What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Günther Pernul
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/compsec
Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises.
Magdalena Glas
Gerhard Messmann
Günther Pernul
2024
conf/sp
Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors.
Daniel Schlette
Philip Empl
Marco Caselli
Thomas Schreck
Günther Pernul
2024
conf/soups
Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations.
Thomas Baumer
Tobias Reittinger
Sascha Kern
Günther Pernul
2022
journals/istr
Optimization of Access Control Policies.
Sascha Kern
Thomas Baumer
Sebastian Groll
Ludwig Fuchs
Günther Pernul
2021
journals/compsec
CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities.
Daniel Schlette
Manfred Vielberth
Günther Pernul
2021
journals/compsec
Towards GDPR-compliant data processing in modern SIEM systems.
Florian Menges
Tobias Latzo
Manfred Vielberth
Sabine Sobola
Henrich C. Pöhls
Benjamin Taubmann
Johannes Köstler
Alexander Puchta
Felix C. Freiling
Hans P. Reiser
Günther Pernul
2021
conf/sec
HyperSec: Visual Analytics for Blockchain Security Monitoring.
Benedikt Putz
Fabian Böhm
Günther Pernul
2019
journals/compsec
A secure and auditable logging infrastructure based on a permissioned blockchain.
Benedikt Putz
Florian Menges
Günther Pernul
2019
journals/istr
Attribute quality management for dynamic identity and access management.
Michael Kunz
Alexander Puchta
Sebastian Groll
Ludwig Fuchs
Günther Pernul
2018
journals/compsec
A comparative analysis of incident reporting formats.
Florian Menges
Günther Pernul
2015
conf/iciss
Introducing Dynamic Identity and Access Management in Organizations.
Michael Kunz
Ludwig Fuchs
Matthias Hummer
Günther Pernul
2013
journals/istr
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments.
Moritz Riesner
Michael Netter
Günther Pernul
2011
journals/compsec
Roles in information security - A survey and classification of the research area.
Ludwig Fuchs
Günther Pernul
Ravi S. Sandhu
2010
journals/compsec
Collaborative privacy management.
Jan Paul Kolter
Thomas Kernchen
Günther Pernul
2009
conf/sec
Collaborative Privacy - A Community-Based Privacy Infrastructure.
Jan Paul Kolter
Thomas Kernchen
Günther Pernul
2008
conf/iciss
HyDRo - Hybrid Development of Roles.
Ludwig Fuchs
Günther Pernul
2007
conf/sec
Building a Distributed Semantic-aware Security Architecture.
Jan Paul Kolter
Rolf Schillinger
Günther Pernul
2004
journals/compsec
Authentication and authorization infrastructures (AAIs): a comparative survey.
Javier López
Rolf Oppliger
Günther Pernul
2003
conf/sec
CSAP - An Adaptable Security Module for the E-Government System Webocrat.
Fredj Dridi
Michael Fischer
Günther Pernul
1999
conf/acsac
A Language for Modeling Secure Business Transactions.
Alexander W. Röhm
Gaby Herrmann
Günther Pernul
1998
conf/acsac
Modeling Secure and Fair Electronic Commerce.
Alexander W. Röhm
Günther Pernul
Gaby Herrmann
1996
conf/sec
The security architecture of IRO-DB.
Wolfgang Eßmayr
Fritz Kastner
Günther Pernul
A Min Tjoa
1994
conf/acsac
Organizing MLS databases from a data modelling point of view.
Günther Pernul
Gerald Quirchmayr
1993
conf/acsac
The deductive filter approach to MLS database prototyping.
Günther Pernul
Werner Winiwarter
A Min Tjoa
1992
conf/esorics
Security Constraint Processing in Multilevel Secure AMAC Schemata.
Günther Pernul
1992
conf/acsac
Security constraint processing during multilevel secure database design.
Günther Pernul
1991
conf/acsac
A multilevel secure relational data model based on views.
Günther Pernul
Gottfried Luef
Coauthors
A Min Tjoa
(2)
Alexander Puchta
(2)
Alexander W. Röhm
(2)
Benedikt Putz
(2)
Benjamin Taubmann
(1)
Daniel Schlette
(2)
Fabian Böhm
(1)
Felix C. Freiling
(1)
Florian Menges
(3)
Fredj Dridi
(1)
Fritz Kastner
(1)
Gaby Herrmann
(2)
Gerald Quirchmayr
(1)
Gerhard Messmann
(1)
Gottfried Luef
(1)
Günther Pernul
(27)
Hans P. Reiser
(1)
Henrich C. Pöhls
(1)
Jan Paul Kolter
(3)
Javier López
(1)
Johannes Köstler
(1)
Ludwig Fuchs
(5)
Magdalena Glas
(1)
Manfred Vielberth
(2)
Marco Caselli
(1)
Matthias Hummer
(1)
Michael Fischer
(1)
Michael Kunz
(2)
Michael Netter
(1)
Moritz Riesner
(1)
Philip Empl
(1)
Ravi S. Sandhu
(1)
Rolf Oppliger
(1)
Rolf Schillinger
(1)
Sabine Sobola
(1)
Sascha Kern
(2)
Sebastian Groll
(2)
Thomas Baumer
(2)
Thomas Kernchen
(2)
Thomas Schreck
(1)
Tobias Latzo
(1)
Tobias Reittinger
(1)
Werner Winiwarter
(1)
Wolfgang Eßmayr
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to