Klarl, Heiko (2011) Zugriffskontrolle in Geschäftsprozessen - Ein modellgetriebener Ansatz. Vieweg+Teubner, Wiesbaden. ISBN 978-3-8348-1465-4.
Klarl, Heiko, Molitorisz, Korbinian, Emig, Christian, Klinger, Karsten und Abeck, Sebastian (2009) Extending Role-based Access Control for Business Usage. In: Third International Conference on Emerging Security Information, Systems and Technologies, 18-23 June 2009, Athens/Glyfada, Greece.
Klarl, Heiko, Wolff, Christian und Emig, Christian (2009) Identity Management in Business Process Modelling: A Model-Driven Approach. In: Hansen, Hans Robert und Karagiannis, Dimitris und Fill, Hans-Georg, (eds.) Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik, Wien, 25 -27. Februar 2009. Teil 1. Österreichische Computer Gesellschaft, Wien, S. 161-170. ISBN 978-3-85403-246-5.
Klarl, Heiko, Marmé, Florian, Wolff, Christian, Emig, Christian und Abeck, Sebastian (2009) An MDA-Based Environment for Generating Access Control Policies. In: Fischer-Hübner, Simone und Lambrinoudakis, Costas und Pernul, Günther, (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 5695. Springer, Berlin, S. 115-126. ISBN 978-3-642-03747-4.
Emig, Christian, Kreuzer, Sebastian, Abeck, Sebastian, Biermann, Jürgen und Klarl, Heiko (2008) Model-Driven Development of Access Control Policies for Web Services. In: Khoshgoftaar, T., (ed.) Proceedings of the 9th IASTED International Conference Software Engineering and Applications. Orlando, Florida, USA, S. 165-171. ISBN 978-0-88986-775-8.
Klarl, Heiko, Wolff, Christian und Emig, Christian (2008) Abbildung von Zugriffskontrollaussagen in Geschäftsprozessmodellen. In: Modellierung 2008 - Workshop Verhaltensmodellierung: Best Practices und neue Erkenntnisse, 12. bis 14. März 2008, Berlin.
Emig, Christian, Brandt, Frank, Abeck, Sebastian, Biermann, Jürgen und Klarl, Heiko (2007) An Access Control Metamodel for Web Service-Oriented Architecture. In: Proceedings of the International Conference on Software Engineering Advances. Cap Esterel. ISBN 0-7695-2937-2.
Klarl, Heiko (2007) Modellgetriebene, mustergestützte Sicherheit in serviceorientierten Architekturen. Informatik-Spektrum 30 (3), S. 175-177.
Klarl, Heiko (2007) Ausblick auf die modellgetriebene, mustergestützte Sicherheit in serviceorientierten Architekturen. In: Oßwald, Achim und Stempfhuber, Maximilian und Wolff, Christian, (eds.) Open Innovation - neue Perspektiven im Kontext von Information und Wissen? Proc. 10. Internationales Symposium für Informationswissenschaft. Schriften zur Informationswissenschaft, 46. UVK, Konstanz, S. 381-383. ISBN 978-3-86764-020-6.
Klarl, Heiko und Preitsameter, Markus (2006) Securing Service-Oriented and Event-Driven Architectures - Results of an Evaluation of Enterprise Security Frameworks. In: IEEE Services Computing Workshops (SCW'06), 18. - 22. September 2006, Chicago, Illinois, USA.
Kunz, Michael, Puchta, Alexander , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2019) Attribute Quality Management for Dynamic Identity and Access Management. Elsevier Journal of Information Security and Applications 44, S. 64-79.
Kunz, Michael, Puchta, Alexander, Groll, Sebastian, Fuchs, Ludwig und Pernul, Günther (2019) Attribute quality management for dynamic identity and access management. Journal of Information Security and Applications 44, S. 64-79.
Nuss, Martin, Puchta, Alexander und Kunz, Michael (2018) Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises. In: Furnell, S. und Mouratidis, H. und Pernul, Günther, (eds.) Trust, Privacy and Security in Digital Business. TrustBus 2018. Lecture Notes in Computer Science, 11033. Springer, Cham (Switzerland), S. 167-181.
Hummer, Matthias, Kunz, Michael, Netter, Michael, Fuchs, Ludwig und Pernul, Günther (2016) Adaptive identity and access management—contextual data based policies. EURASIP Journal on Information Security 19.
Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2016) How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. Communications in Computer and Information Science 576 (2), S. 49-67.
Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias und Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, S. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).
Richthammer, Christian, Kunz, Michael, Sänger, Johannes, Hummer, Matthias und Pernul, Günther (2015) Dynamic Trust-based Recertifications in Identity and Access Management. In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS), Vienna, Austria.
Weishäupl, Eva, Kunz, Michael, Yasasin, Emrah, Wagner, Gerit, Prester, Julian, Schryen, Guido und Pernul, Günther (2015) Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In: 2nd International Workshop on Security in highly connected IT Systems (SHCIS’15), 21-25 Sep 2015, Vienna, Austria. (Im Druck)
Hummer, Matthias, Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2015) Advanced Identity and Access Policy Management using Contextual Data. In: 10th International Conference on Availability, Reliability and Security (ARES '15), August 24th – 28th, 2015, Université Paul Sabatier, Toulouse, France.
Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2015) Analyzing Quality Criteria in Role-based Identity and Access Management. In: 1st International Conference on Information Systems Security and Privacy, 09.02.1015 - 11.02.2015, Angers, France.
Sänger, Johannes, Richthammer, Christian, Kunz, Michael, Meier, Stefan und Pernul, Günther (2015) Visualizing Unfair Ratings in Online Reputation Systems. In: Proc. of the 23rd European Conference on Information Systems (ECIS), Münster, Germany.
Kunz, Michael, Hummer, Matthias, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2014) Analyzing Recent Trends in Enterprise Identity Management. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, München. (Im Druck)
Fuchs, Ludwig, Kunz, Michael und Pernul, Günther (2014) Role Model Optimization For Secure Role-based Identity Management. In: European Conference on Information Systems (ECIS), June 9-11, 2014, Tel Aviv, Israel.
Hummer, Matthias (2019) Sustainable Identity and Access Management. Dissertation, Universität Regensburg.
Hummer, Matthias, Kunz, Michael, Netter, Michael, Fuchs, Ludwig und Pernul, Günther (2016) Adaptive identity and access management—contextual data based policies. EURASIP Journal on Information Security 19.
Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias und Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, S. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).
Richthammer, Christian, Kunz, Michael, Sänger, Johannes, Hummer, Matthias und Pernul, Günther (2015) Dynamic Trust-based Recertifications in Identity and Access Management. In: 2nd Workshop on Security in Highly Connected IT Systems (SHCIS), Vienna, Austria.
Hummer, Matthias, Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2015) Advanced Identity and Access Policy Management using Contextual Data. In: 10th International Conference on Availability, Reliability and Security (ARES '15), August 24th – 28th, 2015, Université Paul Sabatier, Toulouse, France.
Kunz, Michael, Hummer, Matthias, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2014) Analyzing Recent Trends in Enterprise Identity Management. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, München. (Im Druck)
Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2025) Separation of Duty in Information Security. ACM Computing Surveys 57 (7), S. 1-35.
Groll, Sebastian , Kern, Sascha , Fuchs, Ludwig und Pernul, Günther (2024) A Framework for Managing Separation of Duty Policies. In: ARES 2024: The 19th International Conference on Availability, Reliability and Security, July 30 - August 2, 2024, Vienna, Austria.
Kern, Sascha , Baumer, Thomas , Fuchs, Ludwig und Pernul, Günther (2023) Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach. In: DBSec 2023, 19.-21. Jul 2023, Sophia Antipolis, France.
Kern, Sascha , Baumer, Thomas , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2022) Optimization of Access Control Policies. Journal of Information Security and Applications 70, S. 103301.
Groll, Sebastian , Kern, Sascha , Fuchs, Ludwig und Pernul, Günther (2021) Monitoring Access Reviews by Crowd Labelling. In: Fischer-Hübner, Simone und Lambrinoudakis, Costas und Kotsis, Gabriele und Khalil, Ismail und Tjoa, A. Min, (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, 12927. Springer, Cham, S. 3-17. ISBN 978-3-030-86586-3, 978-3-030-86585-6.
Kunz, Michael, Puchta, Alexander , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2019) Attribute Quality Management for Dynamic Identity and Access Management. Elsevier Journal of Information Security and Applications 44, S. 64-79.
Kunz, Michael, Puchta, Alexander, Groll, Sebastian, Fuchs, Ludwig und Pernul, Günther (2019) Attribute quality management for dynamic identity and access management. Journal of Information Security and Applications 44, S. 64-79.
Hummer, Matthias, Kunz, Michael, Netter, Michael, Fuchs, Ludwig und Pernul, Günther (2016) Adaptive identity and access management—contextual data based policies. EURASIP Journal on Information Security 19.
Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2016) How to Discover High-quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining. Communications in Computer and Information Science 576 (2), S. 49-67.
Kunz, Michael, Fuchs, Ludwig, Hummer, Matthias und Pernul, Günther (2015) Introducing Dynamic Identity and Access Management in Organizations. In: Information Systems Security. 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings. Lecture Notes in Computer Science, 9478. Springer, S. 139-158. ISBN 978-3-319-26961-0 (online), 978-3-319-26960-3 (print).
Hummer, Matthias, Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2015) Advanced Identity and Access Policy Management using Contextual Data. In: 10th International Conference on Availability, Reliability and Security (ARES '15), August 24th – 28th, 2015, Université Paul Sabatier, Toulouse, France.
Kunz, Michael, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2015) Analyzing Quality Criteria in Role-based Identity and Access Management. In: 1st International Conference on Information Systems Security and Privacy, 09.02.1015 - 11.02.2015, Angers, France.
Kunz, Michael, Hummer, Matthias, Fuchs, Ludwig, Netter, Michael und Pernul, Günther (2014) Analyzing Recent Trends in Enterprise Identity Management. In: Workshop on Security in highly connected IT systems, September 1-5, 2014, München. (Im Druck)
Fuchs, Ludwig, Kunz, Michael und Pernul, Günther (2014) Role Model Optimization For Secure Role-based Identity Management. In: European Conference on Information Systems (ECIS), June 9-11, 2014, Tel Aviv, Israel.
Meier, Stefan, Fuchs, Ludwig und Pernul, Günther (2013) Managing the Access Grid - A Process View to Minimize Insider Misuse Risks. In: 11th International Conference on Wirtschaftsinformatik (WI2013), 27.2.-1.3.13, Leipzig.
Fuchs, Ludwig und Pernul, Günther (2013) Qualitätssicherung im Identity- und Access Management. In: Knoll, Matthias, (ed.) IT-Prüfung und IT-Revision. HMD - Praxis der Wirtschaftsinformatik, 289. dpunkt-verlag, Heidelberg. ISBN 978-3-86490-057-0.
Fuchs, Ludwig und Pernul, Günther (2012) Minimizing insider misuse through secure Identity Management. Security and Communication Networks 5 (8), S. 847-862.
Fuchs, Ludwig (2012) Innovatives Identitätsmanagement. In: Studie IT Security. IT Verlag für Informationstechnik GmbH, Deutschland, S. 220-236. ISBN 3-936052-38-7.
Fuchs, Ludwig und Pernul, Günther (2012) Minimizing insider misuse through secure Identity Management. Security and Communication Networks 5 (8), S. 847-862.
Fuchs, Ludwig, Pernul, Günther und Sandhu, Ravi (2011) Roles In Information Security - A Survey And Classification Of The Research Area. Computers & Security.
Fuchs, Ludwig und Meier, S. (2011) The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective. In: Tjoa, A. Min, (ed.) Availability, reliability and security for business, enterprise and health information systems : IFIP WG 8.4/8.9 international cross domain conference and workshop ; proceedings / ARES 2011, Vienna, Austria, August 22 - 26, 2011. Lecture notes in computer science, 6908. Springer, Berlin. ISBN 978-3-642-23299-2, 978-3-642-23300-5 (online).
Fuchs, Ludwig und Pernul, Günther (2010) Großreinemachen fürs IAM. Die Zeitschrift für Informations-Sicherheit: <kes> (Nr. 6), S. 24.
Pernul, Günther und Fuchs, Ludwig (2010) Reducing the Risk of Insider Misuse by Revising Identity Management and UserAccount Data. In: 2nd Int. Workshop on Managing Insider Security Threats, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Morioka, Iwate, Japan.
Fuchs, Ludwig (2010) Methodology for Hybrid Role Development. Wirtschaftsinformatik, 69. EUL-Verlag, Lohmar. ISBN 978-3-89936-978-6.
Fuchs, Ludwig, Pernul, Günther und Broser, Christian (2009) Different Approaches to in-house Identity Management. In: Proc of the 4th International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka, Japan. ISBN 978-07695-35647.
Fuchs, Ludwig und Müller, Christian (2009) Automating Periodic Role-Checks: A Tool-based Approach. In: Hansen, Hans Robert, (ed.) Business Services: Konzepte, Technologien, Anwendungen: 9. Internationale Tagung Wirtschaftsinformatik 2009. Booksocg.at, 246. Oesterreichische Computer Gesellschaft, Wien. ISBN 978-3-85403-246-5.
Fuchs, Ludwig und Pernul, Günther (2008) HyDRo - Hybrid Development of Roles. In: Sekar, R. und Pujari, Arun K., (eds.) Information systems security: 4th international conference; proceedings / ICISS 2008, Hyderabad, India, December 16 - 20, 2008. Lecture Notes in Computer Science, 5352. Springer, Berlin, S. 287-302. ISBN 978-3-540-89861-0.
Fuchs, Ludwig und Preis, Anton (2008) BusiROLE: A Model for Integrating Business Roles into Identity Management. In: Furnell, Steven, (ed.) Trust, privacy and security in digital business: 5th international conference; proceedings / TrustBus 2008, Turin, Italy, September 4 - 5, 2008. Lecture Notes in Computer Science, 5185. Springer, Berlin, S. 128-138. ISBN 978-3-540-85734-1.
Schläger, Christian, Fuchs, Ludwig und Pernul, Günther (2008) Intensive Programme on Information and Communication Security. In: Jakoubi, Stefan, (ed.) ARES 2008: the Third International Conference on Availability, Reliability and Security: March 4 - 7, 2008. IEEE Computer Society, Los Alamitos, Calif., S. 752-757. ISBN 978-0-7695-3102-1.
Fuchs, Ludwig und Pernul, Günther (2008) proROLE: A Process-oriented Lifecycle Model for Role Systems. In: Proceedings of the 16th European Conference on Information Systems (ECIS 2008), Galway, Ireland, June 9-11, 2008. Springer, Berlin, S. 1322-1333. ISBN 9780955315923.
Fuchs, Ludwig und Pernul, Günther (2007) Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. In: The Second International Conference on Availability, Reliability and Security, 2007: ARES 2007. IEEE Computer Society, Los Alamitos, Calif., S. 374-384. ISBN 0-7695-2775-2; 978-0-7695-2775-8.
Groll, Sebastian (2025) Sustainable Compliance in Identity and Access Management.
Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2025) Separation of Duty in Information Security.
Groll, Sebastian , Kern, Sascha , Fuchs, Ludwig und Pernul, Günther (2024) A Framework for Managing Separation of Duty Policies.
Kern, Sascha , Baumer, Thomas , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2022) Optimization of Access Control Policies.
Groll, Sebastian , Kern, Sascha , Fuchs, Ludwig und Pernul, Günther (2021) Monitoring Access Reviews by Crowd Labelling.
Puchta, Alexander , Groll, Sebastian und Pernul, Günther (2021) Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture.
Hornsteiner, Markus, Groll, Sebastian und Puchta, Alexander (2021) Towards a user-centric IAM entitlement shop - Learnings from the e-commerce.
Kunz, Michael, Puchta, Alexander , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2019) Attribute Quality Management for Dynamic Identity and Access Management.
