dblp.uni-trier.dewww.uni-trier.de

Günther Pernul Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
76EESimone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings Springer 2009
75EEJan Kolter, Thomas Kernchen, Günther Pernul: Collaborative Privacy - A Community-Based Privacy Infrastructure. SEC 2009: 226-236
2008
74EEChristian Schläger, Günther Pernul: Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. ARES 2008: 344-351
73EEChristian Schläger, Ludwig Fuchs, Günther Pernul: Intensive Programme on Information and Communication Security. ARES 2008: 752-757
72EELudwig Fuchs, Günther Pernul: HyDRo - Hybrid Development of Roles. ICISS 2008: 287-302
71EEEduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie: Patterns and Pattern Diagrams for Access Control. TrustBus 2008: 38-47
2007
70 Roland Wagner, Norman Revell, Günther Pernul: Database and Expert Systems Applications, 18th International Conference, DEXA 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Springer 2007
69 Costas Lambrinoudakis, Günther Pernul, A. Min Tjoa: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Springer 2007
68EELudwig Fuchs, Günther Pernul: Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. ARES 2007: 374-384
67EEJan Kolter, Rolf Schillinger, Günther Pernul: A Privacy-Enhanced Attribute-Based Access Control System. DBSec 2007: 129-143
66EERoland Erber, Christian Schläger, Günther Pernul: Patterns for Authentication and Authorisation Infrastructures. DEXA Workshops 2007: 755-759
65EEWolfgang Dobmeier, Günther Pernul: Towards Privacy-Aware Handling of Authorizations. POLICY 2007: 70-76
64EEJan Kolter, Rolf Schillinger, Günther Pernul: Building a Distributed Semantic-aware Security Architecture. SEC 2007: 397-408
63 Günther Pernul: Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. SECRYPT 2007: 17
62EEGünther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger: Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2
2006
61EESönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe: Authrule: A Generic Rule-Based Authorization Module. DBSec 2006: 267-281
60EEChristian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul: Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. EC-Web 2006: 132-141
59 Wolfgang Dobmeier, Günther Pernul: Modellierung von Zugriffsrichtlinien für offene Systeme. EMISA 2006: 35-47
2005
58 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings Springer 2005
57EEChristian Schläger, Günther Pernul: Authentication and Authorisation Infrastructures in b2c e-Commerce. EC-Web 2005: 306-315
56EERichard Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares: Panel: Information systems security standards: The solution or the problem? ECIS 2005
55EEJavier Lopez, Rolf Oppliger, Günther Pernul: Classifying Public Key Certificates. EuroPKI 2005: 135-143
54EESokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, Privacy and Security in E-Business: Requirements and Solutions. Panhellenic Conference on Informatics 2005: 548-558
53 Torsten Priebe, Wolfgang Dobmeier, Björn Muschall, Günther Pernul: ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle. Sicherheit 2005: 285-296
52 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Editorial. Comput. Syst. Sci. Eng. 20(6): (2005)
51 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust, privacy and security in digital business. Comput. Syst. Sci. Eng. 20(6): (2005)
2004
50 Sokratis K. Katsikas, Javier Lopez, Günther Pernul: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings Springer 2004
49 Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul: A Pattern System for Access Control. DBSec 2004: 235-249
48EETorsten Priebe, Björn Muschall, Wolfgang Dobmeier, Günther Pernul: A Flexible Security System for Enterprise and e-Government Portals. DEXA 2004: 884-893
47EETorsten Priebe, Christian Schläger, Günther Pernul: A Search Engine for RDF Metadata. DEXA Workshops 2004: 168-172
46EEFredj Dridi, Björn Muschall, Günther Pernul: Administration of an RBAC System. HICSS 2004
45EEJavier Lopez, Rolf Oppliger, Günther Pernul: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7): 578-590 (2004)
2003
44EEFredj Dridi, Björn Muschall, Günther Pernul: An Administration Console for the CSAP System. CAiSE Short Paper Proceedings 2003
43EETorsten Priebe, Günther Pernul: Towards integrative enterprise knowledge portals. CIKM 2003: 216-223
42EETorsten Priebe, Günther Pernul: Ontology-based Integration of OLAP and Information Retrieval. DEXA Workshops 2003: 610-614
41EEGünther Pernul: Trust for Digital Products. EC-Web 2003: 1-5
40 Fredj Dridi, Günther Pernul: Webocrat: Ein Bürgerportal für e-democracy. GI Jahrestagung (2) 2003: 229-231
39 Fredj Dridi, Michael Fischer, Günther Pernul: CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003: 301-312
38 Torsten Priebe, Günther Pernul, Peter Krause: Ein integrativer Ansatz für unternehmensweite Wissensportale. Wirtschaftsinformatik (2) 2003: 277-292
37EECostas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26(16): 1873-1883 (2003)
2002
36EEJavier Lopez, Günther Pernul: Message from the TrustBus Workshop Chairs. DEXA Workshops 2002: 409-412
2001
35 Günther Pernul, Rainer Unland: Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz Oldenbourg 2001
34 Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul: Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings Springer 2001
33EETorsten Priebe, Günther Pernul: A Pragmatic Approach to Conceptual Modeling of OLAP Security. ER 2001: 311-324
2000
32 Kurt Bauknecht, Sanjay Kumar Madria, Günther Pernul: Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings Springer 2000
31EETorsten Priebe, Günther Pernul: Towards OLAP Security Design - Survey and Research Issues. DOLAP 2000: 33-40
30EEAlexander W. Röhm, Günther Pernul: COPS: a model and infrastructure for secure and fair electronic markets. Decision Support Systems 29(4): 343-355 (2000)
1999
29EEAlexander W. Röhm, Gaby Herrmann, Günther Pernul: A Language for Modeling Secure Business Transactions. ACSAC 1999: 22-
28EEGünther Pernul, Alexander W. Röhm, Gaby Herrmann: Trust for Electronic Commerce Transactions. ADBIS 1999: 1-13
27EEGünther Pernul, Alexander W. Röhm: COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. HICSS 1999
1998
26EEAlexander W. Röhm, Günther Pernul, Gaby Herrmann: Modeling Secure and Fair Electronic Commerce. ACSAC 1998: 155-
25 Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa: Enterprise-Wide Security Administration. DEXA Workshop 1998: 267-272
24EEGünther Pernul, A. Min Tjoa, Werner Winiwarter: Modelling Data Secrecy and Integrity. Data Knowl. Eng. 26(3): 291-308 (1998)
1997
23 Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa: Access Controls by Object-Oriented Concepts. DBSec 1997: 325-340
22 Gaby Herrmann, Günther Pernul: Zur Bedeutung von Sicherheit in interorganisationellen Workflows. Wirtschaftsinformatik 39(3): 217-224 (1997)
21 Günther Pernul, Alexander W. Röhm: Neuer Markt - neues Geld? Wirtschaftsinformatik 39(4): 345-355 (1997)
1996
20EEErnst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul: Automatic Classification of Semantic Concepts in View Specifications. DEXA 1996: 824-833
19EEWolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa: Authorization and Access Control in IRO-DB. ICDE 1996: 40-47
18 Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa: The security architecture of IRO-DB. SEC 1996: 249-258
1995
17EEGünther Pernul, Hubert Hasenauer: Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma DEXA 1995: 177-186
16EEErnst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul: Neural Network Technology to Support View Integration. OOER 1995: 181-190
1994
15 Günther Pernul: Security Object Modelling for Level-Based Policies. DBSec 1994: 374
14 Günther Pernul: Database Security. Advances in Computers 38: 1-72 (1994)
13 Dieter Merkl, Günther Pernul: Security for next generation hypertext systems. Hypermedia 6(1): 1-18 (1994)
1993
12EEGünther Pernul, Werner Winiwarter, A. Min Tjoa: The Entity-Relationship Model for Multilevel Security. ER 1993: 166-177
11 Günther Pernul, A. Min Tjoa, J. T. Hotz-Behofsits: Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. VIS 1993: 371-393
10 Günther Pernul: 11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). Datenbank Rundbrief 11: 9 (1993)
1992
9 Günther Pernul, A. Min Tjoa: Entity-Relationship Approach - ER'92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7-9, 1992, Proceedings Springer 1992
8 Günther Pernul: Canonical Security Modeling for Federated Databases. DS-5 1992: 207-222
7EEGünther Pernul: Security Constraint Processing in Multilevel Secure AMAC Schemata. ESORICS 1992: 349-370
6 Shamkant B. Navathe, Günther Pernul: Conceptual and Logical Design of Relational Databases. Advances in Computers 35: 1-80 (1992)
5EEGünther Pernul, Gottfried Luef: Bibliography on Database Security. SIGMOD Record 21(1): 105-122 (1992)
1991
4 Gottfried Luef, Günther Pernul: Supporting Range Queries in Multilevel-Secure Databases. DBSec 1991: 117-130
3 Günther Pernul, Kamalakar Karlapalem, Shamkant B. Navathe: Relational Database Organization Based on Views and Fragments. DEXA 1991: 380-386
2EEGünther Pernul, A. Min Tjoa: A View Integration Approach for the Design of Multilevel Security. ER 1991: 483-509
1987
1EEGünther Pernul: An Unnormalized Relational Data Model Based On User Views. SIGMOD Record 16(2): 51-60 (1987)

Coauthor Index

1Richard Baskerville [56]
2Kurt Bauknecht [32] [34]
3Sönke Busch [61]
4Gurpreet Dhillon [56]
5Wolfgang Dobmeier [48] [53] [59] [65]
6Fredj Dridi [37] [39] [40] [44] [46]
7Ernst Ellmer [16] [20]
8Roland Erber [66]
9Wolfgang Eßmayr [18] [19] [23] [25]
10Eduardo B. Fernández [49] [62] [71]
11Michael Fischer [39]
12Simone Fischer-Hübner [76]
13Ludwig Fuchs [68] [72] [73]
14Stefanos Gritzalis [37]
15Hubert Hasenauer [17]
16Gaby Herrmann [22] [26] [28] [29]
17J. T. Hotz-Behofsits [11]
18Christian Huemer [16] [20]
19Elisabeth Kapsammer [25]
20Kamalakar Karlapalem [3]
21Fritz Kastner [18] [19]
22Sokratis K. Katsikas [50] [51] [52] [54] [58] [62]
23Thomas Kernchen [75]
24Alfred Kobsa [62]
25Jan Kolter [64] [67] [75]
26Peter Krause [38]
27Costas Lambrinoudakis [37] [69] [76]
28María M. Larrondo-Petrie (Maria M. Larrondo-Petrie) [71]
29Javier Lopez [36] [45] [50] [51] [52] [54] [55] [58]
30Gottfried Luef [4] [5]
31Sanjay Kumar Madria [32] [34]
32Jens Ingo Mehlau [49]
33Dieter Merkl [13] [16] [20]
34Marco Casassa Mont [62]
35Björn Muschall [44] [46] [48] [53] [60] [61]
36Shamkant B. Navathe [3] [6]
37Rolf Oppliger [45] [55] [62]
38Stefan Preishuber [19]
39Torsten Priebe [31] [33] [38] [42] [43] [47] [48] [49] [53] [61]
40Norman Revell [70]
41Alexander W. Röhm [21] [26] [27] [28] [29] [30]
42Filipe de Sá-Soares [56]
43Rolf Schillinger [64] [67]
44Christian Schläger [47] [57] [60] [66] [73] [74]
45Manuel Sojer [60]
46A Min Tjoa (A. Min Tjoa) [2] [9] [11] [12] [18] [19] [23] [24] [25] [69]
47Rainer Unland [35]
48Roland Wagner [25] [70]
49Werner Winiwarter [12] [24]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)