zugriffsrichtlinien für offene Systeme. EMISA 2006: 35-47 | |
2005 | ||
59 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings Springer 2005 | |
58 | Christian Schläger, Günther Pernul: Authentication and Authorisation Infrastructures in b2c e-Commerce. EC-Web 2005: 306-315 | |
57 | Richard Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares: Panel: Information systems security standards: The solution or the problem? ECIS 2005 | |
56 | Javier Lopez, Rolf Oppliger, Günther Pernul: Classifying Public Key Certificates. EuroPKI 2005: 135-143 | |
55 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558 | |
54 | Torsten Priebe, Wolfgang Dobmeier, Björn Muschall, Günther Pernul: ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle. Sicherheit 2005: 285-296 | |
53 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Editorial. Comput. Syst. Sci. Eng. 20(6): (2005) | |
52 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6): (2005) | |
51 | Javier Lopez, Rolf Oppliger, Günther Pernul: Why have public key infrastructures failed so far? Internet Research 15(5): 544-556 (2005) | |
2004 | ||
50 | Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings Springer 2004 | |
49 | Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul: A Pattern System for Access Control. DBSec 2004: 235-249 | |
48 | Torsten Priebe, Björn Muschall, Wolfgang Dobmeier, Günther Pernul: A Flexible Security System for Enterprise and e-Government Portals. DEXA 2004: 884-893 | |
47 | Torsten Priebe, Christian Schläger, Günther Pernul: A Search Engine for RDF Metadata. DEXA Workshops 2004: 168-172 | |
46 | Fredj Dridi, Björn Muschall, Günther Pernul: Administration of an RBAC System. HICSS 2004 | |
45 | Javier Lopez, Rolf Oppliger, Günther Pernul: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7): 578-590 (2004) | |
2003 | ||
44 | Fredj Dridi, Björn Muschall, Günther Pernul: An Administration Console for the CSAP System. CAiSE Short Paper Proceedings 2003 | |
43 | Torsten Priebe, Günther Pernul: Towards integrative enterprise knowledge portals. CIKM 2003: 216-223 | |
42 | Torsten Priebe, Günther Pernul: Ontology-based Integration of OLAP and Information Retrieval. DEXA Workshops 2003: 610-614 | |
41 | Günther Pernul: Trust for Digital Products. EC-Web 2003: 1-5 | |
40 | Fredj Dridi, Günther Pernul: Webocrat: Ein Bürgerportal für e-democracy. GI Jahrestagung (2) 2003: 229-231 | |
39 | Fredj Dridi, Michael Fischer, Günther Pernul: CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003: 301-312 | |
38 | Torsten Priebe, Günther Pernul, Peter Krause: Ein integrativer Ansatz für unternehmensweite Wissensportale. Wirtschaftsinformatik (2) 2003: 277-292 | |
37 | Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26(16): 1873-1883 (2003) | |
2002 | ||
36 | Javier Lopez, Günther Pernul: Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412 | |
2001 | ||
35 | Günther Pernul, Rainer Unland: Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz Oldenbourg 2001 | |
34 | Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul: Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings Springer 2001 | |
33 | Torsten Priebe, Günther Pernul: A Pragmatic Approach to Conceptual Modeling of OLAP Security. ER 2001: 311-324 | |
2000 | ||
32 | Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul: Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings Springer 2000 | |
31 | Torsten Priebe, Günther Pernul: Towards OLAP Security Design - Survey and Research Issues. DOLAP 2000: 33-40 | |
30 | Alexander W. Röhm, Günther Pernul: COPS: a model and infrastructure for secure and fair electronic markets. Decision Support Systems 29(4): 343-355 (2000) | |
