default search action
BibTeX records: Günter Müller
@article{DBLP:journals/dud/RuckeshauserBM17, author = {Nadine R{\"{u}}ckesh{\"{a}}user and Christian Brenig and G{\"{u}}nter M{\"{u}}ller}, title = {Blockchains als Grundlage digitaler Gesch{\"{a}}ftsmodelle}, journal = {Datenschutz und Datensicherheit}, volume = {41}, number = {8}, pages = {492--496}, year = {2017}, url = {https://doi.org/10.1007/s11623-017-0818-8}, doi = {10.1007/S11623-017-0818-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RuckeshauserBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/BetzWM17, author = {Johann Betz and Dirk Westhoff and G{\"{u}}nter M{\"{u}}ller}, title = {Survey on covert channels in virtual machines and cloud computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {28}, number = {6}, year = {2017}, url = {https://doi.org/10.1002/ett.3134}, doi = {10.1002/ETT.3134}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/BetzWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/topnoc/HoldererCTM17, author = {Julius Holderer and Josep Carmona and Farbod Taymouri and G{\"{u}}nter M{\"{u}}ller}, title = {Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions}, journal = {Trans. Petri Nets Other Model. Concurr.}, volume = {12}, pages = {43--69}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-55862-1\_3}, doi = {10.1007/978-3-662-55862-1\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/topnoc/HoldererCTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apn/HoldererCM16, author = {Julius Holderer and Josep Carmona and G{\"{u}}nter M{\"{u}}ller}, editor = {Wil M. P. van der Aalst and Robin Bergenthum and Josep Carmona}, title = {Security-Sensitive Tackling of Obstructed Workow Executions}, booktitle = {Proceedings of the International Workshop on Algorithms {\&} Theories for the Analysis of Event Data 2016 Satellite event of the conferences: 37th International Conference on Application and Theory of Petri Nets and Concurrency Petri Nets 2016 and 16th International Conference on Application of Concurrency to System Design {ACSD} 2016, Torun, Poland, June 20-21, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1592}, pages = {126--137}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1592/paper09.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:38 +0100}, biburl = {https://dblp.org/rec/conf/apn/HoldererCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/CabinakovaZM16, author = {Johana Cabinakova and Christian Zimmermann and G{\"{u}}nter M{\"{u}}ller}, title = {An Empirical Analysis of Privacy Dashboard Acceptance: the Google Case}, booktitle = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul, Turkey, June 12-15, 2016}, pages = {Research Paper 114}, year = {2016}, url = {http://aisel.aisnet.org/ecis2016\_rp/114}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/CabinakovaZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkwi/MullerSZ16, author = {G{\"{u}}nter M{\"{u}}ller and Stefan Sackmann and Richard M. Zahoransky}, editor = {Volker Nissen and Dirk Stelzer and Steffen Stra{\ss}burger and Daniel Fischer}, title = {Vorwort}, booktitle = {Multikonferenz Wirtschaftsinformatik, {MKWI} 2016, Ilmenau, Germany, March 9-11, 2016, 3 Volumes}, pages = {1339}, publisher = {Universit{\"{a}}tsverlag Ilmenau}, year = {2016}, timestamp = {Tue, 11 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mkwi/MullerSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/EymannLPKML15, author = {Torsten Eymann and Christine Legner and Manfred Prenzel and Helmut Krcmar and G{\"{u}}nter M{\"{u}}ller and Peter Liggesmeyer}, title = {Addressing Grand Challenges - Implications for {BISE} Research}, journal = {Bus. Inf. Syst. Eng.}, volume = {57}, number = {6}, pages = {409--416}, year = {2015}, url = {https://doi.org/10.1007/s12599-015-0408-y}, doi = {10.1007/S12599-015-0408-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/EymannLPKML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bis/KarweM15, author = {Markus Karwe and G{\"{u}}nter M{\"{u}}ller}, editor = {Witold Abramowicz}, title = {{DPIP:} {A} Demand Response Privacy Preserving Interaction Protocol - For Trusted Third Party Involvement}, booktitle = {Business Information Systems Workshops - {BIS} 2015 International Workshops, Pozna{\'{n}}, Poland, June 24-26, 2015, Revised Papers}, series = {Lecture Notes in Business Information Processing}, volume = {228}, pages = {224--234}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26762-3\_20}, doi = {10.1007/978-3-319-26762-3\_20}, timestamp = {Sat, 19 Oct 2019 20:06:46 +0200}, biburl = {https://dblp.org/rec/conf/bis/KarweM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/BrenigAM15, author = {Christian Brenig and Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, editor = {J{\"{o}}rg Becker and Jan vom Brocke and Marco de Marco}, title = {Economic Analysis of Cryptocurrency Backed Money Laundering}, booktitle = {23rd European Conference on Information Systems, {ECIS} 2015, M{\"{u}}nster, Germany, May 26-29, 2015}, year = {2015}, url = {http://aisel.aisnet.org/ecis2015\_cr/20}, timestamp = {Thu, 22 Feb 2018 16:52:21 +0100}, biburl = {https://dblp.org/rec/conf/ecis/BrenigAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/HoldererAM15, author = {Julius Holderer and Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, editor = {Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong}, title = {When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015}, pages = {1245--1248}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2695664.2699497}, doi = {10.1145/2695664.2699497}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/HoldererAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/Dstep/Muller14, author = {G{\"{u}}nter M{\"{u}}ller}, editor = {Jens{-}Matthias Bohli and Friedbert Kaspar and Dirk Westhoff}, title = {Datenschutz: Ein Auslaufmodell?}, booktitle = {Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP 2014, Hochschule Furtwangen}, pages = {3}, publisher = {De Gruyter Oldenbourg}, year = {2014}, timestamp = {Fri, 10 Dec 2021 14:09:50 +0100}, biburl = {https://dblp.org/rec/conf/Dstep/Muller14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZimmermannAM14, author = {Christian Zimmermann and Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, title = {Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy}, booktitle = {Ninth International Conference on Availability, Reliability and Security, {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014}, pages = {152--157}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ARES.2014.27}, doi = {10.1109/ARES.2014.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ZimmermannAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkwi/MullerEB14, author = {G{\"{u}}nter M{\"{u}}ller and Torsten Eymann and Frank B{\"{o}}hr}, editor = {Dennis Kundisch and Leena Suhl and Lars Beckmann}, title = {Vorwort}, booktitle = {Multikonferenz Wirtschaftsinformatik, {MKWI} 2014, Paderborn, Germany, February 26-28, 2014}, pages = {1887}, publisher = {University of Paderborn}, year = {2014}, timestamp = {Mon, 27 May 2024 13:23:46 +0200}, biburl = {https://dblp.org/rec/conf/mkwi/MullerEB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/KarweM13, author = {Markus Karwe and G{\"{u}}nter M{\"{u}}ller}, title = {Transaktionspseudonymit{\"{a}}t f{\"{u}}r Demand-Response-Anwendungen}, journal = {{HMD} Prax. Wirtsch.}, volume = {291}, pages = {52--59}, year = {2013}, url = {http://www.dpunkt.de/hmdissues/291/05.php}, doi = {10.1007/BF03340815}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/KarweM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/MullerW13, author = {G{\"{u}}nter M{\"{u}}ller and Wolfgang Wahlster}, title = {Placing Humans in the Feedback Loop of Social Infrastructures - {NII} Research Strategies on Cyber-Physical Systems}, journal = {Inform. Spektrum}, volume = {36}, number = {6}, pages = {520--529}, year = {2013}, url = {https://doi.org/10.1007/s00287-013-0735-7}, doi = {10.1007/S00287-013-0735-7}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/MullerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/BohrLM13, author = {Frank B{\"{o}}hr and Linh Thao Ly and G{\"{u}}nter M{\"{u}}ller}, title = {Business Process Security Analysis - Design Time, Run Time, Audit Time}, journal = {it Inf. Technol.}, volume = {55}, number = {6}, pages = {217--224}, year = {2013}, url = {https://doi.org/10.1524/itit.2013.2001}, doi = {10.1524/ITIT.2013.2001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/BohrLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/MullerA13, author = {G{\"{u}}nter M{\"{u}}ller and Rafael Accorsi}, editor = {Marc Fischlin and Stefan Katzenbeisser}, title = {Why Are Business Processes Not Secure?}, booktitle = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {8260}, pages = {240--254}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42001-6\_17}, doi = {10.1007/978-3-642-42001-6\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/MullerA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bis/MullerKA13, author = {G{\"{u}}nter M{\"{u}}ller and Thomas G. Koslowski and Rafael Accorsi}, editor = {Witold Abramowicz}, title = {Resilience - {A} New Research Field in Business Information Systems?}, booktitle = {Business Information Systems Workshops - {BIS} 2013 International Workshops, Pozna{\'{n}}, Poland, June 19-20, 2013, Revised Papers}, series = {Lecture Notes in Business Information Processing}, volume = {160}, pages = {3--14}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41687-3\_2}, doi = {10.1007/978-3-642-41687-3\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bis/MullerKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AccorsiSM13, author = {Rafael Accorsi and Thomas Stocker and G{\"{u}}nter M{\"{u}}ller}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {On the exploitation of process mining for security audits: the process discovery case}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1462--1468}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480634}, doi = {10.1145/2480362.2480634}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/AccorsiSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AccorsiM13, author = {Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, title = {Preventive Inference Control in Data-centric Business Models}, booktitle = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013}, pages = {28--33}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SPW.2013.25}, doi = {10.1109/SPW.2013.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AccorsiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/shonan-reports/EchizenMST13, author = {Isao Echizen and G{\"{u}}nter M{\"{u}}ller and Ry{\^{o}}ichi Sasaki and A Min Tjoa}, title = {Privacy by Transparency for Data-Centric Services {(NII} Shonan Meeting 2013-5)}, journal = {{NII} Shonan Meet. Rep.}, volume = {2013}, year = {2013}, url = {https://shonan.nii.ac.jp/seminars/032/}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/shonan-reports/EchizenMST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/BuhlFMR12, author = {Hans Ulrich Buhl and Gilbert Fridgen and G{\"{u}}nter M{\"{u}}ller and Maximilian R{\"{o}}glinger}, title = {On Dinosaurs, Measurement Ideologists, Separatists, and Happy Souls - Proposing and Justifying a Way to Make the Global {IS/BISE} Community Happy}, journal = {Bus. Inf. Syst. Eng.}, volume = {4}, number = {6}, pages = {307--315}, year = {2012}, url = {https://doi.org/10.1007/s12599-012-0239-z}, doi = {10.1007/S12599-012-0239-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/BuhlFMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/BuhlMFR12, author = {Hans Ulrich Buhl and G{\"{u}}nter M{\"{u}}ller and Gilbert Fridgen and Maximilian R{\"{o}}glinger}, title = {Business and Information Systems Engineering: {A} Complementary Approach to Information Systems - What We Can Learn from the Past and May Conclude from Present Reflection on the Future}, journal = {J. Assoc. Inf. Syst.}, volume = {13}, number = {4}, pages = {3}, year = {2012}, url = {https://doi.org/10.17705/1jais.00292}, doi = {10.17705/1JAIS.00292}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/BuhlMFR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/BuhlFMR12, author = {Hans Ulrich Buhl and Gilbert Fridgen and G{\"{u}}nter M{\"{u}}ller and Maximilian R{\"{o}}glinger}, title = {Von Dinosauriern, Tonnenideologen, Separatisten und gl{\"{u}}cklichen Seelen - Vorschlag und Begr{\"{u}}ndung eines Wegs, um die weltweite IS/WI-Community gl{\"{u}}cklich zu machen}, journal = {Wirtschaftsinf.}, volume = {54}, number = {6}, pages = {293--302}, year = {2012}, url = {https://doi.org/10.1007/s11576-012-0342-2}, doi = {10.1007/S11576-012-0342-2}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/BuhlFMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qi/FlenderM12, author = {Christian Flender and G{\"{u}}nter M{\"{u}}ller}, editor = {Jerome R. Busemeyer and Fran{\c{c}}ois Dubois and Ariane Lambert{-}Mogiliansky and Massimo Melucci}, title = {Type Indeterminacy in Privacy Decisions: The Privacy Paradox Revisited}, booktitle = {Quantum Interaction - 6th International Symposium, {QI} 2012, Paris, France, June 27-29, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7620}, pages = {148--159}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35659-9\_14}, doi = {10.1007/978-3-642-35659-9\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/qi/FlenderM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/MullerSEW11, author = {G{\"{u}}nter M{\"{u}}ller and Noboru Sonehara and Isao Echizen and Sven Wohlgemuth}, title = {Sustainable Cloud Computing}, journal = {Bus. Inf. Syst. Eng.}, volume = {3}, number = {3}, pages = {129--131}, year = {2011}, url = {https://doi.org/10.1007/s12599-011-0159-3}, doi = {10.1007/S12599-011-0159-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bise/MullerSEW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/BuhlWMBH11, author = {Hans Ulrich Buhl and Robert Winter and G{\"{u}}nter M{\"{u}}ller and Martin Bichler and Armin Heinzl}, title = {{BISE} - Call for Papers - {BISE} Workshop Within the {MKWI} 2012}, journal = {Bus. Inf. Syst. Eng.}, volume = {3}, number = {4}, pages = {253}, year = {2011}, url = {https://doi.org/10.1007/s12599-011-0163-7}, doi = {10.1007/S12599-011-0163-7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/BuhlWMBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/HaasWESM11, author = {Sebastian Haas and Sven Wohlgemuth and Isao Echizen and Noboru Sonehara and G{\"{u}}nter M{\"{u}}ller}, title = {Aspects of privacy for electronic health records}, journal = {Int. J. Medical Informatics}, volume = {80}, number = {2}, pages = {e26--e31}, year = {2011}, url = {https://doi.org/10.1016/j.ijmedinf.2010.10.001}, doi = {10.1016/J.IJMEDINF.2010.10.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/HaasWESM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/WohlgemuthESM11, author = {Sven Wohlgemuth and Isao Echizen and Noboru Sonehara and G{\"{u}}nter M{\"{u}}ller}, title = {On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {2}, number = {3}, pages = {270--281}, year = {2011}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2011/vol2/JIH-MSP-2011-04-007.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/WohlgemuthESM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/MullerSEW11, author = {G{\"{u}}nter M{\"{u}}ller and Noboru Sonehara and Isao Echizen and Sven Wohlgemuth}, title = {Nachhaltiges Computing in Clouds}, journal = {Wirtschaftsinf.}, volume = {53}, number = {3}, pages = {123--125}, year = {2011}, url = {https://doi.org/10.1007/s11576-011-0273-3}, doi = {10.1007/S11576-011-0273-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/MullerSEW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/BuhlWMBH11, author = {Hans Ulrich Buhl and Robert Winter and G{\"{u}}nter M{\"{u}}ller and Martin Bichler and Armin Heinzl}, title = {{WI} - Call for Papers - BISE-Workshop im Rahmen der {MKWI} 2012}, journal = {Wirtschaftsinf.}, volume = {53}, number = {4}, pages = {249}, year = {2011}, url = {https://doi.org/10.1007/s11576-011-0277-z}, doi = {10.1007/S11576-011-0277-Z}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/BuhlWMBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wm/MullerSEW11, author = {G{\"{u}}nter M{\"{u}}ller and Arnt Syirng and Holger Eggs and Stefan Wenzel}, title = {Risikomanagement und Vertrauensbildung im Cloud Computing}, journal = {Wirtschaftsinformatik Manag.}, volume = {3}, number = {5}, pages = {66--73}, year = {2011}, url = {https://doi.org/10.1365/s35764-011-0080-z}, doi = {10.1365/S35764-011-0080-Z}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wm/MullerSEW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SchropferKM11, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum and G{\"{u}}nter M{\"{u}}ller}, title = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation}, booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22 July 2011}, pages = {298--307}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/COMPSAC.2011.46}, doi = {10.1109/COMPSAC.2011.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SchropferKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/BuhlM10, author = {Hans Ulrich Buhl and G{\"{u}}nter M{\"{u}}ller}, title = {The "Transparent Citizen" in Web 2.0 - Challenges of the "Virtual Striptease"}, journal = {Bus. Inf. Syst. Eng.}, volume = {2}, number = {4}, pages = {203--206}, year = {2010}, url = {https://doi.org/10.1007/s12599-010-0113-9}, doi = {10.1007/S12599-010-0113-9}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/BuhlM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/MullerAHS10, author = {G{\"{u}}nter M{\"{u}}ller and Rafael Accorsi and Sebastian H{\"{o}}hn and Stefan Sackmann}, title = {Sichere Nutzungskontrolle f{\"{u}}r mehr Transparenz in Finanzm{\"{a}}rkten}, journal = {Inform. Spektrum}, volume = {33}, number = {1}, pages = {3--13}, year = {2010}, url = {https://doi.org/10.1007/s00287-009-0405-y}, doi = {10.1007/S00287-009-0405-Y}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/MullerAHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/WohlgemuthEMS10, author = {Sven Wohlgemuth and Isao Echizen and G{\"{u}}nter M{\"{u}}ller and Noboru Sonehara}, title = {Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsph{\"{a}}re bei der Weitergabe pers{\"{o}}nlicher Daten an Dritte)}, journal = {it Inf. Technol.}, volume = {52}, number = {6}, pages = {350--355}, year = {2010}, url = {https://doi.org/10.1524/itit.2010.0614}, doi = {10.1524/ITIT.2010.0614}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/WohlgemuthEMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/BuhlM10, author = {Hans Ulrich Buhl and G{\"{u}}nter M{\"{u}}ller}, title = {Der "gl{\"{a}}serne B{\"{u}}rger" im Web 2.0 - Herausforderungen des "virtuellen Striptease"}, journal = {Wirtschaftsinf.}, volume = {52}, number = {4}, pages = {193--197}, year = {2010}, url = {https://doi.org/10.1007/s11576-010-0230-6}, doi = {10.1007/S11576-010-0230-6}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/BuhlM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/TharaudWESML10, author = {J{\'{e}}r{\'{e}}mie Tharaud and Sven Wohlgemuth and Isao Echizen and Noboru Sonehara and G{\"{u}}nter M{\"{u}}ller and Pascal Lafourcade}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {Privacy by Data Provenance with Digital Watermarking - {A} Proof-of-Concept Implementation for Medical Services with Electronic Health Records}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {510--513}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.130}, doi = {10.1109/IIHMSP.2010.130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/TharaudWESML10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkwi/MullerKSR10, author = {G{\"{u}}nter M{\"{u}}ller and Dennis Kundisch and Stefan Sackmann and Frank Romeike}, editor = {Matthias Schumann and Lutz M. Kolbe and Michael H. Breitner and Arne Frerichs}, title = {Vorwort}, booktitle = {Multikonferenz Wirtschaftsinformatik, {MKWI} 2010, G{\"{o}}ttingen, Deutschland, 23.