99Privacy Settings in Online Social Networks - Preferences, Perception, and Reality. Michael Netter, Moritz Riesner, Michael Weber, Günther Pernul. HICSS 2013, 3219-3228. Web SearchBibTeXDownload
98Qualitätssicherung im Identity- und Access Management. Ludwig Fuchs, Günther Pernul. HMD - Praxis Wirtschaftsinform. (289) (2013). Web SearchBibTeXDownload
97Managing the Access Grid - A Process View to Minimize Insider Misuse Risks. Stefan Meier, Ludwig Fuchs, Günther Pernul. Wirtschaftsinformatik 2013, 66. Web SearchBibTeXDownload
96An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites. Moritz Riesner, Michael Netter, Günther Pernul. ARES 2012, 103-112. Web SearchBibTeXDownload
95A Generic Architecture for User-Centric Portlet Integration. Oliver Gmelch, Günther Pernul. CEC 2012, 70-77. Web SearchBibTeXDownload
94Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking Sites. Moritz Riesner, Günther Pernul. HICSS 2012, 800-809. Web SearchBibTeXDownload
93User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. Christoph Fritsch, Günther Pernul. ICEBE 2012, 193-200. Web SearchBibTeXDownload
92Minimizing insider misuse through secure Identity Management. Ludwig Fuchs, Günther Pernul. Security and Communication Networks (5): 847-862 (2012). Web SearchBibTeXDownload
91Maintaining a Consistent Representation of Self across Multiple Social Networking Sites - A Data-centric Perspective. Moritz Riesner, Günther Pernul. SocialCom/PASSAT 2012, 860-867. Web SearchBibTeXDownload
90An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. Michael Netter, Sabri Hassan, Günther Pernul. TrustBus 2012, 65-78. Web SearchBibTeXDownload
89Roles in information security - A survey and classification of the research area. Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu. Computers & Security (30): 748-769 (2011). Web SearchBibTeXDownload
88DS3I - A Dynamic Semantically Enhanced Service Selection Infrastructure. Christoph Fritsch, Peter Bednár, Günther Pernul. EC-Web 2011, 13-24. Web SearchBibTeXDownload
87Conceptual Design of Secure Databases. Günther Pernul, Moritz Riesner. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 245-248. Web SearchBibTeXDownload
86Eine verteilte Autorisierungsinfrastruktur unter Berücksichtigung von Datenschutzaspekten. Stefan Dürbeck, Jan Kolter, Günther Pernul, Rolf Schillinger. Informatik Spektrum (34): 265-275 (2011). Web SearchBibTeXDownload
85Analyzing Privacy in Social Networks-An Interdisciplinary Approach. Michael Netter, Sebastian Herbst, Günther Pernul. SocialCom/PASSAT 2011, 1327-1334. Web SearchBibTeXDownload
84A portal-based approach for user-centric legacy application integration in collaborative environments. Oliver Gmelch, Günther Pernul. Wirtschaftsinformatik 2011, 45. Web SearchBibTeXDownload
83Assisted Social Identity Management. Michael Netter, Moritz Riesner, Günther Pernul. Wirtschaftsinformatik 2011, 6. Web SearchBibTeXDownload
82Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. Michael Netter, Eduardo B. Fernández, Günther Pernul. ARES 2010, 560-564. Web SearchBibTeXDownload
81Visualizing Past Personal Data Disclosures. Jan Kolter, Michael Netter, Günther Pernul. ARES 2010, 131-139. Web SearchBibTeXDownload
80A Semantic Security Architecture for Web Services. Stefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger. ARES 2010, 222-227. Web SearchBibTeXDownload
79Collaborative privacy management. Jan Kolter, Thomas Kernchen, Günther Pernul. Computers & Security (29): 580-591 (2010). Web SearchBibTeXDownload
786th International Workshop on Foundations and Practices of UML (FP-UML 2010). Günther Pernul, Matti Rossi. ER Workshops 2010, 242. Web SearchBibTeXDownload
77Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals. Oliver Gmelch, Günther Pernul. SECRYPT 2010, 177-182. Web SearchBibTeX
