![]() |
| 2004 | ||
|---|---|---|
| 9 | EE | Susanne Röhrig, Konstantin Knorr: Security Analysis of Electronic Business Processes. Electronic Commerce Research 4(1-2): 59-81 (2004) |
| 2001 | ||
| 8 | Henrik Stormer, Konstantin Knorr: PDA- and Agent-based Execution of Work of Tasks. GI Jahrestagung (2) 2001: 968-972 | |
| 7 | Konstantin Knorr, Susanne Röhrig: Security Requirements of E-Business Processes. I3E 2001: 73-86 | |
| 6 | EE | Konstantin Knorr, Harald Weidner: Analyzing Separation of Duties in Petri Net Workflows. MMM-ACNS 2001: 102-114 |
| 5 | Konstantin Knorr, Henrik Stormer: Modeling and Analyzing Separation of Duties in Workflow Environments. SEC 2001: 199-212 | |
| 2000 | ||
| 4 | EE | Konstantin Knorr: Dynamic Access Control through Petri Net Workflows. ACSAC 2000: 159-167 |
| 3 | EE | Konstantin Knorr, Susanne Röhrig: Security of Electronic Business Applications - Structure and Quantification. EC-Web 2000: 25-37 |
| 2 | EE | Susanne Röhrig, Konstantin Knorr: Towards a Secure Web-Based Health Care Application. ECIS 2000 |
| 1 | Susanne Röhrig, Konstantin Knorr, Hansrudi Noser: Sicherheit von E-Business-Anwendungen - Struktur und Quantifizierung. Wirtschaftsinformatik 42(6): 499-508 (2000) | |
| 1 | Hansrudi Noser | [1] |
| 2 | Susanne Röhrig | [1] [2] [3] [7] [9] |
| 3 | Henrik Stormer | [5] [8] |
| 4 | Harald Weidner | [6] |