-25.2.2010, Proceedings}, pages = {2123--2124}, publisher = {Universit{\"{a}}tsverlag G{\"{o}}ttingen}, year = {2010}, url = {http://webdoc.sub.gwdg.de/univerlag/2010/mkwi/03\_anwendungen/integriertes\_ertrags-risikomanagement/00\_vorwort.pdf}, timestamp = {Thu, 12 Mar 2020 11:37:25 +0100}, biburl = {https://dblp.org/rec/conf/mkwi/MullerKSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/HaasHRAMM10, author = {Sebastian Haas and Ralph Herkenh{\"{o}}ner and Denis Royer and Ammar Alkassar and Hermann de Meer and G{\"{u}}nter M{\"{u}}ller}, editor = {Simone Fischer{-}H{\"{u}}bner and Penny Duquenoy and Marit Hansen and Ronald Leenes and Ge Zhang}, title = {Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns}, booktitle = {Privacy and Identity Management for Life - 6th {IFIP} {WG} 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {352}, pages = {120--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-20769-3\_10}, doi = {10.1007/978-3-642-20769-3\_10}, timestamp = {Fri, 05 Aug 2022 07:31:50 +0200}, biburl = {https://dblp.org/rec/conf/primelife/HaasHRAMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/WohlgemuthESM10, author = {Sven Wohlgemuth and Isao Echizen and Noboru Sonehara and G{\"{u}}nter M{\"{u}}ller}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {241--252}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_22}, doi = {10.1007/978-3-642-15257-3\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/WohlgemuthESM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/AccorsiM10, author = {Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, editor = {Sandro Etalle and Alexander Pretschner and Ravi S. Sandhu and Marianne Winslett}, title = {{FORTES:} Forensic Information Flow Analysis of Business Processes}, booktitle = {Distributed Usage Control, 06.04. - 09.04.2010}, series = {Dagstuhl Seminar Proceedings}, volume = {10141}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2010}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2716/}, timestamp = {Thu, 10 Jun 2021 13:02:07 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/AccorsiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchropferKM10, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum and G{\"{u}}nter M{\"{u}}ller}, title = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2010}, url = {http://eprint.iacr.org/2010/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchropferKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/Muller09, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Was the Internet the Only Option? Which Way Should Business and Information Systems Engineering Go?}, journal = {Bus. Inf. Syst. Eng.}, volume = {1}, number = {1}, pages = {46--52}, year = {2009}, url = {https://doi.org/10.1007/s12599-008-0030-3}, doi = {10.1007/S12599-008-0030-3}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/Muller09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/LandLACHM09, author = {Frank Land and Claudia Loebbecke and Albert A. Angehrn and Eric K. Clemons and Alan R. Hevner and G{\"{u}}nter M{\"{u}}ller}, title = {{ICIS} 2008 Panel Report: Design Science in Information Systems: Hegemony, Bandwagon, or New Wave?}, journal = {Commun. Assoc. Inf. Syst.}, volume = {24}, pages = {29}, year = {2009}, url = {https://doi.org/10.17705/1cais.02429}, doi = {10.17705/1CAIS.02429}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/LandLACHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller09, author = {G{\"{u}}nter M{\"{u}}ller}, title = {War Internet die einzige Option? Welchen Weg soll die Wirtschaftsinformatik gehen?}, journal = {Wirtschaftsinf.}, volume = {51}, number = {1}, pages = {53--60}, year = {2009}, url = {https://doi.org/10.1007/s11576-008-0140-z}, doi = {10.1007/S11576-008-0140-Z}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/WohlgemuthMSE10, author = {Sven Wohlgemuth and G{\"{u}}nter M{\"{u}}ller and Noboru Sonehara and Isao Echizen}, title = {On Observable Delegation of Personal Data by Watermarking}, booktitle = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2009, Las Vegas, NV, USA, 10-13 Jan., 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CCNC.2009.4784940}, doi = {10.1109/CCNC.2009.4784940}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/WohlgemuthMSE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/WonnemannAM09, author = {Claus Wonnemann and Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, editor = {Sheikh Iqbal Ahamed and Elisa Bertino and Carl K. Chang and Vladimir Getov and Lin Liu and Ming Hua and Rajesh Subramanyan}, title = {On Information Flow Forensics in Business Application Scenarios}, booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2}, pages = {324--328}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/COMPSAC.2009.154}, doi = {10.1109/COMPSAC.2009.154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/WonnemannAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/WohlgemuthESM09, author = {Sven Wohlgemuth and Isao Echizen and Noboru Sonehara and G{\"{u}}nter M{\"{u}}ller}, editor = {Joaquim Filipe and David A. Marca and Boris Shishkov and Marten van Sinderen}, title = {On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking}, booktitle = {{ICE-B} 2009 - Proceedings of the International Conference on e-Business, Milan, Italy, July 7-10, 2009, {ICE-B} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {27--32}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Sat, 12 Sep 2009 14:07:05 +0200}, biburl = {https://dblp.org/rec/conf/icete/WohlgemuthESM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/WohlgemuthESM09, author = {Sven Wohlgemuth and Isao Echizen and Noboru Sonehara and G{\"{u}}nter M{\"{u}}ller}, editor = {Jeng{-}Shyang Pan and Yen{-}Wei Chen and Lakhmi C. Jain}, title = {On Privacy-aware Delegation of Personal Data using Digital Watermarking}, booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings}, pages = {56--59}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IIH-MSP.2009.313}, doi = {10.1109/IIH-MSP.2009.313}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/WohlgemuthESM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller08, author = {G{\"{u}}nter M{\"{u}}ller}, title = {{WI} - F{\"{u}}r Sie gelesen}, journal = {Wirtschaftsinf.}, volume = {50}, number = {2}, pages = {133--135}, year = {2008}, url = {https://doi.org/10.1365/s11576-008-0025-1}, doi = {10.1365/S11576-008-0025-1}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller08a, author = {G{\"{u}}nter M{\"{u}}ller}, title = {{WI} - F{\"{u}}r Sie gelesen}, journal = {Wirtschaftsinf.}, volume = {50}, number = {4}, pages = {322--323}, year = {2008}, url = {https://doi.org/10.1365/s11576-008-0066-5}, doi = {10.1365/S11576-008-0066-5}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/MullerT08, author = {G{\"{u}}nter M{\"{u}}ller and Orestis Terzidis}, title = {IT-Compliance und IT-Governance}, journal = {Wirtschaftsinf.}, volume = {50}, number = {5}, pages = {341--343}, year = {2008}, url = {https://doi.org/10.1007/s11576-008-0074-5}, doi = {10.1007/S11576-008-0074-5}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/MullerT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller08b, author = {G{\"{u}}nter M{\"{u}}ller}, title = {{WI} - F{\"{u}}r Sie gelesen}, journal = {Wirtschaftsinf.}, volume = {50}, number = {6}, pages = {508--509}, year = {2008}, url = {https://doi.org/10.1365/s11576-008-0097-y}, doi = {10.1365/S11576-008-0097-Y}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/LandLACHM08, author = {Frank Land and Claudia Loebbecke and Albert A. Angehrn and Eric K. Clemons and Alan R. Hevner and G{\"{u}}nter M{\"{u}}ller}, title = {Design Science in Information Systems: Hegemony, Bandwagon, or New Wave?}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2008, Paris, France, December 14-17, 2008}, pages = {1}, publisher = {Association for Information Systems}, year = {2008}, url = {http://aisel.aisnet.org/icis2008/1}, timestamp = {Tue, 09 Dec 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/LandLACHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mkwi/MullerK08, author = {G{\"{u}}nter M{\"{u}}ller and Wolfgang K{\"{o}}nig}, editor = {Martin Bichler and Thomas Hess and Helmut Krcmar and Ulrike Lechner and Florian Matthes and Arnold Picot and Benjamin Speitkamp and Petra Wolf}, title = {Vorwort: IT-Risikomangement: IT-Projekte und IT-Compliance}, booktitle = {Multikonferenz Wirtschaftsinformatik, {MKWI} 2008, M{\"{u}}nchen, 26.2.2008 - 28.2.2008, Proceedings}, publisher = {GITO-Verlag, Berlin}, year = {2008}, url = {http://ibis.in.tum.de/mkwi08/17\_IT-Risikomanagement\_-\_IT-Projekte\_und\_IT-Compliance/00\_IT-Risk\_Vorwort\_final.pdf}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mkwi/MullerK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/StrukerAM08, author = {Jens Str{\"{u}}ker and Rafael Accorsi and G{\"{u}}nter M{\"{u}}ller}, title = {On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail}, booktitle = {10th {IEEE} International Conference on E-Commerce Technology {(CEC} 2008) / 5th {IEEE} International Conference on Enterprise Computing, E-Commerce and E-Services {(EEE} 2008), July 21-14, 2008, Washington, DC, {USA}}, pages = {44--49}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CECandEEE.2008.101}, doi = {10.1109/CECANDEEE.2008.101}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/StrukerAM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/KahmerGM08, author = {Martin K{\"{a}}hmer and Maike Gilliot and G{\"{u}}nter M{\"{u}}ller}, title = {Automating Privacy Compliance with ExPDT}, booktitle = {10th {IEEE} International Conference on E-Commerce Technology {(CEC} 2008) / 5th {IEEE} International Conference on Enterprise Computing, E-Commerce and E-Services {(EEE} 2008), July 21-14, 2008, Washington, DC, {USA}}, pages = {87--94}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CECandEEE.2008.122}, doi = {10.1109/CECANDEEE.2008.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/KahmerGM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2008P8491, editor = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, title = {Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08491}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/08491/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2008P8491.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08, author = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, editor = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, title = {08491 Abstracts Collection - Theoretical Foundations of Practical Information Security}, booktitle = {Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08491}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1894/}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08a, author = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, editor = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, title = {08491 Executive Summary - Theoretical Foundations of Practical Information Security}, booktitle = {Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08491}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1893/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/MullerSGS07, author = {G{\"{u}}nter M{\"{u}}ller and Stefan Sackmann and Oliver G{\"{u}}nther and Sarah Spiekermann}, title = {Personalisierung und informationelle Selbstbestimmung Ein unaufl{\"{o}}sbarer Widerspruch?}, journal = {Wirtschaftsinf.}, volume = {49}, number = {1}, pages = {1--2}, year = {2007}, url = {https://doi.org/10.1007/s11576-007-0001-1}, doi = {10.1007/S11576-007-0001-1}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/MullerSGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/WeissKKGLMHBIPK07, author = {Daniel Wei{\ss} and J{\"{o}}rn Kaack and Stefan Kirn and Maike Gilliot and Lutz Lowis and G{\"{u}}nter M{\"{u}}ller and Andrea Herrmann and Carsten Binnig and Timea Illes and Barbara Paech and Donald Kossmann}, title = {Die SIKOSA-Methodik}, journal = {Wirtschaftsinf.}, volume = {49}, number = {3}, pages = {188--198}, year = {2007}, url = {https://doi.org/10.1007/s11576-007-0049-y}, doi = {10.1007/S11576-007-0049-Y}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/WeissKKGLMHBIPK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/Mueller07, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Enforceable Privacy Promises}, booktitle = {9th {IEEE} International Conference on E-Commerce Technology {(CEC} 2007) / 4th {IEEE} International Conference on Enterprise Computing, E-Commerce and E-Services {(EEE} 2007), 23-26 July 2007, National Center of Sciences, Tokyo, Japan}, pages = {6}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CEC-EEE.2007.45}, doi = {10.1109/CEC-EEE.2007.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/Mueller07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Muller06, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Introduction}, journal = {Commun. {ACM}}, volume = {49}, number = {9}, pages = {28--31}, year = {2006}, url = {https://doi.org/10.1145/1151030.1151051}, doi = {10.1145/1151030.1151051}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Muller06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller06, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Grid allein oder Vertrauen in Fremde wird teuer}, journal = {Wirtschaftsinf.}, volume = {48}, number = {1}, pages = {74--75}, year = {2006}, url = {https://doi.org/10.1007/s11576-006-0015-0}, doi = {10.1007/S11576-006-0015-0}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller06a, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Budgeting process for information security expenditures}, journal = {Wirtschaftsinf.