The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Günther Pernul: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Günther Pernul
    Canonical Security Modeling for Federated Databases. [Citation Graph (3, 0)][DBLP]
    DS-5, 1992, pp:207-222 [Conf]
  2. Günther Pernul, Hubert Hasenauer
    Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma [Citation Graph (2, 0)][DBLP]
    DEXA, 1995, pp:177-186 [Conf]
  3. Shamkant B. Navathe, Günther Pernul
    Conceptual and Logical Design of Relational Databases. [Citation Graph (2, 0)][DBLP]
    Advances in Computers, 1992, v:35, n:, pp:1-80 [Journal]
  4. Günther Pernul, Kamalakar Karlapalem, Shamkant B. Navathe
    Relational Database Organization Based on Views and Fragments. [Citation Graph (1, 0)][DBLP]
    DEXA, 1991, pp:380-386 [Conf]
  5. Günther Pernul, Werner Winiwarter, A. Min Tjoa
    The Entity-Relationship Model for Multilevel Security. [Citation Graph (1, 8)][DBLP]
    ER, 1993, pp:166-177 [Conf]
  6. Günther Pernul, A. Min Tjoa
    A View Integration Approach for the Design of Multilevel Security. [Citation Graph (1, 13)][DBLP]
    ER, 1991, pp:483-509 [Conf]
  7. Günther Pernul
    Database Security. [Citation Graph (1, 0)][DBLP]
    Advances in Computers, 1994, v:38, n:, pp:1-72 [Journal]
  8. Günther Pernul
    11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). [Citation Graph (1, 0)][DBLP]
    Datenbank Rundbrief, 1993, v:11, n:, pp:9- [Journal]
  9. Alexander W. Röhm, Gaby Herrmann, Günther Pernul
    A Language for Modeling Secure Business Transactions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:22-0 [Conf]
  10. Alexander W. Röhm, Günther Pernul, Gaby Herrmann
    Modeling Secure and Fair Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:155-0 [Conf]
  11. Günther Pernul, Alexander W. Röhm, Gaby Herrmann
    Trust for Electronic Commerce Transactions. [Citation Graph (0, 1)][DBLP]
    ADBIS, 1999, pp:1-13 [Conf]
  12. Fredj Dridi, Björn Muschall, Günther Pernul
    An Administration Console for the CSAP System. [Citation Graph (0, 0)][DBLP]
    CAiSE Short Paper Proceedings, 2003, pp:- [Conf]
  13. Torsten Priebe, Günther Pernul
    Towards integrative enterprise knowledge portals. [Citation Graph (0, 0)][DBLP]
    CIKM, 2003, pp:216-223 [Conf]
  14. Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa
    Access Controls by Object-Oriented Concepts. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:325-340 [Conf]
  15. Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
    Authrule: A Generic Rule-Based Authorization Module. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:267-281 [Conf]
  16. Gottfried Luef, Günther Pernul
    Supporting Range Queries in Multilevel-Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:117-130 [Conf]
  17. Günther Pernul
    Security Object Modelling for Level-Based Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:374- [Conf]
  18. Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul
    A Pattern System for Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:235-249 [Conf]
  19. Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul
    Automatic Classification of Semantic Concepts in View Specifications. [Citation Graph (0, 0)][DBLP]
    DEXA, 1996, pp:824-833 [Conf]
  20. Torsten Priebe, Björn Muschall, Wolfgang Dobmeier, Günther Pernul
    A Flexible Security System for Enterprise and e-Government Portals. [Citation Graph (0, 0)][DBLP]
    DEXA, 2004, pp:884-893 [Conf]
  21. Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa
    Enterprise-Wide Security Administration. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:267-272 [Conf]
  22. Javier Lopez, Günther Pernul
    Message from the TrustBus Workshop Chairs. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:409-412 [Conf]
  23. Torsten Priebe, Günther Pernul
    Ontology-based Integration of OLAP and Information Retrieval. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:610-614 [Conf]
  24. Torsten Priebe, Christian Schläger, Günther Pernul
    A Search Engine for RDF Metadata. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2004, pp:168-172 [Conf]
  25. Torsten Priebe, Günther Pernul
    Towards OLAP Security Design - Survey and Research Issues. [Citation Graph (0, 0)][DBLP]
    DOLAP, 2000, pp:33-40 [Conf]
  26. Richard Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares
    Panel: Information systems security standards: The solution or the problem? [Citation Graph (0, 0)][DBLP]
    ECIS, 2005, pp:- [Conf]
  27. Günther Pernul
    Trust for Digital Products. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:1-5 [Conf]
  28. Christian Schläger, Günther Pernul
    Authentication and Authorisation Infrastructures in b2c e-Commerce. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2005, pp:306-315 [Conf]
  29. Christian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul
    Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2006, pp:132-141 [Conf]
  30. Wolfgang Dobmeier, Günther Pernul
    Modellierung von Zugriffsrichtlinien für offene Systeme. [Citation Graph (0, 0)][DBLP]
    EMISA, 2006, pp:35-47 [Conf]
  31. Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul
    Neural Network Technology to Support View Integration. [Citation Graph (0, 14)][DBLP]
    OOER, 1995, pp:181-190 [Conf]
  32. Torsten Priebe, Günther Pernul
    A Pragmatic Approach to Conceptual Modeling of OLAP Security. [Citation Graph (0, 0)][DBLP]
    ER, 2001, pp:311-324 [Conf]
  33. Günther Pernul
    Security Constraint Processing in Multilevel Secure AMAC Schemata. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:349-370 [Conf]
  34. Javier Lopez, Rolf Oppliger, Günther Pernul
    Classifying Public Key Certificates. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:135-143 [Conf]
  35. Fredj Dridi, Günther Pernul
    Webocrat: Ein Bürgerportal für e-democracy. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (2), 2003, pp:229-231 [Conf]
  36. Fredj Dridi, Björn Muschall, Günther Pernul
    Administration of an RBAC System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  37. Günther Pernul, Alexander W. Röhm
    COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  38. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa
    Authorization and Access Control in IRO-DB. [Citation Graph (0, 11)][DBLP]
    ICDE, 1996, pp:40-47 [Conf]
  39. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Trust, Privacy and Security in E-Business: Requirements and Solutions. [Citation Graph (0, 0)][DBLP]
    Panhellenic Conference on Informatics, 2005, pp:548-558 [Conf]
  40. Fredj Dridi, Michael Fischer, Günther Pernul
    CSAP - An Adaptable Security Module for the E-Government System Webocrat. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:301-312 [Conf]
  41. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa
    The security architecture of IRO-DB. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:249-258 [Conf]
  42. Torsten Priebe, Wolfgang Dobmeier, Björn Muschall, Günther Pernul
    ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:285-296 [Conf]
  43. Günther Pernul, A. Min Tjoa, J. T. Hotz-Behofsits
    Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. [Citation Graph (0, 0)][DBLP]
    VIS, 1993, pp:371-393 [Conf]
  44. Torsten Priebe, Günther Pernul, Peter Krause
    Ein integrativer Ansatz für unternehmensweite Wissensportale. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik (2), 2003, pp:277-292 [Conf]
  45. Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul
    Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1873-1883 [Journal]
  46. Javier Lopez, Rolf Oppliger, Günther Pernul
    Authentication and authorization infrastructures (AAIs): a comparative survey. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:7, pp:578-590 [Journal]
  47. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Editorial. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  48. Sokratis K. Katsikas, Javier Lopez, Günther Pernul
    Trust, privacy and security in digital business. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  49. Günther Pernul, A. Min Tjoa, Werner Winiwarter
    Modelling Data Secrecy and Integrity. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1998, v:26, n:3, pp:291-308 [Journal]
  50. Dieter Merkl, Günther Pernul
    Security for next generation hypertext systems. [Citation Graph (0, 0)][DBLP]
    Hypermedia, 1994, v:6, n:1, pp:1-18 [Journal]
  51. Günther Pernul
    An Unnormalized Relational Data Model Based On User Views. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1987, v:16, n:2, pp:51-60 [Journal]
  52. Günther Pernul, Gottfried Luef
    Bibliography on Database Security. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1992, v:21, n:1, pp:105-122 [Journal]
  53. Gaby Herrmann, Günther Pernul
    Zur Bedeutung von Sicherheit in interorganisationellen Workflows. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1997, v:39, n:3, pp:217-224 [Journal]
  54. Günther Pernul, Alexander W. Röhm
    Neuer Markt - neues Geld? [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1997, v:39, n:4, pp:345-355 [Journal]
  55. Jan Kolter, Rolf Schillinger, Günther Pernul
    A Privacy-Enhanced Attribute-Based Access Control System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:129-143 [Conf]
  56. Roland Erber, Christian Schläger, Günther Pernul
    Patterns for Authentication and Authorisation Infrastructures. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:755-759 [Conf]
  57. Wolfgang Dobmeier, Günther Pernul
    Towards Privacy-Aware Handling of Authorizations. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:70-76 [Conf]
  58. Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger
    Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:2- [Conf]
  59. Alexander W. Röhm, Günther Pernul
    COPS: a model and infrastructure for secure and fair electronic markets. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2000, v:29, n:4, pp:343-355 [Journal]

  60. Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. [Citation Graph (, )][DBLP]


  61. Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. [Citation Graph (, )][DBLP]


  62. Intensive Programme on Information and Communication Security. [Citation Graph (, )][DBLP]


  63. Generating User-Understandable Privacy Preferences. [Citation Graph (, )][DBLP]


  64. Different Approaches to In-House Identity Management - Justification of an Assumption. [Citation Graph (, )][DBLP]


  65. Visualizing Past Personal Data Disclosures. [Citation Graph (, )][DBLP]


  66. A Semantic Security Architecture for Web Services. [Citation Graph (, )][DBLP]


  67. Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. [Citation Graph (, )][DBLP]


  68. Integrating Security Patterns into the Electronic Invoicing Process. [Citation Graph (, )][DBLP]


  69. HyDRo - Hybrid Development of Roles. [Citation Graph (, )][DBLP]


  70. Building a Distributed Semantic-aware Security Architecture. [Citation Graph (, )][DBLP]


  71. Collaborative Privacy - A Community-Based Privacy Infrastructure. [Citation Graph (, )][DBLP]


  72. Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. [Citation Graph (, )][DBLP]


  73. Patterns and Pattern Diagrams for Access Control. [Citation Graph (, )][DBLP]


  74. Attacking Image Recognition Captchas - A Naive but Effective Approach. [Citation Graph (, )][DBLP]


  75. Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. [Citation Graph (, )][DBLP]


  76. Collaborative privacy management. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002