Maria Leitner
Cited by
Cited by
A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions
M Leitner, S Rinderle-Ma
Information and Software Technology 56 (3), 273-293, 2014
An analysis and evaluation of security aspects in the business process model and notation
M Leitner, M Miller, S Rinderle-Ma
2013 international conference on availability, reliability and security, 262-267, 2013
Design considerations for cyber security testbeds: A case study on a cyber security testbed for education
M Frank, M Leitner, T Pahi
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017
Definition and enactment of instance-spanning process constraints
M Leitner, J Mangler, S Rinderle-Ma
International Conference on Web Information Systems Engineering, 652-658, 2012
AW-RBAC: access control in adaptive workflow systems
M Leitner, S Rinderle-Ma, J Mangler
2011 Sixth International Conference on Availability, Reliability and …, 2011
Analysis and assessment of situational awareness models for national cyber security centers
T Pahi, M Leitner, F Skopik
International Conference on Information Systems Security and Privacy 2, 334-345, 2017
Evaluation methods in process-aware information systems research with a perspective on human orientation
S Kriglstein, M Leitner, S Kabicher-Fuchs, S Rinderle-Ma
Business & Information Systems Engineering 58 (6), 397-414, 2016
SPRINT-Responsibilities: design and development of security policies in process-aware information systems
M Leitner, J Mangler, S Rinderle-Ma
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2011
An experimental study on the design and modeling of security concepts in business processes
M Leitner, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck
IFIP Working Conference on The Practice of Enterprise Modeling, 236-250, 2013
Digitale Bürgerbeteiligung: Forschung und Praxis–Chancen und Herausforderungen der elektronischen Partizipation
M Leitner
Springer-Verlag, 2018
An adaptive heuristic approach to service selection problems in dynamic distributed systems
PP Beran, E Vinek, E Schikuta, M Leitner
2012 ACM/IEEE 13th International Conference on Grid Computing, 66-75, 2012
AIT cyber range: flexible cyber security environment for exercises, training and research
M Leitner, M Frank, W Hotwagner, G Langner, O Maurhart, T Pahi, ...
Proceedings of the European Interdisciplinary Cybersecurity Conference, 1-6, 2020
An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments
S Kucek, M Leitner
Journal of Network and Computer Applications 151, 102470, 2020
A case study on the suitability of process mining to produce current-state RBAC models
M Leitner, A Baumgrass, S Schefer-Wenzl, S Rinderle-Ma, M Strembeck
International Conference on Business Process Management, 719-724, 2012
Security policies in adaptive process-aware information systems: Existing approaches and challenges
M Leitner
2011 Sixth International Conference on Availability, Reliability and …, 2011
On evolving organizational models without losing control on authorization constraints in web service orchestrations
S Rinderle-Ma, M Leitner
2010 IEEE 12th Conference on Commerce and Enterprise Computing, 128-135, 2010
An experimental approach to reputation in e-participation
I Serov, M Leitner
2016 International Conference on Software Security and Assurance (ICSSA), 37-42, 2016
Privacy and Security by Design im agilen Softwareentwicklungsprozess
O Terbu, W Hötzendorfer, M Leitner, A Bonitz, S Vogl, S Zehetbauer
Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions …, 2016
Data exploitation at large: your way to adequate cyber common operating pictures
T Pahi, M Leitner, F Skopik
Proceedings of the 16th European Conference on Cyber Warfare and Security …, 2017
E-Participation Platform Features and Design Principles
J Schossböck, M Sachs, M Leitner
CeDEM16 Proceedings of the International Conference for E-Democracy and Open …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20