1999 | ||
29 | Alexander W. Röhm, Gaby Herrmann, Günther Pernul: A Language for Modeling Secure Business Transactions. ACSAC 1999: 22- | |
28 | Günther Pernul, Alexander W. Röhm, Gaby Herrmann: Trust for Electronic Commerce Transactions. ADBIS 1999: 1-13 | |
27 | Günther Pernul, Alexander W. Röhm: COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. HICSS 1999 | |
1998 | ||
26 | Alexander W. Röhm, Günther Pernul, Gaby Herrmann: Modeling Secure and Fair Electronic Commerce. ACSAC 1998: 155- | |
25 | Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa: Enterprise-Wide Security Administration. DEXA Workshop 1998: 267-272 | |
24 | Günther Pernul, A. Min Tjoa, Werner Winiwarter: Modelling Data Secrecy and Integrity. Data Knowl. Eng. 26(3): 291-308 (1998) | |
1997 | ||
23 | Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa: Access Controls by Object-Oriented Concepts. DBSec 1997: 325-340 | |
22 | Gaby Herrmann, Günther Pernul: Zur Bedeutung von Sicherheit in interorganisationellen Workflows. Wirtschaftsinformatik 39(3): 217-224 (1997) | |
21 | Günther Pernul, Alexander W. Röhm: Neuer Markt - neues Geld? Wirtschaftsinformatik 39(4): 345-355 (1997) | |
1996 | ||
20 | Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul: Automatic Classification of Semantic Concepts in View Specifications. DEXA 1996: 824-833 | |
19 | Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa: Authorization and Access Control in IRO-DB. ICDE 1996: 40-47 | |
18 | Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa: The security architecture of IRO-DB. SEC 1996: 249-258 | |
1995 | ||
17 | Günther Pernul, Hubert Hasenauer: Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma DEXA 1995: 177-186 | |
16 | Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul: Neural Network Technology to Support View Integration. OOER 1995: 181-190 | |
1994 | ||
15 | Günther Pernul: Security Object Modelling for Level-Based Policies. DBSec 1994: 374 | |
14 | Günther Pernul: Database Security. Advances in Computers 38: 1-72 (1994) | |
13 | Dieter Merkl, Günther Pernul: Security for next generation hypertext systems. Hypermedia 6(1): 1-18 (1994) | |
1993 | ||
12 | Günther Pernul, Werner Winiwarter, A. Min Tjoa: The Entity-Relationship Model for Multilevel Security. ER 1993: 166-177 | |
11 | Günther Pernul, A. Min Tjoa, J. T. Hotz-Behofsits: Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. VIS 1993: 371-393 | |
10 | Günther Pernul: 11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). Datenbank Rundbrief 11: 9 (1993) | |
1992 | ||
9 | Günther Pernul, A. Min Tjoa: Entity-Relationship Approach - ER'92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7-9, 1992, Proceedings Springer 1992 | |
8 | Günther Pernul: Canonical Security Modeling for Federated Databases. DS-5 1992: 207-222 | |
7 | Günther Pernul: Security Constraint Processing in Multilevel Secure AMAC Schemata. ESORICS 1992: 349-370 | |
6 | Shamkant B. Navathe, Günther Pernul: Conceptual and Logical Design of Relational Databases. Advances in Computers 35: 1-80 (1992) | |
5 | Günther Pernul, Gottfried Luef: Bibliography on Database Security. SIGMOD Record 21(1): 105-122 (1992) | |
1991 | ||
4 | Gottfried Luef, Günther Pernul: Supporting Range Queries in Multilevel-Secure Databases. DBSec 1991: 117-130 | |
3 | Günther Pernul, Kamalakar Karlapalem, Shamkant B. Navathe: Relational Database Organization Based on Views and Fragments. DEXA 1991: 380-386 | |
2 | Günther Pernul, A. Min Tjoa: A View Integration Approach for the Design of Multilevel Security. ER 1991: 483-509 | |
1987 | ||
1 | Günther Pernul: An Unnormalized Relational Data Model Based On User Views. SIGMOD Record 16(2): 51-60 (1987) |