2008 |
25 | EE | Basel Katt,
Xinwen Zhang,
Ruth Breu,
Michael Hafner,
Jean-Pierre Seifert:
A general obligation model and continuity: enhanced policy enforcement engine for usage control.
SACMAT 2008: 123-132 |
24 | EE | Ruth Breu,
Michael Hafner,
Frank Innerhofer-Oberperfler,
Florian Wozak:
Model-Driven Security Engineering of Service Oriented Systems.
UNISCON 2008: 59-71 |
23 | EE | Basel Katt,
Ruth Breu,
Michael Hafner,
Thomas Schabetsberger,
Richard Mair,
Florian Wozak:
Privacy and Access Control for IHE-Based Systems.
eHealth 2008: 145-153 |
22 | EE | Muhammad Alam,
Michael Hafner,
Ruth Breu:
Constraint based role based access control in the SECTET-frameworkA model-driven approach.
Journal of Computer Security 16(2): 223-260 (2008) |
2007 |
21 | EE | Michael Hafner,
Leonhard Brunauer,
Hannes Payer,
Robert Resch,
Friedrich Wrba,
Alfred Gangl,
Andreas Vecsei,
Andreas Uhl:
Pit Pattern Classification of Zoom-Endoscopical Colon Images Using DCT and FFT.
CBMS 2007: 159-164 |
20 | EE | Michael Hafner,
Mukhtiar Memon,
Muhammad Alam:
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet.
MoDELS Workshops 2007: 132-144 |
19 | EE | Berthold Agreiter,
Muhammad Alam,
Ruth Breu,
Michael Hafner,
Alexander Pretschner,
Jean-Pierre Seifert,
Xinwen Zhang:
A technical architecture for enforcing usage control requirements in service-oriented architectures.
SWS 2007: 18-25 |
18 | | Berthold Agreiter,
Michael Hafner,
Ruth Breu:
A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment.
WOSIS 2007: 63-72 |
17 | EE | Muhammad Alam,
Ruth Breu,
Michael Hafner:
Model-Driven Security Engineering for Trust Management in SECTET.
JSW 2(1): 47-59 (2007) |
2006 |
16 | EE | Muhammad Alam,
Ruth Breu,
Michael Hafner:
Modeling permissions in a (U/X)ML world.
ARES 2006: 685-692 |
15 | | Muhammad Alam,
Michael Hafner,
Ruth Breu:
Modeling Authorization in an SOA based Application Scenario.
IASTED Conf. on Software Engineering 2006: 79-84 |
14 | EE | Michael Hafner,
Muhammad Alam,
Ruth Breu:
Towards a MOF/QVT-Based Domain Architecture for Model Driven Security.
MoDELS 2006: 275-290 |
13 | EE | Muhammad Alam,
Michael Hafner,
Ruth Breu:
A constraint based role based access control in the SECTET a model-driven approach.
PST 2006: 13 |
12 | EE | Muhammad Alam,
Michael Hafner,
Ruth Breu:
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET.
PST 2006: 44 |
11 | EE | Muhammad Alam,
Michael Hafner,
Ruth Breu,
Stefan Unterthiner:
A Framework for Modeling Restricted Delegation in Service Oriented Architecture.
TrustBus 2006: 142-151 |
10 | | Michael Hafner,
Ruth Breu,
Berthold Agreiter,
Andrea Nowak:
SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows.
WOSIS 2006: 47-57 |
2005 |
9 | | Michael Hafner,
Ruth Breu,
Michael Breu:
A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together.
ICEIS (3) 2005: 128-135 |
8 | EE | Ruth Breu,
Michael Breu,
Michael Hafner,
Andrea Nowak:
Web Service Engineering - Advancing a New Software Engineering Discipline.
ICWE 2005: 8-18 |
7 | EE | Michael Hafner,
Michael Breu,
Ruth Breu,
Andrea Nowak:
Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment.
ICWS 2005: 533-540 |
6 | EE | Michael Hafner,
Ruth Breu:
Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0.
MoDELS 2005: 39-53 |
5 | EE | Jan Mendling,
Michael Hafner:
From Inter-organizational Workflows to Process Execution: Generating BPEL from WS-CDL.
OTM Workshops 2005: 506-515 |
4 | EE | Ruth Breu,
Michael Hafner,
Barbara Weber,
Andrea Nowak:
Model Driven Security for Inter-organizational Workflows in e-Government.
TCGOV 2005: 122-133 |
2004 |
3 | | Ruth Breu,
Michael Hafner,
Barbara Weber:
Modeling and Realizing Security-Critical Inter-Organizational Workflows.
IASSE 2004: 139-144 |
2 | | Ruth Breu,
Klaus Burger,
Michael Hafner,
Gerhard Popp:
Towards a Systematic Development of Secure Systems.
WOSIS 2004: 1-12 |
1 | EE | Ruth Breu,
Klaus Burger,
Michael Hafner,
Gerhard Popp:
Towards a Systematic Development of Secure Systems.
Information Systems Security 13(3): 5-13 (2004) |