default search action
BibTeX records: Eberhard von Faber
@book{DBLP:books/sp/Faber24, author = {Eberhard von Faber}, title = {Managing {IT} Service Security - Methods and Recipes for User Organizations and Providers Along the Supply Chain}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-55533-6}, doi = {10.1007/978-3-031-55533-6}, isbn = {978-3-031-55532-9}, timestamp = {Fri, 21 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Faber24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber22, author = {Eberhard von Faber}, title = {Vorschlag zur Verbesserung von Cloud-Sicherheitsstandards}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {1}, pages = {45--51}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1559-x}, doi = {10.1007/S11623-022-1559-X}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Faber22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber22a, author = {Eberhard von Faber}, title = {Zw{\"{o}}lf Prinzipien f{\"{u}}r systematische IT-Service-Security}, journal = {Datenschutz und Datensicherheit}, volume = {46}, number = {11}, pages = {703--706}, year = {2022}, url = {https://doi.org/10.1007/s11623-022-1687-3}, doi = {10.1007/S11623-022-1687-3}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Faber22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber21, author = {Eberhard von Faber}, title = {Zur Zukunft des IT-Sicherheitsmanagements angesichts des Wandels von Technik und Serviceerbringung}, journal = {Datenschutz und Datensicherheit}, volume = {45}, number = {10}, pages = {691--697}, year = {2021}, url = {https://doi.org/10.1007/s11623-021-1516-0}, doi = {10.1007/S11623-021-1516-0}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber19, author = {Eberhard von Faber}, title = {Null-Fehler-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {393}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1131-5}, doi = {10.1007/S11623-019-1131-5}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber19a, author = {Eberhard von Faber}, title = {IT-Sicherheit 5.0}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {397}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1132-4}, doi = {10.1007/S11623-019-1132-4}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber19b, author = {Eberhard von Faber}, title = {Methoden: , , Secured by definition'' und die Umsetzung von Prinzipien aus dem Qualit{\"{a}}tsmanagement}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {410--417}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1136-0}, doi = {10.1007/S11623-019-1136-0}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FaberK19, author = {Eberhard von Faber and Arndt Kohler}, title = {Die L{\"{u}}cke: Informationssicherheit in Systemen mit k{\"{u}}nstlicher Intelligenz}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {7}, pages = {434--439}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1139-x}, doi = {10.1007/S11623-019-1139-X}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FaberK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FaberS17, author = {Eberhard von Faber and Walter Sedlacek}, title = {Spieltheorie im Dienst der IT-Sicherheit im Internet-der-Dinge}, journal = {Datenschutz und Datensicherheit}, volume = {41}, number = {7}, pages = {440--447}, year = {2017}, url = {https://doi.org/10.1007/s11623-017-0808-x}, doi = {10.1007/S11623-017-0808-X}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FaberS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber16, author = {Eberhard von Faber}, title = {Digitalisierung, IT-Outsourcing, Informationssicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {40}, number = {10}, pages = {629}, year = {2016}, url = {https://doi.org/10.1007/s11623-016-0671-1}, doi = {10.1007/S11623-016-0671-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber16a, author = {Eberhard von Faber}, title = {Organisation und Absicherung einer industriellen IT-Produktion}, journal = {Datenschutz und Datensicherheit}, volume = {40}, number = {10}, pages = {647--653}, year = {2016}, url = {https://doi.org/10.1007/s11623-016-0676-9}, doi = {10.1007/S11623-016-0676-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faber16b, author = {Eberhard von Faber}, title = {IT-Outsourcing - Sicherheit neu denken!}, journal = {Datenschutz und Datensicherheit}, volume = {40}, number = {10}, pages = {680}, year = {2016}, url = {https://doi.org/10.1007/s11623-016-0681-z}, doi = {10.1007/S11623-016-0681-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faber16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Faber15, author = {Eberhard von Faber}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Changing the Security Mode of Operation in a Global {IT} Organization with 20000+ Technical Staff}, booktitle = {{ISSE} 2015 - Highlights of the Information Security Solutions Europe 2015 Conference, Berlin, Germany, November 1-2, 2015}, pages = {286--304}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-658-10934-9\_24}, doi = {10.1007/978-3-658-10934-9\_24}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/Faber15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Faber14, author = {Eberhard von Faber}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {In-House Standardization of Security Measures: Necessity, Benefits and Realworld Obstructions}, booktitle = {{ISSE} 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014}, pages = {35--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-658-06708-3\_2}, doi = {10.1007/978-3-658-06708-3\_2}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/Faber14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FaberB13, author = {Eberhard von Faber and Wolfgang Behnsen}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {A security Taxonomy that facilitates Protecting an industrial {ICT} Production and how it really provides Transparency}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {87--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_8}, doi = {10.1007/978-3-658-03371-2\_8}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/FaberB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FaberB12, author = {Eberhard von Faber and Wolfgang Behnsen}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {A Systematic Holistic Approach for Providers to Deliver Secure {ICT} Services}, booktitle = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012}, pages = {80--88}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-658-00333-3\_9}, doi = {10.1007/978-3-658-00333-3\_9}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/FaberB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FaberP10, author = {Eberhard von Faber and Michael Pauly}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {User Risk Management Strategies and Models - Adaption for Cloud Computing}, booktitle = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010}, pages = {80--90}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9788-6\_8}, doi = {10.1007/978-3-8348-9788-6\_8}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/FaberP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Faber09, author = {Eberhard von Faber}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Measuring Information Security: Guidelines to Build Metrics}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {17--26}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_2}, doi = {10.1007/978-3-8348-9363-5\_2}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/Faber09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Faber08, author = {Eberhard von Faber}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {How Economy and Society affect Enterprise Security Management}, booktitle = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain}, pages = {77--83}, publisher = {Vieweg+Teubner}, year = {2008}, url = {https://doi.org/10.1007/978-3-8348-9283-6\_7}, doi = {10.1007/978-3-8348-9283-6\_7}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/Faber08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Faber99, author = {Eberhard von Faber}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, pages = {187--203}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5\_17}, doi = {10.1007/3-540-48059-5\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Faber99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HammelrathH97, author = {Eberhard von Faber and R. Hammelrath and F.{-}P. Heider}, title = {The Secure Distribution of Digital Contents}, booktitle = {13th Annual Computer Security Applications Conference {(ACSAC} 1997), 8-12 December 1997, San Diego, CA, {USA}}, pages = {16}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSAC.1997.646169}, doi = {10.1109/CSAC.1997.646169}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HammelrathH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.