76Attacking Image Recognition Captchas - A Naive but Effective Approach. Christoph Fritsch, Michael Netter, Andreas Reisser, Günther Pernul. TrustBus 2010, 13-25. Web SearchBibTeXDownload
75Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. Christoph Fritsch, Günther Pernul. TrustBus 2010, 214-226. Web SearchBibTeXDownload
74Generating User-Understandable Privacy Preferences. Jan Kolter, Günther Pernul. ARES 2009, 299-306. Web SearchBibTeXDownload
73Different Approaches to In-House Identity Management - Justification of an Assumption. Ludwig Fuchs, C. Broser, Günther Pernul. ARES 2009, 122-129. Web SearchBibTeXDownload
72Integrating Security Patterns into the Electronic Invoicing Process. Michael Netter, Günther Pernul. DEXA Workshops 2009, 150-154. Web SearchBibTeXDownload
71Analysing Requirements for Virtual Business Alliances - The Case of SPIKE. Christian Broser, Christoph Fritsch, Oliver Gmelch, Günther Pernul, Rolf Schillinger, Sandra Wiesbeck. DigiBiz 2009, 35-44. Web SearchBibTeXDownload
70Collaborative Privacy - A Community-Based Privacy Infrastructure. Jan Kolter, Thomas Kernchen, Günther Pernul. SEC 2009, 226-236. Web SearchBibTeXDownload
69Intensive Programme on Information and Communication Security. Christian Schläger, Ludwig Fuchs, Günther Pernul. ARES 2008, 752-757. Web SearchBibTeXDownload
68Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. Christian Schläger, Günther Pernul. ARES 2008, 344-351. Web SearchBibTeXDownload
67Prorole: A Process-Oriented Lifecycle Model for Role Systems Leveraging Identity Management and Guiding Role Projects. Ludwig Fuchs, Günther Pernul. ECIS 2008, 1322-1333. Web SearchBibTeXDownload
66HyDRo - Hybrid Development of Roles. Ludwig Fuchs, Günther Pernul. ICISS 2008, 287-302. Web SearchBibTeXDownload
65Patterns and Pattern Diagrams for Access Control. Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie. TrustBus 2008, 38-47. Cited by 3Web SearchBibTeXDownload
64Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. Ludwig Fuchs, Günther Pernul. ARES 2007, 374-384. Web SearchBibTeXDownload
63A Privacy-Enhanced Attribute-Based Access Control System. Jan Kolter, Rolf Schillinger, Günther Pernul. DBSec 2007, 129-143. Web SearchBibTeXDownload
62Patterns for Authentication and Authorisation Infrastructures. Roland Erber, Christian Schläger, Günther Pernul. DEXA Workshops 2007, 755-759. Web SearchBibTeXDownload
61Towards Privacy-Aware Handling of Authorizations. Wolfgang Dobmeier, Günther Pernul. POLICY 2007, 70-76. Web SearchBibTeXDownload
60Building a Distributed Semantic-aware Security Architecture. Jan Kolter, Rolf Schillinger, Günther Pernul. SEC 2007, 397-408. Web SearchBibTeXDownload
59Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. Günther Pernul. SECRYPT 2007, 17. Web SearchBibTeX
58Panel Discussion: Managing Digital Identities - Challenges and Opportunities. Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger. TrustBus 2007, 2. Web SearchBibTeXDownload
57Authrule: A Generic Rule-Based Authorization Module. Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe. DBSec 2006, 267-281. Web SearchBibTeXDownload
56Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. Christian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul. EC-Web 2006, 132-141. Web SearchBibTeXDownload
55Modellierung von Zugriffsrichtlinien für offene Systeme. Wolfgang Dobmeier, Günther Pernul. EMISA 2006, 35-47. Web SearchBibTeXDownload
54Trust, privacy and security in digital business. Sokratis K. Katsikas, Javier Lopez, Günther Pernul. Comput. Syst. Sci. Eng. (20) (2005). Web SearchBibTeX
53Panel: Information systems security standards: The solution or the problem?. Richard Baskerville, Gurpreet Dhillon, Günther Pernul, Filipe de Sá-Soares. ECIS 2005, 1780-1782. Web SearchBibTeXDownload