}, volume = {48}, number = {4}, pages = {286--288}, year = {2006}, url = {https://doi.org/10.1007/s11576-006-0061-7}, doi = {10.1007/S11576-006-0061-7}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etrics/WohlgemuthM06, author = {Sven Wohlgemuth and G{\"{u}}nter M{\"{u}}ller}, editor = {G{\"{u}}nter M{\"{u}}ller}, title = {Privacy with Delegation of Rights by Identity Management}, booktitle = {Emerging Trends in Information and Communication Security, International Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {175--190}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11766155\_13}, doi = {10.1007/11766155\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/etrics/WohlgemuthM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/06/EymannMS06, author = {Torsten Eymann and G{\"{u}}nter M{\"{u}}ller and Moritz Strasser}, editor = {Stefan Kirn and Otthein Herzog and Peter C. Lockemann and Otto Spaniol}, title = {Self-Organized Scheduling in Hospitals by Connecting Agents and Mobile Devices}, booktitle = {Multiagent Engineering, Theory and Applications in Enterprises}, pages = {319--337}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/3-540-32062-8\_17}, doi = {10.1007/3-540-32062-8\_17}, timestamp = {Wed, 29 May 2019 09:31:45 +0200}, biburl = {https://dblp.org/rec/books/sp/06/EymannMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/etrics/2006, editor = {G{\"{u}}nter M{\"{u}}ller}, title = {Emerging Trends in Information and Communication Security, International Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3995}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11766155}, doi = {10.1007/11766155}, isbn = {3-540-34640-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/etrics/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/Muller05, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Die {FG} - Berichte aus den Instituten}, journal = {Prax. Inf.verarb. Kommun.}, volume = {28}, number = {1}, pages = {60--61}, year = {2005}, url = {https://doi.org/10.1515/PIKO.2005.60}, doi = {10.1515/PIKO.2005.60}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/Muller05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller05, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Success factors and impacts of mobile business applications: Results from a mobile e-procurement study}, journal = {Wirtschaftsinf.}, volume = {47}, number = {4}, pages = {298--299}, year = {2005}, url = {https://doi.org/10.1007/BF03254918}, doi = {10.1007/BF03254918}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/MullerENS04, author = {G{\"{u}}nter M{\"{u}}ller and Torsten Eymann and Norbert Nopper and Sven Seuken}, title = {{EMIKA} system: architecture and prototypic realization}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man {\&} Cybernetics: The Hague, Netherlands, 10-13 October 2004}, pages = {5621--5626}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICSMC.2004.1401089}, doi = {10.1109/ICSMC.2004.1401089}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/MullerENS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/StrukerSM04, author = {Jens Str{\"{u}}ker and Stefan Sackmann and G{\"{u}}nter M{\"{u}}ller}, title = {Case Study on Retail Customer Communication Applying Ubiquitous Computing}, booktitle = {2004 {IEEE} International Conference on E-Commerce Technology {(CEC} 2004), 6-9 July 2004, San Diego, CA, {USA}}, pages = {42--48}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ICECT.2004.1319716}, doi = {10.1109/ICECT.2004.1319716}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/StrukerSM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spc/2003, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95124}, doi = {10.1007/B95124}, isbn = {3-540-20887-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/WohlgemuthMJM03, author = {Sven Wohlgemuth and Daniela Gerd tom Markotten and Uwe Jendricke and G{\"{u}}nter M{\"{u}}ller}, title = {DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik"}, journal = {it Inf. Technol.}, volume = {45}, number = {1}, pages = {46--54}, year = {2003}, url = {https://doi.org/10.1524/itit.45.1.46.19028}, doi = {10.1524/ITIT.45.1.46.19028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/WohlgemuthMJM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/MullerE03, author = {G{\"{u}}nter M{\"{u}}ller and Claudia Eckert}, title = {Sicherheit an der Schnittstelle zum Nutzer}, journal = {Prax. Inf.verarb. Kommun.}, volume = {26}, number = {1}, pages = {2--4}, year = {2003}, url = {https://doi.org/10.1515/PIKO.2003.2}, doi = {10.1515/PIKO.2003.2}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/MullerE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/MarkottenWM03, author = {Daniela Gerd tom Markotten and Sven Wohlgemuth and G{\"{u}}nter M{\"{u}}ller}, title = {Mit Sicherheit zukunftsf{\"{a}}hig. DFG-Schwerpunktprogramm "Sicherheit in der Informations-und Kommunikationstechnik"}, journal = {Prax. Inf.verarb. Kommun.}, volume = {26}, number = {1}, pages = {5--14}, year = {2003}, url = {https://doi.org/10.1515/PIKO.2003.5}, doi = {10.1515/PIKO.2003.5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/MarkottenWM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/EymannSM03, author = {Torsten Eymann and Stefan Sackmann and G{\"{u}}nter M{\"{u}}ller}, title = {Hayeks Katallaxie - Ein zukunftsweisendes Konzept f{\"{u}}r die Wirtschaftsinformatik?}, journal = {Wirtschaftsinf.}, volume = {45}, number = {5}, pages = {491--496}, year = {2003}, url = {https://doi.org/10.1007/BF03250911}, doi = {10.1007/BF03250911}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/EymannSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/EymannSMP03, author = {Torsten Eymann and Stefan Sackmann and G{\"{u}}nter M{\"{u}}ller and Ingo Pippow}, title = {Hayek's Catallaxy: {A} Forward-Looking Concept for Information Systems?}, booktitle = {9th Americas Conference on Information Systems, {AMCIS} 2003, Tampa, FL, USA, August 4-6, 2003}, pages = {234}, publisher = {Association for Information Systems}, year = {2003}, url = {http://aisel.aisnet.org/amcis2003/234}, timestamp = {Mon, 09 Jan 2012 12:52:36 +0100}, biburl = {https://dblp.org/rec/conf/amcis/EymannSMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/MullerW03, author = {G{\"{u}}nter M{\"{u}}ller and Sven Wohlgemuth}, editor = {Klaus R. Dittrich and Wolfgang K{\"{o}}nig and Andreas Oberweis and Kai Rannenberg and Wolfgang Wahlster}, title = {Sichere IT-Systeme}, booktitle = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Innovative Informatikanwendungen, {INFORMATIK} 2003, Frankfurt am Main, Germany, September 29 - October 2, 2003, Band 1}, series = {{LNI}}, volume = {{P-34}}, pages = {87--90}, publisher = {{GI}}, year = {2003}, url = {https://dl.gi.de/handle/20.500.12116/29807}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/MullerW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/ZugenmaierKM03, author = {Alf Zugenmaier and Michael Kreutzer and G{\"{u}}nter M{\"{u}}ller}, editor = {Klaus Irmscher and Klaus{-}Peter F{\"{a}}hnrich}, title = {The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment}, booktitle = {Kommunikation in Verteilten Systemen (KiVS), 13. Fachtagung Kommunikation in Verteilten Systemen. KiVS 2003, 25.