default search action
Wolfgang Hommel
Person information
- affiliation: Bundeswehr University Munich, Institute for Software Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Michael Hofmeier, Daniela Pöhn, Wolfgang Hommel:
DistIN: Analysis and Validation of a Concept and Protocol for Distributed Identity Information Networks. ARES 2024: 90:1-90:10 - [c50]Michael Hofmeier, Karl Seidenfad, Manfred Hofmeier, Wolfgang Hommel:
Web-Based Protocol Enabling Distributed Identity Information Networks for Greater Sovereignty. I4CS 2024: 408-425 - [c49]Michael Hofmeier, Wolfgang Hommel:
Application for Electronic Signatures Using Blockchain Technology to Support Trust, Sovereignty and Privacy. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 587-594 - [i8]Daniela Pöhn, Wolfgang Hommel:
Towards an Improved Taxonomy of Attacks related to Digital Identities and Identity Management Systems. CoRR abs/2407.16718 (2024) - 2023
- [j13]Moritz Teuschel, Daniela Pöhn, Michael Grabatin, Felix Dietz, Wolfgang Hommel, Florian Alt:
'Don't Annoy Me With Privacy Decisions!' - Designing Privacy-Preserving User Interfaces for SSI Wallets on Smartphones. IEEE Access 11: 131814-131835 (2023) - [j12]Daniela Pöhn, Wolfgang Hommel:
New Directions and Challenges within Identity and Access Management. IEEE Commun. Stand. Mag. 7(2): 84-90 (2023) - [c48]Lukas Hafner, Florian Wutz, Daniela Pöhn, Wolfgang Hommel:
TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks. ARES 2023: 67:1-67:10 - [c47]Daniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel:
Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation. ARES 2023: 91:1-91:10 - [c46]Michael Hofmeier, Wolfgang Hommel:
Enabling the JSON Web Signature Format to Support Complex and Identity-Oriented Non-web Processes. I4CS 2023: 29-47 - [c45]Michael Hofmeier, Karl Seidenfad, Wolfgang Hommel:
Validating a Modified JSON Web Signature Format using the Scenario of Ammunition Issuance for Training Purposes. MILCOM 2023: 237-238 - [c44]Alexander Frank, Wolfgang Hommel, Benedikt Hopfner:
An Intermediary Protocol Representation to Aid in Avionics Network Development. NOMS 2023: 1-5 - [c43]Daniela Pöhn, Michael Grabatin, Wolfgang Hommel:
Modeling the Threats to Self-Sovereign Identities. Open Identity Summit 2023 - [e2]Bernhard M. Hämmerli, Udo Helmbrecht, Wolfgang Hommel, Leonhard Kunczik, Stefan Pickl:
Critical Information Infrastructures Security - 17th International Conference, CRITIS 2022, Munich, Germany, September 14-16, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13723, Springer 2023, ISBN 978-3-031-35189-1 [contents] - [i7]Daniela Pöhn, Wolfgang Hommel:
An Overview of Limitations and Approaches in Identity Management. CoRR abs/2301.00442 (2023) - [i6]Daniela Pöhn, Wolfgang Hommel:
TaxIdMA: Towards a Taxonomy for Attacks related to Identities. CoRR abs/2301.00443 (2023) - [i5]Daniela Pöhn, Wolfgang Hommel:
IMC: A Classification of Identity Management Approaches. CoRR abs/2301.00444 (2023) - [i4]Lukas Hafner, Florian Wutz, Daniela Pöhn, Wolfgang Hommel:
TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks. CoRR abs/2308.15161 (2023) - [i3]Daniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel:
Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation. CoRR abs/2308.15166 (2023) - 2022
- [j11]Daniela Pöhn, Wolfgang Hommel:
Reference Service Model Framework for Identity Management. IEEE Access 10: 120984-121009 (2022) - [c42]Daniela Pöhn, Wolfgang Hommel:
TaxIdMA: Towards a Taxonomy for Attacks related to Identities. ARES 2022: 125:1-125:13 - 2021
- [j10]Daniela Pöhn, Wolfgang Hommel:
Universal Identity and Access Management Framework for Future Ecosystems. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(1): 64-84 (2021) - [c41]Michael Grabatin, Michael Steinke, Daniela Pöhn, Wolfgang Hommel:
A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related Environments. SAT-CPS@CODASPY 2021: 88-97 - [c40]Stefanie Pham, Matthias Schopp, Lars Stiemert, Sebastian Seeber, Daniela Pöhn, Wolfgang Hommel:
Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails. ICISSP 2021: 384-390 - [c39]Michael Steinke, Wolfgang Hommel:
FEDCON: An embeddable Framework for Managing MOC Functions and Interfaces in Federated Software Networks. IM 2021: 107-115 - [c38]Michael Grabatin, Wolfgang Hommel:
Self-sovereign Identity Management in Wireless Ad Hoc Mesh Networks. IM 2021: 480-486 - 2020
- [c37]Daniela Pöhn, Wolfgang Hommel:
An overview of limitations and approaches in identity management. ARES 2020: 90:1-90:10 - [c36]Daniela Pöhn, Wolfgang Hommel:
IMC: A Classification of Identity Management Approaches. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 3-20
2010 – 2019
- 2019
- [c35]Tanja Hanauer, Wolfgang Hommel:
Enhancing Enterprise IT Security with a Visualization-Based Process Framework. SSCC 2019: 225-236 - 2018
- [c34]Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn:
A Process Framework for Stakeholder-specific Visualization of Security Metrics. ARES 2018: 28:1-28:10 - [c33]Michael Steinke, Wolfgang Hommel:
Overcoming Network and Security Management Platform Gaps in Federated Software Networks. CNSM 2018: 295-299 - [c32]Michael Steinke, Iris Adam, Wolfgang Hommel:
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks. NFV-SDN 2018: 1-6 - [c31]Michael Grabatin, Wolfgang Hommel:
Reliability and scalability improvements to identity federations by managing SAML metadata with distributed ledger technology. NOMS 2018: 1-6 - [c30]Michael Steinke, Wolfgang Hommel:
A data model for federated network and security management information exchange in inter-organizational IT service infrastructures. NOMS 2018: 1-2 - [c29]Michael Grabatin, Wolfgang Hommel, Michael Steinke:
Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned Blockchains. SSCC 2018: 145-156 - 2016
- [j9]Felix von Eye, Michael Grabatin, Wolfgang Hommel:
Detecting Stealthy Backdoors and Port Knocking Sequences through Flow Analysis. Prax. Inf.verarb. Kommun. 38(3-4): 97-104 (2016) - [j8]Wolfgang Hommel, Michael Grabatin, Stefan Metzger, Daniela Pöhn:
Level of Assurance Management Automation for Dynamic Identity Federations based on Vectors of Trust. Prax. Inf.verarb. Kommun. 39(3-4): 41 (2016) - [c28]Michael Steinke, Stefan Metzger, Wolfgang Hommel:
POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks. CCS 2016: 1829-1831 - [c27]Michael Grabatin, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn:
Improving the scalability of identity federations through level of assurance management automation. DFN-Forum Kommunikationstechnologien 2016: 67-76 - 2015
- [j7]Helmut Reiser, Daniel Feuchtinger, Wolfgang Hommel, Bernhard Schmidt, Michael Storz:
E-Mail made in Science - Sicherheit für den E-Mail Transport mit DANE TLSA. Prax. Inf.verarb. Kommun. 38(1-2): 23-41 (2015) - [j6]Helmut Reiser, Daniel Feuchtinger, Wolfgang Hommel, Bernhard Schmidt, Michael Storz:
DNSSEC - Konzepte und Betriebsaspekte des Domain Name Systems der Zukunft. Prax. Inf.verarb. Kommun. 38(1-2): 71-81 (2015) - [c26]Felix von Eye, Michael Grabatin, Wolfgang Hommel:
Netzbasierte Erkennung von mittels Port Knocking verstecksten Dienstern und Backdoors. DFN-Forum Kommunikationstechnologien 2015: 57-67 - 2014
- [j5]Hao Yu, Feng Liu, Susanne Naegele-Jackson, Tangui Coulouarn, Trupti Kulkarni, Josva Kleist, Wolfgang Hommel, Lars Dittmann:
GÉANT perfSONAR MDM-based circuit monitoring in a multidomain environment. IEEE Commun. Mag. 52(5): 174-181 (2014) - [c25]Felix von Eye, Wolfgang Hommel, Helmut Reiser:
Herausforderungen und Anforderungen für ein organisationsweites Notfall-Passwortmanagement. DFN-Forum Kommunikationstechnologien 2014: 109-119 - [c24]Daniela Pöhn, Stefan Metzger, Wolfgang Hommel:
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures. SEC 2014: 307-320 - 2013
- [j4]Wolfgang Hommel, Stefan Metzger, Helmut Reiser:
Grenzen, Chancen und Perspektiven von Security Information & Event Management Systemen. Prax. Inf.verarb. Kommun. 36(4): 215-221 (2013) - [c23]Gabi Dreo Rodosek, Mario Golling, Wolfgang Hommel:
MuSIC: An IT security architecture for inter-community clouds. IM 2013: 812-815 - [c22]Gabi Dreo, Mario Golling, Wolfgang Hommel, Frank Tietze:
ICEMAN: An architecture for secure federated inter-cloud identity management. IM 2013: 1207-1210 - 2012
- [j3]Mark Yampolskiy, Wolfgang Hommel, Feng Liu, Ralf König, Martin G. Metzker, Michael Schiffers:
Link repair in managed multi-domain connections with end-to-end quality guarantees. Int. J. Netw. Manag. 22(6): 494-507 (2012) - [c21]Nils gentschen Felde, Wolfgang Hommel, Jan Kohlrausch, Helmut Reiser, Christian Szongott, Felix von Eye:
Das Datenschutzkonzept für das föderierte Frühwarnsystem im D-Grid und seine technische Umsetzung. DFN-Forum Kommunikationstechnologien 2012: 53-62 - [c20]Gabi Dreo Rodosek, Mario Golling, Wolfgang Hommel, Alexander Reinhold:
Inter-Clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit. DFN-Forum Kommunikationstechnologien 2012: 73-82 - 2011
- [c19]Silvia Knittl, Wolfgang Hommel:
Identitätsmanagement für Hybrid-Cloud-Umgebungen an Hochschulen-Erfahrungen im Münchner Wissenschaftsnetz. DFN-Forum Kommunikationstechnologien 2011: 103-112 - [c18]Stefan Metzger, Wolfgang Hommel, Helmut Reiser:
Migration Gewachsener Umgebungen Auf Ein Zentrales, Datenschutzorientiertes Log-Management-System-Erfahrungen Am Leibniz-Rechenzentrum. GI-Jahrestagung 2011: 113 - [c17]Stefan Metzger, Wolfgang Hommel, Helmut Reiser:
Integrated Security Incident Management - Concepts and Real-World Experiences. IMF 2011: 107-121 - [i2]Patricia Marcu, Wolfgang Hommel:
Inter-organizational fault management: Functional and organizational core aspects of management architectures. CoRR abs/1101.3891 (2011) - [i1]Patricia Marcu, David Schmitz, Wolfgang Fritz, Mark Yampolskiy, Wolfgang Hommel:
Integrated monitoring of multi-domain backbone connections -- Operational experience in the LHC optical private network. CoRR abs/1101.3896 (2011) - 2010
- [c16]Mark Yampolskiy, Wolfgang Hommel, Patricia Marcu, Matthias K. Hamm:
An Information Model for the Provisioning of Network Connections Enabling Customer-Specific End-to-End QoS Guarantees. IEEE SCC 2010: 138-145 - [c15]Silvia Knittl, Wolfgang Hommel:
Umgang mit Risiken für IT-Dienste im Hochschulumfeld am Beispiel des Münchner Wissenschaftsnetzes. GI Jahrestagung (2) 2010: 265-270
2000 – 2009
- 2009
- [j2]Wolfgang Hommel:
Using Policy-Based Management for Privacy-Enhancing Data Access and Usage Control in Grid Environments. Int. J. Grid High Perform. Comput. 1(2): 15-29 (2009) - [j1]Latifa Boursas, Heinz-Gerd Hegering, Wolfgang Hommel:
Standards and New Technology for Systems and Virtualization Management: A Report on SVM'08. J. Netw. Syst. Manag. 17(1-2): 99-104 (2009) - [c14]Latifa Boursas, Wolfgang Hommel:
Multidimensional Dynamic Trust Management for Federated Services. CSE (2) 2009: 684-689 - [c13]Latifa Boursas, Mohamed Bourimi, Wolfgang Hommel, Dogan Kesdogan:
Enhancing Trust in SOA Based Collaborative Environments. SVM 2009: 94-102 - [c12]Stephan Graf, Wolfgang Hommel, Sabine Rathmayer:
Hochschulübergreifendes E-Learning: Technische Realisierung und Datenschutz. Wirtschaftsinformatik (2) 2009: 401-410 - [c11]Wolfgang Hommel, Silvia Knittl:
Zielorientierte Datenmodellierung für ITIL-basierte inter-organisationale Configuration Management Databases. Wirtschaftsinformatik (1) 2009: 695704 - 2008
- [c10]Wolfgang Hommel:
Using Policy-Based Management for Privacy-Enhancing Data Access and Usage Control in Grid Environments. CCGRID 2008: 621-626 - [c9]Wolfgang Hommel, Michael Schiffers:
Benutzergesteuerter Datenschutz in Grids. DFN-Forum Kommunikationstechnologien 2008: 65-74 - [c8]Daniel Pluta, Latifa Boursas, Ralf Ebner, Wolfgang Hommel, Silvia Knittl:
Hochschulübergreifend integriertes Identitäts-Management am Beispiel des Münchner Wissenschaftsnetzes. GI Jahrestagung (2) 2008: 583-588 - [e1]Latifa Boursas, Mark Carlson, Wolfgang Hommel, Michelle Sibilla, Kes Wold:
Systems and Virtualization Management. Standards and New Technologies - Second International Workshop, SVM 2008, Munich, Germany, October, 21-22, 2008 Proceedings. Communications in Computer and Information Science 18, 2008, ISBN 978-3-540-88707-2 [contents] - 2007
- [b1]Wolfgang Hommel:
Architektur- und Werkzeugkonzepte für föderiertes Identitäts-Management. Ludwig Maximilian University of Munich, Germany, Verlag Dr. Hut 2007, ISBN 978-3-89963-594-2, pp. 1-453 - 2006
- [c7]Wolfgang Hommel:
Policy-Based Integration of User and Provider-Sided Identity Management. ETRICS 2006: 160-174 - [c6]Latifa Boursas, Wolfgang Hommel:
Policy-based Service Provisioning and Dynamic Trust Management in Identity Federations. ICC 2006: 2370-2375 - [c5]Latifa Boursas, Wolfgang Hommel:
Policy-gesteuerte Datenfreigaben und Trust Management im organisationsübergreifenden Identitäts-Management. Sicherheit 2006: 91-102 - 2005
- [c4]Wolfgang Hommel:
Using XACML for Privacy Control in SAML-Based Identity Federations. Communications and Multimedia Security 2005: 160-169 - [c3]Wolfgang Hommel:
An Architecture for Privacy-Aware Inter-domain Identity Management. DSOM 2005: 48-59 - [c2]Wolfgang Hommel, Helmut Reiser:
Federated Identity Management: Die Notwendigkeit zentraler Koordinationsdienste. KiVS Kurzbeiträge und Workshop 2005: 65-72 - 2003
- [c1]Ernst Bötsch, Petra Eilfeld, Wolfgang Hommel:
Effiziente Bearbeitung von Abuse-Beschwerden. IMF 2003: 13-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint