Pernul Günther
Pernul Günther
Professor für Wirtschaftsinformatik, Universität Regensburg
Verified email at wiwi.uni-regensburg.de - Homepage
TitleCited byYear
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
C Lambrinoudakis, S Gritzalis, F Dridi, GN Pernul
Computer Communications 26 (16), 1873-1883, 2003
1802003
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
1382004
A pattern system for access control
T Priebe, EB Fernández, JI Mehlau, G Pernul
Research Directions in Data and Applications Security XVIII, 235-249, 2004
1152004
Towards OLAP security design- survey and research issues
T Priebe, G Pernul
Data Warehousing and OLAP: Proceedings of the 3 rd ACM international …, 2000
1022000
Roles in information security–a survey and classification of the research area
L Fuchs, G Pernul, R Sandhu
computers & security 30 (8), 748-769, 2011
992011
A pragmatic approach to conceptual modeling of OLAP security
T Priebe, G Pernul
International Conference on Conceptual Modeling, 311-324, 2001
872001
Viewing business-process security from different perspectives
G Herrmann, G Pernul
International Journal of Electronic Commerce 3 (3), 89-103, 1999
831999
Towards integrative enterprise knowledge portals
T Priebe, G Pernul
Proceedings of the twelfth international conference on Information and …, 2003
742003
Why have public key infrastructures failed so far?
J Lopez, R Oppliger, G Pernul
Internet Research 15 (5), 544-556, 2005
692005
Trust, privacy and security in e-business: Requirements and solutions
SK Katsikas, J Lopez, G Pernul
Panhellenic Conference on Informatics, 548-558, 2005
682005
Ontology-based integration of OLAP and information retrieval
T Priebe, G Pernul
14th International Workshop on Database and Expert Systems Applications …, 2003
662003
Database security
G Pernul
Advances in computers 38, 1-72, 1994
581994
COPS: a model and infrastructure for secure and fair electronic markets
AW Rohm, G Pernul
Proceedings of the 32nd Annual Hawaii International Conference on Systems …, 1999
561999
Generating user-understandable privacy preferences
J Kolter, G Pernul
2009 International Conference on Availability, Reliability and Security, 299-306, 2009
492009
Canonical security modeling for federated databases
G Pernul
Interoperable Database Systems (DS-5), 207-222, 1993
471993
An integrated model of influential antecedents of online shopping initial trust: Empirical evidence in a low-trust environment
M Zhou, D Tian
Journal of International Consumer Marketing 22 (2), 147-167, 2010
462010
Privacy Settings in Online Social Networks--Preferences, Perception, and Reality
M Netter, M Riesner, M Weber, G Pernul
2013 46th Hawaii International Conference on System Sciences, 3219-3228, 2013
452013
Role-based access controls: Status, dissemination, and prospects for generic security mechanisms
W Essmayr, S Probst, E Weippl
Electronic Commerce Research 4 (1-2), 127-156, 2004
422004
Using attribute certificates to implement role-based authorization and access controls
R Oppliger, G Pernul, C Strauss
Sicherheit in Informationssystemen (SIS 2000), 169-184, 2000
412000
Using security patterns to develop secure systems
EB Fernandez, N Yoshioka, H Washizaki, J Jurjens, M VanHilst, G Pernu
Software Engineering for Secure Systems: Industrial and Research …, 2011
392011
The system can't perform the operation now. Try again later.
Articles 1–20