BibTeX records: Eberhard von Faber

download as .bib file

@article{DBLP:journals/dud/Faber22,
  author       = {Eberhard von Faber},
  title        = {Vorschlag zur Verbesserung von Cloud-Sicherheitsstandards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {1},
  pages        = {45--51},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1559-x},
  doi          = {10.1007/S11623-022-1559-X},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Faber22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber22a,
  author       = {Eberhard von Faber},
  title        = {Zw{\"{o}}lf Prinzipien f{\"{u}}r systematische IT-Service-Security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {11},
  pages        = {703--706},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1687-3},
  doi          = {10.1007/S11623-022-1687-3},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Faber22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber21,
  author       = {Eberhard von Faber},
  title        = {Zur Zukunft des IT-Sicherheitsmanagements angesichts des Wandels von
                  Technik und Serviceerbringung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {10},
  pages        = {691--697},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1516-0},
  doi          = {10.1007/S11623-021-1516-0},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19,
  author       = {Eberhard von Faber},
  title        = {Null-Fehler-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {393},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1131-5},
  doi          = {10.1007/S11623-019-1131-5},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19a,
  author       = {Eberhard von Faber},
  title        = {IT-Sicherheit 5.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {397},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1132-4},
  doi          = {10.1007/S11623-019-1132-4},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber19b,
  author       = {Eberhard von Faber},
  title        = {Methoden: , , Secured by definition'' und die Umsetzung von Prinzipien
                  aus dem Qualit{\"{a}}tsmanagement},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {410--417},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1136-0},
  doi          = {10.1007/S11623-019-1136-0},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FaberK19,
  author       = {Eberhard von Faber and
                  Arndt Kohler},
  title        = {Die L{\"{u}}cke: Informationssicherheit in Systemen mit k{\"{u}}nstlicher
                  Intelligenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {7},
  pages        = {434--439},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1139-x},
  doi          = {10.1007/S11623-019-1139-X},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FaberK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FaberS17,
  author       = {Eberhard von Faber and
                  Walter Sedlacek},
  title        = {Spieltheorie im Dienst der IT-Sicherheit im Internet-der-Dinge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {41},
  number       = {7},
  pages        = {440--447},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11623-017-0808-x},
  doi          = {10.1007/S11623-017-0808-X},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FaberS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber16,
  author       = {Eberhard von Faber},
  title        = {Digitalisierung, IT-Outsourcing, Informationssicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {40},
  number       = {10},
  pages        = {629},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11623-016-0671-1},
  doi          = {10.1007/S11623-016-0671-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber16a,
  author       = {Eberhard von Faber},
  title        = {Organisation und Absicherung einer industriellen IT-Produktion},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {40},
  number       = {10},
  pages        = {647--653},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11623-016-0676-9},
  doi          = {10.1007/S11623-016-0676-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faber16b,
  author       = {Eberhard von Faber},
  title        = {IT-Outsourcing - Sicherheit neu denken!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {40},
  number       = {10},
  pages        = {680},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11623-016-0681-z},
  doi          = {10.1007/S11623-016-0681-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faber16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Faber15,
  author       = {Eberhard von Faber},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Changing the Security Mode of Operation in a Global {IT} Organization
                  with 20000+ Technical Staff},
  booktitle    = {{ISSE} 2015 - Highlights of the Information Security Solutions Europe
                  2015 Conference, Berlin, Germany, November 1-2, 2015},
  pages        = {286--304},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-658-10934-9\_24},
  doi          = {10.1007/978-3-658-10934-9\_24},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Faber15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Faber14,
  author       = {Eberhard von Faber},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {In-House Standardization of Security Measures: Necessity, Benefits
                  and Realworld Obstructions},
  booktitle    = {{ISSE} 2014 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2014 Conference, Brussels,
                  Belgium, October 14-15, 2014},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-658-06708-3\_2},
  doi          = {10.1007/978-3-658-06708-3\_2},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Faber14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/FaberB13,
  author       = {Eberhard von Faber and
                  Wolfgang Behnsen},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {A security Taxonomy that facilitates Protecting an industrial {ICT}
                  Production and how it really provides Transparency},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_8},
  doi          = {10.1007/978-3-658-03371-2\_8},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/FaberB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/FaberB12,
  author       = {Eberhard von Faber and
                  Wolfgang Behnsen},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {A Systematic Holistic Approach for Providers to Deliver Secure {ICT}
                  Services},
  booktitle    = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2012 Conference, Brussels,
                  Belgium, October 23-24, 2012},
  pages        = {80--88},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-658-00333-3\_9},
  doi          = {10.1007/978-3-658-00333-3\_9},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/FaberB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/FaberP10,
  author       = {Eberhard von Faber and
                  Michael Pauly},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {User Risk Management Strategies and Models - Adaption for Cloud Computing},
  booktitle    = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2010 Conference, Berlin,
                  Germany, October 5-7, 2010},
  pages        = {80--90},
  publisher    = {Vieweg+Teubner},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-8348-9788-6\_8},
  doi          = {10.1007/978-3-8348-9788-6\_8},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/FaberP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Faber09,
  author       = {Eberhard von Faber},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Measuring Information Security: Guidelines to Build Metrics},
  booktitle    = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2009 Conference, The Hague,
                  The Netherlands, October 6-8, 2009},
  pages        = {17--26},
  publisher    = {Vieweg+Teubner},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-8348-9363-5\_2},
  doi          = {10.1007/978-3-8348-9363-5\_2},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Faber09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Faber08,
  author       = {Eberhard von Faber},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {How Economy and Society affect Enterprise Security Management},
  booktitle    = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of
                  the Information Security Solutions Europe 2008 Conference, 7-9 October
                  2008, Madrid, Spain},
  pages        = {77--83},
  publisher    = {Vieweg+Teubner},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-8348-9283-6\_7},
  doi          = {10.1007/978-3-8348-9283-6\_7},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Faber08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Faber99,
  author       = {Eberhard von Faber},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Security Evaluation Schemas for the Public and Private Market with
                  a Focus on Smart Card Systems},
  booktitle    = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5\_17},
  doi          = {10.1007/3-540-48059-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Faber99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HammelrathH97,
  author       = {Eberhard von Faber and
                  R. Hammelrath and
                  F.{-}P. Heider},
  title        = {The Secure Distribution of Digital Contents},
  booktitle    = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
                  8-12 December 1997, San Diego, CA, {USA}},
  pages        = {16},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSAC.1997.646169},
  doi          = {10.1109/CSAC.1997.646169},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HammelrathH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics