Prof. Dr. Andreas Schaad
Prof. Dr. Andreas Schaad
University of Applied Sciences Offenburg
Dirección de correo verificada de
Citado por
Citado por
The role-based access control system of a European bank: a case study and discussion
A Schaad, J Moffett, J Jacob
Proceedings of the sixth ACM symposium on Access control models and …, 2001
Modeling of task-based authorization constraints in BPMN
C Wolter, A Schaad
Business Process Management: 5th International Conference, BPM 2007 …, 2007
Model-driven business process security requirement specification
C Wolter, M Menzel, A Schaad, P Miseldine, C Meinel
Journal of Systems Architecture 55 (4), 211-223, 2009
Observations on the role life-cycle in the context of enterprise security management
A Kern, M Kuhlmann, A Schaad, J Moffett
Proceedings of the seventh ACM symposium on Access control models and …, 2002
A lightweight approach to specification and analysis of role-based access control extensions
A Schaad, JD Moffett
Proceedings of the seventh ACM symposium on Access control models and …, 2002
A model-checking approach to analysing organisational controls in a loan origination process
A Schaad, V Lotz, K Sohr
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
Towards secure SOAP message exchange in a SOA
MA Rahaman, A Schaad, M Rits
Proceedings of the 3rd ACM workshop on Secure web services, 77-84, 2006
An administration concept for the enterprise role-based access control model
A Kern, A Schaad, J Moffett
Proceedings of the eighth ACM symposium on Access control models and …, 2003
A framework for organisational control principles
A Schaad, JD Moffett
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Soap-based secure conversation and collaboration
MA Rahaman, A Schaad
IEEE International Conference on Web Services (ICWS 2007), 471-480, 2007
Task-based entailment constraints for basic workflow patterns
C Wolter, A Schaad, C Meinel
Proceedings of the 13th ACM symposium on access control models and …, 2008
Delegation of obligations
A Schaad, JD Moffett
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
Deriving XACML policies from business process models
C Wolter, A Schaad, C Meinel
Web Information Systems Engineering–WISE 2007 Workshops: WISE 2007 …, 2007
Privacy-preserving social network analysis for criminal investigations
F Kerschbaum, A Schaad
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 9-14, 2008
Mechanism to control delegation and revocation of tasks in workflow system
A Schaad
US Patent 8,620,713, 2013
An inline approach for secure soap requests and early validation
MA Rahaman, R Marten, A Schaad
OWASP AppSec Europe 1, 2006
Comparing encrypted documents having structured data
MA Rahaman, A Schaad, H Plate, Y Roudier
US Patent 8,726,151, 2014
Encrypted in-memory column-store
F Kerschbaum, M Haerterich, M Kohler, I Hang, A Schaad, A Schroepfer, ...
US Patent 9,213,764, 2015
Local versus remote optimization in encrypted query processing
F Kerschbaum, P Grofig, M Haerterich, M Kohler, A Schaad, A Schroepfer, ...
US Patent 10,162,858, 2018
Privacy preserving social network analysis
F Kerschbaum, A Schaad
US Patent 8,130,947, 2012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20