A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions M Leitner, S Rinderle-Ma Information and Software Technology 56 (3), 273-293, 2014 | 75 | 2014 |
An analysis and evaluation of security aspects in the business process model and notation M Leitner, M Miller, S Rinderle-Ma 2013 international conference on availability, reliability and security, 262-267, 2013 | 28 | 2013 |
Definition and enactment of instance-spanning process constraints M Leitner, J Mangler, S Rinderle-Ma International Conference on Web Information Systems Engineering, 652-658, 2012 | 24 | 2012 |
AW-RBAC: access control in adaptive workflow systems M Leitner, S Rinderle-Ma, J Mangler 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 21 | 2011 |
Design considerations for cyber security testbeds: A case study on a cyber security testbed for education M Frank, M Leitner, T Pahi 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 17 | 2017 |
Analysis and assessment of situational awareness models for national cyber security centers T Pahi, M Leitner, F Skopik International Conference on Information Systems Security and Privacy 2, 334-345, 2017 | 16 | 2017 |
SPRINT-Responsibilities: design and development of security policies in process-aware information systems M Leitner, J Mangler, S Rinderle-Ma Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011 | 15 | 2011 |
Evaluation methods in process-aware information systems research with a perspective on human orientation S Kriglstein, M Leitner, S Kabicher-Fuchs, S Rinderle-Ma Business & Information Systems Engineering 58 (6), 397-414, 2016 | 13 | 2016 |
An experimental study on the design and modeling of security concepts in business processes M Leitner, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck IFIP Working Conference on The Practice of Enterprise Modeling, 236-250, 2013 | 11 | 2013 |
An adaptive heuristic approach to service selection problems in dynamic distributed systems PP Beran, E Vinek, E Schikuta, M Leitner 2012 ACM/IEEE 13th International Conference on Grid Computing, 66-75, 2012 | 11 | 2012 |
An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments S Kucek, M Leitner Journal of Network and Computer Applications 151, 102470, 2020 | 8 | 2020 |
A case study on the suitability of process mining to produce current-state RBAC models M Leitner, A Baumgrass, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck International Conference on Business Process Management, 719-724, 2012 | 8 | 2012 |
Security policies in adaptive process-aware information systems: Existing approaches and challenges M Leitner 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 8 | 2011 |
On evolving organizational models without losing control on authorization constraints in web service orchestrations S Rinderle-Ma, M Leitner 2010 IEEE 12th Conference on Commerce and Enterprise Computing, 128-135, 2010 | 8 | 2010 |
Digitale Bürgerbeteiligung: Forschung und Praxis–Chancen und Herausforderungen der elektronischen Partizipation M Leitner Springer-Verlag, 2018 | 6* | 2018 |
An experimental approach to reputation in e-participation I Serov, M Leitner 2016 International Conference on Software Security and Assurance (ICSSA), 37-42, 2016 | 6 | 2016 |
Privacy and Security by Design im agilen Softwareentwicklungsprozess O Terbu, W Hötzendorfer, M Leitner, A Bonitz, S Vogl, S Zehetbauer Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions …, 2016 | 6 | 2016 |
Delta analysis of role-based access control models M Leitner International Conference on Computer Aided Systems Theory, 507-514, 2013 | 6 | 2013 |
Responsibility-driven design and development of process-aware security policies M Leitner, S Rinderle-Ma, J Mangler 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 6 | 2011 |
Situational Awareness for Strategic Decision Making on a National Level M eitner, T Pahi, F Skopik Collaborative Cyber Threat Intelligence, 225-276, 2017 | 5 | 2017 |