-28. Februar 2003, Leipzig, Kurzbeitr{\"{a}}ge, Praxisberichte und Workshop E-Learning}, pages = {131--141}, publisher = {{VDE} Verlag}, year = {2003}, timestamp = {Mon, 01 Mar 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kivs/ZugenmaierKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcm/SackmannEM02, author = {Stefan Sackmann and Torsten Eymann and G{\"{u}}nter M{\"{u}}ller}, editor = {Hans{-}Bernd Bludau and Andreas Koop}, title = {{EMIKA} - Real-Time Controlled Mobile Information Systems in Health Care Applications}, booktitle = {Mobile Computing in Medicine, Second Conference on Mobile Computing in Medicine, Workshop of the Project Group MoCoMed, GMDS-Fachbereich Medizinische Informatik {\&} GI-Fachausschuss 4.7, 11.4.2002, Heidelberg}, series = {{LNI}}, volume = {{P-15}}, pages = {151--158}, publisher = {{GI}}, year = {2002}, url = {https://dl.gi.de/handle/20.500.12116/30469}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mcm/SackmannEM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/p2p/EggsSEM02, author = {Holger Eggs and Stefan Sackmann and Torsten Eymann and G{\"{u}}nter M{\"{u}}ller}, editor = {Detlef Schoder and Kai Fischbach and Ren{\'{e}} Teichmann}, title = {Vertrauen und Reputation in P2P-Netzwerken}, booktitle = {Peer-to-Peer: {\"{O}}konomische, technische und juristische Perspektiven, Das aktuelle P2P-Buch}, pages = {229--254}, publisher = {Springer}, year = {2002}, timestamp = {Tue, 06 Aug 2019 09:56:05 +0200}, biburl = {https://dblp.org/rec/books/sp/p2p/EggsSEM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/MullerK01, author = {G{\"{u}}nter M{\"{u}}ller and Michael Kreutzer}, title = {Erst die neue Technologie, danach die Sicherheit!}, journal = {Informationstechnik Tech. Inform.}, volume = {43}, number = {5}, pages = {225--226}, year = {2001}, url = {https://doi.org/10.1524/itit.2001.43.5.225}, doi = {10.1524/ITIT.2001.43.5.225}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/MullerK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/EymannM01, author = {Torsten Eymann and G{\"{u}}nter M{\"{u}}ller}, editor = {Kurt Bauknecht and Wilfried Brauer and Thomas A. M{\"{u}}ck}, title = {Decentralized Electronic Markets - Economic Coordination of Multi-Agent Systems}, booktitle = {Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Wirtschaft und Wissenschaft in der Network Economy - Visionen und Wirklichkeit, Jahrestagung der {\"{O}}sterreichischen Computer Gesellschaft 2001, {INFORMATIK/OCG} 2001, Vienna, Austria, September 25-28, 2001, Band 2}, series = {Schriftenreihe der {\"{O}}sterreichischen Computer-Gesellschaft}, volume = {157}, pages = {981--990}, publisher = {Konstanz UVK-Verl.-Ges.}, year = {2001}, timestamp = {Fri, 17 Jul 2020 14:28:31 +0200}, biburl = {https://dblp.org/rec/conf/gi/EymannM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/01/Muller01a, author = {G{\"{u}}nter M{\"{u}}ller}, editor = {Hannes Werthner and Martin Bichler}, title = {Security in E-Commerce}, booktitle = {Lectures in E-Commerce}, series = {Springer Computer Science}, pages = {149--162}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-3-7091-6213-2\_7}, doi = {10.1007/978-3-7091-6213-2\_7}, timestamp = {Sun, 17 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/01/Muller01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ife/KappelMS00, author = {Gerti Kappel and G{\"{u}}nter M{\"{u}}ller and Franz Schober}, title = {Themenheft: Electronic Commerce - Editorial}, journal = {Inform. Forsch. Entwickl.}, volume = {15}, number = {4}, pages = {181}, year = {2000}, url = {https://doi.org/10.1007/s004500000064}, doi = {10.1007/S004500000064}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ife/KappelMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/MullerM00, author = {G{\"{u}}nter M{\"{u}}ller and Daniela Gerd tom Markotten}, title = {Sicherheit in der Kommunikations- und Informationstechnik}, journal = {Wirtschaftsinf.}, volume = {42}, number = {6}, pages = {487--488}, year = {2000}, url = {https://doi.org/10.1007/BF03250764}, doi = {10.1007/BF03250764}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/MullerM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/MullerM00a, author = {G{\"{u}}nter M{\"{u}}ller and Kevin S. McCurley}, title = {Interview}, journal = {Wirtschaftsinf.}, volume = {42}, number = {6}, pages = {547--549}, year = {2000}, url = {https://doi.org/10.1007/BF03250772}, doi = {10.1007/BF03250772}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/MullerM00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ife/MullerR99, author = {G{\"{u}}nter M{\"{u}}ller and Kai Rannenberg}, title = {Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm}, journal = {Inform. Forsch. Entwickl.}, volume = {14}, number = {1}, pages = {46--48}, year = {1999}, url = {https://doi.org/10.1007/s004500050123}, doi = {10.1007/S004500050123}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ife/MullerR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/SchoderM99, author = {Detlef Schoder and G{\"{u}}nter M{\"{u}}ller}, title = {Potentiale und H{\"{u}}rden des Electronic Commerce: Eine Momentaufnahme}, journal = {Inform. Spektrum}, volume = {22}, number = {4}, pages = {252--260}, year = {1999}, url = {https://doi.org/10.1007/s002870050142}, doi = {10.1007/S002870050142}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/SchoderM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/GoldKKM99, author = {S. Gold and Dirk O. Keck and Paul J. K{\"{u}}hn and G{\"{u}}nter M{\"{u}}ller}, title = {Sichere Telekommunikationsdienste mit intelligenten Netzen}, journal = {Prax. Inf.verarb. Kommun.}, volume = {22}, number = {2}, pages = {71--76}, year = {1999}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/GoldKKM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/MullerR99, author = {G{\"{u}}nter M{\"{u}}ller and Kai Rannenberg}, title = {Sicherheit, auch das noch!?!}, journal = {Prax. Inf.verarb. Kommun.}, volume = {22}, number = {3}, pages = {138--139}, year = {1999}, url = {https://doi.org/10.1515/piko.1999.22.3.138}, doi = {10.1515/PIKO.1999.22.3.138}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/MullerR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Muller99, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Vernetzte kleine und mittlere Unternhemen}, journal = {Wirtschaftsinf.}, volume = {41}, number = {4}, pages = {305--306}, year = {1999}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Muller99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/SchoderHM97, author = {Detlef Schoder and Thomas Hummel and G{\"{u}}nter M{\"{u}}ller}, editor = {Matthias Jarke and Klaus Pasedach and Klaus Pohl}, title = {Interdisziplin{\"{a}}re Modelle f{\"{u}}r Entwurf und Einsatz telematischer Systeme: Grunds{\"{a}}tzliche Probleme diskutiert am Beispiel des "Freiburger Schichtenmodells der Telematik"}, booktitle = {Informatik '97, Informatik als Innovationsmotor, 27. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Aachen, 24.-26. September 1997}, series = {Informatik Aktuell}, pages = {277--286}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/978-3-642-60831-5\_36}, doi = {10.1007/978-3-642-60831-5\_36}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/SchoderHM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/vi/97/MRRS1997, editor = {G{\"{u}}nter M{\"{u}}ller and Kai Rannenberg and Manfred Reitenspie{\ss} and Helmut Stiegler}, title = {Verl{\"{a}}{\ss}liche IT-Systeme - Zwischen Key Escrow und elektronischem Geld}, series = {DuD-Fachbeitr{\"{a}}ge}, publisher = {Vieweg+Teubner Verlag}, year = {1997}, url = {https://doi.org/10.1007/978-3-322-86842-8}, doi = {10.1007/978-3-322-86842-8}, isbn = {978-3-528-05594-3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/vi/97/MRRS1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/MullerB96, author = {G{\"{u}}nter M{\"{u}}ller and Herbert Bunz}, title = {Sicherheit in der Kommunikationstechnik}, journal = {Informationstechnik Tech. Inform.}, volume = {38}, number = {4}, pages = {5--6}, year = {1996}, url = {https://doi.org/10.1524/itit.1996.38.4.5}, doi = {10.1524/ITIT.1996.38.4.5}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/MullerB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/RannenbergPM96, author = {Kai Rannenberg and Andreas Pfitzmann and G{\"{u}}nter M{\"{u}}ller}, title = {Sicherheit, insbesondere mehrseitige IT-Sicherheit}, journal = {Informationstechnik Tech. Inform.}, volume = {38}, number = {4}, pages = {7--10}, year = {1996}, url = {https://doi.org/10.1524/itit.1996.38.4.7}, doi = {10.1524/ITIT.1996.38.4.7}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/RannenbergPM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/MullerS96, author = {G{\"{u}}nter M{\"{u}}ller and Frank Stoll}, title = {Der Freiburger Kommunikationsassistent}, journal = {Prax. Inf.verarb. Kommun.}, volume = {19}, number = {4}, pages = {189--197}, year = {1996}, url = {http://www.degruyter.com/view/j/piko.1996.19.issue-4/piko.1996.19.4.179/piko.1996.19.4.179.xml}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/MullerS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/StraussSM96, author = {Ralf E. Strauss and Detlef Schoder and G{\"{u}}nter M{\"{u}}ller}, editor = {Nobuyoshi Terashima and Edward Altman}, title = {Wired cities - opportunities for small and medium sized cities on the information highway}, booktitle = {Advanced {IT} Tools, {IFIP} World Conference on {IT} Tools, 2-6 September 1996, Canberra, Australia.}, pages = {3--10}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Sun, 28 Jul 2019 13:03:48 +0200}, biburl = {https://dblp.org/rec/conf/ifip/StraussSM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gesellschaft/Muller92, author = {G{\"{u}}nter M{\"{u}}ller}, editor = {Werner Langenheder and G{\"{u}}nter M{\"{u}}ller and Britta Schinzel}, title = {Einf{\"{u}}hrung}, booktitle = {Informatik cui bono? {GI-FB} 8 Fachtagung, Freiburg, 23.-26. September 1992, Proceedings}, series = {Informatik Aktuell}, pages = {144}, publisher = {Springer}, year = {1992}, timestamp = {Thu, 25 May 2017 00:40:49 +0200}, biburl = {https://dblp.org/rec/conf/gesellschaft/Muller92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gesellschaft/1992, editor = {Werner Langenheder and G{\"{u}}nter M{\"{u}}ller and Britta Schinzel}, title = {Informatik cui bono? {GI-FB} 8 Fachtagung, Freiburg, 23.-26. September 1992, Proceedings}, series = {Informatik Aktuell}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/978-3-642-77808-7}, doi = {10.1007/978-3-642-77808-7}, isbn = {3-540-55957-4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gesellschaft/1992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Muller91, author = {G{\"{u}}nter M{\"{u}}ller}, editor = {Hermann A. Maurer}, title = {Current Trends in Distributed Systems}, booktitle = {New Results and New Trends in Computer Science, Graz, Austria, June 20-21, 1991, Proceedings [on occasion of H. Maurer's 50th birthday]}, series = {Lecture Notes in Computer Science}, volume = {555}, pages = {204--224}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0038191}, doi = {10.1007/BFB0038191}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Muller91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/kivs/1991, editor = {Wolfgang Effelsberg and Hans Werner Meuer and G{\"{u}}nter M{\"{u}}ller}, title = {Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung, Mannheim, 20.-22. Februar 1991, Proceedings}, series = {Informatik-Fachberichte}, volume = {267}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/978-3-642-76462-2}, doi = {10.1007/978-3-642-76462-2}, isbn = {3-540-53721-X}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kivs/1991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/lockemannS87/BlaserJLM87, author = {Albrecht Blaser and Matthias Jarke and Hein Lehmann and G{\"{u}}nter M{\"{u}}ller}, editor = {Peter C. Lockemann and Joachim W. Schmidt}, title = {Datenbanksprachen und Datenbankbenutzung}, booktitle = {Datenbankhandbuch}, pages = {559--635}, publisher = {Springer}, year = {1987}, timestamp = {Mon, 05 Aug 2019 12:54:07 +0200}, biburl = {https://dblp.org/rec/books/sp/lockemannS87/BlaserJLM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ibm/1986, editor = {G{\"{u}}nter M{\"{u}}ller and Robert P. Blanc}, title = {Networking in Open Systems, International Seminar, Oberlech, Austria, August 18-22, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {248}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/BFb0026949}, doi = {10.1007/BFB0026949}, isbn = {3-540-17707-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ibm/1986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Muller86a, author = {G{\"{u}}nter M{\"{u}}ller}, title = {Projektierungsstrategie f{\"{u}}r Mikrorechner-Automatisierungsanlagen}, school = {Otto-von-Guericke University Magdeburg, Germany}, year = {1986}, url = {https://d-nb.info/920288847}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Muller86a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ibm/Muller86, author = {G{\"{u}}nter M{\"{u}}ller}, editor = {G{\"{u}}nter M{\"{u}}ller and Robert P. Blanc}, title = {{ENC} - {IBM} European Networking Center}, booktitle = {Networking in Open Systems, International Seminar, Oberlech, Austria, August 18-22, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {248}, pages = {437--440}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/BFb0026975}, doi = {10.1007/BFB0026975}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ibm/Muller86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.