default search action
Johannes Heurix
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j8]Stefan Fenz, Johannes Heurix, Thomas Neubauer, A Min Tjoa, Neda Ghiassi, Ulrich Pont, Ardeshir Mahdavi:
SEMERGY.net: automatically identifying and optimizing energy-efficient building designs. Comput. Sci. Res. Dev. 31(3): 135-140 (2016) - [j7]Johannes Heurix, Stefan Fenz, Antonio Rella, Thomas Neubauer:
Recognition and pseudonymisation of medical records for secondary use. Medical Biol. Eng. Comput. 54(2-3): 371-383 (2016) - 2015
- [j6]Johannes Heurix, Peter Zimmermann, Thomas Neubauer, Stefan Fenz:
A taxonomy for privacy enhancing technologies. Comput. Secur. 53: 1-17 (2015) - [j5]Ulrich Pont, Neda Ghiassi, Stefan Fenz, Johannes Heurix, Ardeshir Mahdavi:
SEMERGY: Application of semantic web technologies in performance-guided building design optimization. J. Inf. Technol. Constr. 20: 107-120 (2015) - [c13]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management. ECIS 2015 - 2014
- [j4]Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein:
Current challenges in information security risk management. Inf. Manag. Comput. Secur. 22(5): 410-430 (2014) - 2013
- [c12]Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar R. Weippl:
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. SEC 2013: 286-299 - 2012
- [c11]Johannes Heurix, Antonio Rella, Stefan Fenz, Thomas Neubauer:
Automated Transformation of Semi-Structured Text Elements. AMCIS 2012 - [c10]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records. BIS 2012: 153-164 - [c9]Johannes Heurix, Michael Karlinger, Thomas Neubauer:
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents. HICSS 2012: 3011-3020 - 2011
- [j3]Thomas Neubauer, Johannes Heurix:
A methodology for the pseudonymization of medical data. Int. J. Medical Informatics 80(3): 190-204 (2011) - [c8]Reza Rawassizadeh, Johannes Heurix, Soheil Khosravipour, A Min Tjoa:
LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information. ARES 2011: 603-608 - [c7]Daniel Abouakil, Johannes Heurix, Thomas Neubauer:
Data Models for the Pseudonymization of DICOM Data. HICSS 2011: 1-11 - [c6]Kresimir Kasal, Johannes Heurix, Thomas Neubauer:
Model-Driven Development Meets Security: An Evaluation of Current Approaches. HICSS 2011: 1-9 - [c5]Johannes Heurix, Thomas Neubauer:
Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption. TrustBus 2011: 186-197 - 2010
- [j2]Thomas Neubauer, Johannes Heurix, A Min Tjoa, Edgar R. Weippl:
Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotech. Informationstechnik 127(5): 135-142 (2010) - [c4]Johannes Heurix, Thomas Neubauer:
On the Security of Outsourced and Untrusted Databases. ACIS-ICIS 2010: 125-132
2000 – 2009
- 2008
- [j1]Thomas Neubauer, Johannes Heurix:
Multiobjective decision support for defining secure business processes: a case study. Int. J. Bus. Intell. Data Min. 3(2): 177-195 (2008) - [c3]Thomas Neubauer, Johannes Heurix:
Objective Types for the Valuation of Secure Business Processes. ACIS-ICIS 2008: 231-236 - [c2]Thomas Neubauer, Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives. ARES 2008: 187-194 - 2007
- [c1]Thomas Neubauer, Johannes Heurix:
Multiobjective Decision Support for defining Secure Business Processes. iiWAS 2007: 477-482
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint