Follow
Christian Jung
Christian Jung
Department Head Security Engineering
Verified email at exla.de
Title
Cited by
Cited by
Year
Aggregated aluminium exposure: risk assessment for the general population
T Tietz, A Lenzner, AE Kolbaum, S Zellmer, C Riebeling, R Gürtler, ...
Archives of toxicology 93, 3503-3521, 2019
1152019
Ids reference architecture model. industrial data space. version 2.0
B Otto, S Lohmann, S Steinbuss, A Teuscher, S Auer, M Boehmer, J Bohn, ...
International Data Spaces Association, 2018
1092018
Usage control architecture options for data sovereignty in business ecosystems
J Zrenner, FO Möller, C Jung, A Eitel, B Otto
Journal of Enterprise Information Management 32 (3), 477-495, 2019
552019
Reference architecture model for the industrial data space
B Otto, S Lohmann, S Auer, G Brost, J Cirullies, A Eitel, T Ernst, C Haas, ...
Fraunhofer-Gesellschaft, 2017
532017
Phishing in the wireless: Implementation and analysis
I Martinovic, FA Zdarsky, A Bachorek, C Jung, JB Schmitt
New Approaches for Security, Privacy and Trust in Complex Environments …, 2007
272007
Evaluation of exposure assessment tools under REACH: part I—tier 1 tools
EG Lee, J Lamb, N Savic, I Basinas, B Gasic, C Jung, ML Kashon, J Kim, ...
Annals of work exposures and health 63 (2), 218-229, 2019
232019
Evaluation of exposure assessment tools under REACH: part II—higher tier tools
EG Lee, J Lamb, N Savic, I Basinas, B Gasic, C Jung, ML Kashon, J Kim, ...
Annals of work exposures and health 63 (2), 230-241, 2019
212019
Context-aware, data-driven policy enforcement for smart mobile devices in business environments
D Feth, C Jung
Security and Privacy in Mobile Information and Communication Systems: 4th …, 2012
202012
Indicator-based architecture-level security evaluation in a service-oriented environment
P Antonino, S Duszynski, C Jung, M Rudolph
Proceedings of the Fourth European Conference on Software Architecture …, 2010
202010
Methods for segmenting cracks in 3d images of concrete: A comparison based on semi-synthetic images
T Barisin, C Jung, F Müsebeck, C Redenbach, K Schladitz
Pattern Recognition 129, 108747, 2022
172022
Enhancing Cloud Security with Context-aware Usage Control Policies.
C Jung, A Eitel, R Schwarz
GI-Jahrestagung 211, 50, 2014
172014
Context-aware policy enforcement for android
C Jung, D Feth, C Seise
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
162013
Datenschutz und Datenanalyse: Herausforderungen und Lösungsansätze
M Steinebach, E Krempel, C Jung, M Hoffmann
Datenschutz und Datensicherheit-DuD 40 (7), 440-445, 2016
152016
Usage control in the international data spaces
A Eitel, C Jung, R Brandstädter, A Hosseinzadeh, S Bader, C Kühnle, ...
Aufl. IDS Association, Berlin, 2021
132021
Guidelines for uncertainty analysis: Application of the respective documents of EFSA and BfR for exposure assessments: Framework partnership agreement GP/EFSA/AMU/2016/01 …
T Schendel, C Jung, O Lindtner, M Greiner
EFSA Supporting Publications 15 (7), 1472E, 2018
132018
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements.
A Hosseinzadeh, A Eitel, C Jung
ICISSP, 397-405, 2020
122020
Formal specification and verification of JDK’s identity hash map implementation
M De Boer, S De Gouw, J Klamroth, C Jung, M Ulbrich, A Weigl
Formal Aspects of Computing 35 (3), 1-26, 2023
112023
Exposure modelling in Europe: how to pave the road for the future as part of the European Exposure Science Strategy 2020–2030
U Schlüter, J Meyer, A Ahrens, F Borghi, F Clerc, C Delmaar, A Di Guardo, ...
Journal of Exposure Science & Environmental Epidemiology 32 (4), 499-512, 2022
112022
Data Usage Control.
C Jung, J Dörr
Designing data spaces, 129-146, 2022
102022
Chronic dietary exposure to total arsenic, inorganic arsenic and water-soluble organic arsenic species based on results of the first German total diet study
C Hackethal, U Pabel, C Jung, T Schwerdtle, O Lindtner
Science of the Total Environment 859, 160261, 2023
92023
The system can't perform the operation now. Try again later.
Articles 1–20