logo  
           
 
Sectissimo Publications

2011

Memon, M. (2011). Security Modeling with Pattern Refinement for a Security-as-a-Service Architecture. . PhD Thesis, University of Innsbruck.

2010

Schabetsberger, T. and Wozak, F. and Katt, B. and Mair, R. and Hirsch, B. and Hoerbst, A. (2010). Implementation of a Secure and Interoperable Generic e-Health Infrastructure for Shared Electronic Health Records based on IHE Integration Profiles. In: 13th world congress on Medical and Health Informatics, Medinfo 2010., 12-15 Sep 2010, Cape Town, South Africa.

Katt, B. and Trojer, T. and Breu, R. and Schabetsberger, T. and Wozak, F. (2010). Meeting EHR Security Requirements: SeAAS Approach. EMFI Special Topics Conference 2010, Reykjavik, Iceland.

2009

Hafner, M., Memon, M. and Breu R. (2009). SeAAS - A Reference Architecture for Security Services in SOO. Journal of Universal Computer Science, Vol. 15, No. 15, pp. 2916-2936.

Mukhtiar, M. and Hafner, M. and Breu, R. (2009). Security As A Service - A Reference Architecture for SOA Security. WOSIS Workshop '09, May, 2009, Milan, Italy.

2008

Mukhtiar, M. and Hafner, M. and Breu, R. (2008). SECTISSIMO: A Platform-independent Framework for Security Services. In: Modeling Security Workshop In Association with MODELS '08, 28th September, 2008, Toulouse, France.

Grounding Research Publications

2009

Hafner, M. and Breu, R. (2009). Security Engineering for Service-Oriented Architectures. Springer Verlag GmbH, Berlin/Heidelberg.

2008

Alam, M. and Hafner, M. and Breu, R. (2008) Constraint Based Role Based Access Control in the SECTET-Framework a Model-driven Approach. Journal of Computer Security, 16 (2). ISSN 0926-227X

2007

Alam, M. and Hafner, M. and Breu, R. and Unterthiner, S. (2007) A Framework for Modeling Restricted Delegation of Rights in the SECTET. International Journal of Computer Systems, Science and Engineering, 22 (5). ISSN 0267 6192;

Alam, Muhammad (2007). Model Driven Realization of Dynamic Security requirements in Distributed Systems. PhD thesis, University of Innsbruck.

Hafner, M. and Weber, B. and Breu, R. and Nowak, A. (2007) Model Driven Security for Inter-Organizational Workflows in e-Government. In: Secure eGovernment Web Services. IGI Global. ISBN Secure eGovernment Web Services

Alam, M. and Hafner, M. and Breu, R. (2007) Model-Driven Security Engineering for Trust Management in SECTET. Journal of Software, 2 (1). ISSN 1796-217X

Hafner, M. and Mukhtiar, M. and Alam, M. (2007) Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with SECTET. In: Workshops and Symposia at MoDELS 2007, Septermber 30 - October 5th, Nashville, USA.

Hafner, M. (2007) Modelling and Realization of Security Critical Processes in E-Government. PhD thesis, Universit�t Innsbruck.

2006

Alam, M. and Hafner, M. and Breu, R. (2006) A Constraint based Role Based Access Control in the SECTET A Model-Driven Approach. In: Proceedings of the International Conference on Privacy, Security and Trust (ACM PST 2006), October 30 � November 1, 2006, Markham, Ontario, Canada.

Alam, M. and Hafner, M. and Breu, R. and Unterthiner, S. (2006) A Framework for Modeling Restricted Delegation in Service Oriented Architecture. In: Proceedings of the 3rd International Conference on Trust, Privacy, and Security of Digital Business (TrustBus06), September 4-8, 2006, Krakow, Poland.

Alam, M. (2006) Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems. In: Proceedings of the PhD Symposium of IEEE/ACM Models 2006, Genova, Italy.

Alam, M. and Breu, R. and Hafner, M. (2006) Modeling Authorization in a SOA based Application Scenario. In: Proceedings of the IASTED Software Engineering 2006, February 17 � 19, 2006, Innsbruck, Austria.

Alam, M. and Breu, R. and Hafner, M. (2006) Modeling Permissions in a (U/X)ML World. In: Proceedings of the 1st International Conference on Availability, Reliability and Security The International Dependability Conference - Bridging Theory and Practice (ARES 2006), April 20th - April 22nd 2006, Vienna, Austria.

Alam, M. and Breu, R. and Hafner, M. (2006) Pattern-to-Pattern Transformation in the SECTET. In: Proceedings of the European Workshop on Milestones, Models and Mappings for Model-Driven Architecture (3M4MDA 2006) , 11th July, 2006, Bilbao, Spain.

Hafner, M. and Breu, R. and Agreiter, B. and Nowak, A. (2006) Sectet -- An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. In: Proceedings of the 4th International Workshop on Security in Information System (WOSIS 2006), May 23-24, 2006, Pahos, Cyprus.

Hafner, M. and Breu, R. and Agreiter, B. and Nowak, A. (2006) Sectet: an extensible framework for the realization of secure inter-organizational workflows. Internet Research, 16 (5). pp. 491-506.

Hafner, M. and Breu, R. and Novak, A. (2006) Sectet: ein Framework f�r sichere unternehmens�bergreifende Prozesse. In: Proceedings of the D - A - CH Security 2006, March 28 - 29, 2006, D�sseldorf, Germany.

Hafner, M. and Alam, M. and Breu, R. (2006) Towards a MOF/QVT-based Domain Architecture for Model Driven Security. In: Proceedings of the 9th Conference on Model Driven Engineering Languages and Systems (Models 2006), October 1-6, Genova, Italy.

2005

Breu, R. and Hafner, M. and Weber, B. and Novak, A. (2005) Model Driven Security for Inter-Organizational Workflows in e-Government. In: Proceedings of the TED Conference on e-Government 2005, March 2�4, 2005, Bozen-Bolzano, Italy.

Hafner, M. and Breu, R. (2005) Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0 - Bringing Web Services, Security and UML Together. In: Proceedings of the ACM/IEEE 8th International Conference on Model Driven Engineering Languages and Systems (Models 2005), Ocotber 2-7, 2005, Montego Bay, Jamaica.

Hafner, M. and Breu, R. and Novak, A. (2005) SECTINO - A Framework for the Realization of Security-critical Workflows. In: Proceedings of the eChallenges e-2005, October 9 - 21 2005, Ljubljana, Slovenia.

 
 
In association with:
qe_logo