Kunz, Michael, Puchta, Alexander, Groll, Sebastian, Fuchs, Ludwig und Pernul, Günther (2019) Attribute quality management for dynamic identity and access management.
Baumer, Thomas , Reittinger, Tobias , Kern, Sascha und Pernul, Günther (2024) Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations.
Groll, Sebastian , Kern, Sascha , Fuchs, Ludwig und Pernul, Günther (2024) A Framework for Managing Separation of Duty Policies.
Kern, Sascha , Baumer, Thomas , Fuchs, Ludwig und Pernul, Günther (2023) Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.
Kern, Sascha , Baumer, Thomas , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2022) Optimization of Access Control Policies.
Groll, Sebastian , Kern, Sascha , Fuchs, Ludwig und Pernul, Günther (2021) Monitoring Access Reviews by Crowd Labelling.
Baumer, Thomas , Reittinger, Tobias , Kern, Sascha und Pernul, Günther (2024) Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations.
Baumer, Thomas , Grill, Johannes , Adan, Jacob und Pernul, Günther (2024) A Trust and Reputation System for Examining Compliance with Access Control.
Puchta, Alexander , Baumer, Thomas , Müller, Mathis und Pernul, Günther (2024) IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence.
Baumer, Thomas , Müller, Mathis und Pernul, Günther (2023) System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC.
Kern, Sascha , Baumer, Thomas , Fuchs, Ludwig und Pernul, Günther (2023) Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.
Baumer, Thomas, Müller, Mathis und Pernul, Günther (2023) System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC.
Kern, Sascha , Baumer, Thomas , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2022) Optimization of Access Control Policies.
Schlette, Daniel , Menges, Florian , Baumer, Thomas und Pernul, Günther (2020) 4. Security Enumerations for Cyber-Physical Systems.
Kern, S., Baumer, T., Neudert, R., & Pernul, G. (2025, June). Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. In IFIP Annual Conference on Data and Applications Security and Privacy
Thomas Baumer, Sascha Kern, Ludwig Fuchs, and Günther Pernul. (2026) Identity and Access Management Metrics: A Systematic Review.
Puchta, Alexander , Baumer, Thomas , Müller, Mathis und Pernul, Günther (2024) IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence.
Menges, Florian , Latzo, Tobias, Vielberth, Manfred , Sobola, Sabine, Pöhls, Henrich C., Taubmann, Benjamin, Köstler, Johannes, Puchta, Alexander, Reiser, Hans P., Freiling, Felix und Pernul, Günther (2021) Towards GDPR-compliant data processing in modern SIEM systems.
Puchta, Alexander , Groll, Sebastian und Pernul, Günther (2021) Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM Architecture.
Hornsteiner, Markus, Groll, Sebastian und Puchta, Alexander (2021) Towards a user-centric IAM entitlement shop - Learnings from the e-commerce.
Puchta, Alexander, Böhm, Fabian und Pernul, Günther (2019) Contributing to Current Challenges in Identity and Access Management with Visual Analytics.
Kunz, Michael, Puchta, Alexander , Groll, Sebastian , Fuchs, Ludwig und Pernul, Günther (2019) Attribute Quality Management for Dynamic Identity and Access Management.
Kunz, Michael, Puchta, Alexander, Groll, Sebastian, Fuchs, Ludwig und Pernul, Günther (2019) Attribute quality management for dynamic identity and access management.
Menges, Florian, Böhm, Fabian, Vielberth, Manfred, Puchta, Alexander, Taubmann, Benjamin, Rakotondravony, Noëlle und Latzo, Tobias (2018) Introducing DINGfest: An architecture for next generation SIEM systems.
Nuss, Martin, Puchta, Alexander und Kunz, Michael (2018) Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises.
Gnanasekaran, Vahiny, Neudert, Raphael, Heegaard, Poul Einar, und Pernul, Günther (2025). A Role Taxonomy in Security-Safety Incident Response.
Kern, Sascha, Baumer, Thomas, Neudert, Raphael, und Pernul, Günther (2025). Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source
You are currently viewing a placeholder content from Vimeo. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou need to load content from reCAPTCHA to submit the form. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Hubspot Meetings. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information