default search action
Günther Pernul
Person information
- affiliation: University of Regensburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Marietheres Dietz, Thomas Reichvilser, Günther Pernul:
A Data-Driven Framework for Digital Twin Creation in Industrial Environments. IEEE Access 12: 93294-93304 (2024) - [j59]Magdalena Glas, Gerhard Messmann, Günther Pernul:
Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises. Comput. Secur. 144: 103965 (2024) - [j58]Sabrina Friedl, Günther Pernul:
IoT Forensics Readiness - influencing factors. Forensic Sci. Int. Digit. Investig. 49: 301768 (2024) - [j57]Philip Empl, Daniel Schlette, Lukas Stöger, Günther Pernul:
Generating ICS vulnerability playbooks with open standards. Int. J. Inf. Sec. 23(2): 1215-1230 (2024) - [c154]Sebastian Groll, Sascha Kern, Ludwig Fuchs, Günther Pernul:
A Framework for Managing Separation of Duty Policies. ARES 2024: 180:1-180:10 - [c153]Thomas Baumer, Johannes Grill, Jacob Adan, Günther Pernul:
A Trust and Reputation System for Examining Compliance with Access Control. ARES 2024: 181:1-181:10 - [c152]Manfred Vielberth, Kristina Raab, Magdalena Glas, Patrick Grümer, Günther Pernul:
Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment. ARES 2024: 189:1-189:9 - [c151]Sabrina Friedl, Charlotte Zajewski, Günther Pernul:
Sustainability in Digital Forensics. ARES 2024: 202:1-202:9 - [c150]Philip Empl, Fabian Böhm, Günther Pernul:
Process-Aware Intrusion Detection in MQTT Networks. CODASPY 2024: 91-102 - [c149]Alexander Puchta, Thomas Baumer, Mathis Müller, Günther Pernul:
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. DBSec 2024: 44-52 - [c148]Sabrina Friedl, Tobias Reittinger, Günther Pernul:
From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. DBSec 2024: 269-289 - [c147]Sabrina Friedl, Tobias Reittinger, Günther Pernul:
Digital Detectives: A Serious Point-and-Click Game for Digital Forensics. World Conference on Information Security Education 2024: 129-145 - [c146]Sabrina Friedl, Günther Pernul:
Forensic Analysis of an IoT ARP Spoofing Attack. ISDFS 2024: 1-7 - [c145]Thomas Baumer, Tobias Reittinger, Sascha Kern, Günther Pernul:
Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations. SOUPS @ USENIX Security Symposium 2024: 239-258 - [c144]Daniel Schlette, Philip Empl, Marco Caselli, Thomas Schreck, Günther Pernul:
Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors. SP 2024: 3625-3643 - 2023
- [j56]Thomas Baumer, Mathis Müller, Günther Pernul:
System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC. IEEE Access 11: 86872-86894 (2023) - [j55]Magdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther Pernul:
Improving cybersecurity skill development through visual programming. Inf. Comput. Secur. 31(3): 316-330 (2023) - [j54]Philip Empl, Günther Pernul:
Digital-Twin-Based Security Analytics for the Internet of Things. Inf. 14(2): 95 (2023) - [c143]Magdalena Glas, Manfred Vielberth, Günther Pernul:
Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges. CHI 2023: 622:1-622:19 - [c142]Philip Empl, Henric Hager, Günther Pernul:
Digital Twins for IoT Security Management. DBSec 2023: 141-149 - [c141]Sascha Kern, Thomas Baumer, Ludwig Fuchs, Günther Pernul:
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach. DBSec 2023: 223-242 - [c140]Magdalena Glas, Fabian Böhm, Falko Schönteich, Günther Pernul:
Cyber Range Exercises: Potentials and Open Challenges for Organizations. HAISA 2023: 24-35 - 2022
- [j53]Sascha Kern, Thomas Baumer, Sebastian Groll, Ludwig Fuchs, Günther Pernul:
Optimization of Access Control Policies. J. Inf. Secur. Appl. 70: 103301 (2022) - [j52]Fabian Böhm, Manfred Vielberth, Günther Pernul:
Formalizing and Integrating User Knowledge into Security Analytics. SN Comput. Sci. 3(5): 347 (2022) - [c139]Philip Empl, Daniel Schlette, Daniel Zupfer, Günther Pernul:
SOAR4IoT: Securing IoT Assets with Digital Twins. ARES 2022: 4:1-4:10 - [c138]Benedikt Putz, Manfred Vielberth, Günther Pernul:
BISCUIT - Blockchain Security Incident Reporting based on Human Observations. ARES 2022: 27:1-27:6 - [c137]Marietheres Dietz, Leon Hageman, Constantin von Hornung, Günther Pernul:
Employing Digital Twins for Security-by-Design System Testing. SAT-CPS@CODASPY 2022: 97-106 - [c136]Marietheres Dietz, Daniel Schlette, Günther Pernul:
Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence. COMPSAC 2022: 789-797 - [c135]Andreas Reisser, Manfred Vielberth, Sofia Fohringer, Günther Pernul:
Security Operations Center Roles and Skills: A Comparison of Theory and Practice. DBSec 2022: 316-327 - [c134]Magdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther Pernul:
Visual Programming in Cyber Range Training to Improve Skill Development. HAISA 2022: 3-13 - [c133]Benedikt Putz, Günther Pernul:
Comparing Successful DLT Consortia: A Lifecycle Perspective. HICSS 2022: 1-10 - [c132]Sabrina Friedl, Magdalena Glas, Ludwig Englbrecht, Fabian Böhm, Günther Pernul:
ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics. World Conference on Information Security Education 2022: 77-91 - [c131]Sabrina Friedl, Ludwig Englbrecht, Fabian Böhm, Günther Pernul:
Support Tool Selection in Digital Forensics Training. UbiSec 2022: 3-21 - 2021
- [j51]Florian Menges, Tobias Latzo, Manfred Vielberth, Sabine Sobola, Henrich C. Pöhls, Benjamin Taubmann, Johannes Köstler, Alexander Puchta, Felix C. Freiling, Hans P. Reiser, Günther Pernul:
Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103: 102165 (2021) - [j50]Daniel Schlette, Manfred Vielberth, Günther Pernul:
CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities. Comput. Secur. 111: 102482 (2021) - [j49]Daniel Schlette, Marco Caselli, Günther Pernul:
A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective. IEEE Commun. Surv. Tutorials 23(4): 2525-2556 (2021) - [j48]Daniel Schlette, Fabian Böhm, Marco Caselli, Günther Pernul:
Measuring and visualizing cyber threat intelligence quality. Int. J. Inf. Sec. 20(1): 21-38 (2021) - [j47]Florian Menges, Benedikt Putz, Günther Pernul:
DEALER: decentralized incentives for threat intelligence reporting and exchange. Int. J. Inf. Sec. 20(5): 741-761 (2021) - [j46]Manfred Vielberth, Ludwig Englbrecht, Günther Pernul:
Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information. Inf. Comput. Secur. 29(2): 332-349 (2021) - [j45]Benedikt Putz, Marietheres Dietz, Philip Empl, Günther Pernul:
EtherTwin: Blockchain-based Secure Digital Twin Information Management. Inf. Process. Manag. 58(1): 102425 (2021) - [j44]Ludwig Englbrecht, Günther Pernul:
A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. J. Cyber Secur. Mobil. 10(1): 27-64 (2021) - [j43]Fabian Böhm, Marietheres Dietz, Tobias Preindl, Günther Pernul:
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. J. Cybersecur. Priv. 1(3): 519-538 (2021) - [c130]Philip Empl, Günther Pernul:
A Flexible Security Analytics Service for the Industrial IoT. SAT-CPS@CODASPY 2021: 23-32 - [c129]Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos, Günther Pernul:
A Digital Twin-Based Cyber Range for SOC Analysts. DBSec 2021: 293-311 - [c128]Fabian Böhm, Manfred Vielberth, Günther Pernul:
Bridging Knowledge Gaps in Security Analytics. ICISSP 2021: 98-108 - [c127]Alexander Puchta, Sebastian Groll, Günther Pernul:
Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture. ICISSP 2021: 611-618 - [c126]Marietheres Dietz, Ludwig Englbrecht, Günther Pernul:
Enhancing Industrial Control System Forensics Using Replication-Based Digital Twins. IFIP Int. Conf. Digital Forensics 2021: 21-38 - [c125]Benedikt Putz, Fabian Böhm, Günther Pernul:
HyperSec: Visual Analytics for Blockchain Security Monitoring. SEC 2021: 165-180 - [c124]Sebastian Groll, Sascha Kern, Ludwig Fuchs, Günther Pernul:
Monitoring Access Reviews by Crowd Labelling. TrustBus 2021: 3-17 - [c123]Fabian Böhm, Ludwig Englbrecht, Sabrina Friedl, Günther Pernul:
Visual Decision-Support for Live Digital Forensics. VizSec 2021: 58-67 - [i2]Benedikt Putz, Fabian Böhm, Günther Pernul:
HyperSec: Visual Analytics for blockchain security monitoring. CoRR abs/2103.14414 (2021) - 2020
- [j42]Manfred Vielberth, Fabian Böhm, Ines Fichtinger, Günther Pernul:
Security Operations Center: A Systematic Study and Open Challenges. IEEE Access 8: 227756-227779 (2020) - [j41]Marietheres Dietz, Günther Pernul:
Digital Twin: Empowering Enterprises Towards a System-of-Systems Approach. Bus. Inf. Syst. Eng. 62(2): 179-184 (2020) - [j40]Christian Richthammer, Günther Pernul:
Situation awareness for recommender systems. Electron. Commer. Res. 20(4): 783-806 (2020) - [j39]Marietheres Dietz, Günther Pernul:
Unleashing the Digital Twin's Potential for ICS Security. IEEE Secur. Priv. 18(4): 20-27 (2020) - [j38]Ludwig Englbrecht, Stefan Meier, Günther Pernul:
