Search Results - "Heurix, Johannes"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Nachhaltige Digitale Zwillinge in der Landwirtschaft by Neubauer, Thomas, Bauer, Alexander, Heurix, Johannes, Iwersen, Michael, Mallinger, Kevin, Manschadi, Ahmad M., Purcell, Warren, Rauber, Andreas

    Published in Zeitschrift für Hochschulentwicklung (05-02-2024)
    “…Die Digitalisierung vollzieht sich auch in der Landwirtschaft in rasanter Geschwindigkeit. Die erheblichen Risiken bei der Anwendung von Lösungen, die in ihren…”
    Get full text
    Journal Article
  2. 2

    A methodology for the pseudonymization of medical data by Neubauer, Thomas, Heurix, Johannes

    “…Abstract Purpose E-health enables the sharing of patient-related data whenever and wherever necessary. Electronic health records (EHRs) promise to improve…”
    Get full text
    Journal Article
  3. 3

    A taxonomy for privacy enhancing technologies by Heurix, Johannes, Zimmermann, Peter, Neubauer, Thomas, Fenz, Stefan

    Published in Computers & security (01-09-2015)
    “…Privacy-enhancing technologies (PETs) belong to a class of technical measures which aim at preserving the privacy of individuals or groups of individuals…”
    Get full text
    Journal Article
  4. 4

    AI- and data-driven pre-crop values and crop rotation matrices by Fenz, Stefan, Neubauer, Thomas, Heurix, Johannes, Friedel, Jürgen Kurt, Wohlmuth, Marie-Luise

    Published in European journal of agronomy (01-10-2023)
    “…Crop rotation planning, being an essential prerequisite for organic farming, involves determining the species and timing of crops on farmland to improve soil…”
    Get full text
    Journal Article
  5. 5

    Recognition and pseudonymisation of medical records for secondary use by Heurix, Johannes, Fenz, Stefan, Rella, Antonio, Neubauer, Thomas

    “…Health records rank among the most sensitive personal information existing today. An unwanted disclosure to unauthorised parties usually results in significant…”
    Get full text
    Journal Article
  6. 6

    De-identification of unstructured paper-based health records for privacy-preserving secondary use by Fenz, Stefan, Heurix, Johannes, Neubauer, Thomas, Rella, Antonio

    “…Abstract Whenever personal data is processed, privacy is a serious issue. Especially in the document-centric e-health area, the patients' privacy must be…”
    Get full text
    Journal Article
  7. 7

    Recognition and privacy preservation of paper-based health records by Fenz, Stefan, Heurix, Johannes, Neubauer, Thomas

    “…While the digitization of medical data within electronic health records has been introduced in some areas, massive amounts of paper-based health records are…”
    Get more information
    Journal Article
  8. 8

    Current challenges in information security risk management by Fenz, Stefan, Heurix, Johannes, Neubauer, Thomas, Pechstein, Fabian

    Published in Information management & computer security (10-11-2014)
    “…Purpose – The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate…”
    Get full text
    Journal Article
  9. 9

    A rule-based transformation system for converting semi-structured medical documents by Heurix, Johannes, Rella, Antonio, Fenz, Stefan, Neubauer, Thomas

    Published in Health and technology (01-03-2013)
    “…The electronic health record (EHR) enabled the cost-efficient handling and processing of health information. By storing medical documents in digitized form,…”
    Get full text
    Journal Article
  10. 10

    Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents by Heurix, J., Karlinger, M., Neubauer, T.

    “…The average costs of data leakage are steadily on the rise. As a consequence, several data security and access control mechanisms have been introduced, ranging…”
    Get full text
    Conference Proceeding
  11. 11

    Model-Driven Development Meets Security: An Evaluation of Current Approaches by Kasal, K, Heurix, J, Neubauer, T

    “…Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of…”
    Get full text
    Conference Proceeding
  12. 12

    Data Models for the Pseudonymization of DICOM Data by Abouakil, D, Heurix, J, Neubauer, T

    “…DICOM has become the most widely implemented and supported communications standard for medical imaging. The security of DICOM relies on the encryption of the…”
    Get full text
    Conference Proceeding
  13. 13

    A Roadmap for Personal Identity Management by Neubauer, Thomas, Heurix, Johannes

    “…Digital identities and secure environments are a fundamental precondition for giving life to e-government, e-health, and e-commerce. Whereas corporations are…”
    Get full text
    Conference Proceeding
  14. 14

    On the Security of Outsourced and Untrusted Databases by Heurix, Johannes, Neubauer, Thomas

    “…The outsourcing of databases to third parties has become a viable alternative to traditional in-house data management. Database management by third parties…”
    Get full text
    Conference Proceeding
  15. 15

    SEMERGY.net: automatically identifying and optimizing energy-efficient building designs: Status quo and outlook by Fenz, Stefan, Heurix, Johannes, Neubauer, Thomas, Tjoa, A. Min, Ghiassi, Neda, Pont, Ulrich, Mahdavi, Ardeshir

    Published in Computer science (Berlin, Germany) (01-08-2016)
    “…A central goal of European and national climate and energy programs is to reduce the greenhouse gas emission of buildings. SEMERGY is a web-based optimization…”
    Get full text
    Journal Article
  16. 16

    Defining Secure Business Processes with Respect to Multiple Objectives by Neubauer, T., Heurix, J.

    “…Business processes are of major importance in today's business environments, and their unimpeded execution is crucial for a company's success. Since business…”
    Get full text
    Conference Proceeding
  17. 17

    Objective Types for the Valuation of Secure Business Processes by Neubauer, T., Heurix, J.

    “…In today's business environments, the unimpeded execution of corporate business processes is crucial for a company's success. As business processes are…”
    Get full text
    Conference Proceeding
  18. 18

    Message from the IWSMA Workshop Organizers

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  19. 19

    LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information by Rawassizadeh, R., Heurix, J., Khosravipour, S., Tjoa, A. M.

    “…Sharing personal information benefits both data providers and data consumers in many ways. Recent advances in sensor networks and personal archives enable…”
    Get full text
    Conference Proceeding