Search the dblp DataBase
Günther Pernul :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Günther Pernul Canonical Security Modeling for Federated Databases. [Citation Graph (3, 0)][DBLP ] DS-5, 1992, pp:207-222 [Conf ] Günther Pernul , Hubert Hasenauer Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma [Citation Graph (2, 0)][DBLP ] DEXA, 1995, pp:177-186 [Conf ] Shamkant B. Navathe , Günther Pernul Conceptual and Logical Design of Relational Databases. [Citation Graph (2, 0)][DBLP ] Advances in Computers, 1992, v:35, n:, pp:1-80 [Journal ] Günther Pernul , Kamalakar Karlapalem , Shamkant B. Navathe Relational Database Organization Based on Views and Fragments. [Citation Graph (1, 0)][DBLP ] DEXA, 1991, pp:380-386 [Conf ] Günther Pernul , Werner Winiwarter , A. Min Tjoa The Entity-Relationship Model for Multilevel Security. [Citation Graph (1, 8)][DBLP ] ER, 1993, pp:166-177 [Conf ] Günther Pernul , A. Min Tjoa A View Integration Approach for the Design of Multilevel Security. [Citation Graph (1, 13)][DBLP ] ER, 1991, pp:483-509 [Conf ] Günther Pernul Database Security. [Citation Graph (1, 0)][DBLP ] Advances in Computers, 1994, v:38, n:, pp:1-72 [Journal ] Günther Pernul 11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). [Citation Graph (1, 0)][DBLP ] Datenbank Rundbrief, 1993, v:11, n:, pp:9- [Journal ] Alexander W. Röhm , Gaby Herrmann , Günther Pernul A Language for Modeling Secure Business Transactions. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:22-0 [Conf ] Alexander W. Röhm , Günther Pernul , Gaby Herrmann Modeling Secure and Fair Electronic Commerce. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:155-0 [Conf ] Günther Pernul , Alexander W. Röhm , Gaby Herrmann Trust for Electronic Commerce Transactions. [Citation Graph (0, 1)][DBLP ] ADBIS, 1999, pp:1-13 [Conf ] Fredj Dridi , Björn Muschall , Günther Pernul An Administration Console for the CSAP System. [Citation Graph (0, 0)][DBLP ] CAiSE Short Paper Proceedings, 2003, pp:- [Conf ] Torsten Priebe , Günther Pernul Towards integrative enterprise knowledge portals. [Citation Graph (0, 0)][DBLP ] CIKM, 2003, pp:216-223 [Conf ] Wolfgang Eßmayr , Günther Pernul , A. Min Tjoa Access Controls by Object-Oriented Concepts. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:325-340 [Conf ] Sönke Busch , Björn Muschall , Günther Pernul , Torsten Priebe Authrule: A Generic Rule-Based Authorization Module. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:267-281 [Conf ] Gottfried Luef , Günther Pernul Supporting Range Queries in Multilevel-Secure Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:117-130 [Conf ] Günther Pernul Security Object Modelling for Level-Based Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:374- [Conf ] Torsten Priebe , Eduardo B. Fernández , Jens Ingo Mehlau , Günther Pernul A Pattern System for Access Control. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:235-249 [Conf ] Ernst Ellmer , Christian Huemer , Dieter Merkl , Günther Pernul Automatic Classification of Semantic Concepts in View Specifications. [Citation Graph (0, 0)][DBLP ] DEXA, 1996, pp:824-833 [Conf ] Torsten Priebe , Björn Muschall , Wolfgang Dobmeier , Günther Pernul A Flexible Security System for Enterprise and e-Government Portals. [Citation Graph (0, 0)][DBLP ] DEXA, 2004, pp:884-893 [Conf ] Wolfgang Eßmayr , Elisabeth Kapsammer , Roland Wagner , Günther Pernul , A. Min Tjoa Enterprise-Wide Security Administration. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:267-272 [Conf ] Javier Lopez , Günther Pernul Message from the TrustBus Workshop Chairs. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:409-412 [Conf ] Torsten Priebe , Günther Pernul Ontology-based Integration of OLAP and Information Retrieval. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:610-614 [Conf ] Torsten Priebe , Christian Schläger , Günther Pernul A Search Engine for RDF Metadata. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2004, pp:168-172 [Conf ] Torsten Priebe , Günther Pernul Towards OLAP Security Design - Survey and Research Issues. [Citation Graph (0, 0)][DBLP ] DOLAP, 2000, pp:33-40 [Conf ] Richard Baskerville , Gurpreet Dhillon , Günther Pernul , Filipe de Sá-Soares Panel: Information systems security standards: The solution or the problem? [Citation Graph (0, 0)][DBLP ] ECIS, 2005, pp:- [Conf ] Günther Pernul Trust for Digital Products. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:1-5 [Conf ] Christian Schläger , Günther Pernul Authentication and Authorisation Infrastructures in b2c e-Commerce. [Citation Graph (0, 0)][DBLP ] EC-Web, 2005, pp:306-315 [Conf ] Christian Schläger , Manuel Sojer , Björn Muschall , Günther Pernul Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. [Citation Graph (0, 0)][DBLP ] EC-Web, 2006, pp:132-141 [Conf ] Wolfgang Dobmeier , Günther Pernul Modellierung von Zugriffsrichtlinien für offene Systeme. [Citation Graph (0, 0)][DBLP ] EMISA, 2006, pp:35-47 [Conf ] Ernst Ellmer , Christian Huemer , Dieter Merkl , Günther Pernul Neural Network Technology to Support View Integration. [Citation Graph (0, 14)][DBLP ] OOER, 1995, pp:181-190 [Conf ] Torsten Priebe , Günther Pernul A Pragmatic Approach to Conceptual Modeling of OLAP Security. [Citation Graph (0, 0)][DBLP ] ER, 2001, pp:311-324 [Conf ] Günther Pernul Security Constraint Processing in Multilevel Secure AMAC Schemata. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:349-370 [Conf ] Javier Lopez , Rolf Oppliger , Günther Pernul Classifying Public Key Certificates. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:135-143 [Conf ] Fredj Dridi , Günther Pernul Webocrat: Ein Bürgerportal für e-democracy. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (2), 2003, pp:229-231 [Conf ] Fredj Dridi , Björn Muschall , Günther Pernul Administration of an RBAC System. [Citation Graph (0, 0)][DBLP ] HICSS, 2004, pp:- [Conf ] Günther Pernul , Alexander W. Röhm COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. [Citation Graph (0, 0)][DBLP ] HICSS, 1999, pp:- [Conf ] Wolfgang Eßmayr , Fritz Kastner , Günther Pernul , Stefan Preishuber , A. Min Tjoa Authorization and Access Control in IRO-DB. [Citation Graph (0, 11)][DBLP ] ICDE, 1996, pp:40-47 [Conf ] Sokratis K. Katsikas , Javier Lopez , Günther Pernul Trust, Privacy and Security in E-Business: Requirements and Solutions. [Citation Graph (0, 0)][DBLP ] Panhellenic Conference on Informatics, 2005, pp:548-558 [Conf ] Fredj Dridi , Michael Fischer , Günther Pernul CSAP - An Adaptable Security Module for the E-Government System Webocrat. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:301-312 [Conf ] Wolfgang Eßmayr , Fritz Kastner , Günther Pernul , A. Min Tjoa The security architecture of IRO-DB. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:249-258 [Conf ] Torsten Priebe , Wolfgang Dobmeier , Björn Muschall , Günther Pernul ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle. [Citation Graph (0, 0)][DBLP ] Sicherheit, 2005, pp:285-296 [Conf ] Günther Pernul , A. Min Tjoa , J. T. Hotz-Behofsits Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. [Citation Graph (0, 0)][DBLP ] VIS, 1993, pp:371-393 [Conf ] Torsten Priebe , Günther Pernul , Peter Krause Ein integrativer Ansatz für unternehmensweite Wissensportale. [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik (2), 2003, pp:277-292 [Conf ] Costas Lambrinoudakis , Stefanos Gritzalis , Fredj Dridi , Günther Pernul Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2003, v:26, n:16, pp:1873-1883 [Journal ] Javier Lopez , Rolf Oppliger , Günther Pernul Authentication and authorization infrastructures (AAIs): a comparative survey. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:7, pp:578-590 [Journal ] Sokratis K. Katsikas , Javier Lopez , Günther Pernul Editorial. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal ] Sokratis K. Katsikas , Javier Lopez , Günther Pernul Trust, privacy and security in digital business. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal ] Günther Pernul , A. Min Tjoa , Werner Winiwarter Modelling Data Secrecy and Integrity. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1998, v:26, n:3, pp:291-308 [Journal ] Dieter Merkl , Günther Pernul Security for next generation hypertext systems. [Citation Graph (0, 0)][DBLP ] Hypermedia, 1994, v:6, n:1, pp:1-18 [Journal ] Günther Pernul An Unnormalized Relational Data Model Based On User Views. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1987, v:16, n:2, pp:51-60 [Journal ] Günther Pernul , Gottfried Luef Bibliography on Database Security. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1992, v:21, n:1, pp:105-122 [Journal ] Gaby Herrmann , Günther Pernul Zur Bedeutung von Sicherheit in interorganisationellen Workflows. [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 1997, v:39, n:3, pp:217-224 [Journal ] Günther Pernul , Alexander W. Röhm Neuer Markt - neues Geld? [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 1997, v:39, n:4, pp:345-355 [Journal ] Jan Kolter , Rolf Schillinger , Günther Pernul A Privacy-Enhanced Attribute-Based Access Control System. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:129-143 [Conf ] Roland Erber , Christian Schläger , Günther Pernul Patterns for Authentication and Authorisation Infrastructures. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2007, pp:755-759 [Conf ] Wolfgang Dobmeier , Günther Pernul Towards Privacy-Aware Handling of Authorizations. [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:70-76 [Conf ] Günther Pernul , Marco Casassa Mont , Eduardo B. Fernández , Sokratis K. Katsikas , Alfred Kobsa , Rolf Oppliger Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:2- [Conf ] Alexander W. Röhm , Günther Pernul COPS: a model and infrastructure for secure and fair electronic markets. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2000, v:29, n:4, pp:343-355 [Journal ] Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. [Citation Graph (, )][DBLP ] Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. [Citation Graph (, )][DBLP ] Intensive Programme on Information and Communication Security. [Citation Graph (, )][DBLP ] Generating User-Understandable Privacy Preferences. [Citation Graph (, )][DBLP ] Different Approaches to In-House Identity Management - Justification of an Assumption. [Citation Graph (, )][DBLP ] Visualizing Past Personal Data Disclosures. [Citation Graph (, )][DBLP ] A Semantic Security Architecture for Web Services. [Citation Graph (, )][DBLP ] Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. [Citation Graph (, )][DBLP ] Integrating Security Patterns into the Electronic Invoicing Process. [Citation Graph (, )][DBLP ] HyDRo - Hybrid Development of Roles. [Citation Graph (, )][DBLP ] Building a Distributed Semantic-aware Security Architecture. [Citation Graph (, )][DBLP ] Collaborative Privacy - A Community-Based Privacy Infrastructure. [Citation Graph (, )][DBLP ] Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. [Citation Graph (, )][DBLP ] Patterns and Pattern Diagrams for Access Control. [Citation Graph (, )][DBLP ] Attacking Image Recognition Captchas - A Naive but Effective Approach. [Citation Graph (, )][DBLP ] Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. [Citation Graph (, )][DBLP ] Collaborative privacy management. [Citation Graph (, )][DBLP ] Search in 0.048secs, Finished in 0.051secs