Almut Herzog

470 total citations
15 papers, 264 citations indexed

About

Almut Herzog is a scholar working on Computer Networks and Communications, Sociology and Political Science and Information Systems. According to data from OpenAlex, Almut Herzog has authored 15 papers receiving a total of 264 indexed citations (citations by other indexed papers that have themselves been cited), including 7 papers in Computer Networks and Communications, 7 papers in Sociology and Political Science and 7 papers in Information Systems. Recurrent topics in Almut Herzog's work include Access Control and Trust (6 papers), Security and Verification in Computing (5 papers) and Service-Oriented Architecture and Web Services (3 papers). Almut Herzog is often cited by papers focused on Access Control and Trust (6 papers), Security and Verification in Computing (5 papers) and Service-Oriented Architecture and Web Services (3 papers). Almut Herzog collaborates with scholars based in Sweden. Almut Herzog's co-authors include Nahid Shahmehri, Claudiu Duma, Kerstin Roback, Leili Lind and Levon Saldamli and has published in prestigious journals such as Computers & Security, Technology and Health Care and International Journal of Information Security and Privacy.

In The Last Decade

Almut Herzog

13 papers receiving 212 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Almut Herzog Sweden 8 150 85 79 53 51 15 264
Bart De Decker Belgium 9 149 1.0× 71 0.8× 134 1.7× 44 0.8× 44 0.9× 64 252
Leonardo A. Martucci Sweden 13 123 0.8× 127 1.5× 267 3.4× 153 2.9× 35 0.7× 44 453
Owen Lo United Kingdom 10 185 1.2× 138 1.6× 146 1.8× 24 0.5× 64 1.3× 23 347
William Grosso United States 8 132 0.9× 117 1.4× 197 2.5× 11 0.2× 27 0.5× 10 313
Weider D. Yu United States 11 218 1.5× 115 1.4× 96 1.2× 37 0.7× 58 1.1× 41 343
Jens H. Jahnke Canada 11 372 2.5× 167 2.0× 251 3.2× 21 0.4× 29 0.6× 40 529
Steven A. Demurjian United States 12 217 1.4× 171 2.0× 241 3.1× 155 2.9× 44 0.9× 73 431
Kevin Stine United States 7 242 1.6× 118 1.4× 44 0.6× 28 0.5× 56 1.1× 17 326
Harsh Kupwade Patil United States 7 117 0.8× 138 1.6× 122 1.5× 25 0.5× 32 0.6× 13 289
Hyo-Sang Lim South Korea 10 97 0.6× 200 2.4× 172 2.2× 38 0.7× 73 1.4× 28 366

Countries citing papers authored by Almut Herzog

Since Specialization
Citations

This map shows the geographic impact of Almut Herzog's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Almut Herzog with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Almut Herzog more than expected).

Fields of papers citing papers by Almut Herzog

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Almut Herzog. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Almut Herzog. The network helps show where Almut Herzog may publish in the future.

Co-authorship network of co-authors of Almut Herzog

This figure shows the co-authorship network connecting the top 25 collaborators of Almut Herzog. A scholar is included among the top collaborators of Almut Herzog based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Almut Herzog. Almut Herzog is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Herzog, Almut & Nahid Shahmehri. (2007). Usable Set-up of Runtime Security Policies. 394–407. 8 indexed citations
2.
Herzog, Almut, Nahid Shahmehri, & Claudiu Duma. (2007). An Ontology of Information Security. International Journal of Information Security and Privacy. 1(4). 1–23. 133 indexed citations
3.
Herzog, Almut & Nahid Shahmehri. (2007). Usable set‐up of runtime security policies. Information Management & Computer Security. 15(5). 394–407. 5 indexed citations
4.
Duma, Claudiu, Almut Herzog, & Nahid Shahmehri. (2007). Privacy in the Semantic Web: What Policy Languages Have to Offer. 109–118. 16 indexed citations
5.
Herzog, Almut. (2007). Usable Security Policies for Runtime Environments. KTH Publication Database DiVA (KTH Royal Institute of Technology). 10 indexed citations
6.
Herzog, Almut & Nahid Shahmehri. (2007). User help techniques for usable security. 11–11. 20 indexed citations
7.
Herzog, Almut & Nahid Shahmehri. (2006). An Evaluation of Java Application Containers according to Security Requirements. 178–186. 3 indexed citations
8.
Herzog, Almut & Nahid Shahmehri. (2005). Problems Running Untrusted Services as Java Threads.
9.
Herzog, Almut & Nahid Shahmehri. (2004). Performance of the Java security manager. Computers & Security. 24(3). 192–207. 12 indexed citations
10.
Roback, Kerstin & Almut Herzog. (2003). Home informatics in healthcare: Assessment guidelines to keep up quality of care and avoid adverse effects. Technology and Health Care. 11(3). 195–206. 24 indexed citations
11.
Herzog, Almut & Leili Lind. (2003). Network solutions for home health care applications. Technology and Health Care. 11(2). 77–87. 17 indexed citations
12.
Duma, Claudiu, Almut Herzog, & Nahid Shahmehri. (2002). Towards secure e-services. 221–222. 1 indexed citations
13.
Herzog, Almut. (2002). Secure execution environment for Java electronic services. 5 indexed citations
14.
Herzog, Almut & Nahid Shahmehri. (2002). Using the Java sandbox for resource control. 135–147. 3 indexed citations
15.
Herzog, Almut, et al.. (2001). Security Issues in E-Home Network and Software Infrastructures. 2–2. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026