Optimization of access control policies S Kern, T Baumer, S Groll, L Fuchs, G Pernul Journal of Information Security and Applications 70, 103301, 2022 | 19 | 2022 |
Security enumerations for cyber-physical systems D Schlette, F Menges, T Baumer, G Pernul Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 …, 2020 | 9 | 2020 |
System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC T Baumer, M Müller, G Pernul IEEE Access, 2023 | 8 | 2023 |
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach S Kern, T Baumer, L Fuchs, G Pernul IFIP Annual Conference on Data and Applications Security and Privacy, 223-242, 2023 | 6 | 2023 |
Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations T Baumer, T Reittinger, S Kern, G Pernul Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 239-258, 2024 | 1 | 2024 |
A Trust and Reputation System for Examining Compliance with Access Control T Baumer, J Grill, J Adan, G Pernul Proceedings of the 19th International Conference on Availability …, 2024 | | 2024 |
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence A Puchta, T Baumer, M Müller, G Pernul IFIP Annual Conference on Data and Applications Security and Privacy, 44-52, 2024 | | 2024 |