Andreas Schaad

According to our database1, Andreas Schaad authored at least 64 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
"You still have to study" - On the Security of LLM generated code.
CoRR, 2024

2022
Deep-Learning-Based Vulnerability Detection in Binary Executables.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
FEX - A Feature Extractor for Real-Time IDS.
Proceedings of the Information Security - 24th International Conference, 2021

Creation and Detection of German Voice Deepfakes.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Project OVVL - Threat Modeling Support for the entire secure development lifecycle.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

2019
CloudProtect - A Cloud-based Software Protection Service.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger Blockchain.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

"Open Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat Modeling.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Towards a Cloud-based System for Software Protection and Licensing.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Industrial Feasibility of Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2017

Short Paper: Industrial Feasibility of Private Information Retrieval.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2015
Initial Encryption of large Searchable Data Sets using Hadoop.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Optimized and controlled provisioning of encrypted outsourced data.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Privacy by Encrypted Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Secure benchmarking in the cloud.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

An Encrypted In-Memory Column-Store: The Onion Selection Problem.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Adjustably encrypted in-memory column-store.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Automating architectural security analysis.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

TAM<sup>2</sup>: automated threat analysis.
Proceedings of the ACM Symposium on Applied Computing, 2012

Security and safety of assets in business processes.
Proceedings of the ACM Symposium on Applied Computing, 2012

Monitoring Security and Safety of Assets in Supply Chains.
Proceedings of the Future Security - 7th Security Research Conference, 2012

2011
Visualizing security in business processes.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Sichere Warenketten durch RescueIT.
Proceedings of the Qualität und Effizienz durch informationsgestützte Landwirtschaft, Fokus: Moderne Weinwirtschaft. Referate der 31. GIL-Jahrestagung, 24., 2011

2009
Model-driven business process security requirement specification.
J. Syst. Archit., 2009

Document-Based Dynamic Workflows: Towards Flexible and Stateful Services.
Proceedings of the 2009 IEEE World Congress on Services, Part II, 2009

Ontology-Based Secure XML Content Distribution.
Proceedings of the Emerging Challenges for Security, 2009

Delegation Assistance.
Proceedings of the POLICY 2009, 2009

Practical privacy-preserving protocols for criminal investigations.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

A Secure Comparison Technique for Tree Structured Data.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009

Modelling task delegation for human-centric eGovernment workflows.
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009

ProActive Caching: Generating Caching Heuristics for Business Process Environments.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Towards Secure Content Based Dissemination of XML Documents.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Privacy-preserving social network analysis for criminal investigations.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

A Secure Task Delegation Model for Workflows.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Task-based entailment constraints for basic workflow patterns.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios.
Proceedings of the First International Workshop on Requirements Engineering and Law, 2008

Distributed Access Control For XML Document Centric Collaborations.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

ProActive Access Control for Business Process-Driven Environments.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Avoiding Policy-based Deadlocks in Business Processes.
Proceedings of the The Third International Conference on Availability, 2008

2007
Deriving XACML Policies from Business Process Models.
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007

A Framework for Evidence Lifecycle Management.
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007

Collaboration for Human-Centric eGovernment Workflows.
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007

Classification Model for Access Control Constraints.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

SOAP-based Secure Conversation and Collaboration.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Modeling of Task-Based Authorization Constraints in BPMN.
Proceedings of the Business Process Management, 5th International Conference, 2007

2006
Towards secure SOAP message exchange in a SOA.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

A model-checking approach to analysing organisational controls in a loan origination process.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Security in enterprise resource planning systems and service-oriented architectures.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

From Business Process Choreography to Authorization Policies.
Proceedings of the Data and Applications Security XX, 2006

2005
XacT: a bridge between resource management and access control in multi-layered applications.
ACM SIGSOFT Softw. Eng. Notes, 2005

A case study of separation of duty properties in the context of the Austrian "eLaw" process.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Revocation of Obligation and Authorisation Policy Objects.
Proceedings of the Data and Applications Security XIX, 2005

2004
Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

An Extended Analysis of Delegating Obligations.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
An administration concept for the enterprise role-based access control model.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

2002
A lightweight approach to specification and analysis of role-based access control extensions.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Observations on the role life-cycle in the context of enterprise security management.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Delegation of Obligations.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

A Framework for Organisational Control Principles.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
The role-based access control system of a European bank: a case study and discussion.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Detecting Conflicts in a Role-Based Delegation Model.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001


  Loading...