Pernul Günther
Pernul Günther
Professor für Wirtschaftsinformatik, Universität Regensburg
E-mail confirmado em - Página inicial
Citado por
Citado por
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
C Lambrinoudakis, S Gritzalis, F Dridi, G Pernul
Computer communications 26 (16), 1873-1883, 2003
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
Roles in information security–a survey and classification of the research area
L Fuchs, G Pernul, R Sandhu
computers & security 30 (8), 748-769, 2011
A pattern system for access control
T Priebe, EB Fernández, JI Mehlau, G Pernul
Research Directions in Data and Applications Security XVIII, 235-249, 2004
Towards OLAP security design—survey and research issues
T Priebe, G Pernul
Proceedings of the 3rd ACM International Workshop on Data Warehousing and …, 2000
A pragmatic approach to conceptual modeling of OLAP security
T Priebe, G Pernul
International Conference on Conceptual Modeling, 311-324, 2001
Viewing business-process security from different perspectives
G Herrmann, G Pernul
International Journal of Electronic Commerce 3 (3), 89-103, 1999
Towards integrative enterprise knowledge portals
T Priebe, G Pernul
Proceedings of the twelfth international conference on Information and …, 2003
Why have public key infrastructures failed so far?
J Lopez, R Oppliger, G Pernul
Internet Research, 2005
Ontology-based integration of OLAP and information retrieval
T Priebe, G Pernul
14th International Workshop on Database and Expert Systems Applications …, 2003
Trust, privacy and security in e-business: Requirements and solutions
SK Katsikas, J Lopez, G Pernul
Panhellenic Conference on Informatics, 548-558, 2005
COPS: a model and infrastructure for secure and fair electronic markets
AW Rohm, G Pernul
Proceedings of the 32nd Annual Hawaii International Conference on Systems …, 1999
Database security
G Pernul
Advances in Computers 38, 1-72, 1994
Generating user-understandable privacy preferences
J Kolter, G Pernul
2009 International Conference on Availability, Reliability and Security, 299-306, 2009
Privacy Settings in Online Social Networks--Preferences, Perception, and Reality
M Netter, M Riesner, M Weber, G Pernul
2013 46th Hawaii International Conference on System Sciences, 3219-3228, 2013
Using security patterns to develop secure systems
EB Fernandez, N Yoshioka, H Washizaki, J Jurjens, M VanHilst, G Pernu
Software Engineering for Secure Systems: Industrial and Research …, 2011
Canonical security modeling for federated databases
G Pernul
Interoperable Database Systems (DS-5), 207-222, 1993
Using attribute certificates to implement role-based authorization and access controls
R Oppliger, G Pernul, C Strauss
Sicherheit in Informationssystemen (SIS 2000), 169-184, 2000
Information systems security: Scope, state-of-the-art, and evaluation of techniques
G Pernul
International journal of information management 15 (3), 165-180, 1995
Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz
G Pernul, R Unland
Walter de Gruyter, 2009
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20