Pernul Günther
Pernul Günther
Professor für Wirtschaftsinformatik, Universität Regensburg
Verified email at wiwi.uni-regensburg.de - Homepage
Title
Cited by
Cited by
Year
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
C Lambrinoudakis, S Gritzalis, F Dridi, G Pernul
Computer communications 26 (16), 1873-1883, 2003
2092003
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
1462004
A pattern system for access control
T Priebe, EB Fernández, JI Mehlau, G Pernul
Research Directions in Data and Applications Security XVIII, 235-249, 2004
1232004
Roles in information security–a survey and classification of the research area
L Fuchs, G Pernul, R Sandhu
computers & security 30 (8), 748-769, 2011
1192011
Towards OLAP security design—survey and research issues
T Priebe, G Pernul
Proceedings of the 3rd ACM International Workshop on Data Warehousing and …, 2000
1112000
A pragmatic approach to conceptual modeling of OLAP security
T Priebe, G Pernul
International Conference on Conceptual Modeling, 311-324, 2001
902001
Viewing business-process security from different perspectives
G Herrmann, G Pernul
International Journal of Electronic Commerce 3 (3), 89-103, 1999
891999
Towards integrative enterprise knowledge portals
T Priebe, G Pernul
Proceedings of the twelfth international conference on Information and …, 2003
772003
Ontology-based integration of OLAP and information retrieval
T Priebe, G Pernul
14th International Workshop on Database and Expert Systems Applications …, 2003
722003
Why have public key infrastructures failed so far?
J Lopez, R Oppliger, G Pernul
Internet Research, 2005
712005
Trust, privacy and security in e-business: Requirements and solutions
SK Katsikas, J Lopez, G Pernul
Panhellenic Conference on Informatics, 548-558, 2005
702005
Database security
G Pernul
Advances in Computers 38, 1-72, 1994
621994
COPS: a model and infrastructure for secure and fair electronic markets
AW Rohm, G Pernul
Proceedings of the 32nd Annual Hawaii International Conference on Systems …, 1999
611999
Generating user-understandable privacy preferences
J Kolter, G Pernul
2009 International Conference on Availability, Reliability and Security, 299-306, 2009
592009
An integrated model of influential antecedents of online shopping initial trust: Empirical evidence in a low-trust environment
M Zhou, D Tian
Journal of International Consumer Marketing 22 (2), 147-167, 2010
522010
Privacy Settings in Online Social Networks--Preferences, Perception, and Reality
M Netter, M Riesner, M Weber, G Pernul
2013 46th Hawaii International Conference on System Sciences, 3219-3228, 2013
472013
Using security patterns to develop secure systems
EB Fernandez, N Yoshioka, H Washizaki, J Jurjens, M VanHilst, G Pernu
Software Engineering for Secure Systems: Industrial and Research …, 2011
472011
Canonical security modeling for federated databases
G Pernul
Interoperable Database Systems (DS-5), 207-222, 1993
461993
Using attribute certificates to implement role-based authorization and access controls
R Oppliger, G Pernul, C Strauss
Sicherheit in Informationssystemen (SIS 2000), 169-184, 2000
442000
Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz
G Pernul, R Unland
De Gruyter, 2003
432003
The system can't perform the operation now. Try again later.
Articles 1–20