2009 |
21 | EE | Andreas Ekelhart,
Stefan Fenz,
Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management.
HICSS 2009: 1-10 |
20 | EE | Thomas Neubauer,
Andreas Ekelhart:
An evaluation of technologies for the pseudonymization of medical data.
SAC 2009: 857-858 |
2008 |
19 | EE | Thomas Neubauer,
Johannes Heurix:
Objective Types for the Valuation of Secure Business Processes.
ACIS-ICIS 2008: 231-236 |
18 | EE | Thomas Neubauer,
Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives.
ARES 2008: 187-194 |
17 | EE | Bernhard Riedl,
Veronika Grascher,
Mathias Kolb,
Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health.
ARES 2008: 39-46 |
16 | EE | Bernhard Riedl,
Veronika Grascher,
Stefan Fenz,
Thomas Neubauer:
Pseudonymization for improving the Privacy in E-Health Applications.
HICSS 2008: 255 |
15 | EE | Thomas Neubauer,
Andreas Ekelhart,
Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives.
SEC 2008: 477-492 |
14 | EE | Thomas Neubauer,
Johannes Heurix:
Multiobjective decision support for defining secure business processes: a case study.
IJBIDM 3(2): 177-195 (2008) |
13 | EE | Bernhard Riedl,
Veronika Grascher,
Thomas Neubauer:
A Secure e-Health Architecture based on the Appliance of Pseudonymization.
JSW 3(2): 23-32 (2008) |
2007 |
12 | EE | Bernhard Riedl,
Thomas Neubauer,
Gernot Goluch,
Oswald Boehm,
Gert Reinauer,
Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data.
ARES 2007: 318-324 |
11 | EE | Thomas Neubauer,
Gernot Goluch,
Bernhard Riedl:
A research agenda for Autonomous Business Process Management.
ARES 2007: 670-680 |
10 | EE | Thomas Neubauer,
Christian Stummer:
Interactive Decision Support for Multiobjective COTS Selection.
HICSS 2007: 283 |
9 | EE | Andreas Ekelhart,
Stefan Fenz,
Thomas Neubauer,
Edgar Weippl:
Formal threat descriptions for enhancing governmental risk assessment.
ICEGOV 2007: 40-43 |
8 | EE | Bernhard Riedl,
Veronika Grascher,
Thomas Neubauer:
Applying a Threshold Scheme to the Pseudonymization of Health Data.
PRDC 2007: 397-400 |
7 | EE | Thomas Neubauer,
Christian Stummer:
Extending business process management to determine efficient IT investments.
SAC 2007: 1250-1256 |
6 | | Thomas Neubauer,
Christian Stummer:
Interaktive Entscheidungsunterstützung für die Auswahl von Software-Komponenten bei mehrfachen Zielsetzungen.
Wirtschaftsinformatik (2) 2007: 255-270 |
5 | | Thomas Neubauer,
Johannes Heurix:
Multiobjective Decision Support for defining Secure Business Processes.
iiWAS 2007: 477-482 |
2006 |
4 | EE | Thomas Neubauer,
Christian Stummer,
Edgar Weippl:
Workshop-based Multiobjective Security Safeguard Selection.
ARES 2006: 366-373 |
3 | EE | Thomas Neubauer,
Markus D. Klemen,
Stefan Biffl:
Secure Business Process Management: A Roadmap.
ARES 2006: 457-464 |
2 | EE | Thomas Neubauer,
Edgar Weippl,
Stefan Biffl:
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.
ARES 2006: 723-731 |
2005 |
1 | EE | Thomas Neubauer,
Markus D. Klemen,
Stefan Biffl:
Business process-based valuation of IT-security.
ACM SIGSOFT Software Engineering Notes 30(4): 1-5 (2005) |