Maria Leitner
TitleCited byYear
A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions
M Leitner, S Rinderle-Ma
Information and Software Technology 56 (3), 273-293, 2014
An analysis and evaluation of security aspects in the business process model and notation
M Leitner, M Miller, S Rinderle-Ma
2013 international conference on availability, reliability and security, 262-267, 2013
AW-RBAC: access control in adaptive workflow systems
M Leitner, S Rinderle-Ma, J Mangler
2011 Sixth International Conference on Availability, Reliability and …, 2011
Definition and enactment of instance-spanning process constraints
M Leitner, J Mangler, S Rinderle-Ma
International Conference on Web Information Systems Engineering, 652-658, 2012
SPRINT-Responsibilities: design and development of security policies in process-aware information systems
M Leitner, J Mangler, S Rinderle-Ma
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011
Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
T Pahi, M Leitner, F Skopik
ICISSP, 334-345, 2017
An adaptive heuristic approach to service selection problems in dynamic distributed systems
PP Beran, E Vinek, E Schikuta, M Leitner
Proceedings of the 2012 ACM/IEEE 13th International Conference on Grid …, 2012
Evaluation methods in process-aware information systems research with a perspective on human orientation
S Kriglstein, M Leitner, S Kabicher-Fuchs, S Rinderle-Ma
Business & Information Systems Engineering 58 (6), 397-414, 2016
An experimental study on the design and modeling of security concepts in business processes
M Leitner, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck
IFIP Working Conference on The Practice of Enterprise Modeling, 236-250, 2013
A case study on the suitability of process mining to produce current-state RBAC models
M Leitner, A Baumgrass, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck
International Conference on Business Process Management, 719-724, 2012
Delta analysis of role-based access control models
M Leitner
International Conference on Computer Aided Systems Theory, 507-514, 2013
Security policies in adaptive process-aware information systems: Existing approaches and challenges
M Leitner
2011 Sixth International Conference on Availability, Reliability and …, 2011
On evolving organizational models without losing control on authorization constraints in web service orchestrations
S Rinderle-Ma, M Leitner
2010 IEEE 12th Conference on Commerce and Enterprise Computing, 128-135, 2010
Privacy and Security by Design im agilen Softwareentwicklungsprozess
O Terbu, W Hötzendorfer, M Leitner, A Bonitz, S Vogl, S Zehetbauer
Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions …, 2016
Responsibility-driven design and development of process-aware security policies
M Leitner, S Rinderle-Ma, J Mangler
2011 Sixth International Conference on Availability, Reliability and …, 2011
E-Participation Platform Features and Design Principles
J Schossböck, M Sachs, M Leitner
CeDEM16 Proceedings of the International Conference for E-Democracy and Open …, 2016
Data exploitation at large: your way to adequate Cyber common operating pictures
T Pahi, M Leitner, F Skopik
Proceedings of the 16th European Conference on Cyber Warfare and Security …, 2017
Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education
M Frank, M Leitner, T Pahi
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017
Preparation, Modelling, and Visualisation of Cyber Common Operating Pictures for National Cyber Security Centres
T Pahi, M Leitner, F Skopik
Journal of Information Warfare 16 (4), 26-40, 2017
A versatile, secure and privacy-aware tool for online participation
M Leitner, A Bonitz, B Herzog, W Hotzendorfer, C Kenngott, T Kuhta, ...
2016 IEEE 20th International Enterprise Distributed Object Computing …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20