The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ruth Breu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ruth Breu, Ursula Hinkel, Christoph Hofmann, Cornel Klein, Barbara Paech, Bernhard Rumpe, Veronika Thurner
    Towards a Formalization of the Unified Modeling Language. [Citation Graph (1, 0)][DBLP]
    ECOOP, 1997, pp:344-366 [Conf]
  2. Muhammad Alam, Ruth Breu, Michael Hafner
    Modeling permissions in a (U/X)ML world. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:685-692 [Conf]
  3. Ruth Breu, Michael Breu
    Abstract and Concrete Objects - An Algebraic Design Method for Object-Based Systems. [Citation Graph (0, 0)][DBLP]
    AMAST, 1993, pp:343-348 [Conf]
  4. Gerhard Popp, Jan Jürjens, Guido Wimmel, Ruth Breu
    Security-Critical System Development with Extended Use Cases. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:478-487 [Conf]
  5. Bernd Tilg, Joanna Chimiak-Opoka, Chris Lenz, Ruth Breu
    Towards Operationalizing Strategic Alignment of IT by Usage of Software Engineering Methods. [Citation Graph (0, 0)][DBLP]
    BIS, 2007, pp:610-625 [Conf]
  6. Ruth Breu, Radu Grosu, Franz Huber, Bernhard Rumpe, Wolfgang Schwerin
    Towards a Precise Semantics for Object-Oriented Modeling Techniques. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1997, pp:205-210 [Conf]
  7. Ruth Breu, Michael Breu
    Ein Konzept der Modul- und Typvererbung. [Citation Graph (0, 0)][DBLP]
    Eiffel, 1992, pp:23-37 [Conf]
  8. Ruth Breu, Joanna Chimiak-Opoka
    Towards Systematic Model Assessment. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2005, pp:398-409 [Conf]
  9. Ruth Breu, Radu Grosu
    Modeling the Dynamic Behavior of Objects on Events, Messages and Methods (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Euro-Par, 1997, pp:572-575 [Conf]
  10. Barbara Weber, Werner Wild, Ruth Breu
    CBRFlow: Enabling Adaptive Workflow Management Through Conversational Case-Based Reasoning. [Citation Graph (0, 0)][DBLP]
    ECCBR, 2004, pp:434-448 [Conf]
  11. Ruth Breu, Gerhard Popp
    Actor-Centric Modeling of User Rights. [Citation Graph (0, 0)][DBLP]
    FASE, 2004, pp:165-179 [Conf]
  12. Ruth Breu, Elena Zucca
    An Algebraic Compositional Semantics of an Object Oriented Notation with Concurrency. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1989, pp:131-142 [Conf]
  13. Ruth Breu, Michael Hafner, Barbara Weber
    Modeling and Realizing Security-Critical Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP]
    IASSE, 2004, pp:139-144 [Conf]
  14. Muhammad Alam, Michael Hafner, Ruth Breu
    Modeling Authorization in an SOA based Application Scenario. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2006, pp:79-84 [Conf]
  15. Michael Hafner, Ruth Breu, Michael Breu
    A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:128-135 [Conf]
  16. Ruth Breu, Michael Breu, Michael Hafner, Andrea Nowak
    Web Service Engineering - Advancing a New Software Engineering Discipline. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:8-18 [Conf]
  17. Michael Hafner, Michael Breu, Ruth Breu, Andrea Nowak
    Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:533-540 [Conf]
  18. Martin Wirsing, Rolf Hennicker, Ruth Breu
    Reusable Specification Components. [Citation Graph (0, 0)][DBLP]
    MFCS, 1988, pp:121-137 [Conf]
  19. Michael Hafner, Muhammad Alam, Ruth Breu
    Towards a MOF/QVT-Based Domain Architecture for Model Driven Security. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2006, pp:275-290 [Conf]
  20. Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp
    Towards a Systematic Development of Secure Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:1-12 [Conf]
  21. Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak
    SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:47-57 [Conf]
  22. Ruth Breu, Michael Hafner, Barbara Weber, Andrea Nowak
    Model Driven Security for Inter-organizational Workflows in e-Government. [Citation Graph (0, 0)][DBLP]
    TCGOV, 2005, pp:122-133 [Conf]
  23. Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner
    A Framework for Modeling Restricted Delegation in Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:142-151 [Conf]
  24. Ruth Breu, Radu Grosu, Franz Huber, Bernhard Rumpe, Wolfgang Schwerin
    Systems, Views and Models of UML. [Citation Graph (0, 0)][DBLP]
    UML Workshop, 1997, pp:93-108 [Conf]
  25. Michael Hafner, Ruth Breu
    Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2005, pp:39-53 [Conf]
  26. Bernhard Rumpe, Ruth Breu, Ingolf Krüger
    Applied Software Engineering Principles for UML. [Citation Graph (0, 0)][DBLP]
    TOOLS (29), 1999, pp:410- [Conf]
  27. Ruth Breu, Elena Zucca
    An Algebraic Semantic Framework for Object Oriented Languages with Concurrency (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1996, v:8, n:6, pp:706-715 [Journal]
  28. Manfred Broy, Ruth Breu, Franz Huber, Ingolf Krüger, Bernhard Rumpe, Wolfgang Schwerin
    Methodik, Sprachen und Grundlagen des Software Engineering, Abschlussbericht des Forschungslabors SYSLAB (1.10.1994 - 30.9.1999). [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 2001, v:16, n:1, pp:53-59 [Journal]
  29. Ruth Breu, Walter Huber, Wolfgang Schwerin
    A conformity model of software processes. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2001, v:43, n:5, pp:339-349 [Journal]
  30. Ruth Breu, Michael Breu
    A Methodology of Inheritance. [Citation Graph (0, 0)][DBLP]
    Software - Concepts and Tools, 1995, v:16, n:3, pp:113-123 [Journal]
  31. Bernd Tilg, Christian Hechenblaikner, Ruth Breu
    Integration der Open Business Intelligence-Suite Pentaho in ein modellgetriebenes Analyse-Framework am Beispiel des Strategic Alignment. [Citation Graph (0, 0)][DBLP]
    Data Warehousing, 2006, pp:125-142 [Conf]

  32. Quantitative Assessment of Enterprise Security System. [Citation Graph (, )][DBLP]


  33. An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. [Citation Graph (, )][DBLP]


  34. User-Oriented Quality Assessment of IT-Supported Healthcare Processes - A Position Paper. [Citation Graph (, )][DBLP]


  35. TestStories - Ausführbare Requirements für Serviceorientierte Architekturen. [Citation Graph (, )][DBLP]


  36. A Web-Based Collaborative Metamodeling Environment with Secure Remote Model Access. [Citation Graph (, )][DBLP]


  37. Workflow Testing. [Citation Graph (, )][DBLP]


  38. Model-Driven Security Engineering of Service Oriented Systems. [Citation Graph (, )][DBLP]


  39. Vorwort zum Doktorandensymposium der Modellierung 2008. [Citation Graph (, )][DBLP]


  40. Security Testing by Telling TestStories. [Citation Graph (, )][DBLP]


  41. First International Workshop on the Model-Based Design of Trustworthy Health Information Systems. [Citation Graph (, )][DBLP]


  42. Second International Workshop on the Model-Based Design of Trustworthy Health Information Systems MOTHIS 2008. [Citation Graph (, )][DBLP]


  43. Model-Driven Configuration of SELinux Policies. [Citation Graph (, )][DBLP]


  44. Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. [Citation Graph (, )][DBLP]


  45. A constraint based role based access control in the SECTET a model-driven approach. [Citation Graph (, )][DBLP]


  46. Towards Adaptive Test Code Generation for Service Oriented Systems. [Citation Graph (, )][DBLP]


  47. A general obligation model and continuity: enhanced policy enforcement engine for usage control. [Citation Graph (, )][DBLP]


  48. Model-Driven Approaches to Security. [Citation Graph (, )][DBLP]


  49. A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. [Citation Graph (, )][DBLP]


  50. A technical architecture for enforcing usage control requirements in service-oriented architectures. [Citation Graph (, )][DBLP]


  51. Workflow Inspector – A Test Tool for Microsoft Workflow Foundation. [Citation Graph (, )][DBLP]


  52. Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering. [Citation Graph (, )][DBLP]


  53. Using an Enterprise Architecture for IT Risk Management. [Citation Graph (, )][DBLP]


  54. Privacy and Access Control for IHE-Based Systems. [Citation Graph (, )][DBLP]


  55. E-Health Approach to Link-up Actors in the Health Care System of Austria. [Citation Graph (, )][DBLP]


Search in 0.547secs, Finished in 0.549secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002