dblp.uni-trier.dewww.uni-trier.de

Thomas Neubauer

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
21EEAndreas Ekelhart, Stefan Fenz, Thomas Neubauer: AURUM: A Framework for Information Security Risk Management. HICSS 2009: 1-10
20EEThomas Neubauer, Andreas Ekelhart: An evaluation of technologies for the pseudonymization of medical data. SAC 2009: 857-858
2008
19EEThomas Neubauer, Johannes Heurix: Objective Types for the Valuation of Secure Business Processes. ACIS-ICIS 2008: 231-236
18EEThomas Neubauer, Johannes Heurix: Defining Secure Business Processes with Respect to Multiple Objectives. ARES 2008: 187-194
17EEBernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer: Economic and Security Aspects of Applying a Threshold Scheme in e-Health. ARES 2008: 39-46
16EEBernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer: Pseudonymization for improving the Privacy in E-Health Applications. HICSS 2008: 255
15EEThomas Neubauer, Andreas Ekelhart, Stefan Fenz: Interactive Selection of ISO 27001 Controls under Multiple Objectives. SEC 2008: 477-492
14EEThomas Neubauer, Johannes Heurix: Multiobjective decision support for defining secure business processes: a case study. IJBIDM 3(2): 177-195 (2008)
13EEBernhard Riedl, Veronika Grascher, Thomas Neubauer: A Secure e-Health Architecture based on the Appliance of Pseudonymization. JSW 3(2): 23-32 (2008)
2007
12EEBernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck: A secure architecture for the pseudonymization of medical data. ARES 2007: 318-324
11EEThomas Neubauer, Gernot Goluch, Bernhard Riedl: A research agenda for Autonomous Business Process Management. ARES 2007: 670-680
10EEThomas Neubauer, Christian Stummer: Interactive Decision Support for Multiobjective COTS Selection. HICSS 2007: 283
9EEAndreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar Weippl: Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43
8EEBernhard Riedl, Veronika Grascher, Thomas Neubauer: Applying a Threshold Scheme to the Pseudonymization of Health Data. PRDC 2007: 397-400
7EEThomas Neubauer, Christian Stummer: Extending business process management to determine efficient IT investments. SAC 2007: 1250-1256
6 Thomas Neubauer, Christian Stummer: Interaktive Entscheidungsunterstützung für die Auswahl von Software-Komponenten bei mehrfachen Zielsetzungen. Wirtschaftsinformatik (2) 2007: 255-270
5 Thomas Neubauer, Johannes Heurix: Multiobjective Decision Support for defining Secure Business Processes. iiWAS 2007: 477-482
2006
4EEThomas Neubauer, Christian Stummer, Edgar Weippl: Workshop-based Multiobjective Security Safeguard Selection. ARES 2006: 366-373
3EEThomas Neubauer, Markus D. Klemen, Stefan Biffl: Secure Business Process Management: A Roadmap. ARES 2006: 457-464
2EEThomas Neubauer, Edgar Weippl, Stefan Biffl: Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ARES 2006: 723-731
2005
1EEThomas Neubauer, Markus D. Klemen, Stefan Biffl: Business process-based valuation of IT-security. ACM SIGSOFT Software Engineering Notes 30(4): 1-5 (2005)

Coauthor Index

1Stefan Biffl [1] [2] [3]
2Oswald Boehm [12]
3Andreas Ekelhart [9] [15] [20] [21]
4Stefan Fenz [9] [15] [16] [21]
5Gernot Goluch [11] [12]
6Veronika Grascher [8] [13] [16] [17]
7Johannes Heurix [5] [14] [18] [19]
8Markus D. Klemen [1] [3]
9Mathias Kolb [17]
10Alexander Krumboeck [12]
11Gert Reinauer [12]
12Bernhard Riedl [8] [11] [12] [13] [16] [17]
13Christian Stummer [4] [6] [7] [10]
14Edgar R. Weippl (Edgar Weippl) [2] [4] [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)