Follow
Pernul Günther
Pernul Günther
Professor für Wirtschaftsinformatik, Universität Regensburg
Verified email at wiwi.uni-regensburg.de - Homepage
Title
Cited by
Cited by
Year
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
C Lambrinoudakis, S Gritzalis, F Dridi, G Pernul
Computer communications 26 (16), 1873-1883, 2003
2342003
Ethertwin: Blockchain-based secure digital twin information management
B Putz, M Dietz, P Empl, G Pernul
Information Processing & Management 58 (1), 102425, 2021
1772021
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
1532004
Roles in information security–a survey and classification of the research area
L Fuchs, G Pernul, R Sandhu
computers & security 30 (8), 748-769, 2011
1482011
Security operations center: A systematic study and open challenges
M Vielberth, F Böhm, I Fichtinger, G Pernul
Ieee Access 8, 227756-227779, 2020
1452020
A pattern system for access control
T Priebe, EB Fernández, JI Mehlau, G Pernul
Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11 …, 2004
1272004
Towards OLAP security design—survey and research issues
T Priebe, G Pernul
Proceedings of the 3rd ACM International Workshop on Data Warehousing and …, 2000
1222000
Viewing business-process security from different perspectives
G Herrmann, G Pernul
International Journal of Electronic Commerce 3 (3), 89-103, 1999
981999
A pragmatic approach to conceptual modeling of OLAP security
T Priebe, G Pernul
Conceptual Modeling—ER 2001: 20th International Conference on Conceptual …, 2001
922001
Digital twin: Empowering enterprises towards a system-of-systems approach
M Dietz, G Pernul
Business & Information Systems Engineering 62, 179-184, 2020
902020
SSIBAC: self-sovereign identity based access control
R Belchior, B Putz, G Pernul, M Correia, A Vasconcelos, S Guerreiro
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
802020
Why have public key infrastructures failed so far?
J Lopez, R Oppliger, G Pernul
Internet Research 15 (5), 544-556, 2005
802005
A distributed ledger approach to digital twin secure data sharing
M Dietz, B Putz, G Pernul
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
792019
Towards integrative enterprise knowledge portals
T Priebe, G Pernul
Proceedings of the twelfth international conference on Information and …, 2003
792003
Measuring and visualizing cyber threat intelligence quality
D Schlette, F Böhm, M Caselli, G Pernul
International Journal of Information Security 20, 21-38, 2021
762021
Trust, privacy and security in e-business: Requirements and solutions
SK Katsikas, J Lopez, G Pernul
Panhellenic Conference on Informatics, 548-558, 2005
752005
Ontology-based integration of OLAP and information retrieval
T Priebe, G Pernul
14th International Workshop on Database and Expert Systems Applications …, 2003
752003
A comparative study on cyber threat intelligence: The security incident response perspective
D Schlette, M Caselli, G Pernul
IEEE Communications Surveys & Tutorials 23 (4), 2525-2556, 2021
742021
Generating user-understandable privacy preferences
J Kolter, G Pernul
2009 International Conference on Availability, Reliability and Security, 299-306, 2009
722009
COPS: a model and infrastructure for secure and fair electronic markets
AW Rohm, G Pernul
Proceedings of the 32nd Annual Hawaii International Conference on Systems …, 1999
671999
The system can't perform the operation now. Try again later.
Articles 1–20