BibTeX records: Günter Müller

download as .bib file

@article{DBLP:journals/dud/RuckeshauserBM17,
  author       = {Nadine R{\"{u}}ckesh{\"{a}}user and
                  Christian Brenig and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Blockchains als Grundlage digitaler Gesch{\"{a}}ftsmodelle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {41},
  number       = {8},
  pages        = {492--496},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11623-017-0818-8},
  doi          = {10.1007/S11623-017-0818-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RuckeshauserBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/BetzWM17,
  author       = {Johann Betz and
                  Dirk Westhoff and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Survey on covert channels in virtual machines and cloud computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {28},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/ett.3134},
  doi          = {10.1002/ETT.3134},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/BetzWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/topnoc/HoldererCTM17,
  author       = {Julius Holderer and
                  Josep Carmona and
                  Farbod Taymouri and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Log- and Model-Based Techniques for Security-Sensitive Tackling of
                  Obstructed Workflow Executions},
  journal      = {Trans. Petri Nets Other Model. Concurr.},
  volume       = {12},
  pages        = {43--69},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-55862-1\_3},
  doi          = {10.1007/978-3-662-55862-1\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/topnoc/HoldererCTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apn/HoldererCM16,
  author       = {Julius Holderer and
                  Josep Carmona and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Wil M. P. van der Aalst and
                  Robin Bergenthum and
                  Josep Carmona},
  title        = {Security-Sensitive Tackling of Obstructed Workow Executions},
  booktitle    = {Proceedings of the International Workshop on Algorithms {\&} Theories
                  for the Analysis of Event Data 2016 Satellite event of the conferences:
                  37th International Conference on Application and Theory of Petri Nets
                  and Concurrency Petri Nets 2016 and 16th International Conference
                  on Application of Concurrency to System Design {ACSD} 2016, Torun,
                  Poland, June 20-21, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1592},
  pages        = {126--137},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1592/paper09.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:38 +0100},
  biburl       = {https://dblp.org/rec/conf/apn/HoldererCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/CabinakovaZM16,
  author       = {Johana Cabinakova and
                  Christian Zimmermann and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {An Empirical Analysis of Privacy Dashboard Acceptance: the Google
                  Case},
  booktitle    = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul,
                  Turkey, June 12-15, 2016},
  pages        = {Research Paper 114},
  year         = {2016},
  url          = {http://aisel.aisnet.org/ecis2016\_rp/114},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/CabinakovaZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/EymannLPKML15,
  author       = {Torsten Eymann and
                  Christine Legner and
                  Manfred Prenzel and
                  Helmut Krcmar and
                  G{\"{u}}nter M{\"{u}}ller and
                  Peter Liggesmeyer},
  title        = {Addressing Grand Challenges - Implications for {BISE} Research},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {57},
  number       = {6},
  pages        = {409--416},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12599-015-0408-y},
  doi          = {10.1007/S12599-015-0408-Y},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/EymannLPKML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/KarweM15,
  author       = {Markus Karwe and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Witold Abramowicz},
  title        = {{DPIP:} {A} Demand Response Privacy Preserving Interaction Protocol
                  - For Trusted Third Party Involvement},
  booktitle    = {Business Information Systems Workshops - {BIS} 2015 International
                  Workshops, Pozna{\'{n}}, Poland, June 24-26, 2015, Revised Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {228},
  pages        = {224--234},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26762-3\_20},
  doi          = {10.1007/978-3-319-26762-3\_20},
  timestamp    = {Sat, 19 Oct 2019 20:06:46 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/KarweM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/BrenigAM15,
  author       = {Christian Brenig and
                  Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {J{\"{o}}rg Becker and
                  Jan vom Brocke and
                  Marco de Marco},
  title        = {Economic Analysis of Cryptocurrency Backed Money Laundering},
  booktitle    = {23rd European Conference on Information Systems, {ECIS} 2015, M{\"{u}}nster,
                  Germany, May 26-29, 2015},
  year         = {2015},
  url          = {http://aisel.aisnet.org/ecis2015\_cr/20},
  timestamp    = {Thu, 22 Feb 2018 16:52:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/BrenigAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/HoldererAM15,
  author       = {Julius Holderer and
                  Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Roger L. Wainwright and
                  Juan Manuel Corchado and
                  Alessio Bechini and
                  Jiman Hong},
  title        = {When four-eyes become too much: a survey on the interplay of authorization
                  constraints and workflow resilience},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
                  Salamanca, Spain, April 13-17, 2015},
  pages        = {1245--1248},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2695664.2699497},
  doi          = {10.1145/2695664.2699497},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/HoldererAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/Dstep/Muller14,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  editor       = {Jens{-}Matthias Bohli and
                  Friedbert Kaspar and
                  Dirk Westhoff},
  title        = {Datenschutz: Ein Auslaufmodell?},
  booktitle    = {Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit
                  in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP
                  2014, Hochschule Furtwangen},
  pages        = {3},
  publisher    = {De Gruyter Oldenbourg},
  year         = {2014},
  timestamp    = {Fri, 10 Dec 2021 14:09:50 +0100},
  biburl       = {https://dblp.org/rec/conf/Dstep/Muller14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZimmermannAM14,
  author       = {Christian Zimmermann and
                  Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy},
  booktitle    = {Ninth International Conference on Availability, Reliability and Security,
                  {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014},
  pages        = {152--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ARES.2014.27},
  doi          = {10.1109/ARES.2014.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZimmermannAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/KarweM13,
  author       = {Markus Karwe and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Transaktionspseudonymit{\"{a}}t f{\"{u}}r Demand-Response-Anwendungen},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {291},
  pages        = {52--59},
  year         = {2013},
  url          = {http://www.dpunkt.de/hmdissues/291/05.php},
  doi          = {10.1007/BF03340815},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/KarweM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/MullerW13,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Wolfgang Wahlster},
  title        = {Placing Humans in the Feedback Loop of Social Infrastructures - {NII}
                  Research Strategies on Cyber-Physical Systems},
  journal      = {Inform. Spektrum},
  volume       = {36},
  number       = {6},
  pages        = {520--529},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00287-013-0735-7},
  doi          = {10.1007/S00287-013-0735-7},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/MullerW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/BohrLM13,
  author       = {Frank B{\"{o}}hr and
                  Linh Thao Ly and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Business Process Security Analysis - Design Time, Run Time, Audit
                  Time},
  journal      = {it Inf. Technol.},
  volume       = {55},
  number       = {6},
  pages        = {217--224},
  year         = {2013},
  url          = {https://doi.org/10.1524/itit.2013.2001},
  doi          = {10.1524/ITIT.2013.2001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/BohrLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/MullerA13,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Rafael Accorsi},
  editor       = {Marc Fischlin and
                  Stefan Katzenbeisser},
  title        = {Why Are Business Processes Not Secure?},
  booktitle    = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {8260},
  pages        = {240--254},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42001-6\_17},
  doi          = {10.1007/978-3-642-42001-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/MullerA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/MullerKA13,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Thomas G. Koslowski and
                  Rafael Accorsi},
  editor       = {Witold Abramowicz},
  title        = {Resilience - {A} New Research Field in Business Information Systems?},
  booktitle    = {Business Information Systems Workshops - {BIS} 2013 International
                  Workshops, Pozna{\'{n}}, Poland, June 19-20, 2013, Revised Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {160},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41687-3\_2},
  doi          = {10.1007/978-3-642-41687-3\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/MullerKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AccorsiSM13,
  author       = {Rafael Accorsi and
                  Thomas Stocker and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {On the exploitation of process mining for security audits: the process
                  discovery case},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1462--1468},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480634},
  doi          = {10.1145/2480362.2480634},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/AccorsiSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AccorsiM13,
  author       = {Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Preventive Inference Control in Data-centric Business Models},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 23-24, 2013},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SPW.2013.25},
  doi          = {10.1109/SPW.2013.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AccorsiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/shonan-reports/EchizenMST13,
  author       = {Isao Echizen and
                  G{\"{u}}nter M{\"{u}}ller and
                  Ry{\^{o}}ichi Sasaki and
                  A Min Tjoa},
  title        = {Privacy by Transparency for Data-Centric Services {(NII} Shonan Meeting
                  2013-5)},
  journal      = {{NII} Shonan Meet. Rep.},
  volume       = {2013},
  year         = {2013},
  url          = {https://shonan.nii.ac.jp/seminars/032/},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/shonan-reports/EchizenMST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/BuhlFMR12,
  author       = {Hans Ulrich Buhl and
                  Gilbert Fridgen and
                  G{\"{u}}nter M{\"{u}}ller and
                  Maximilian R{\"{o}}glinger},
  title        = {On Dinosaurs, Measurement Ideologists, Separatists, and Happy Souls
                  - Proposing and Justifying a Way to Make the Global {IS/BISE} Community
                  Happy},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {4},
  number       = {6},
  pages        = {307--315},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12599-012-0239-z},
  doi          = {10.1007/S12599-012-0239-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/BuhlFMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/BuhlMFR12,
  author       = {Hans Ulrich Buhl and
                  G{\"{u}}nter M{\"{u}}ller and
                  Gilbert Fridgen and
                  Maximilian R{\"{o}}glinger},
  title        = {Business and Information Systems Engineering: {A} Complementary Approach
                  to Information Systems - What We Can Learn from the Past and May Conclude
                  from Present Reflection on the Future},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {13},
  number       = {4},
  pages        = {3},
  year         = {2012},
  url          = {https://doi.org/10.17705/1jais.00292},
  doi          = {10.17705/1JAIS.00292},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/BuhlMFR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/BuhlFMR12,
  author       = {Hans Ulrich Buhl and
                  Gilbert Fridgen and
                  G{\"{u}}nter M{\"{u}}ller and
                  Maximilian R{\"{o}}glinger},
  title        = {Von Dinosauriern, Tonnenideologen, Separatisten und gl{\"{u}}cklichen
                  Seelen - Vorschlag und Begr{\"{u}}ndung eines Wegs, um die weltweite
                  IS/WI-Community gl{\"{u}}cklich zu machen},
  journal      = {Wirtschaftsinf.},
  volume       = {54},
  number       = {6},
  pages        = {293--302},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11576-012-0342-2},
  doi          = {10.1007/S11576-012-0342-2},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/BuhlFMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qi/FlenderM12,
  author       = {Christian Flender and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Jerome R. Busemeyer and
                  Fran{\c{c}}ois Dubois and
                  Ariane Lambert{-}Mogiliansky and
                  Massimo Melucci},
  title        = {Type Indeterminacy in Privacy Decisions: The Privacy Paradox Revisited},
  booktitle    = {Quantum Interaction - 6th International Symposium, {QI} 2012, Paris,
                  France, June 27-29, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7620},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35659-9\_14},
  doi          = {10.1007/978-3-642-35659-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/qi/FlenderM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/MullerSEW11,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Noboru Sonehara and
                  Isao Echizen and
                  Sven Wohlgemuth},
  title        = {Sustainable Cloud Computing},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {129--131},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12599-011-0159-3},
  doi          = {10.1007/S12599-011-0159-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bise/MullerSEW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/BuhlWMBH11,
  author       = {Hans Ulrich Buhl and
                  Robert Winter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Martin Bichler and
                  Armin Heinzl},
  title        = {{BISE} - Call for Papers - {BISE} Workshop Within the {MKWI} 2012},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {253},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12599-011-0163-7},
  doi          = {10.1007/S12599-011-0163-7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/BuhlWMBH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/HaasWESM11,
  author       = {Sebastian Haas and
                  Sven Wohlgemuth and
                  Isao Echizen and
                  Noboru Sonehara and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Aspects of privacy for electronic health records},
  journal      = {Int. J. Medical Informatics},
  volume       = {80},
  number       = {2},
  pages        = {e26--e31},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijmedinf.2010.10.001},
  doi          = {10.1016/J.IJMEDINF.2010.10.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/HaasWESM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/WohlgemuthESM11,
  author       = {Sven Wohlgemuth and
                  Isao Echizen and
                  Noboru Sonehara and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {On Privacy-compliant Disclosure of Personal Data to Third Parties
                  using Digital Watermarking},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {2},
  number       = {3},
  pages        = {270--281},
  year         = {2011},
  url          = {http://bit.kuas.edu.tw/\%7Ejihmsp/2011/vol2/JIH-MSP-2011-04-007.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/WohlgemuthESM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/MullerSEW11,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Noboru Sonehara and
                  Isao Echizen and
                  Sven Wohlgemuth},
  title        = {Nachhaltiges Computing in Clouds},
  journal      = {Wirtschaftsinf.},
  volume       = {53},
  number       = {3},
  pages        = {123--125},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11576-011-0273-3},
  doi          = {10.1007/S11576-011-0273-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/MullerSEW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/BuhlWMBH11,
  author       = {Hans Ulrich Buhl and
                  Robert Winter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Martin Bichler and
                  Armin Heinzl},
  title        = {{WI} - Call for Papers - BISE-Workshop im Rahmen der {MKWI} 2012},
  journal      = {Wirtschaftsinf.},
  volume       = {53},
  number       = {4},
  pages        = {249},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11576-011-0277-z},
  doi          = {10.1007/S11576-011-0277-Z},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/BuhlWMBH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wm/MullerSEW11,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Arnt Syirng and
                  Holger Eggs and
                  Stefan Wenzel},
  title        = {Risikomanagement und Vertrauensbildung im Cloud Computing},
  journal      = {Wirtschaftsinformatik Manag.},
  volume       = {3},
  number       = {5},
  pages        = {66--73},
  year         = {2011},
  url          = {https://doi.org/10.1365/s35764-011-0080-z},
  doi          = {10.1365/S35764-011-0080-Z},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wm/MullerSEW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SchropferKM11,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation},
  booktitle    = {Proceedings of the 35th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
                  July 2011},
  pages        = {298--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMPSAC.2011.46},
  doi          = {10.1109/COMPSAC.2011.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SchropferKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/BuhlM10,
  author       = {Hans Ulrich Buhl and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {The "Transparent Citizen" in Web 2.0 - Challenges of the
                  "Virtual Striptease"},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {2},
  number       = {4},
  pages        = {203--206},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12599-010-0113-9},
  doi          = {10.1007/S12599-010-0113-9},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/BuhlM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/MullerAHS10,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Rafael Accorsi and
                  Sebastian H{\"{o}}hn and
                  Stefan Sackmann},
  title        = {Sichere Nutzungskontrolle f{\"{u}}r mehr Transparenz in Finanzm{\"{a}}rkten},
  journal      = {Inform. Spektrum},
  volume       = {33},
  number       = {1},
  pages        = {3--13},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00287-009-0405-y},
  doi          = {10.1007/S00287-009-0405-Y},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/MullerAHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/WohlgemuthEMS10,
  author       = {Sven Wohlgemuth and
                  Isao Echizen and
                  G{\"{u}}nter M{\"{u}}ller and
                  Noboru Sonehara},
  title        = {Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz
                  der Privatsph{\"{a}}re bei der Weitergabe pers{\"{o}}nlicher
                  Daten an Dritte)},
  journal      = {it Inf. Technol.},
  volume       = {52},
  number       = {6},
  pages        = {350--355},
  year         = {2010},
  url          = {https://doi.org/10.1524/itit.2010.0614},
  doi          = {10.1524/ITIT.2010.0614},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/WohlgemuthEMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/BuhlM10,
  author       = {Hans Ulrich Buhl and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Der "gl{\"{a}}serne B{\"{u}}rger" im Web 2.0 -
                  Herausforderungen des "virtuellen Striptease"},
  journal      = {Wirtschaftsinf.},
  volume       = {52},
  number       = {4},
  pages        = {193--197},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11576-010-0230-6},
  doi          = {10.1007/S11576-010-0230-6},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/BuhlM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/TharaudWESML10,
  author       = {J{\'{e}}r{\'{e}}mie Tharaud and
                  Sven Wohlgemuth and
                  Isao Echizen and
                  Noboru Sonehara and
                  G{\"{u}}nter M{\"{u}}ller and
                  Pascal Lafourcade},
  editor       = {Isao Echizen and
                  Jeng{-}Shyang Pan and
                  Dieter W. Fellner and
                  Alexander Nouak and
                  Arjan Kuijper and
                  Lakhmi C. Jain},
  title        = {Privacy by Data Provenance with Digital Watermarking - {A} Proof-of-Concept
                  Implementation for Medical Services with Electronic Health Records},
  booktitle    = {Sixth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
                  15-17 October, 2010, Proceedings},
  pages        = {510--513},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IIHMSP.2010.130},
  doi          = {10.1109/IIHMSP.2010.130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/TharaudWESML10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mkwi/MullerKSR10,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Dennis Kundisch and
                  Stefan Sackmann and
                  Frank Romeike},
  editor       = {Matthias Schumann and
                  Lutz M. Kolbe and
                  Michael H. Breitner and
                  Arne Frerichs},
  title        = {Vorwort},
  booktitle    = {Multikonferenz Wirtschaftsinformatik, {MKWI} 2010, G{\"{o}}ttingen,
                  Deutschland, 23.-25.2.2010, Proceedings},
  pages        = {2123--2124},
  publisher    = {Universit{\"{a}}tsverlag G{\"{o}}ttingen},
  year         = {2010},
  url          = {http://webdoc.sub.gwdg.de/univerlag/2010/mkwi/03\_anwendungen/integriertes\_ertrags-risikomanagement/00\_vorwort.pdf},
  timestamp    = {Thu, 12 Mar 2020 11:37:25 +0100},
  biburl       = {https://dblp.org/rec/conf/mkwi/MullerKSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/HaasHRAMM10,
  author       = {Sebastian Haas and
                  Ralph Herkenh{\"{o}}ner and
                  Denis Royer and
                  Ammar Alkassar and
                  Hermann de Meer and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Penny Duquenoy and
                  Marit Hansen and
                  Ronald Leenes and
                  Ge Zhang},
  title        = {Supporting Semi-automated Compliance Control by a System Design Based
                  on the Concept of Separation of Concerns},
  booktitle    = {Privacy and Identity Management for Life - 6th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden,
                  August 2-6, 2010, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {352},
  pages        = {120--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-20769-3\_10},
  doi          = {10.1007/978-3-642-20769-3\_10},
  timestamp    = {Fri, 05 Aug 2022 07:31:50 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/HaasHRAMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WohlgemuthESM10,
  author       = {Sven Wohlgemuth and
                  Isao Echizen and
                  Noboru Sonehara and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Tagging Disclosures of Personal Data to Third Parties to Preserve
                  Privacy},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_22},
  doi          = {10.1007/978-3-642-15257-3\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/WohlgemuthESM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/AccorsiM10,
  author       = {Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Sandro Etalle and
                  Alexander Pretschner and
                  Ravi S. Sandhu and
                  Marianne Winslett},
  title        = {{FORTES:} Forensic Information Flow Analysis of Business Processes},
  booktitle    = {Distributed Usage Control, 06.04. - 09.04.2010},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {10141},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2010},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2716/},
  timestamp    = {Thu, 10 Jun 2021 13:02:07 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/AccorsiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchropferKM10,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchropferKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/Muller09,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Was the Internet the Only Option? Which Way Should Business and Information
                  Systems Engineering Go?},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {46--52},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12599-008-0030-3},
  doi          = {10.1007/S12599-008-0030-3},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/Muller09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/LandLACHM09,
  author       = {Frank Land and
                  Claudia Loebbecke and
                  Albert A. Angehrn and
                  Eric K. Clemons and
                  Alan R. Hevner and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {{ICIS} 2008 Panel Report: Design Science in Information Systems: Hegemony,
                  Bandwagon, or New Wave?},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {24},
  pages        = {29},
  year         = {2009},
  url          = {https://doi.org/10.17705/1cais.02429},
  doi          = {10.17705/1CAIS.02429},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/LandLACHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller09,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {War Internet die einzige Option? Welchen Weg soll die Wirtschaftsinformatik
                  gehen?},
  journal      = {Wirtschaftsinf.},
  volume       = {51},
  number       = {1},
  pages        = {53--60},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11576-008-0140-z},
  doi          = {10.1007/S11576-008-0140-Z},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/WohlgemuthMSE10,
  author       = {Sven Wohlgemuth and
                  G{\"{u}}nter M{\"{u}}ller and
                  Noboru Sonehara and
                  Isao Echizen},
  title        = {On Observable Delegation of Personal Data by Watermarking},
  booktitle    = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2009, Las Vegas, NV, USA, 10-13 Jan., 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CCNC.2009.4784940},
  doi          = {10.1109/CCNC.2009.4784940},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/WohlgemuthMSE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/WonnemannAM09,
  author       = {Claus Wonnemann and
                  Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Sheikh Iqbal Ahamed and
                  Elisa Bertino and
                  Carl K. Chang and
                  Vladimir Getov and
                  Lin Liu and
                  Ming Hua and
                  Rajesh Subramanyan},
  title        = {On Information Flow Forensics in Business Application Scenarios},
  booktitle    = {Proceedings of the 33rd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
                  USA, July 20-24, 2009. Volume 2},
  pages        = {324--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/COMPSAC.2009.154},
  doi          = {10.1109/COMPSAC.2009.154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/WonnemannAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/WohlgemuthESM09,
  author       = {Sven Wohlgemuth and
                  Isao Echizen and
                  Noboru Sonehara and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Joaquim Filipe and
                  David A. Marca and
                  Boris Shishkov and
                  Marten van Sinderen},
  title        = {On Privacy in Business Processes - Observing Delegation of Personal
                  Data by using Digital Watermarking},
  booktitle    = {{ICE-B} 2009 - Proceedings of the International Conference on e-Business,
                  Milan, Italy, July 7-10, 2009, {ICE-B} is part of {ICETE} - The International
                  Joint Conference on e-Business and Telecommunications},
  pages        = {27--32},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Sat, 12 Sep 2009 14:07:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/WohlgemuthESM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/WohlgemuthESM09,
  author       = {Sven Wohlgemuth and
                  Isao Echizen and
                  Noboru Sonehara and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Jeng{-}Shyang Pan and
                  Yen{-}Wei Chen and
                  Lakhmi C. Jain},
  title        = {On Privacy-aware Delegation of Personal Data using Digital Watermarking},
  booktitle    = {Fifth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14
                  September, 2009, Proceedings},
  pages        = {56--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IIH-MSP.2009.313},
  doi          = {10.1109/IIH-MSP.2009.313},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/WohlgemuthESM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller08,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {{WI} - F{\"{u}}r Sie gelesen},
  journal      = {Wirtschaftsinf.},
  volume       = {50},
  number       = {2},
  pages        = {133--135},
  year         = {2008},
  url          = {https://doi.org/10.1365/s11576-008-0025-1},
  doi          = {10.1365/S11576-008-0025-1},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller08a,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {{WI} - F{\"{u}}r Sie gelesen},
  journal      = {Wirtschaftsinf.},
  volume       = {50},
  number       = {4},
  pages        = {322--323},
  year         = {2008},
  url          = {https://doi.org/10.1365/s11576-008-0066-5},
  doi          = {10.1365/S11576-008-0066-5},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/MullerT08,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Orestis Terzidis},
  title        = {IT-Compliance und IT-Governance},
  journal      = {Wirtschaftsinf.},
  volume       = {50},
  number       = {5},
  pages        = {341--343},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11576-008-0074-5},
  doi          = {10.1007/S11576-008-0074-5},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/MullerT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller08b,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {{WI} - F{\"{u}}r Sie gelesen},
  journal      = {Wirtschaftsinf.},
  volume       = {50},
  number       = {6},
  pages        = {508--509},
  year         = {2008},
  url          = {https://doi.org/10.1365/s11576-008-0097-y},
  doi          = {10.1365/S11576-008-0097-Y},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/LandLACHM08,
  author       = {Frank Land and
                  Claudia Loebbecke and
                  Albert A. Angehrn and
                  Eric K. Clemons and
                  Alan R. Hevner and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Design Science in Information Systems: Hegemony, Bandwagon, or New
                  Wave?},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2008, Paris, France, December 14-17, 2008},
  pages        = {1},
  publisher    = {Association for Information Systems},
  year         = {2008},
  url          = {http://aisel.aisnet.org/icis2008/1},
  timestamp    = {Tue, 09 Dec 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/LandLACHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mkwi/MullerK08,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Wolfgang K{\"{o}}nig},
  editor       = {Martin Bichler and
                  Thomas Hess and
                  Helmut Krcmar and
                  Ulrike Lechner and
                  Florian Matthes and
                  Arnold Picot and
                  Benjamin Speitkamp and
                  Petra Wolf},
  title        = {Vorwort: IT-Risikomangement: IT-Projekte und IT-Compliance},
  booktitle    = {Multikonferenz Wirtschaftsinformatik, {MKWI} 2008, M{\"{u}}nchen,
                  26.2.2008 - 28.2.2008, Proceedings},
  publisher    = {GITO-Verlag, Berlin},
  year         = {2008},
  url          = {http://ibis.in.tum.de/mkwi08/17\_IT-Risikomanagement\_-\_IT-Projekte\_und\_IT-Compliance/00\_IT-Risk\_Vorwort\_final.pdf},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mkwi/MullerK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/StrukerAM08,
  author       = {Jens Str{\"{u}}ker and
                  Rafael Accorsi and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {On Providing One-to-One Marketing with Customers' Privacy in Stationary
                  Retail},
  booktitle    = {10th {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2008) / 5th {IEEE} International Conference on Enterprise Computing,
                  E-Commerce and E-Services {(EEE} 2008), July 21-14, 2008, Washington,
                  DC, {USA}},
  pages        = {44--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CECandEEE.2008.101},
  doi          = {10.1109/CECANDEEE.2008.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/StrukerAM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/KahmerGM08,
  author       = {Martin K{\"{a}}hmer and
                  Maike Gilliot and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Automating Privacy Compliance with ExPDT},
  booktitle    = {10th {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2008) / 5th {IEEE} International Conference on Enterprise Computing,
                  E-Commerce and E-Services {(EEE} 2008), July 21-14, 2008, Washington,
                  DC, {USA}},
  pages        = {87--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CECandEEE.2008.122},
  doi          = {10.1109/CECANDEEE.2008.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/KahmerGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2008P8491,
  editor       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  title        = {Theoretical Foundations of Practical Information Security, 30.11.
                  - 05.12.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08491},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/08491/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2008P8491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  editor       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  title        = {08491 Abstracts Collection - Theoretical Foundations of Practical
                  Information Security},
  booktitle    = {Theoretical Foundations of Practical Information Security, 30.11.
                  - 05.12.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08491},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1894/},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08a,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  editor       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  title        = {08491 Executive Summary - Theoretical Foundations of Practical Information
                  Security},
  booktitle    = {Theoretical Foundations of Practical Information Security, 30.11.
                  - 05.12.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08491},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1893/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/MullerSGS07,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Stefan Sackmann and
                  Oliver G{\"{u}}nther and
                  Sarah Spiekermann},
  title        = {Personalisierung und informationelle Selbstbestimmung Ein unaufl{\"{o}}sbarer
                  Widerspruch?},
  journal      = {Wirtschaftsinf.},
  volume       = {49},
  number       = {1},
  pages        = {1--2},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11576-007-0001-1},
  doi          = {10.1007/S11576-007-0001-1},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/MullerSGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/WeissKKGLMHBIPK07,
  author       = {Daniel Wei{\ss} and
                  J{\"{o}}rn Kaack and
                  Stefan Kirn and
                  Maike Gilliot and
                  Lutz Lowis and
                  G{\"{u}}nter M{\"{u}}ller and
                  Andrea Herrmann and
                  Carsten Binnig and
                  Timea Illes and
                  Barbara Paech and
                  Donald Kossmann},
  title        = {Die SIKOSA-Methodik},
  journal      = {Wirtschaftsinf.},
  volume       = {49},
  number       = {3},
  pages        = {188--198},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11576-007-0049-y},
  doi          = {10.1007/S11576-007-0049-Y},
  timestamp    = {Fri, 25 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wi/WeissKKGLMHBIPK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/Mueller07,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Enforceable Privacy Promises},
  booktitle    = {9th {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2007) / 4th {IEEE} International Conference on Enterprise Computing,
                  E-Commerce and E-Services {(EEE} 2007), 23-26 July 2007, National
                  Center of Sciences, Tokyo, Japan},
  pages        = {6},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CEC-EEE.2007.45},
  doi          = {10.1109/CEC-EEE.2007.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/Mueller07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Muller06,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Introduction},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {9},
  pages        = {28--31},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151030.1151051},
  doi          = {10.1145/1151030.1151051},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Muller06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller06,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Grid allein oder Vertrauen in Fremde wird teuer},
  journal      = {Wirtschaftsinf.},
  volume       = {48},
  number       = {1},
  pages        = {74--75},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11576-006-0015-0},
  doi          = {10.1007/S11576-006-0015-0},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller06a,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Budgeting process for information security expenditures},
  journal      = {Wirtschaftsinf.},
  volume       = {48},
  number       = {4},
  pages        = {286--288},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11576-006-0061-7},
  doi          = {10.1007/S11576-006-0061-7},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etrics/WohlgemuthM06,
  author       = {Sven Wohlgemuth and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Privacy with Delegation of Rights by Identity Management},
  booktitle    = {Emerging Trends in Information and Communication Security, International
                  Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3995},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11766155\_13},
  doi          = {10.1007/11766155\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/etrics/WohlgemuthM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/06/EymannMS06,
  author       = {Torsten Eymann and
                  G{\"{u}}nter M{\"{u}}ller and
                  Moritz Strasser},
  editor       = {Stefan Kirn and
                  Otthein Herzog and
                  Peter C. Lockemann and
                  Otto Spaniol},
  title        = {Self-Organized Scheduling in Hospitals by Connecting Agents and Mobile
                  Devices},
  booktitle    = {Multiagent Engineering, Theory and Applications in Enterprises},
  pages        = {319--337},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/3-540-32062-8\_17},
  doi          = {10.1007/3-540-32062-8\_17},
  timestamp    = {Wed, 29 May 2019 09:31:45 +0200},
  biburl       = {https://dblp.org/rec/books/sp/06/EymannMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/etrics/2006,
  editor       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Emerging Trends in Information and Communication Security, International
                  Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3995},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11766155},
  doi          = {10.1007/11766155},
  isbn         = {3-540-34640-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/etrics/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/Muller05,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Die {FG} - Berichte aus den Instituten},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {28},
  number       = {1},
  pages        = {60--61},
  year         = {2005},
  url          = {https://doi.org/10.1515/PIKO.2005.60},
  doi          = {10.1515/PIKO.2005.60},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/Muller05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller05,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Success factors and impacts of mobile business applications: Results
                  from a mobile e-procurement study},
  journal      = {Wirtschaftsinf.},
  volume       = {47},
  number       = {4},
  pages        = {298--299},
  year         = {2005},
  url          = {https://doi.org/10.1007/BF03254918},
  doi          = {10.1007/BF03254918},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/MullerENS04,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Torsten Eymann and
                  Norbert Nopper and
                  Sven Seuken},
  title        = {{EMIKA} system: architecture and prototypic realization},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  {\&} Cybernetics: The Hague, Netherlands, 10-13 October 2004},
  pages        = {5621--5626},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICSMC.2004.1401089},
  doi          = {10.1109/ICSMC.2004.1401089},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/MullerENS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/StrukerSM04,
  author       = {Jens Str{\"{u}}ker and
                  Stefan Sackmann and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Case Study on Retail Customer Communication Applying Ubiquitous Computing},
  booktitle    = {2004 {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2004), 6-9 July 2004, San Diego, CA, {USA}},
  pages        = {42--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICECT.2004.1319716},
  doi          = {10.1109/ICECT.2004.1319716},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/StrukerSM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spc/2003,
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95124},
  doi          = {10.1007/B95124},
  isbn         = {3-540-20887-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/WohlgemuthMJM03,
  author       = {Sven Wohlgemuth and
                  Daniela Gerd tom Markotten and
                  Uwe Jendricke and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {DFG-Schwerpunktprogramm "Sicherheit in der Informations- und
                  Kommunikationstechnik"},
  journal      = {it Inf. Technol.},
  volume       = {45},
  number       = {1},
  pages        = {46--54},
  year         = {2003},
  url          = {https://doi.org/10.1524/itit.45.1.46.19028},
  doi          = {10.1524/ITIT.45.1.46.19028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/WohlgemuthMJM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/MullerE03,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Claudia Eckert},
  title        = {Sicherheit an der Schnittstelle zum Nutzer},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {26},
  number       = {1},
  pages        = {2--4},
  year         = {2003},
  url          = {https://doi.org/10.1515/PIKO.2003.2},
  doi          = {10.1515/PIKO.2003.2},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/MullerE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/MarkottenWM03,
  author       = {Daniela Gerd tom Markotten and
                  Sven Wohlgemuth and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Mit Sicherheit zukunftsf{\"{a}}hig. DFG-Schwerpunktprogramm "Sicherheit
                  in der Informations-und Kommunikationstechnik"},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {26},
  number       = {1},
  pages        = {5--14},
  year         = {2003},
  url          = {https://doi.org/10.1515/PIKO.2003.5},
  doi          = {10.1515/PIKO.2003.5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/MarkottenWM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/EymannSM03,
  author       = {Torsten Eymann and
                  Stefan Sackmann and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Hayeks Katallaxie - Ein zukunftsweisendes Konzept f{\"{u}}r die
                  Wirtschaftsinformatik?},
  journal      = {Wirtschaftsinf.},
  volume       = {45},
  number       = {5},
  pages        = {491--496},
  year         = {2003},
  url          = {https://doi.org/10.1007/BF03250911},
  doi          = {10.1007/BF03250911},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/EymannSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/EymannSMP03,
  author       = {Torsten Eymann and
                  Stefan Sackmann and
                  G{\"{u}}nter M{\"{u}}ller and
                  Ingo Pippow},
  title        = {Hayek's Catallaxy: {A} Forward-Looking Concept for Information Systems?},
  booktitle    = {9th Americas Conference on Information Systems, {AMCIS} 2003, Tampa,
                  FL, USA, August 4-6, 2003},
  pages        = {234},
  publisher    = {Association for Information Systems},
  year         = {2003},
  url          = {http://aisel.aisnet.org/amcis2003/234},
  timestamp    = {Mon, 09 Jan 2012 12:52:36 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/EymannSMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/MullerW03,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Sven Wohlgemuth},
  editor       = {Klaus R. Dittrich and
                  Wolfgang K{\"{o}}nig and
                  Andreas Oberweis and
                  Kai Rannenberg and
                  Wolfgang Wahlster},
  title        = {Sichere IT-Systeme},
  booktitle    = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Innovative
                  Informatikanwendungen, {INFORMATIK} 2003, Frankfurt am Main, Germany,
                  September 29 - October 2, 2003, Band 1},
  series       = {{LNI}},
  volume       = {{P-34}},
  pages        = {87--90},
  publisher    = {{GI}},
  year         = {2003},
  url          = {https://dl.gi.de/handle/20.500.12116/29807},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/MullerW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kivs/ZugenmaierKM03,
  author       = {Alf Zugenmaier and
                  Michael Kreutzer and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Klaus Irmscher and
                  Klaus{-}Peter F{\"{a}}hnrich},
  title        = {The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing
                  Environment},
  booktitle    = {Kommunikation in Verteilten Systemen (KiVS), 13. Fachtagung Kommunikation
                  in Verteilten Systemen. KiVS 2003, 25.-28. Februar 2003, Leipzig,
                  Kurzbeitr{\"{a}}ge, Praxisberichte und Workshop E-Learning},
  pages        = {131--141},
  publisher    = {{VDE} Verlag},
  year         = {2003},
  timestamp    = {Mon, 01 Mar 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kivs/ZugenmaierKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcm/SackmannEM02,
  author       = {Stefan Sackmann and
                  Torsten Eymann and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Hans{-}Bernd Bludau and
                  Andreas Koop},
  title        = {{EMIKA} - Real-Time Controlled Mobile Information Systems in Health
                  Care Applications},
  booktitle    = {Mobile Computing in Medicine, Second Conference on Mobile Computing
                  in Medicine, Workshop of the Project Group MoCoMed, GMDS-Fachbereich
                  Medizinische Informatik {\&} GI-Fachausschuss 4.7, 11.4.2002,
                  Heidelberg},
  series       = {{LNI}},
  volume       = {{P-15}},
  pages        = {151--158},
  publisher    = {{GI}},
  year         = {2002},
  url          = {https://dl.gi.de/handle/20.500.12116/30469},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mcm/SackmannEM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/p2p/EggsSEM02,
  author       = {Holger Eggs and
                  Stefan Sackmann and
                  Torsten Eymann and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Detlef Schoder and
                  Kai Fischbach and
                  Ren{\'{e}} Teichmann},
  title        = {Vertrauen und Reputation in P2P-Netzwerken},
  booktitle    = {Peer-to-Peer: {\"{O}}konomische, technische und juristische Perspektiven,
                  Das aktuelle P2P-Buch},
  pages        = {229--254},
  publisher    = {Springer},
  year         = {2002},
  timestamp    = {Tue, 06 Aug 2019 09:56:05 +0200},
  biburl       = {https://dblp.org/rec/books/sp/p2p/EggsSEM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/MullerK01,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Michael Kreutzer},
  title        = {Erst die neue Technologie, danach die Sicherheit!},
  journal      = {Informationstechnik Tech. Inform.},
  volume       = {43},
  number       = {5},
  pages        = {225--226},
  year         = {2001},
  url          = {https://doi.org/10.1524/itit.2001.43.5.225},
  doi          = {10.1524/ITIT.2001.43.5.225},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/MullerK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/EymannM01,
  author       = {Torsten Eymann and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Kurt Bauknecht and
                  Wilfried Brauer and
                  Thomas A. M{\"{u}}ck},
  title        = {Decentralized Electronic Markets - Economic Coordination of Multi-Agent
                  Systems},
  booktitle    = {Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft
                  f{\"{u}}r Informatik, Wirtschaft und Wissenschaft in der Network
                  Economy - Visionen und Wirklichkeit, Jahrestagung der {\"{O}}sterreichischen
                  Computer Gesellschaft 2001, {INFORMATIK/OCG} 2001, Vienna, Austria,
                  September 25-28, 2001, Band 2},
  series       = {Schriftenreihe der {\"{O}}sterreichischen Computer-Gesellschaft},
  volume       = {157},
  pages        = {981--990},
  publisher    = {Konstanz UVK-Verl.-Ges.},
  year         = {2001},
  timestamp    = {Fri, 17 Jul 2020 14:28:31 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/EymannM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/01/Muller01a,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  editor       = {Hannes Werthner and
                  Martin Bichler},
  title        = {Security in E-Commerce},
  booktitle    = {Lectures in E-Commerce},
  series       = {Springer Computer Science},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-3-7091-6213-2\_7},
  doi          = {10.1007/978-3-7091-6213-2\_7},
  timestamp    = {Sun, 17 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/01/Muller01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ife/KappelMS00,
  author       = {Gerti Kappel and
                  G{\"{u}}nter M{\"{u}}ller and
                  Franz Schober},
  title        = {Themenheft: Electronic Commerce - Editorial},
  journal      = {Inform. Forsch. Entwickl.},
  volume       = {15},
  number       = {4},
  pages        = {181},
  year         = {2000},
  url          = {https://doi.org/10.1007/s004500000064},
  doi          = {10.1007/S004500000064},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ife/KappelMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/MullerM00,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Daniela Gerd tom Markotten},
  title        = {Sicherheit in der Kommunikations- und Informationstechnik},
  journal      = {Wirtschaftsinf.},
  volume       = {42},
  number       = {6},
  pages        = {487--488},
  year         = {2000},
  url          = {https://doi.org/10.1007/BF03250764},
  doi          = {10.1007/BF03250764},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/MullerM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/MullerM00a,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Kevin S. McCurley},
  title        = {Interview},
  journal      = {Wirtschaftsinf.},
  volume       = {42},
  number       = {6},
  pages        = {547--549},
  year         = {2000},
  url          = {https://doi.org/10.1007/BF03250772},
  doi          = {10.1007/BF03250772},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/MullerM00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ife/MullerR99,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Kai Rannenberg},
  title        = {Sicherheit in der Informations- und Kommunikationstechnik - Ein neues
                  DFG-Schwerpunktprogramm},
  journal      = {Inform. Forsch. Entwickl.},
  volume       = {14},
  number       = {1},
  pages        = {46--48},
  year         = {1999},
  url          = {https://doi.org/10.1007/s004500050123},
  doi          = {10.1007/S004500050123},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ife/MullerR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/SchoderM99,
  author       = {Detlef Schoder and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Potentiale und H{\"{u}}rden des Electronic Commerce: Eine Momentaufnahme},
  journal      = {Inform. Spektrum},
  volume       = {22},
  number       = {4},
  pages        = {252--260},
  year         = {1999},
  url          = {https://doi.org/10.1007/s002870050142},
  doi          = {10.1007/S002870050142},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/SchoderM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/GoldKKM99,
  author       = {S. Gold and
                  Dirk O. Keck and
                  Paul J. K{\"{u}}hn and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Sichere Telekommunikationsdienste mit intelligenten Netzen},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {22},
  number       = {2},
  pages        = {71--76},
  year         = {1999},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/GoldKKM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/MullerR99,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Kai Rannenberg},
  title        = {Sicherheit, auch das noch!?!},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {22},
  number       = {3},
  pages        = {138--139},
  year         = {1999},
  url          = {https://doi.org/10.1515/piko.1999.22.3.138},
  doi          = {10.1515/PIKO.1999.22.3.138},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/MullerR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Muller99,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Vernetzte kleine und mittlere Unternhemen},
  journal      = {Wirtschaftsinf.},
  volume       = {41},
  number       = {4},
  pages        = {305--306},
  year         = {1999},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Muller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/SchoderHM97,
  author       = {Detlef Schoder and
                  Thomas Hummel and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Matthias Jarke and
                  Klaus Pasedach and
                  Klaus Pohl},
  title        = {Interdisziplin{\"{a}}re Modelle f{\"{u}}r Entwurf und Einsatz
                  telematischer Systeme: Grunds{\"{a}}tzliche Probleme diskutiert
                  am Beispiel des "Freiburger Schichtenmodells der Telematik"},
  booktitle    = {Informatik '97, Informatik als Innovationsmotor, 27. Jahrestagung
                  der Gesellschaft f{\"{u}}r Informatik, Aachen, 24.-26. September
                  1997},
  series       = {Informatik Aktuell},
  pages        = {277--286},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-3-642-60831-5\_36},
  doi          = {10.1007/978-3-642-60831-5\_36},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/SchoderHM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/vi/97/MRRS1997,
  editor       = {G{\"{u}}nter M{\"{u}}ller and
                  Kai Rannenberg and
                  Manfred Reitenspie{\ss} and
                  Helmut Stiegler},
  title        = {Verl{\"{a}}{\ss}liche IT-Systeme - Zwischen Key Escrow und elektronischem
                  Geld},
  series       = {DuD-Fachbeitr{\"{a}}ge},
  publisher    = {Vieweg+Teubner Verlag},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-3-322-86842-8},
  doi          = {10.1007/978-3-322-86842-8},
  isbn         = {978-3-528-05594-3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/vi/97/MRRS1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/MullerB96,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Herbert Bunz},
  title        = {Sicherheit in der Kommunikationstechnik},
  journal      = {Informationstechnik Tech. Inform.},
  volume       = {38},
  number       = {4},
  pages        = {5--6},
  year         = {1996},
  url          = {https://doi.org/10.1524/itit.1996.38.4.5},
  doi          = {10.1524/ITIT.1996.38.4.5},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/MullerB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/RannenbergPM96,
  author       = {Kai Rannenberg and
                  Andreas Pfitzmann and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Sicherheit, insbesondere mehrseitige IT-Sicherheit},
  journal      = {Informationstechnik Tech. Inform.},
  volume       = {38},
  number       = {4},
  pages        = {7--10},
  year         = {1996},
  url          = {https://doi.org/10.1524/itit.1996.38.4.7},
  doi          = {10.1524/ITIT.1996.38.4.7},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/RannenbergPM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/MullerS96,
  author       = {G{\"{u}}nter M{\"{u}}ller and
                  Frank Stoll},
  title        = {Der Freiburger Kommunikationsassistent},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {19},
  number       = {4},
  pages        = {189--197},
  year         = {1996},
  url          = {http://www.degruyter.com/view/j/piko.1996.19.issue-4/piko.1996.19.4.179/piko.1996.19.4.179.xml},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/MullerS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/StraussSM96,
  author       = {Ralf E. Strauss and
                  Detlef Schoder and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Nobuyoshi Terashima and
                  Edward Altman},
  title        = {Wired cities - opportunities for small and medium sized cities on
                  the information highway},
  booktitle    = {Advanced {IT} Tools, {IFIP} World Conference on {IT} Tools, 2-6 September
                  1996, Canberra, Australia.},
  pages        = {3--10},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Sun, 28 Jul 2019 13:03:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/StraussSM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gesellschaft/Muller92,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  editor       = {Werner Langenheder and
                  G{\"{u}}nter M{\"{u}}ller and
                  Britta Schinzel},
  title        = {Einf{\"{u}}hrung},
  booktitle    = {Informatik cui bono? {GI-FB} 8 Fachtagung, Freiburg, 23.-26. September
                  1992, Proceedings},
  series       = {Informatik Aktuell},
  pages        = {144},
  publisher    = {Springer},
  year         = {1992},
  timestamp    = {Thu, 25 May 2017 00:40:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gesellschaft/Muller92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gesellschaft/1992,
  editor       = {Werner Langenheder and
                  G{\"{u}}nter M{\"{u}}ller and
                  Britta Schinzel},
  title        = {Informatik cui bono? {GI-FB} 8 Fachtagung, Freiburg, 23.-26. September
                  1992, Proceedings},
  series       = {Informatik Aktuell},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/978-3-642-77808-7},
  doi          = {10.1007/978-3-642-77808-7},
  isbn         = {3-540-55957-4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gesellschaft/1992.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Muller91,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  editor       = {Hermann A. Maurer},
  title        = {Current Trends in Distributed Systems},
  booktitle    = {New Results and New Trends in Computer Science, Graz, Austria, June
                  20-21, 1991, Proceedings [on occasion of H. Maurer's 50th birthday]},
  series       = {Lecture Notes in Computer Science},
  volume       = {555},
  pages        = {204--224},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/BFb0038191},
  doi          = {10.1007/BFB0038191},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Muller91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/kivs/1991,
  editor       = {Wolfgang Effelsberg and
                  Hans Werner Meuer and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb,
                  GI/ITG-Fachtagung, Mannheim, 20.-22. Februar 1991, Proceedings},
  series       = {Informatik-Fachberichte},
  volume       = {267},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/978-3-642-76462-2},
  doi          = {10.1007/978-3-642-76462-2},
  isbn         = {3-540-53721-X},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kivs/1991.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/lockemannS87/BlaserJLM87,
  author       = {Albrecht Blaser and
                  Matthias Jarke and
                  Hein Lehmann and
                  G{\"{u}}nter M{\"{u}}ller},
  editor       = {Peter C. Lockemann and
                  Joachim W. Schmidt},
  title        = {Datenbanksprachen und Datenbankbenutzung},
  booktitle    = {Datenbankhandbuch},
  pages        = {559--635},
  publisher    = {Springer},
  year         = {1987},
  timestamp    = {Mon, 05 Aug 2019 12:54:07 +0200},
  biburl       = {https://dblp.org/rec/books/sp/lockemannS87/BlaserJLM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ibm/1986,
  editor       = {G{\"{u}}nter M{\"{u}}ller and
                  Robert P. Blanc},
  title        = {Networking in Open Systems, International Seminar, Oberlech, Austria,
                  August 18-22, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {248},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/BFb0026949},
  doi          = {10.1007/BFB0026949},
  isbn         = {3-540-17707-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ibm/1986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Muller86a,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Projektierungsstrategie f{\"{u}}r Mikrorechner-Automatisierungsanlagen},
  school       = {Otto-von-Guericke University Magdeburg, Germany},
  year         = {1986},
  url          = {https://d-nb.info/920288847},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Muller86a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ibm/Muller86,
  author       = {G{\"{u}}nter M{\"{u}}ller},
  editor       = {G{\"{u}}nter M{\"{u}}ller and
                  Robert P. Blanc},
  title        = {{ENC} - {IBM} European Networking Center},
  booktitle    = {Networking in Open Systems, International Seminar, Oberlech, Austria,
                  August 18-22, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {248},
  pages        = {437--440},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/BFb0026975},
  doi          = {10.1007/BFB0026975},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ibm/Muller86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics