|
Note: Links lead to the DBLP on the Web. Günther Pernul Fredj Dridi , Björn Muschall , Günther Pernul: Administration of an RBAC System. HICSS 2004 Fredj Dridi , Björn Muschall , Günther Pernul: An Administration Console for the CSAP System. CAiSE Short Paper Proceedings 2003 Torsten Priebe , Günther Pernul: Towards integrative enterprise knowledge portals. CIKM 2003 : 216-223 Torsten Priebe , Günther Pernul: Ontology-based Integration of OLAP and Information Retrieval. DEXA Workshops 2003 : 610- Günther Pernul: Trust for Digital Products. EC-Web 2003 : 1-5 Fredj Dridi , Günther Pernul: Webocrat: Ein Bürgerportal für e-democracy. GI Jahrestagung (2) 2003 : 229-231 Fredj Dridi , Michael Fischer , Günther Pernul: CSAP - An Adaptable Security Module for the E-Government System Webocrat. SEC 2003 : 301-312 Torsten Priebe , Günther Pernul, Peter Krause : Ein integrativer Ansatz für unternehmensweite Wissensportale. Wirtschaftsinformatik (2) 2003 : 277-292 Costas Lambrinoudakis , Stefanos Gritzalis , Fredj Dridi , Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26 (16): 1873-1883 (2003) Javier Lopez , Günther Pernul: Message from the TrustBus Workshop Chairs. DEXA Workshops 2002 : 409-412 Günther Pernul, Rainer Unland : Datenbanken im Unternehmen: Analyse, Modellbildung und Einsatz Oldenbourg 2001 Kurt Bauknecht , Sanjay Kumar Madria , Günther Pernul: Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings Springer 2001 Torsten Priebe , Günther Pernul: A Pragmatic Approach to Conceptual Modeling of OLAP Security. ER 2001 : 311-324 Kurt Bauknecht , Sanjay Kumar Madria , Günther Pernul: Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings Springer 2000 Torsten Priebe , Günther Pernul: Towards OLAP Security Design - Survey and Research Issues. DOLAP 2000 : 33-40 Alexander W. Röhm , Gaby Herrmann , Günther Pernul: A Language for Modeling Secure Business Transactions. ACSAC 1999 : 22- Günther Pernul, Alexander W. Röhm , Gaby Herrmann : Trust for Electronic Commerce Transactions. ADBIS 1999 : 1-13 Günther Pernul, Alexander W. Röhm : COPS: A Model and Infrastructure for Secure and Fair Electronic Markets. HICSS 1999 Alexander W. Röhm , Günther Pernul, Gaby Herrmann : Modeling Secure and Fair Electronic Commerce. ACSAC 1998 : 155- Wolfgang Eßmayr , Elisabeth Kapsammer , Roland Wagner , Günther Pernul, A. Min Tjoa : Enterprise-Wide Security Administration. DEXA Workshop 1998 : 267-272 Günther Pernul, A. Min Tjoa , Werner Winiwarter : Modelling Data Secrecy and Integrity. Data Knowl. Eng. 26 (3): 291-308 (1998) Wolfgang Eßmayr , Günther Pernul, A. Min Tjoa : Access Controls by Object-Oriented Concepts. DBSec 1997 : 325-340 Gaby Herrmann , Günther Pernul: Zur Bedeutung von Sicherheit in interorganisationellen Workflows. Wirtschaftsinformatik 39 (3): 217-224 (1997) Günther Pernul, Alexander W. Röhm : Neuer Markt - neues Geld? Wirtschaftsinformatik 39 (4): 345-355 (1997) Ernst Ellmer , Christian Huemer , Dieter Merkl , Günther Pernul: Automatic Classification of Semantic Concepts in View Specifications. DEXA 1996 : 824-833 Wolfgang Eßmayr , Fritz Kastner , Günther Pernul, Stefan Preishuber , A. Min Tjoa : Authorization and Access Control in IRO-DB. ICDE 1996 : 40-47 Wolfgang Eßmayr , Fritz Kastner , Günther Pernul, A. Min Tjoa : The security architecture of IRO-DB. SEC 1996 : 249-258 Günther Pernul, Hubert Hasenauer : Combining Reverse with Classical Forward Database Engineering - A Step Forward to Solve the Legacy System Dilemma DEXA 1995 : 177-186 Ernst Ellmer , Christian Huemer , Dieter Merkl , Günther Pernul: Neural Network Technology to Support View Integration. OOER 1995 : 181-190 Günther Pernul: Security Object Modelling for Level-Based Policies. DBSec 1994 : 374 Günther Pernul: Database Security. Advances in Computers 38 : 1-72 (1994) Dieter Merkl , Günther Pernul: Security for next generation hypertext systems. Hypermedia 6 (1): 1-18 (1994) Günther Pernul, Werner Winiwarter , A. Min Tjoa : The Entity-Relationship Model for Multilevel Security. ER 1993 : 166-177 Günther Pernul, A. Min Tjoa , J. T. Hotz-Behofsits : Datenbankmanagementsysteme mit hohem Sicherheitsanspruch. VIS 1993 : 371-393 Günther Pernul: 11th International Conference on the Entity-Relationship Approach (ER 92), Karlsruhe (Tagungsbericht). Datenbank Rundbrief 11 : 9 (1993) Günther Pernul, A. Min Tjoa : Entity-Relationship Approach - ER'92, 11th International Conference on the Entity-Relationship Approach, Karlsruhe, Germany, October 7-9, 1992, Proceedings Springer 1992 Günther Pernul: Canonical Security Modeling for Federated Databases. DS-5 1992 : 207-222 Günther Pernul: Security Constraint Processing in Multilevel Secure AMAC Schemata. ESORICS 1992 : 349-370 Shamkant B. Navathe , Günther Pernul: Conceptual and Logical Design of Relational Databases. Advances in Computers 35 : 1-80 (1992) Günther Pernul, Gottfried Luef : Bibliography on Database Security. SIGMOD Record 21 (1): 105-122 (1992) Gottfried Luef , Günther Pernul: Supporting Range Queries in Multilevel-Secure Databases. DBSec 1991 : 117-130 Günther Pernul, Kamalakar Karlapalem , Shamkant B. Navathe : Relational Database Organization Based on Views and Fragments. DEXA 1991 : 380-386 Günther Pernul, A. Min Tjoa : A View Integration Approach for the Design of Multilevel Security. ER 1991 : 483-509 Günther Pernul: An Unnormalized Relational Data Model Based On User Views. SIGMOD Record 16 (2): 51-60 (1987) 1 [ 31 ] [ 33 ] 2 [ 36 ] [ 38 ] [ 39 ] [ 43 ] [ 44 ] 3 [ 16 ] [ 20 ] 4 [ 18 ] [ 19 ] [ 23 ] [ 25 ] 5 [ 38 ] 6 [ 36 ] 7 [ 17 ] 8 [ 22 ] [ 26 ] [ 28 ] [ 29 ] 9 [ 11 ] 10 [ 16 ] [ 20 ] 11 [ 25 ] 12 [ 3 ] 13 [ 18 ] [ 19 ] 14 [ 37 ] 15 [ 36 ] 16 [ 35 ] 17 [ 4 ] [ 5 ] 18 [ 31 ] [ 33 ] 19 [ 13 ] [ 16 ] [ 20 ] 20 [ 43 ] [ 44 ] 21 [ 3 ] [ 6 ] 22 [ 19 ] 23 [ 30 ] [ 32 ] [ 37 ] [ 41 ] [ 42 ] 24 [ 21 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] 25 [ 2 ] [ 9 ] [ 11 ] [ 12 ] [ 18 ] [ 19 ] [ 23 ] [ 24 ] [ 25 ] 26 [ 34 ] 27 [ 25 ] 28 [ 12 ] [ 24 ] ©2004 Association for Computing Machinery |