Search the dblp DataBase
Ruth Breu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ruth Breu , Ursula Hinkel , Christoph Hofmann , Cornel Klein , Barbara Paech , Bernhard Rumpe , Veronika Thurner Towards a Formalization of the Unified Modeling Language. [Citation Graph (1, 0)][DBLP ] ECOOP, 1997, pp:344-366 [Conf ] Muhammad Alam , Ruth Breu , Michael Hafner Modeling permissions in a (U/X)ML world. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:685-692 [Conf ] Ruth Breu , Michael Breu Abstract and Concrete Objects - An Algebraic Design Method for Object-Based Systems. [Citation Graph (0, 0)][DBLP ] AMAST, 1993, pp:343-348 [Conf ] Gerhard Popp , Jan Jürjens , Guido Wimmel , Ruth Breu Security-Critical System Development with Extended Use Cases. [Citation Graph (0, 0)][DBLP ] APSEC, 2003, pp:478-487 [Conf ] Bernd Tilg , Joanna Chimiak-Opoka , Chris Lenz , Ruth Breu Towards Operationalizing Strategic Alignment of IT by Usage of Software Engineering Methods. [Citation Graph (0, 0)][DBLP ] BIS, 2007, pp:610-625 [Conf ] Ruth Breu , Radu Grosu , Franz Huber , Bernhard Rumpe , Wolfgang Schwerin Towards a Precise Semantics for Object-Oriented Modeling Techniques. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1997, pp:205-210 [Conf ] Ruth Breu , Michael Breu Ein Konzept der Modul- und Typvererbung. [Citation Graph (0, 0)][DBLP ] Eiffel, 1992, pp:23-37 [Conf ] Ruth Breu , Joanna Chimiak-Opoka Towards Systematic Model Assessment. [Citation Graph (0, 0)][DBLP ] ER (Workshops), 2005, pp:398-409 [Conf ] Ruth Breu , Radu Grosu Modeling the Dynamic Behavior of Objects on Events, Messages and Methods (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Euro-Par, 1997, pp:572-575 [Conf ] Barbara Weber , Werner Wild , Ruth Breu CBRFlow: Enabling Adaptive Workflow Management Through Conversational Case-Based Reasoning. [Citation Graph (0, 0)][DBLP ] ECCBR, 2004, pp:434-448 [Conf ] Ruth Breu , Gerhard Popp Actor-Centric Modeling of User Rights. [Citation Graph (0, 0)][DBLP ] FASE, 2004, pp:165-179 [Conf ] Ruth Breu , Elena Zucca An Algebraic Compositional Semantics of an Object Oriented Notation with Concurrency. [Citation Graph (0, 0)][DBLP ] FSTTCS, 1989, pp:131-142 [Conf ] Ruth Breu , Michael Hafner , Barbara Weber Modeling and Realizing Security-Critical Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP ] IASSE, 2004, pp:139-144 [Conf ] Muhammad Alam , Michael Hafner , Ruth Breu Modeling Authorization in an SOA based Application Scenario. [Citation Graph (0, 0)][DBLP ] IASTED Conf. on Software Engineering, 2006, pp:79-84 [Conf ] Michael Hafner , Ruth Breu , Michael Breu A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2005, pp:128-135 [Conf ] Ruth Breu , Michael Breu , Michael Hafner , Andrea Nowak Web Service Engineering - Advancing a New Software Engineering Discipline. [Citation Graph (0, 0)][DBLP ] ICWE, 2005, pp:8-18 [Conf ] Michael Hafner , Michael Breu , Ruth Breu , Andrea Nowak Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment. [Citation Graph (0, 0)][DBLP ] ICWS, 2005, pp:533-540 [Conf ] Martin Wirsing , Rolf Hennicker , Ruth Breu Reusable Specification Components. [Citation Graph (0, 0)][DBLP ] MFCS, 1988, pp:121-137 [Conf ] Michael Hafner , Muhammad Alam , Ruth Breu Towards a MOF/QVT-Based Domain Architecture for Model Driven Security. [Citation Graph (0, 0)][DBLP ] MoDELS, 2006, pp:275-290 [Conf ] Ruth Breu , Klaus Burger , Michael Hafner , Gerhard Popp Towards a Systematic Development of Secure Systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:1-12 [Conf ] Michael Hafner , Ruth Breu , Berthold Agreiter , Andrea Nowak SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP ] WOSIS, 2006, pp:47-57 [Conf ] Ruth Breu , Michael Hafner , Barbara Weber , Andrea Nowak Model Driven Security for Inter-organizational Workflows in e-Government. [Citation Graph (0, 0)][DBLP ] TCGOV, 2005, pp:122-133 [Conf ] Muhammad Alam , Michael Hafner , Ruth Breu , Stefan Unterthiner A Framework for Modeling Restricted Delegation in Service Oriented Architecture. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:142-151 [Conf ] Ruth Breu , Radu Grosu , Franz Huber , Bernhard Rumpe , Wolfgang Schwerin Systems, Views and Models of UML. [Citation Graph (0, 0)][DBLP ] UML Workshop, 1997, pp:93-108 [Conf ] Michael Hafner , Ruth Breu Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0. [Citation Graph (0, 0)][DBLP ] MoDELS, 2005, pp:39-53 [Conf ] Bernhard Rumpe , Ruth Breu , Ingolf Krüger Applied Software Engineering Principles for UML. [Citation Graph (0, 0)][DBLP ] TOOLS (29), 1999, pp:410- [Conf ] Ruth Breu , Elena Zucca An Algebraic Semantic Framework for Object Oriented Languages with Concurrency (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 1996, v:8, n:6, pp:706-715 [Journal ] Manfred Broy , Ruth Breu , Franz Huber , Ingolf Krüger , Bernhard Rumpe , Wolfgang Schwerin Methodik, Sprachen und Grundlagen des Software Engineering, Abschlussbericht des Forschungslabors SYSLAB (1.10.1994 - 30.9.1999). [Citation Graph (0, 0)][DBLP ] Inform., Forsch. Entwickl., 2001, v:16, n:1, pp:53-59 [Journal ] Ruth Breu , Walter Huber , Wolfgang Schwerin A conformity model of software processes. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2001, v:43, n:5, pp:339-349 [Journal ] Ruth Breu , Michael Breu A Methodology of Inheritance. [Citation Graph (0, 0)][DBLP ] Software - Concepts and Tools, 1995, v:16, n:3, pp:113-123 [Journal ] Bernd Tilg , Christian Hechenblaikner , Ruth Breu Integration der Open Business Intelligence-Suite Pentaho in ein modellgetriebenes Analyse-Framework am Beispiel des Strategic Alignment. [Citation Graph (0, 0)][DBLP ] Data Warehousing, 2006, pp:125-142 [Conf ] Quantitative Assessment of Enterprise Security System. [Citation Graph (, )][DBLP ] An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. [Citation Graph (, )][DBLP ] User-Oriented Quality Assessment of IT-Supported Healthcare Processes - A Position Paper. [Citation Graph (, )][DBLP ] TestStories - Ausführbare Requirements für Serviceorientierte Architekturen. [Citation Graph (, )][DBLP ] A Web-Based Collaborative Metamodeling Environment with Secure Remote Model Access. [Citation Graph (, )][DBLP ] Workflow Testing. [Citation Graph (, )][DBLP ] Model-Driven Security Engineering of Service Oriented Systems. [Citation Graph (, )][DBLP ] Vorwort zum Doktorandensymposium der Modellierung 2008. [Citation Graph (, )][DBLP ] Security Testing by Telling TestStories. [Citation Graph (, )][DBLP ] First International Workshop on the Model-Based Design of Trustworthy Health Information Systems. [Citation Graph (, )][DBLP ] Second International Workshop on the Model-Based Design of Trustworthy Health Information Systems MOTHIS 2008. [Citation Graph (, )][DBLP ] Model-Driven Configuration of SELinux Policies. [Citation Graph (, )][DBLP ] Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. [Citation Graph (, )][DBLP ] A constraint based role based access control in the SECTET a model-driven approach. [Citation Graph (, )][DBLP ] Towards Adaptive Test Code Generation for Service Oriented Systems. [Citation Graph (, )][DBLP ] A general obligation model and continuity: enhanced policy enforcement engine for usage control. [Citation Graph (, )][DBLP ] Model-Driven Approaches to Security. [Citation Graph (, )][DBLP ] A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. [Citation Graph (, )][DBLP ] A technical architecture for enforcing usage control requirements in service-oriented architectures. [Citation Graph (, )][DBLP ] Workflow Inspector A Test Tool for Microsoft Workflow Foundation. [Citation Graph (, )][DBLP ] Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering. [Citation Graph (, )][DBLP ] Using an Enterprise Architecture for IT Risk Management. [Citation Graph (, )][DBLP ] Privacy and Access Control for IHE-Based Systems. [Citation Graph (, )][DBLP ] E-Health Approach to Link-up Actors in the Health Care System of Austria. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.305secs