フォロー
Ludwig Fuchs
Ludwig Fuchs
Nexis GmbH
確認したメール アドレス: nexis-secure.com
タイトル
引用先
引用先
Roles in information security–a survey and classification of the research area
L Fuchs, G Pernul, R Sandhu
computers & security 30 (8), 748-769, 2011
1522011
HyDRo–hybrid development of roles
L Fuchs, G Pernul
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
432008
Attribute quality management for dynamic identity and access management
M Kunz, A Puchta, S Groll, L Fuchs, G Pernul
Journal of information security and applications 44, 64-79, 2019
422019
Adaptive identity and access management—contextual data based policies
M Hummer, M Kunz, M Netter, L Fuchs, G Pernul
EURASIP Journal on Information Security 2016, 1-16, 2016
352016
Supporting compliant and secure user handling-a structured approach for in-house identity management
L Fuchs, G Pernul
The Second International Conference on Availability, Reliability and …, 2007
302007
Optimization of access control policies
S Kern, T Baumer, S Groll, L Fuchs, G Pernul
Journal of Information Security and Applications 70, 103301, 2022
202022
Analyzing recent trends in enterprise identity management
M Kunz, M Hummer, L Fuchs, M Netter, G Pernul
2014 25th international workshop on database and expert systems applications …, 2014
172014
Introducing dynamic identity and access management in organizations
M Kunz, L Fuchs, M Hummer, G Pernul
Information Systems Security: 11th International Conference, ICISS 2015 …, 2015
162015
Minimizing insider misuse through secure Identity Management
L Fuchs, G Pernul
Security and Communication Networks 5 (8), 847-862, 2012
162012
The role mining process model-underlining the need for a comprehensive research perspective
L Fuchs, S Meier
2011 Sixth International Conference on Availability, Reliability and …, 2011
162011
BusiROLE: a model for integrating business roles into identity management
L Fuchs, A Preis
Trust, Privacy and Security in Digital Business: 5th International …, 2008
152008
Measuring Identity and Access Management Performance-An Expert Survey on Possible Performance Indicators.
M Hummer, S Groll, M Kunz, L Fuchs, G Pernul
ICISSP, 233-240, 2018
122018
Role model optimization for secure role-based identity management
L Fuchs, M Kunz, G Pernul
122014
Prorole: a process-oriented lifecycle model for role systems leveraging identity management and guiding role projects
L Fuchs, G Pernul
122008
Managing the access grid-a process view to minimize insider misuse risks
S Meier, L Fuchs, G Pernul
112013
Advanced identity and access policy management using contextual data
M Hummer, M Kunz, M Netter, L Fuchs, G Pernul
2015 10th international conference on availability, reliability and security …, 2015
102015
Reducing the risk of insider misuse by revising identity management and useraccount data
G Pernul, L Fuchs
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable …, 2010
92010
Different approaches to in-house identity management-justification of an assumption
L Fuchs, C Broser, G Pernul
2009 international conference on availability, reliability and security, 122-129, 2009
82009
Analyzing quality criteria in role-based identity and access management
M Kunz, L Fuchs, M Netter, G Pernul
2015 International Conference on Information Systems Security and Privacy …, 2015
72015
How to discover high-quality roles? A survey and dependency analysis of quality criteria in role mining
M Kunz, L Fuchs, M Netter, G Pernul
Information Systems Security and Privacy: First International Conference …, 2015
72015
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20