The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andreas Schaad: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andreas Schaad
    Detecting Conflicts in a Role-Based Delegation Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:117-126 [Conf]
  2. Andreas Schaad, Jonathan D. Moffett
    A Framework for Organisational Control Principles. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:229-238 [Conf]
  3. Philip Robinson, Florian Kerschbaum, Andreas Schaad
    From Business Process Choreography to Authorization Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:297-309 [Conf]
  4. Andreas Schaad
    An Extended Analysis of Delegating Obligations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:49-64 [Conf]
  5. Andreas Schaad
    Revocation of Obligation and Authorisation Policy Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:28-39 [Conf]
  6. Andreas Schaad, Jonathan D. Moffett
    Delegation of Obligations. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:25-35 [Conf]
  7. Andreas Schaad, Jonathan D. Moffett
    Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:1380-1384 [Conf]
  8. Andreas Schaad, Pascal Spadone, Helmut Weichsel
    A case study of separation of duty properties in the context of the Austrian "eLaw" process. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1328-1332 [Conf]
  9. Andreas Schaad
    Security in enterprise resource planning systems and service-oriented architectures. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:69-70 [Conf]
  10. Andreas Schaad, Volkmar Lotz, Karsten Sohr
    A model-checking approach to analysing organisational controls in a loan origination process. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:139-149 [Conf]
  11. Andreas Schaad, Jonathan D. Moffett
    A lightweight approach to specification and analysis of role-based access control extensions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:13-22 [Conf]
  12. Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob
    The role-based access control system of a European bank: a case study and discussion. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:3-9 [Conf]
  13. Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett
    Observations on the role life-cycle in the context of enterprise security management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:43-51 [Conf]
  14. Axel Kern, Andreas Schaad, Jonathan D. Moffett
    An administration concept for the enterprise role-based access control model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:3-11 [Conf]
  15. Christian Wolter, Andreas Schaad
    Modeling of Task-Based Authorization Constraints in BPMN. [Citation Graph (0, 0)][DBLP]
    BPM, 2007, pp:64-79 [Conf]
  16. Mohammad Ashiqur Rahaman, Andreas Schaad
    SOAP-based Secure Conversation and Collaboration. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:471-480 [Conf]
  17. Khaled Gaaloul, François Charoy, Andreas Schaad, Hannah Lee
    Collaboration for Human-Centric eGovernment Workflows. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2007, pp:201-212 [Conf]
  18. Christian Wolter, Andreas Schaad, Christoph Meinel
    Deriving XACML Policies from Business Process Models. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2007, pp:142-153 [Conf]
  19. Andreas Schaad
    A Framework for Evidence Lifecycle Management. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2007, pp:191-200 [Conf]

  20. Avoiding Policy-based Deadlocks in Business Processes. [Citation Graph (, )][DBLP]


  21. ProActive Access Control for Business Process-Driven Environments. [Citation Graph (, )][DBLP]


  22. Modelling task delegation for human-centric eGovernment workflows. [Citation Graph (, )][DBLP]


  23. Distributed Access Control For XML Document Centric Collaborations. [Citation Graph (, )][DBLP]


  24. Delegation Assistance. [Citation Graph (, )][DBLP]


  25. Task-based entailment constraints for basic workflow patterns. [Citation Graph (, )][DBLP]


  26. Ontology-Based Secure XML Content Distribution. [Citation Graph (, )][DBLP]


  27. Privacy-preserving social network analysis for criminal investigations. [Citation Graph (, )][DBLP]


  28. Classification Model for Access Control Constraints. [Citation Graph (, )][DBLP]


  29. A Secure Comparison Technique for Tree Structured Data. [Citation Graph (, )][DBLP]


  30. Towards secure SOAP message exchange in a SOA. [Citation Graph (, )][DBLP]


  31. Towards Secure Content Based Dissemination of XML Documents. [Citation Graph (, )][DBLP]


  32. ProActive Caching: Generating Caching Heuristics for Business Process Environments. [Citation Graph (, )][DBLP]


  33. A Secure Task Delegation Model for Workflows. [Citation Graph (, )][DBLP]


  34. Document-Based Dynamic Workflows: Towards Flexible and Stateful Services. [Citation Graph (, )][DBLP]


Search in 0.085secs, Finished in 0.087secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002