Paper & Theses
- Kristof Böhmer, Stefanie Rinderle-Ma: Automatic Signature Generation for Anomaly Detection in Business Process Instance Data. BMMDS/EMMSAD 2016: 196-211
- Stefanie Rinderle-Ma, Zhendong Ma, Bernhard Madlmayr: Using Content Analysis for Privacy Requirement Extraction and Policy Formalization. EMISA 2015: 93-107
- T Hildebrandt, S Rinderle-Ma: Server sounds and network noises . Cognitive Infocommunications (CogInfoCom), IEEE (2015)
- Maria Leitner, Stefanie Rinderle-Ma: A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions. Information & Software Technology 56(3): 273-293 (2014), «open access»
- Maria Leitner, Stefanie Rinderle-Ma: Anomaly detection and visualization in generative RBAC models. SACMAT 2014: 41-52
- Mark Strembeck, Stefanie Rinderle-Ma: Security and Privacy in Business Processes: A Posteriori Analysis Techniques. it - Information Technology 55(6): 247-254 (2013)
- Maria Leitner, Sigrid Schefer-Wenzl, Stefanie Rinderle-Ma, Mark Strembeck:An Experimental Study on the Design and Modeling of Security Concepts in Business Processes. PoEM 2013: 236-250
- Maria Leitner, Michelle Miller, Stefanie Rinderle-Ma: An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation. ARES 2013: 262-267
- Maria Leitner, Anne Baumgrass, Sigrid Schefer-Wenzl, Stefanie Rinderle-Ma, Mark Strembeck:A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models. Business Process Management Workshops 2012: 719-724
- Simone Kriglstein, Juergen Mangler, Stefanie Rinderle-Ma:Who is who: On visualizing organizational models in Collaborative Systems. CollaborateCom 2012: 279-288
- M. Leitner, S. Rinderle-Ma, and J. Mangler, «Responsibility-driven Design and Development of Process-aware Security Policies», in 2011 Sixth International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 2011, pp. 334–341.
- M. Leitner, J. Mangler, and S. Rinderle-Ma, «SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems», Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 2, no. 4, pp. 1–24, Dec. 2011.
- Dissertation Maria Leitner
- Thesis Olexandr Kyshynevskyi
Letzte Änderung: 23.03.2017, 11:34 | 272 Worte