- Kolter, Jan, Netter, Michael und Pernul, Günther (2010). Visualizing Past Personal Data Disclosures.
Proc. of the Fifth International Conference on Availability, Reliability and Security (ARES 2010). IEEE Computer Society, Krakow, Poland - Fuchs, Ludwig (2010). Methodology for Hybrid Role Development.
, 69 EUL-Verlag, Lohmar, ISBN 978-3-89936-978-6. - Broser, Christian, Fritsch, Christoph, Gmelch, Oliver und Pernul, Günther (2009). Impact Analysis of Collaborative Platforms - The Case of SPIKE.
IFAC, Workshop SWIIS (Supplementary Ways for Improving International Stability). - Netter, Michael und Pernul, Günther (2009). Integrating security patterns into the electronic invoicing process.
in: A. Min Tjoa und Roland Wagner (eds.) Proc. of the 20th International Workshop on Database and Expert Systems Applications (DEXA 2009). IEEE Computer Society Press, Los Alamitos, Calif., 150-154. ISBN 978-0-7695-3763-4. - Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther, Schillinger, Rolf und Wiesbeck, Sandra (2009). Analyzing Requirements for Virtual Business Alliances -the case of SPIKE.
Proceedings of the The First International ICST Conference on Digital Business (DigiBiz 2009), London, UK. Springer, Heidelberg, ISBN 978-963-9799-56-1. - Broser, Christian, Fritsch, Christoph, Gmelch, Oliver, Pernul, Günther und Schillinger, Rolf (2009). SPIKE - A Collaboration Platform for Short-Term Virtual Business Alliances.
Proceedings of the Workshop on Technological trends in Enterprise Systems for SMEs and large enterprises: Heading towards the Future Internet, London, UK während der DIGIBIZ 2009. Springer, Heidelberg, ISBN 978-963-9799-56-1. - Kolter, Jan, Kernchen, Thomas und Pernul, Günther (2009). Collaborative Privacy - A Community-based Privacy Infrastructure.
, 297 in: Dimitris Gritzalis und Javier Lopez (eds.) Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings. Springer, Berlin, ISBN 978-3-642-01243-3. - Fuchs, Ludwig, Pernul, Günther und Broser, Christian (2009). Different Approaches to in-house Identity Management.
Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan, ISBN 978-07695-35647. - Fuchs, Ludwig, Pernul, Günther und Broser, Christian (2009). Different Approaches to in-house Identity Management.
Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan, ISBN 978-07695-35647. - Kolter, Jan und Pernul, Günther (2009). Generating User-understandable Privacy Preferences.
4th International Conference on Availability, Reliability and Security (ARES 2009), Fukuoka, Japan, March 2009 Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan, ISBN 978-07695-35647. - Fuchs, Ludwig und Müller, Christian (2009). Automating Periodic Role-Checks: A Tool-based Approach.
, 246 in: und (eds.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Oesterreichische Computer Gesellschaft, Wien, ISBN 978-3-85403-246-5. - Fuchs, Ludwig und Pernul, Günther (2008). HyDRo - Hybrid Development of Roles.
, 5352 in: R. Sekar und Arun K. Pujari (eds.) Information systems security: 4th international conference; proceedings / ICISS 2008, Hyderabad, India, December 16 - 20, 2008. Springer, Berlin, 287-302. ISBN 978-3-540-89861-0.
https://dx.doi.org/10.1007/978-3-540-89862-7 - Fuchs, Ludwig und Pernul, Günther (2008). HyDRo - Hybrid Development of Roles.
, 5352 in: R. Sekar und Arun K. Pujari (eds.) Information systems security: 4th international conference; proceedings / ICISS 2008, Hyderabad, India, December 16 - 20, 2008. Springer, Berlin, 287-302. ISBN 978-3-540-89861-0.
https://dx.doi.org/10.1007/978-3-540-89862-7 - Fuchs, Ludwig und Preis, Anton (2008). BusiROLE: A Model for Integrating Business Roles into Identity Management.
, 5185 in: und (eds.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Springer, Berlin, 128-138. ISBN 978-3-540-85734-1.
https://dx.doi.org/10.1007/978-3-540-85735-8_13 - Fernandez, Eduardo B., Pernul, Günther und Larrando-Petrie, Maria M. (2008). Patterns and Pattern Diagrams for Access Control.
, 5185 in: und (eds.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Springer, Berlin, 38-47. ISBN 978-3-540-85734-1.
https://dx.doi.org/10.1007/978-3-540-85735-8 - Schläger, Christian, Fuchs, Ludwig und Pernul, Günther (2008). Intensive Programme on Information and Communication Security.
in: und (eds.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., 752-757. ISBN 978-0-7695-3102-1.
https://dx.doi.org/10.1109/ARES.2008.73 - Schläger, Christian, Fuchs, Ludwig und Pernul, Günther (2008). Intensive Programme on Information and Communication Security.
in: und (eds.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., 752-757. ISBN 978-0-7695-3102-1.
https://dx.doi.org/10.1109/ARES.2008.73 - Schläger, Christian und Pernul, Günther (2008). Trust Modelling in E-Commerce through Fuzzy Cognitive Maps.
in: und (eds.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., 344-351. ISBN 978-0-7695-3102-1; 0-7695-3102-4.
https://dx.doi.org/10.1109/ARES.2008.23 - Pernul, Günther (2008). Data-Centric Applications.
in: Steven Furnell Sokratis K. Katsikas Javier Lopez und Ahmed Patel (eds.) Securing Information and Communication Systems: Principles, Technologies and Applications. Artech House, Boston, 87-103. ISBN 978-1-59693-228-9; 1-59693-228-7. - Fuchs, Ludwig und Pernul, Günther (2008). proROLE: A Process-oriented Lifecycle Model for Role Systems.
Proceedings of the 16th European Conference on Information Systems (ECIS 2008), Galway, Ireland, June 9-11, 2008. Springer, Berlin, 1322-1333. ISBN 9780955315923. - Fuchs, Ludwig und Pernul, Günther (2008). proROLE: A Process-oriented Lifecycle Model for Role Systems.
Proceedings of the 16th European Conference on Information Systems (ECIS 2008), Galway, Ireland, June 9-11, 2008. Springer, Berlin, 1322-1333. ISBN 9780955315923. - Erber, Roland, Schläger, Christian und Pernul, Günther (2007). Patterns for Authentication and Authorisation Infrastructures.
in: und (eds.) Proceedings / 18th International Conference on Database and Expert Systems Applications, DEXA 2007 Regensburg, Germany, 3 - 7 September 2007. IEEE Computer Society, Los Alamitos, Calif., 755-759. ISBN 978-0-7695-2932-5.
https://dx.doi.org/10.1109/DEXA.2007.4 - Schläger, Christian, Priebe, Torsten, Liewald, Manuel und Pernul, Günther (2007). Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures.
in: M. Lynne Markus J. Felix Hampe Joze Gricar Andreja Pucihar und Gregor Lenart (eds.) Proceedings of the 20th Bled eConference "eMergence" (Bled'07), Bled, Slovenia, June 3 - 6 2007. Faculty of Organizational Sciences, Kranj, ISBN 978-961-232-204-5. - Dobmeier, Wolfgang und Pernul, Günther (2007). Towards Privacy-Aware Handling of Authorizations.
Policy 2007: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks: proceedings: Bologna, Italy, 13-15 June, 2007. IEEE Computer Society, Los Alamitos, Calif., 70-76. ISBN 0-7695-2767-1.
https://dx.doi.org/10.1109/POLICY.2007.47 - Kolter, Jan, Schillinger, Rolf und Pernul, Günther (2007). Building a Distributed Semantic-aware Security Architecture.
in: Hein Venter Mariki Eloff Les Labuschagne Jan Eloff und Rossouw von Solms (eds.) New approaches for security, privacy and trust in complex environments: proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. Springer, New York, 397-408. ISBN 978-0-387-72366-2; 0-387-72366-8.
https://dx.doi.org/10.1007/978-0-387-72367-9_34