52Authentication and Authorisation Infrastructures in b2c e-Commerce. Christian Schläger, Günther Pernul. EC-Web 2005, 306-315. Web SearchBibTeXDownload
51Classifying Public Key Certificates. Javier Lopez, Rolf Oppliger, Günther Pernul. EuroPKI 2005, 135-143. Web SearchBibTeXDownload
50Why have public key infrastructures failed so far?. Javier Lopez, Rolf Oppliger, Günther Pernul. Internet Research (15): 544-556 (2005). Web SearchBibTeXDownload
49Trust, Privacy and Security in E-Business: Requirements and Solutions. Sokratis K. Katsikas, Javier Lopez, Günther Pernul. Panhellenic Conference on Informatics 2005, 548-558. Web SearchBibTeXDownload
48ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle. Torsten Priebe, Wolfgang Dobmeier, Björn Muschall, Günther Pernul. Sicherheit 2005, 285-296. Web SearchBibTeXDownload
47Authentication and authorization infrastructures (AAIs): a comparative survey. Javier Lopez, Rolf Oppliger, Günther Pernul. Computers & Security (23): 578-590 (2004). Web SearchBibTeXDownload
46A Pattern System for Access Control. Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul. DBSec 2004, 235-249. Web SearchBibTeX
45A Flexible Security System for Enterprise and e-Government Portals. Torsten Priebe, Björn Muschall, Wolfgang Dobmeier, Günther Pernul. DEXA 2004, 884-893. Web SearchBibTeXDownload
44A Search Engine for RDF Metadata. Torsten Priebe, Christian Schläger, Günther Pernul. DEXA Workshops 2004, 168-172. Web SearchBibTeXDownload
43Administration of an RBAC System. Fredj Dridi, Björn Muschall, Günther Pernul. HICSS 2004. Web SearchBibTeXDownload
42An Administration Console for the CSAP System. Fredj Dridi, Björn Muschall, Günther Pernul. CAiSE Short Paper Proceedings 2003. Web SearchBibTeXDownload
41Towards integrative enterprise knowledge portals. Torsten Priebe, Günther Pernul. CIKM 2003, 216-223. Web SearchBibTeXDownload
40Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul. Computer Communications (26): 1873-1883 (2003). Web SearchBibTeXDownload
39Ontology-based Integration of OLAP and Information Retrieval. Torsten Priebe, Günther Pernul. DEXA Workshops 2003, 610-614. Web SearchBibTeXDownload
38Trust for Digital Products. Günther Pernul. EC-Web 2003, 1-5. Web SearchBibTeXDownload
37Webocrat: Ein Bürgerportal für e-democracy. Fredj Dridi, Günther Pernul. GI Jahrestagung (2) 2003, 229-231. Web SearchBibTeXDownload
36CSAP - An Adaptable Security Module for the E-Government System Webocrat. Fredj Dridi, Michael Fischer, Günther Pernul. SEC 2003, 301-312. Web SearchBibTeX
35Ein integrativer Ansatz für unternehmensweite Wissensportale. Torsten Priebe, Günther Pernul, Peter Krause. Wirtschaftsinformatik (2) 2003, 277-292. Web SearchBibTeXDownload
34Message from the TrustBus Workshop Chairs. Javier Lopez, Günther Pernul. DEXA Workshops 2002, 409-412. Web SearchBibTeXDownload
33A Pragmatic Approach to Conceptual Modeling of OLAP Security. Torsten Priebe, Günther Pernul. ER 2001, 311-324. Web SearchBibTeXDownload
32Metadaten-gestützter Data-Warehouse-Entwurf mit ADAPTed UML. Torsten Priebe, Günther Pernul. Wirtschaftsinformatik 2001, 8. Web SearchBibTeXDownload
31COPS: a model and infrastructure for secure and fair electronic markets. Alexander W. Röhm, Günther Pernul. Decision Support Systems (29): 343-355 (2000). Web SearchBibTeXDownload
30Towards OLAP Security Design - Survey and Research Issues. Torsten Priebe, Günther Pernul. DOLAP 2000, 33-40. Web SearchBibTeXDownload
29A Language for Modeling Secure Business Transactions. Alexander W. Röhm, Gaby Herrmann, Günther Pernul. ACSAC 1999, 22-31. Web SearchBibTeXDownload
28Trust for Electronic Commerce Transactions. Günther Pernul, Alexander W. Röhm, Gaby Herrmann. ADBIS 1999, 1-13. Web SearchBibTeXDownload
27COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. Günther Pernul, Alexander W. Röhm. HICSS 1999. Web SearchBibTeXDownload
