- Fuchs, Ludwig und Pernul, Günther (2012). Minimizing insider misuse through secure Identity Management.
Security and Communication Networks, 5 (8) WILEY-BLACKWELL, HOBOKEN, 847-862.
https://dx.doi.org/10.1002/sec.314 - Fuchs, Ludwig und Pernul, Günther (2012). Minimizing insider misuse through secure Identity Management.
Security and Communication Networks, 5 (8) WILEY-BLACKWELL, HOBOKEN, 847-862.
https://dx.doi.org/10.1002/sec.314 - Riesner, Moritz und Pernul, Günther (2012). Provider-Independent Online Social Identity Management -Enhancing Privacy Consistently Across Multiple Social Networking Sites.
Proc of the 45th Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, USA, , 4 - 7 January 2012. IEEE, Piscataway, NJ, ISBN 978-0-7695-4525-7. - Weippl, Edgar, Tjoa, A. Min und Pernul, Günther (2011). Advances in Applied Security.
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependabe Applications, Vol. 2 (No. 4) - Netter, Michael, Herbst, Sebastian und Pernul, Günther (2011). Analyzing Privacy in Social Networks - An Interdisciplinary Approach.
Proc. of the Third IEEE International Conference on Social Computing Workshop on Security and Privacy in Social Networks (SPSN at SocialCom). IEEE Computer Society Press, Boston, USA - Fuchs, Ludwig, Pernul, Günther und Sandhu, Ravi (2011). Roles In Information Security - A Survey And Classification Of The Research Area.
Computers & Security ELSEVIER ADVANCED TECHNOLOGY, OXFORD
https://dx.doi.org/10.1016/j.cose.2011.08.002 - Fuchs, Ludwig, Pernul, Günther und Sandhu, Ravi (2011). Roles In Information Security - A Survey And Classification Of The Research Area.
Computers & Security ELSEVIER ADVANCED TECHNOLOGY, OXFORD
https://dx.doi.org/10.1016/j.cose.2011.08.002 - Fritsch, Christoph, Bednar, Peter und Pernul, Günther (2011). DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure.
, 85, Part 1 in: Christian Huemer und Thomas Setzer (eds.) E-Commerce and Web Technologies. 12th International Conference, EC-Web 2011, Toulouse, France, August 30 - September 1, 2011. Proceedings. Springer, Berlin, 13-24.
https://dx.doi.org/10.1007/978-3-642-23014-1_2 - Fuchs, Ludwig und Meier, S. (2011). The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective.
, 6908 in: und (eds.) Availability, reliability and security for business, enterprise and health information systems : IFIP WG 8.4/8.9 international cross domain conference and workshop ; proceedings / ARES 2011, Vienna, Austria, August 22 - 26, 2011. Springer, Berlin, ISBN 978-3-642-23299-2, 978-3-642-23300-5 (online). - Dürbeck, Stefan, Kolter, Jan, Pernul, Günther und Schillinger, Rolf (2011). Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten.
Informatik-Spektrum, 34 (3) Springer Verlag, 265-275.
https://dx.doi.org/10.1007/s00287-009-0411-0 - Gmelch, Oliver und Pernul, Günther (2011). A portal-based approach for user-centric legacy application integration in collaborative environments..
Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011)., Schweiz - Netter, Michael, Riesner, Moritz und Pernul, Günther (2011). Assisted Social Identity Management - Enhancing Privacy in the Social Web.
Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI 2011), 16.-18.Februar 2011, Zürich., Schweiz - Pernul, Günther und Riesner, Moritz (2011). Conceptual Design of Secure Databases.
in: Henk C. A. van Tilborg und Sushil Jajodia (eds.) Encyclopedia of Cryptography and Security. 2. Auflage. Springer, New York, 245-248. ISBN 978-1-441-95906-5; 978-1-4419-5905-8 (ISBN der Printausgabe). - Fernandez, Eduardo B., Yoshioka, Nobukazu, Washizaki, Hironori, Jurjens, Jan, VanHilst, Michael und Pernul, Günther (2011). Using security patterns to develop secure systems.
in: und (eds.) Software engineering for secure systems: Industrial and Research Perspectives. IGI Global Group, Information Science Reference, New York, 16-31. ISBN 978-1-615-20837-1; 978-1-615-20838-8. - Fuchs, Ludwig und Pernul, Günther (2010). Gro?reinemachen fürs IAM.
Die Zeitschrift für Informations-Sicherheit: <kes>, (Nr. 6) SecuMedia Verlags-GmbH, 24. - Fuchs, Ludwig und Pernul, Günther (2010). Gro?reinemachen fürs IAM.
Die Zeitschrift für Informations-Sicherheit: <kes>, (Nr. 6) SecuMedia Verlags-GmbH, 24. - Riesner, Moritz und Pernul, Günther (2010). Supporting Compliance through Enhancing Internal Control Systems by Conceptual Business Process Security Modeling.
Proceedings of the 21st Australasian Conference on Information Systems (ACIS). AISel, Brisbane, Australia - Fritsch, Christoph, Netter, Michael, Reisser, Andreas und Pernul, Günther (2010). Attacking Image Recognition Captchas - A Naive but Effective Approach.
, 6264 in: Sokratis Katsikas Javier Lopez und Miguel Soriano (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Springer, Berlin, 13-25. ISBN 3-642-15151-5, 978-3-642-15151-4.
https://dx.doi.org/10.1007/978-3-642-15152-1 - Fritsch, Christoph und Pernul, Günther (2010). Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution.
, 6264 in: Sokratis Katsikas Javier Lopez und Miguel Soriano (eds.) Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010; proceedings. Springer, Berlin, 214-226. ISBN 3-642-15151-5, 978-3-642-15151-4.
https://dx.doi.org/10.1007/978-3-642-15152-1 - Pernul, Günther, Kolter, Jan und Kernchen, Thomas (2010). Collaborative Privacy Management.
Computers & Security, 29 (5) Elsevier, 580-591. - Gmelch, Oliver und Pernul, Günther (2010). Preventing malicious Portlets from Communication and Intercepting in Collaboration Portals.
Proceedings of the International Conference on Security and Cryptography (SECRYPT). - Pernul, Günther und Fuchs, Ludwig (2010). Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data.
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA) 2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)., Morioka, Iwate, Japan - Pernul, Günther und Fuchs, Ludwig (2010). Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data.
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA) 2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)., Morioka, Iwate, Japan - Dürbeck, Stefan, Fritsch, Christoph, Pernul, Günther und Schillinger, Rolf (2010). A Semantic Security Architecture for Web Services - the Access-eGov Solution.
Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland - Netter, Michael, Pernul, Günther und Fernandez, Eduardo B. (2010). Refining the pattern-based reference model for electronic invoices by incorporating threats.
Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland