| 2009 |
| 21 | EE | Andreas Ekelhart,
Stefan Fenz,
Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management.
HICSS 2009: 1-10 |
| 20 | EE | Thomas Neubauer,
Andreas Ekelhart:
An evaluation of technologies for the pseudonymization of medical data.
SAC 2009: 857-858 |
| 2008 |
| 19 | EE | Thomas Neubauer,
Johannes Heurix:
Objective Types for the Valuation of Secure Business Processes.
ACIS-ICIS 2008: 231-236 |
| 18 | EE | Thomas Neubauer,
Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives.
ARES 2008: 187-194 |
| 17 | EE | Bernhard Riedl,
Veronika Grascher,
Mathias Kolb,
Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health.
ARES 2008: 39-46 |
| 16 | EE | Bernhard Riedl,
Veronika Grascher,
Stefan Fenz,
Thomas Neubauer:
Pseudonymization for improving the Privacy in E-Health Applications.
HICSS 2008: 255 |
| 15 | EE | Thomas Neubauer,
Andreas Ekelhart,
Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives.
SEC 2008: 477-492 |
| 14 | EE | Thomas Neubauer,
Johannes Heurix:
Multiobjective decision support for defining secure business processes: a case study.
IJBIDM 3(2): 177-195 (2008) |
| 13 | EE | Bernhard Riedl,
Veronika Grascher,
Thomas Neubauer:
A Secure e-Health Architecture based on the Appliance of Pseudonymization.
JSW 3(2): 23-32 (2008) |
| 2007 |
| 12 | EE | Bernhard Riedl,
Thomas Neubauer,
Gernot Goluch,
Oswald Boehm,
Gert Reinauer,
Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data.
ARES 2007: 318-324 |
| 11 | EE | Thomas Neubauer,
Gernot Goluch,
Bernhard Riedl:
A research agenda for Autonomous Business Process Management.
ARES 2007: 670-680 |
| 10 | EE | Thomas Neubauer,
Christian Stummer:
Interactive Decision Support for Multiobjective COTS Selection.
HICSS 2007: 283 |
| 9 | EE | Andreas Ekelhart,
Stefan Fenz,
Thomas Neubauer,
Edgar Weippl:
Formal threat descriptions for enhancing governmental risk assessment.
ICEGOV 2007: 40-43 |
| 8 | EE | Bernhard Riedl,
Veronika Grascher,
Thomas Neubauer:
Applying a Threshold Scheme to the Pseudonymization of Health Data.
PRDC 2007: 397-400 |
| 7 | EE | Thomas Neubauer,
Christian Stummer:
Extending business process management to determine efficient IT investments.
SAC 2007: 1250-1256 |
| 6 | | Thomas Neubauer,
Christian Stummer:
Interaktive Entscheidungsunterstützung für die Auswahl von Software-Komponenten bei mehrfachen Zielsetzungen.
Wirtschaftsinformatik (2) 2007: 255-270 |
| 5 | | Thomas Neubauer,
Johannes Heurix:
Multiobjective Decision Support for defining Secure Business Processes.
iiWAS 2007: 477-482 |
| 2006 |
| 4 | EE | Thomas Neubauer,
Christian Stummer,
Edgar Weippl:
Workshop-based Multiobjective Security Safeguard Selection.
ARES 2006: 366-373 |
| 3 | EE | Thomas Neubauer,
Markus D. Klemen,
Stefan Biffl:
Secure Business Process Management: A Roadmap.
ARES 2006: 457-464 |
| 2 | EE | Thomas Neubauer,
Edgar Weippl,
Stefan Biffl:
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.
ARES 2006: 723-731 |
| 2005 |
| 1 | EE | Thomas Neubauer,
Markus D. Klemen,
Stefan Biffl:
Business process-based valuation of IT-security.
ACM SIGSOFT Software Engineering Notes 30(4): 1-5 (2005) |