26Sichere Geschäftstransaktionen auf Elektronischen Märkten. Gaby Herrmann, Alexander W. Röhm, Günther Pernul. Wirtschaftsinformatik 1999, 12. Web SearchBibTeXDownload
25Modeling Secure and Fair Electronic Commerce. Alexander W. Röhm, Günther Pernul, Gaby Herrmann. ACSAC 1998, 155-164. Web SearchBibTeXDownload
24Modelling Data Secrecy and Integrity. Günther Pernul, A. Min Tjoa, Werner Winiwarter. Data Knowl. Eng. (26): 291-308 (1998). Web SearchBibTeXDownload
23Enterprise-Wide Security Administration. Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, Günther Pernul, A. Min Tjoa. DEXA Workshop 1998, 267-272. Web SearchBibTeX
22Access Controls by Object-Oriented Concepts. Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa. DBSec 1997, 325-340. Web SearchBibTeX
21Zur Bedeutung von Sicherheit in interorganisationellen Workflows. Gaby Herrmann, Günther Pernul. Wirtschaftsinformatik (39): 217-224 (1997). Web SearchBibTeX
20Neuer Markt - neues Geld?. Günther Pernul, Alexander W. Röhm. Wirtschaftsinformatik (39): 345-355 (1997). Web SearchBibTeX
19Automatic Classification of Semantic Concepts in View Specifications. Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul. DEXA 1996, 824-833. Web SearchBibTeXDownload
18Authorization and Access Control in IRO-DB. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa. ICDE 1996, 40-47. Web SearchBibTeXDownload
17The security architecture of IRO-DB. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, A. Min Tjoa. SEC 1996, 249-258. Web SearchBibTeX
16Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma. Günther Pernul, Hubert Hasenauer. DEXA 1995, 177-186. Web SearchBibTeXDownload
15Neural Network Technology to Support View Integration. Ernst Ellmer, Christian Huemer, Dieter Merkl, Günther Pernul. OOER 1995, 181-190. Web SearchBibTeXDownload
14Database Security. Günther Pernul, Eduardo B. Fernández, C. Russel Szelag, David L. Wells. Advances in Computers (38): 1-72 (1994). Cited by 520Web SearchBibTeXDownload
13Security Object Modelling for Level-Based Policies. Günther Pernul. DBSec 1994, 374. Web SearchBibTeX
12Security for next generation hypertext systems. Dieter Merkl, Günther Pernul. Hypermedia (6): 1-18 (1994). Web SearchBibTeX
1111th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). Günther Pernul. Datenbank Rundbrief (11): 9 (1993). Web SearchBibTeX
10The Entity-Relationship Model for Multilevel Security. Günther Pernul, Werner Winiwarter, A. Min Tjoa. ER 1993, 166-177. Web SearchBibTeXDownload
9Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. Günther Pernul, A. Min Tjoa, J. T. Hotz-Behofsits. VIS 1993, 371-393. Web SearchBibTeX
8Conceptual and Logical Design of Relational Databases. Shamkant B. Navathe, Günther Pernul. Advances in Computers (35): 1-80 (1992). Web SearchBibTeXDownload
7Canonical Security Modeling for Federated Databases. Günther Pernul. DS-5 1992, 207-222. Web SearchBibTeX
6Security Constraint Processing in Multilevel Secure AMAC Schemata. Günther Pernul. ESORICS 1992, 349-370. Web SearchBibTeXDownload
5Bibliography on Database Security. Günther Pernul, Gottfried Luef. SIGMOD Record (21): 105-122 (1992). Web SearchBibTeXDownload
4Supporting Range Queries in Multilevel-Secure Databases. Gottfried Luef, Günther Pernul. DBSec 1991, 117-130. Web SearchBibTeX
3Relational Database Organization Based on Views and Fragments. Günther Pernul, Kamalakar Karlapalem, Shamkant B. Navathe. DEXA 1991, 380-386. Web SearchBibTeX
2A View Integration Approach for the Design of Multilevel Security. Günther Pernul, A. Min Tjoa. ER 1991, 483-509. Web SearchBibTeX
1An Unnormalized Relational Data Model Based On User Views. Günther Pernul. SIGMOD Record (16): 51-60 (1987). Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research