dblp.uni-trier.dewww.uni-trier.de

Michael Hafner

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
25EEBasel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert: A general obligation model and continuity: enhanced policy enforcement engine for usage control. SACMAT 2008: 123-132
24EERuth Breu, Michael Hafner, Frank Innerhofer-Oberperfler, Florian Wozak: Model-Driven Security Engineering of Service Oriented Systems. UNISCON 2008: 59-71
23EEBasel Katt, Ruth Breu, Michael Hafner, Thomas Schabetsberger, Richard Mair, Florian Wozak: Privacy and Access Control for IHE-Based Systems. eHealth 2008: 145-153
22EEMuhammad Alam, Michael Hafner, Ruth Breu: Constraint based role based access control in the SECTET-frameworkA model-driven approach. Journal of Computer Security 16(2): 223-260 (2008)
2007
21EEMichael Hafner, Leonhard Brunauer, Hannes Payer, Robert Resch, Friedrich Wrba, Alfred Gangl, Andreas Vecsei, Andreas Uhl: Pit Pattern Classification of Zoom-Endoscopical Colon Images Using DCT and FFT. CBMS 2007: 159-164
20EEMichael Hafner, Mukhtiar Memon, Muhammad Alam: Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet. MoDELS Workshops 2007: 132-144
19EEBerthold Agreiter, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean-Pierre Seifert, Xinwen Zhang: A technical architecture for enforcing usage control requirements in service-oriented architectures. SWS 2007: 18-25
18 Berthold Agreiter, Michael Hafner, Ruth Breu: A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. WOSIS 2007: 63-72
17EEMuhammad Alam, Ruth Breu, Michael Hafner: Model-Driven Security Engineering for Trust Management in SECTET. JSW 2(1): 47-59 (2007)
2006
16EEMuhammad Alam, Ruth Breu, Michael Hafner: Modeling permissions in a (U/X)ML world. ARES 2006: 685-692
15 Muhammad Alam, Michael Hafner, Ruth Breu: Modeling Authorization in an SOA based Application Scenario. IASTED Conf. on Software Engineering 2006: 79-84
14EEMichael Hafner, Muhammad Alam, Ruth Breu: Towards a MOF/QVT-Based Domain Architecture for Model Driven Security. MoDELS 2006: 275-290
13EEMuhammad Alam, Michael Hafner, Ruth Breu: A constraint based role based access control in the SECTET a model-driven approach. PST 2006: 13
12EEMuhammad Alam, Michael Hafner, Ruth Breu: Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. PST 2006: 44
11EEMuhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner: A Framework for Modeling Restricted Delegation in Service Oriented Architecture. TrustBus 2006: 142-151
10 Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak: SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. WOSIS 2006: 47-57
2005
9 Michael Hafner, Ruth Breu, Michael Breu: A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. ICEIS (3) 2005: 128-135
8EERuth Breu, Michael Breu, Michael Hafner, Andrea Nowak: Web Service Engineering - Advancing a New Software Engineering Discipline. ICWE 2005: 8-18
7EEMichael Hafner, Michael Breu, Ruth Breu, Andrea Nowak: Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment. ICWS 2005: 533-540
6EEMichael Hafner, Ruth Breu: Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0. MoDELS 2005: 39-53
5EEJan Mendling, Michael Hafner: From Inter-organizational Workflows to Process Execution: Generating BPEL from WS-CDL. OTM Workshops 2005: 506-515
4EERuth Breu, Michael Hafner, Barbara Weber, Andrea Nowak: Model Driven Security for Inter-organizational Workflows in e-Government. TCGOV 2005: 122-133
2004
3 Ruth Breu, Michael Hafner, Barbara Weber: Modeling and Realizing Security-Critical Inter-Organizational Workflows. IASSE 2004: 139-144
2 Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp: Towards a Systematic Development of Secure Systems. WOSIS 2004: 1-12
1EERuth Breu, Klaus Burger, Michael Hafner, Gerhard Popp: Towards a Systematic Development of Secure Systems. Information Systems Security 13(3): 5-13 (2004)

Coauthor Index

1Berthold Agreiter [10] [18] [19]
2Muhammad Alam [11] [12] [13] [14] [15] [16] [17] [19] [20] [22]
3Michael Breu [7] [8] [9]
4Ruth Breu [1] [2] [3] [4] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [22] [23] [24] [25]
5Leonhard Brunauer [21]
6Klaus Burger [1] [2]
7Alfred Gangl [21]
8Frank Innerhofer-Oberperfler [24]
9Basel Katt [23] [25]
10Richard Mair [23]
11Mukhtiar Memon [20]
12Jan Mendling [5]
13Andrea Nowak [4] [7] [8] [10]
14Hannes Payer [21]
15Gerhard Popp [1] [2]
16Alexander Pretschner [19]
17Robert Resch [21]
18Thomas Schabetsberger [23]
19Jean-Pierre Seifert [19] [25]
20Andreas Uhl [21]
21Stefan Unterthiner [11]
22Andreas Vecsei [21]
23Barbara Weber [3] [4]
24Florian Wozak [23] [24]
25Friedrich Wrba [21]
26Xinwen Zhang [19] [25]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)