Towards a capability maturity model for digital forensic readiness. Wirel. Networks 26(7): 4895-4907 (2020) - [c122]Marietheres Dietz, Manfred Vielberth, Günther Pernul:
Integrating digital twin security simulations in the security operations center. ARES 2020: 18:1-18:9 - [c121]Ludwig Englbrecht, Günther Pernul:
A privacy-aware digital forensics investigation in enterprises. ARES 2020: 58:1-58:10 - [c120]Benedikt Putz, Günther Pernul:
Detecting Blockchain Security Threats. Blockchain 2020: 313-320 - [c119]Daniel Schlette, Florian Menges, Thomas Baumer, Günther Pernul:
Security Enumerations for Cyber-Physical Systems. DBSec 2020: 64-76 - [c118]Fabian Böhm, Ludwig Englbrecht, Günther Pernul:
Designing a Decision-Support Visualization for Live Digital Forensic Investigations. DBSec 2020: 223-240 - [c117]Ludwig Englbrecht, Stefan Schönig, Günther Pernul:
Supporting Process Mining with Recovered Residual Data. PoEM 2020: 389-404 - [c116]Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro:
SSIBAC: Self-Sovereign Identity Based Access Control. TrustCom 2020: 1935-1943 - [c115]Ludwig Englbrecht, Günther Pernul:
A Serious Game-Based Peer-Instruction Digital Forensics Workshop. WISE 2020: 127-141
2010 – 2019
- 2019
- [j37]Benedikt Putz, Florian Menges, Günther Pernul:
A secure and auditable logging infrastructure based on a permissioned blockchain. Comput. Secur. 87 (2019) - [j36]Manfred Vielberth, Florian Menges, Günther Pernul:
Human-as-a-security-sensor for harvesting threat intelligence. Cybersecur. 2(1): 23 (2019) - [j35]Michael Kunz, Alexander Puchta, Sebastian Groll, Ludwig Fuchs, Günther Pernul:
Attribute quality management for dynamic identity and access management. J. Inf. Secur. Appl. 44: 64-79 (2019) - [j34]Benedikt Putz, Günther Pernul:
Trust Factors and Insider Threats in Permissioned Distributed Ledgers - An Analytical Study and Evaluation of Popular DLT Frameworks. Trans. Large Scale Data Knowl. Centered Syst. 42: 25-50 (2019) - [c114]Ludwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr:
Enhancing credibility of digital evidence through provenance-based incident response handling. ARES 2019: 26:1-26:6 - [c113]Alexander Puchta, Fabian Böhm, Günther Pernul:
Contributing to Current Challenges in Identity and Access Management with Visual Analytics. DBSec 2019: 221-239 - [c112]Marietheres Dietz, Benedikt Putz, Günther Pernul:
A Distributed Ledger Approach to Digital Twin Secure Data Sharing. DBSec 2019: 281-300 - [c111]Florian Menges, Christine Sperl, Günther Pernul:
Unifying Cyber Threat Intelligence. TrustBus 2019: 161-175 - 2018
- [j33]Johannes Sänger, Günther Pernul:
Interactive Reputation Systems - How to Cope with Malicious Behavior in Feedback Mechanisms. Bus. Inf. Syst. Eng. 60(4): 273-287 (2018) - [j32]Florian Menges, Günther Pernul:
A comparative analysis of incident reporting formats. Comput. Secur. 73: 87-101 (2018) - [j31]Fabian Böhm, Florian Menges, Günther Pernul:
Graph-based visual analytics for cyber threat intelligence. Cybersecur. 1(1): 16 (2018) - [j30]Christian Richthammer, Michael Weber, Günther Pernul:
State of the art of reputation-enhanced recommender systems. Web Intell. 16(4): 273-286 (2018) - [c110]Marietheres Dietz, Günther Pernul:
Big Log Data Stream Processing: Adapting an Anomaly Detection Technique. DEXA (2) 2018: 159-166 - [c109]Matthias Hummer, Sebastian Groll, Michael Kunz, Ludwig Fuchs, Günther Pernul:
Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance Indicators. ICISSP 2018: 233-240 - [e18]Sven Hartmann, Hui Ma, Abdelkader Hameurlain, Günther Pernul, Roland R. Wagner:
Database and Expert Systems Applications - 29th International Conference, DEXA 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11029, Springer 2018, ISBN 978-3-319-98808-5 [contents] - [e17]Sven Hartmann, Hui Ma, Abdelkader Hameurlain, Günther Pernul, Roland R. Wagner:
Database and Expert Systems Applications - 29th International Conference, DEXA 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11030, Springer 2018, ISBN 978-3-319-98811-5 [contents] - [e16]Steven Furnell, Haralambos Mouratidis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings. Lecture Notes in Computer Science 11033, Springer 2018, ISBN 978-3-319-98384-4 [contents] - 2017
- [j29]Rolf Oppliger, Günther Pernul, Sokratis K. Katsikas:
New Frontiers: Assessing and Managing Security Risks. Computer 50(4): 48-51 (2017) - [c108]Christian Richthammer, Johannes Sänger, Günther Pernul:
Interactive Visualization of Recommender Systems Data. SHCIS@DAIS 2017: 19-24 - [c107]Christian Richthammer, Michael Weber, Günther Pernul:
Reputation-Enhanced Recommender Systems. IFIPTM 2017: 163-179 - 2016
- [j28]Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul:
Adaptive identity and access management - contextual data based policies. EURASIP J. Inf. Secur. 2016: 19 (2016) - [c106]Christian Richthammer, Günther Pernul:
Explorative Analysis of Recommendations Through Interactive Visualization. EC-Web 2016: 46-57 - 2015
- [c105]Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul:
Advanced Identity and Access Policy Management Using Contextual Data. ARES 2015: 40-49 - [c104]Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul:
Personalized Composition of Trustful Reputation Systems. DBSec 2015: 207-214 - [c103]Johannes Sänger, Christian Richthammer, Michael Kunz, Stefan Meier, Günther Pernul:
Visualizing Unfair Ratings in Online Reputation Systems. ECIS 2015 - [c102]Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul:
Introducing Dynamic Identity and Access Management in Organizations. ICISS 2015: 139-158 - [c101]Michael Netter, Günther Pernul, Christian Richthammer, Moritz Riesner:
Privacy in Social Networks: Existing Challenges and Proposals for Solutions. ICISSP (Revised Selected Papers) 2015: 16-27 - [c100]Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul:
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. ICISSP (Revised Selected Papers) 2015: 49-67 - [c99]Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul:
Analyzing Quality Criteria in Role-based Identity and Access Management. ICISSP 2015: 64-72 - [c98]Günther Pernul:
Privacy in Social Networks - Existing Challenges and Proposals for Solution. ICISSP 2015: IS-11 - [c97]Johannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul:
Reusable Defense Components for Online Reputation Systems. IFIPTM 2015: 195-202 - [e15]Günther Pernul, Peter Y. A. Ryan, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9 [contents] - [e14]Günther Pernul, Peter Y. A. Ryan, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0 [contents] - 2014
- [j27]Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger, Günther Pernul:
Taxonomy of social network data types. EURASIP J. Inf. Secur. 2014: 11 (2014) - [c96]Johannes Sänger, Günther Pernul:
Visualizing Transaction Context in Trust and Reputation Systems. ARES 2014: 94-103 - [c95]Sabri Hassan, Johannes Sänger, Günther Pernul:
SoDA: Dynamic visual analytics of big social data. BigComp 2014: 183-188 - [c94]Michael Kunz, Matthias Hummer, Ludwig Fuchs, Michael Netter, Günther Pernul:
Analyzing Recent Trends in Enterprise Identity Management. DEXA Workshops 2014: 273-277 - [c93]Johannes Sänger, Christian Richthammer, Sabri Hassan, Günther Pernul:
Trust and Big Data: A Roadmap for Research. DEXA Workshops 2014: 278-282 - [c92]Ludwig Fuchs, Michael Kunz, Günther Pernul:
Role Model Optimization for Secure Role-Based Identity Management. ECIS 2014 - [c91]Michael Netter, Michael Weber, Michael Diener, Günther Pernul:
Visualizing Social Roles - Design and Evaluation of a Bird's-eye View of Social Network Privacy Settings. ECIS 2014 - [c90]Johannes Sänger, Günther Pernul:
Reusability for Trust and Reputation Systems. IFIPTM 2014: 28-43 - [c89]Sabri Hassan, Günther Pernul:
Efficiently Managing the Security and Costs of Big Data Storage using Visual Analytics. iiWAS 2014: 180-184 - [c88]Stefan Meier, Günther Pernul:
Einsatz von digitaler Forensik in Unternehmen und Organisationen. Sicherheit 2014: 103-114 - [e13]Vijay Atluri, Günther Pernul:
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture Notes in Computer Science 8566, Springer 2014, ISBN 978-3-662-43935-7 [contents] - [e12]Claudia Eckert, Sokratis K. Katsikas, Günther Pernul:
Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science 8647, Springer 2014, ISBN 978-3-319-09769-5 [contents] - [i1]Alexandra Cetto, Michael Netter, Günther Pernul, Christian Richthammer, Moritz Riesner, Christian Roth, Johannes Sänger:
Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks. CoRR abs/1402.5878 (2014) - 2013
- [j26]Javier López, Svetla Nikova, Andreas Pashalidis, Günther Pernul, Bart Preneel:
Preface. Comput. Math. Appl. 65(5): 747 (2013) - [j25]Ludwig Fuchs, Günther Pernul:
Qualitätssicherung im Identity- und Access Management. HMD Prax. Wirtsch. 289: 88-97 (2013) - [j24]Moritz Riesner, Michael Netter, Günther Pernul:
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments. Inf. Secur. Tech. Rep. 17(4): 185-198 (2013) - [c87]Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul:
Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. ARES 2013: 141-150 - [c86]Michael Netter, Moritz Riesner, Michael Weber, Günther Pernul:
Privacy Settings in Online Social Networks - Preferences, Perception, and Reality. HICSS 2013: 3219-3228 - [c85]Stefan Meier, Ludwig Fuchs, Günther Pernul:
Managing the Access Grid - A Process View to Minimize Insider Misuse Risks. Wirtschaftsinformatik 2013: 66 - 2012
- [j23]Ludwig Fuchs, Günther Pernul:
Minimizing insider misuse through secure Identity Management. Secur. Commun. Networks 5(8): 847-862 (2012) - [c84]Moritz Riesner, Michael Netter, Günther Pernul:
An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites. ARES 2012: 103-112 - [c83]Moritz Riesner, Günther Pernul:
Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking Sites. HICSS 2012: 800-809 - [c82]Christoph Fritsch, Günther Pernul:
User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. ICEBE 2012: 193-200 - [c81]Moritz Riesner, Günther Pernul:
Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective. SocialCom/PASSAT 2012: 860-867 - [c80]Michael Netter, Sabri Hassan, Günther Pernul:
An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. TrustBus 2012: 65-78 - [c79]Oliver Gmelch, Günther Pernul:
A Generic Architecture for User-Centric Portlet Integration. CEC 2012: 70-77 - [e11]Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul:
Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7163, Springer 2012, ISBN 978-3-642-29803-5 [contents] - 2011
- [j22]Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu:
Roles in information security - A survey and classification of the research area. Comput. Secur. 30(8): 748-769 (2011) - [j21]Stefan Dürbeck, Jan Paul Kolter, Günther Pernul, Rolf Schillinger:
Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten. Inform. Spektrum 34(3): 265-275 (2011) - [j20]Edgar R. Weippl, A Min Tjoa, Günther Pernul:
Guest Editorial: Advances in Applied Security. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(4): 1-3 (2011) - [c78]Christoph Fritsch, Peter Bednár, Günther Pernul:
DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure. EC-Web 2011: 13-24 - [c77]Michael Netter, Sebastian Herbst, Günther Pernul:
Analyzing Privacy in Social Networks-An Interdisciplinary Approach. SocialCom/PASSAT 2011: 1327-1334 - [c76]Michael Netter, Moritz Riesner, Günther Pernul:
Assisted Social Identity Management. Wirtschaftsinformatik 2011: 6 - [c75]Oliver Gmelch, Günther Pernul:
A portal-based approach for user-centric legacy application integration in collaborative environments. Wirtschaftsinformatik 2011: 45 - [e10]Steven Furnell, Costas Lambrinoudakis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings. Lecture Notes in Computer Science 6863, Springer 2011, ISBN 978-3-642-22889-6 [contents] - [r1]Günther Pernul, Moritz Riesner:
Conceptual Design of Secure Databases. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 245-248 - 2010
- [j19]Jan Paul Kolter, Thomas Kernchen, Günther Pernul:
Collaborative privacy management. Comput. Secur. 29(5): 580-591 (2010) - [j18]Ludwig Fuchs, Günther Pernul:
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 14-28 (2010) - [c74]Jan Paul Kolter, Michael Netter, Günther Pernul:
Visualizing Past Personal Data Disclosures. ARES 2010: 131-139 - [c73]Stefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger:
A Semantic Security Architecture for Web Services. ARES 2010: 222-227 - [c72]Michael Netter, Eduardo B. Fernández, Günther Pernul:
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. ARES 2010: 560-564 - [c71]Moritz Riesner, Günther Pernul:
Supporting Compliance through Enhancing Internal Control Systems by Conceptual Business Process Security Modeling. ACIS 2010 - [c70]Günther Pernul, Matti Rossi:
6th International Workshop on Foundations and Practices of UML (FP-UML 2010). ER Workshops 2010: 242 - [c69]Oliver Gmelch, Günther Pernul:
Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals. SECRYPT 2010: 177-182 - [c68]Christoph Fritsch, Michael Netter, Andreas Reisser, Günther Pernul:
Attacking Image Recognition Captchas - A Naive but Effective Approach. TrustBus 2010: 13-25 - [c67]Christoph Fritsch, Günther Pernul:
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. TrustBus 2010: 214-226
2000 – 2009
- 2009
- [c66]Ludwig Fuchs, Christian Broser, Günther Pernul:
Different Approaches to In-House Identity Management - Justification of an Assumption. ARES 2009: 122-129 - [c65]Jan Paul Kolter, Günther Pernul:
Generating User-Understandable Privacy Preferences. ARES 2009: 299-306 - [c64]Michael Netter, Günther Pernul:
Integrating Security Patterns into the Electronic Invoicing Process. DEXA Workshops 2009: 150-154 - [c63]Christian Broser, Christoph Fritsch, Oliver Gmelch, Günther Pernul, Rolf Schillinger, Sandra Wiesbeck:
Analysing Requirements for Virtual Business Alliances - The Case of SPIKE. DigiBiz 2009: 35-44 - [c62]Jan Paul Kolter, Thomas Kernchen, Günther Pernul:
Collaborative Privacy - A Community-Based Privacy Infrastructure. SEC 2009: 226-236 - [e9]Carlos A. Heuser, Günther Pernul:
Advances in Conceptual Modeling - Challenging Perspectives, ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009. Proceedings. Lecture Notes in Computer Science 5833, Springer 2009, ISBN 978-3-642-04946-0 [contents] - [e8]Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul:
Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings. Lecture Notes in Computer Science 5695, Springer 2009, ISBN 978-3-642-03747-4 [contents] - 2008
- [c61]Christian Schläger, Günther Pernul:
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. ARES 2008: 344-351 - [c60]Christian Schläger, Ludwig Fuchs, Günther Pernul:
Intensive Programme on Information and Communication Security. ARES 2008: 752-757 - [c59]Ludwig Fuchs, Günther Pernul:
Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects. ECIS 2008: 1322-1333 - [c58]Ludwig Fuchs, Günther Pernul:
HyDRo - Hybrid Development of Roles. ICISS 2008: 287-302 - [c57]Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie:
Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47 - 2007
- [c56]Ludwig Fuchs, Günther Pernul:
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. ARES 2007: 374-384 - [c55]Christian Schläger, Torsten Priebe, Manuel Liewald, Günther Pernul:
Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures. Bled eConference 2007: 3 - [c54]Jan Paul Kolter, Rolf Schillinger, Günther Pernul:
A Privacy-Enhanced Attribute-Based Access Control System. DBSec 2007: 129-143 - [c53]Roland Erber, Christian Schläger, Günther Pernul:
Patterns for Authentication and Authorisation Infrastructures. DEXA Workshops 2007: 755-759 - [c52]Wolfgang Dobmeier, Günther Pernul:
Towards Privacy-Aware Handling of Authorizations. POLICY 2007: 70-76 - [c51]Jan Paul Kolter, Rolf Schillinger, Günther Pernul:
Building a Distributed Semantic-aware Security Architecture. SEC 2007: 397-408 - [c50]Günther Pernul:
Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. SECRYPT 2007: 17 - [c49]Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 - [e7]Roland R. Wagner, Norman Revell, Günther Pernul:
Database and Expert Systems Applications, 18th International Conference, DEXA 2007, Regensburg, Germany, September 3-7, 2007, Proceedings. Lecture Notes in Computer Science 4653, Springer 2007, ISBN 978-3-540-74467-2 [contents] - [e6]Costas Lambrinoudakis, Günther Pernul, A Min Tjoa:
Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings. Lecture Notes in Computer Science 4657, Springer 2007, ISBN 978-3-540-74408-5 [contents] - 2006
- [c48]Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe:
Authrule: A Generic Rule-Based Authorization Module. DBSec 2006: 267-281 - [c47]Christian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul:
Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. EC-Web 2006: 132-141 - [c46]Wolfgang Dobmeier, Günther Pernul:
Modellierung von Zugriffsrichtlinien für offene Systeme. EMISA 2006: 35-47 - 2005
- [j17]Sokratis K. Katsikas, Javier López, Günther Pernul:
Editorial. Comput. Syst. Sci. Eng. 20(6) (2005) - [j16]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6) (2005) - [j15]Javier López, Rolf Oppliger, Günther Pernul:
Why have public key infrastructures failed so far? Internet Res. 15(5): 544-556 (2005) - [c45]Richard L. Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares:
Panel: Information systems security standards: The solution or the problem? ECIS 2005: 1780-1782 - [c44]Christian Schläger, Günther Pernul:
Authentication and Authorisation Infrastructures in b2c e-Commerce. EC-Web 2005: 306-315 - [c43]Javier López, Rolf Oppliger, Günther Pernul:
Classifying Public Key Certificates. EuroPKI 2005: 135-143 - [c42]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558 - [c41]Torsten Priebe, Wolfgang Dobmeier, Björn Muschall, Günther Pernul:
ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle. Sicherheit 2005: 285-296 - [e5]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings. Lecture Notes in Computer Science 3592, Springer 2005, ISBN 3-540-28224-6 [contents] - 2004
- [j14]Javier López, Rolf Oppliger, Günther Pernul:
Authentication and authorization infrastructures (AAIs): a comparative survey. Comput. Secur. 23(7): 578-590 (2004) - [c40]Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul:
A Pattern System for Access Control. DBSec 2004: 235-249 - [c39]Torsten Priebe, Björn Muschall, Wolfgang Dobmeier, Günther Pernul:
A Flexible Security System for Enterprise and e-Government Portals. DEXA 2004: 884-893 - [c38]Torsten Priebe, Christian Schläger, Günther Pernul:
A Search Engine for RDF Metadata. DEXA Workshops 2004: 168-172 - [c37]Fredj Dridi, Björn Muschall, Günther Pernul:
Administration of an RBAC System. HICSS 2004 - [e4]Sokratis K. Katsikas, Javier López, Günther Pernul:
Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings. Lecture Notes in Computer Science 3184, Springer 2004, ISBN 3-540-22919-1 [contents] - 2003
- [b3]Günther Pernul, Rainer Unland:
Datenbanken im Unternehmen - Analyse, Modellbildung und Einsatz (2). Lehrbücher Wirtschaftsinformatik, Oldenbourg 2003, ISBN 978-3-486-27210-9, pp. I-XVI, 1-634 - [j13]Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul:
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Comput. Commun. 26(16): 1873-1883 (2003) - [c36]Fredj Dridi, Björn Muschall, Günther Pernul:
An Administration Console for the CSAP System. CAiSE Short Paper Proceedings 2003 - [c35]Torsten Priebe, Günther Pernul:
Towards integrative enterprise knowledge portals. CIKM 2003: 216-223 - [c34]Torsten Priebe, Günther Pernul:
Ontology-based Integration of OLAP and Information Retrieval. DEXA Workshops 2003: 610-614 - [c33]Günther Pernul:
Trust for Digital Products. EC-Web 2003: 1-5 - [c32]Fredj Dridi, Günther Pernul:
Webocrat: Ein Bürgerportal für e-democracy. GI Jahrestagung (2) 2003: 229-231 - [c31]Fredj Dridi, Michael Fischer, Günther Pernul:
CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003: 301-312 - [c30]Torsten Priebe, Günther Pernul, Peter Krause:
Ein integrativer Ansatz für unternehmensweite Wissensportale. Wirtschaftsinformatik (2) 2003: 277-292 - 2002
- [c29]Javier López, Günther Pernul:
Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412 - 2001
- [b2]Günther Pernul, Rainer Unland:
Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz. Oldenbourg 2001, ISBN 3-486-25580-0 - [c28]Torsten Priebe, Günther Pernul:
A Pragmatic Approach to Conceptual Modeling of OLAP Security. ER 2001: 311-324 - [c27]Torsten Priebe, Günther Pernul:
Metadaten-gestützter Data-Warehouse-Entwurf mit ADAPTed UML. Wirtschaftsinformatik 2001: 8 - [e3]Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul:
Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings. Lecture Notes in Computer Science 2115, Springer 2001, ISBN 3-540-42517-9 [contents] - 2000
- [j12]Alexander W. Röhm, Günther Pernul:
COPS: a model and infrastructure for secure and fair electronic markets. Decis. Support Syst. 29(4): 343-355 (2000) - [j11]Torsten Mandry, Günther Pernul, Alexander W. Röhm:
Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection. Int. J. Electron. Commer. 5(2): 47-60 (2000) - [c26]Torsten Priebe, Günther Pernul:
Towards OLAP Security Design - Survey and Research Issues. DOLAP 2000: 33-40 - [e2]Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul:
Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1875, Springer 2000, ISBN 3-540-67981-2 [contents]
1990 – 1999
- 1999
- [j10]Gaby Herrmann, Günther Pernul:
Viewing Business-Process Security from Different Perspectives. Int. J. Electron. Commer. 3(3): 89-103 (1999) - [c25]Alexander W. Röhm, Gaby Herrmann, Günther Pernul:
A Language for Modeling Secure Business Transactions. ACSAC 1999: 22-31 - [c24]Günther Pernul, Alexander W. Röhm, Gaby Herrmann:
Trust for Electronic Commerce Transactions. ADBIS 1999: 1-13 - [c23]Günther Pernul, Alexander W. Röhm:
COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. HICSS 1999 - [c22]Gaby Herrmann, Alexander W. Röhm, Günther Pernul:
Sichere Geschäftstransaktionen auf Elektronischen Märkten. Wirtschaftsinformatik 1999: 12 - 1998
- [j9]Günther Pernul, A Min Tjoa, Werner Winiwarter:
Modelling Data Secrecy and Integrity. Data Knowl. Eng. 26(3): 291-308 (1998) - [c21]Alexander W. Röhm, Günther Pernul, Gaby Herrmann:
Modeling Secure and Fair Electronic Commerce. ACSAC 1998: 155-164 - [c20]Wolfgang Eßmayr, Elisabeth Kapsammer, Roland R. Wagner, Günther Pernul, A Min Tjoa:
Enterprise-Wide Security Administration. DEXA Workshop 1998: 267-272 - [c19]Gaby Herrmann, Günther Pernul:
Towards Security Semantics in Workflow Management. HICSS (7) 1998: 766-769 - 1997
- [j8]Gaby Herrmann, Günther Pernul:
Zur Bedeutung von Sicherheit in interorganisationellen Workflows. Wirtschaftsinf. 39(3): 217-224 (1997) - [j7]Günther Pernul, Alexander W. Röhm:
Neuer Markt - neues Geld? Wirtschaftsinf. 39(4): 345-355 (1997) - [c18]Wolfgang Eßmayr, Günther Pernul, A Min Tjoa:
Access Controls by Object-Oriented Concepts. DBSec 1997: 325-340 - 1996
- [c17]Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul:
Automatic Classification of Semantic Concepts in View Specifications. DEXA 1996: 824-833 - [c16]Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A Min Tjoa:
Authorization and Access Control in IRO-DB. ICDE 1996: 40-47 - [c15]Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A Min Tjoa:
The security architecture of IRO-DB. SEC 1996: 249-258 - 1995
- [b1]Günther Pernul:
IT-Sicherheit '94. Schriftenreihe der Österreichischen Computer Gesellschaft 75, Oldenbourg 1995 - [c14]Günther Pernul, Hubert Hasenauer:
Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma. DEXA 1995: 177-186 - [c13]Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul:
Neural Network Technology to Support View Integration. OOER 1995: 181-190 - 1994
- [j6]Günther Pernul:
Database Security. Adv. Comput. 38: 1-72 (1994) - [j5]Dieter Merkl, Günther Pernul:
Security for next generation hypertext systems. Hypermedia 6(1): 1-18 (1994) - [c12]Günther Pernul, Gerald Quirchmayr:
Organizing MLS databases from a data modelling point of view. ACSAC 1994: 96-105 - [c11]Günther Pernul:
Security Object Modelling for Level-Based Policies. DBSec 1994: 374 - 1993
- [j4]Günther Pernul:
11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). Datenbank Rundbr. 11: 9 (1993) - [c10]Günther Pernul, Werner Winiwarter, A Min Tjoa:
The deductive filter approach to MLS database prototyping. ACSAC 1993: 244-253 - [c9]Günther Pernul, Werner Winiwarter, A Min Tjoa:
The Entity-Relationship Model for Multilevel Security. ER 1993: 166-177 - [c8]Günther Pernul, A Min Tjoa, J. T. Hotz-Behofsits:
Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. VIS 1993: 371-393 - 1992
- [j3]Shamkant B. Navathe, Günther Pernul:
Conceptual and Logical Design of Relational Databases. Adv. Comput. 35: 1-80 (1992) - [j2]Günther Pernul, Gottfried Luef:
Bibliography on Database Security. SIGMOD Rec. 21(1): 105-122 (1992) - [c7]Günther Pernul:
Security constraint processing during multilevel secure database design. ACSAC 1992: 75-84 - [c6]Günther Pernul:
Canonical Security Modeling for Federated Databases. DS-5 1992: 207-222 - [c5]Günther Pernul:
Security Constraint Processing in Multilevel Secure AMAC Schemata. ESORICS 1992: 349-370 - [e1]Günther Pernul, A Min Tjoa:
Entity-Relationship Approach - ER'92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7-9, 1992, Proceedings. Lecture Notes in Computer Science 645, Springer 1992, ISBN 3-540-56023-8 [contents] - 1991
- [c4]Günther Pernul, Gottfried Luef:
A multilevel secure relational data model based on views. ACSAC 1991: 166-177 - [c3]Gottfried Luef, Günther Pernul:
Supporting Range Queries in Multilevel-Secure Databases. DBSec 1991: 117-130 - [c2]Günther Pernul, Kamalakar Karlapalem, Shamkant B. Navathe:
Relational Database Organization Based on Views and Fragments. DEXA 1991: 380-386 - [c1]Günther Pernul, A Min Tjoa:
A View Integration Approach for the Design of Multilevel Security. ER 1991: 483-509
1980 – 1989
- 1987
- [j1]Günther Pernul:
An Unnormalized Relational Data Model Based On User Views. SIGMOD Rec. 16(2): 51-60 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint