![]() | ![]() |
2006 | ||
---|---|---|
7 | EE | Peter Herrmann, Gaby Herrmann: Security requirement analysis of business processes. Electronic Commerce Research 6(3-4): 305-335 (2006) |
2004 | ||
6 | EE | Gaby Herrmann, Peter Herrmann: Introduction: Security and Trust in Electronic Commerce. Electronic Commerce Research 4(1-2): 5-7 (2004) |
1999 | ||
5 | EE | Alexander W. Röhm, Gaby Herrmann, Günther Pernul: A Language for Modeling Secure Business Transactions. ACSAC 1999: 22- |
4 | EE | Günther Pernul, Alexander W. Röhm, Gaby Herrmann: Trust for Electronic Commerce Transactions. ADBIS 1999: 1-13 |
1998 | ||
3 | EE | Alexander W. Röhm, Günther Pernul, Gaby Herrmann: Modeling Secure and Fair Electronic Commerce. ACSAC 1998: 155- |
1997 | ||
2 | Gaby Herrmann, Günther Pernul: Zur Bedeutung von Sicherheit in interorganisationellen Workflows. Wirtschaftsinformatik 39(3): 217-224 (1997) | |
1993 | ||
1 | Gaby Herrmann: Lastverteilung in verteilten Systemen. GI-Fachgespräch über Rechenzentren 1993: 103-114 |
1 | Peter Herrmann | [6] [7] |
2 | Günther Pernul | [2] [3] [4] [5] |
3 | Alexander W. Röhm | [3] [4] [5] |