The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Hafner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Muhammad Alam, Ruth Breu, Michael Hafner
    Modeling permissions in a (U/X)ML world. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:685-692 [Conf]
  2. Ruth Breu, Michael Hafner, Barbara Weber
    Modeling and Realizing Security-Critical Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP]
    IASSE, 2004, pp:139-144 [Conf]
  3. Muhammad Alam, Michael Hafner, Ruth Breu
    Modeling Authorization in an SOA based Application Scenario. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2006, pp:79-84 [Conf]
  4. Michael Hafner, Ruth Breu, Michael Breu
    A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:128-135 [Conf]
  5. Ruth Breu, Michael Breu, Michael Hafner, Andrea Nowak
    Web Service Engineering - Advancing a New Software Engineering Discipline. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:8-18 [Conf]
  6. Michael Hafner, Michael Breu, Ruth Breu, Andrea Nowak
    Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:533-540 [Conf]
  7. Michael Hafner, Muhammad Alam, Ruth Breu
    Towards a MOF/QVT-Based Domain Architecture for Model Driven Security. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2006, pp:275-290 [Conf]
  8. Jan Mendling, Michael Hafner
    From Inter-organizational Workflows to Process Execution: Generating BPEL from WS-CDL. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2005, pp:506-515 [Conf]
  9. Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp
    Towards a Systematic Development of Secure Systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:1-12 [Conf]
  10. Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak
    SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:47-57 [Conf]
  11. Ruth Breu, Michael Hafner, Barbara Weber, Andrea Nowak
    Model Driven Security for Inter-organizational Workflows in e-Government. [Citation Graph (0, 0)][DBLP]
    TCGOV, 2005, pp:122-133 [Conf]
  12. Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner
    A Framework for Modeling Restricted Delegation in Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:142-151 [Conf]
  13. Michael Hafner, Ruth Breu
    Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2005, pp:39-53 [Conf]

  14. Model-Driven Security Engineering of Service Oriented Systems. [Citation Graph (, )][DBLP]


  15. Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet. [Citation Graph (, )][DBLP]


  16. Towards a Usage Control Policy Specification with Petri Nets. [Citation Graph (, )][DBLP]


  17. Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. [Citation Graph (, )][DBLP]


  18. A constraint based role based access control in the SECTET a model-driven approach. [Citation Graph (, )][DBLP]


  19. A general obligation model and continuity: enhanced policy enforcement engine for usage control. [Citation Graph (, )][DBLP]


  20. A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. [Citation Graph (, )][DBLP]


  21. Building a stateful reference monitor with coloured petri nets. [Citation Graph (, )][DBLP]


  22. A usage control policy specification with Petri nets. [Citation Graph (, )][DBLP]


  23. A technical architecture for enforcing usage control requirements in service-oriented architectures. [Citation Graph (, )][DBLP]


  24. Privacy and Access Control for IHE-Based Systems. [Citation Graph (, )][DBLP]


Search in 0.071secs, Finished in 0.072secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002