Andreas Schaad
According to our database1,
Andreas Schaad
authored at least 64 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
2020
Proceedings of the Sicherheit 2020, Sicherheit, 2020
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger Blockchain.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
"Open Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat Modeling.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
2014
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014
2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Future Security - 7th Security Research Conference, 2012
2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Qualität und Effizienz durch informationsgestützte Landwirtschaft, Fokus: Moderne Weinwirtschaft. Referate der 31. GIL-Jahrestagung, 24., 2011
2009
J. Syst. Archit., 2009
Proceedings of the 2009 IEEE World Congress on Services, Part II, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios.
Proceedings of the First International Workshop on Requirements Engineering and Law, 2008
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Proceedings of the Business Process Management, 5th International Conference, 2007
2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
A model-checking approach to analysing organisational controls in a loan origination process.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Data and Applications Security XX, 2006
2005
XacT: a bridge between resource management and access control in multi-layered applications.
ACM SIGSOFT Softw. Eng. Notes, 2005
A case study of separation of duty properties in the context of the Austrian "eLaw" process.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
2002
A lightweight approach to specification and analysis of role-based access control extensions.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Observations on the role life-cycle in the context of enterprise security management.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
The role-based access control system of a European bank: a case study and discussion.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001