The role-based access control system of a European bank: a case study and discussion A Schaad, J Moffett, J Jacob Proceedings of the sixth ACM symposium on Access control models and …, 2001 | 236 | 2001 |
Modeling of task-based authorization constraints in BPMN C Wolter, A Schaad Business Process Management: 5th International Conference, BPM 2007 …, 2007 | 195 | 2007 |
Model-driven business process security requirement specification C Wolter, M Menzel, A Schaad, P Miseldine, C Meinel Journal of Systems Architecture 55 (4), 211-223, 2009 | 186 | 2009 |
Observations on the role life-cycle in the context of enterprise security management A Kern, M Kuhlmann, A Schaad, J Moffett Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 147 | 2002 |
A lightweight approach to specification and analysis of role-based access control extensions A Schaad, JD Moffett Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 145 | 2002 |
A model-checking approach to analysing organisational controls in a loan origination process A Schaad, V Lotz, K Sohr Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 133 | 2006 |
Towards secure SOAP message exchange in a SOA MA Rahaman, A Schaad, M Rits Proceedings of the 3rd ACM workshop on Secure web services, 77-84, 2006 | 123 | 2006 |
An administration concept for the enterprise role-based access control model A Kern, A Schaad, J Moffett Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 104 | 2003 |
A framework for organisational control principles A Schaad, JD Moffett 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 99 | 2002 |
Task-based entailment constraints for basic workflow patterns C Wolter, A Schaad, C Meinel Proceedings of the 13th ACM symposium on access control models and …, 2008 | 57 | 2008 |
Soap-based secure conversation and collaboration MA Rahaman, A Schaad IEEE International Conference on Web Services (ICWS 2007), 471-480, 2007 | 56 | 2007 |
Delegation of obligations A Schaad, JD Moffett Proceedings Third International Workshop on Policies for Distributed Systems …, 2002 | 55 | 2002 |
Privacy-preserving social network analysis for criminal investigations F Kerschbaum, A Schaad Proceedings of the 7th ACM workshop on Privacy in the electronic society, 9-14, 2008 | 51 | 2008 |
Deriving XACML policies from business process models C Wolter, A Schaad, C Meinel Web Information Systems Engineering–WISE 2007 Workshops: WISE 2007 …, 2007 | 51 | 2007 |
Mechanism to control delegation and revocation of tasks in workflow system A Schaad US Patent 8,620,713, 2013 | 49 | 2013 |
An inline approach for secure soap requests and early validation MA Rahaman, R Marten, A Schaad OWASP AppSec Europe 1, 2006 | 48 | 2006 |
Comparing encrypted documents having structured data MA Rahaman, A Schaad, H Plate, Y Roudier US Patent 8,726,151, 2014 | 45 | 2014 |
Encrypted in-memory column-store F Kerschbaum, M Haerterich, M Kohler, I Hang, A Schaad, A Schroepfer, ... US Patent 9,213,764, 2015 | 44 | 2015 |
Local versus remote optimization in encrypted query processing F Kerschbaum, P Grofig, M Haerterich, M Kohler, A Schaad, A Schroepfer, ... US Patent 10,162,858, 2018 | 41 | 2018 |
Privacy preserving social network analysis F Kerschbaum, A Schaad US Patent 8,130,947, 2012 | 40 | 2012 |