Thomas Neubauer
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j17]Stefan Fenz, Thomas Neubauer:
Ontology-based information security compliance determination and control selection on the example of ISO 27002. Inf. & Comput. Security 26(5): 551-567 (2018) - 2016
- [j16]Stefan Fenz, Johannes Heurix, Thomas Neubauer, A. Min Tjoa, Neda Ghiassi, Ulrich Pont, Ardeshir Mahdavi:
SEMERGY.net: automatically identifying and optimizing energy-efficient building designs. Computer Science - R&D 31(3): 135-140 (2016) - [j15]Johannes Heurix, Stefan Fenz, Antonio Rella, Thomas Neubauer:
Recognition and pseudonymisation of medical records for secondary use. Med. Biol. Engineering and Computing 54(2-3): 371-383 (2016) - 2015
- [j14]Johannes Heurix, Peter Zimmermann, Thomas Neubauer, Stefan Fenz:
A taxonomy for privacy enhancing technologies. Computers & Security 53: 1-17 (2015) - [j13]Michael Koenigsmayr, Thomas Neubauer:
The Role of ICT in a Low Carbon Society. IEEE Technol. Soc. Mag. 34(1): 39-44 (2015) - [c40]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management. ECIS 2015 - 2014
- [j12]Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein:
Current challenges in information security risk management. Inf. Manag. Comput. Security 22(5): 410-430 (2014) - 2013
- [c39]Stefan Fenz, Thomas Neubauer, Rafael Accorsi, Thomas G. Koslowski:
FORISK: Formalizing information security risk and compliance management. DSN Workshops 2013: 1-4 - 2012
- [c38]Johannes Heurix, Antonio Rella, Stefan Fenz, Thomas Neubauer:
Automated Transformation of Semi-Structured Text Elements. AMCIS 2012 - [c37]Stefan Fenz, Johannes Heurix, Thomas Neubauer:
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records. BIS 2012: 153-164 - [c36]Johannes Heurix, Michael Karlinger, Thomas Neubauer:
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents. HICSS 2012: 3011-3020 - 2011
- [j11]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Information Security Risk Management: In Which Security Solutions Is It Worth Investing? CAIS 28: 22 (2011) - [j10]Thomas Neubauer, Johannes Heurix:
A methodology for the pseudonymization of medical data. I. J. Medical Informatics 80(3): 190-204 (2011) - [c35]Daniel Abouakil, Johannes Heurix, Thomas Neubauer:
Data Models for the Pseudonymization of DICOM Data. HICSS 2011: 1-11 - [c34]Kresimir Kasal, Johannes Heurix, Thomas Neubauer:
Model-Driven Development Meets Security: An Evaluation of Current Approaches. HICSS 2011: 1-9 - [c33]Johannes Heurix, Thomas Neubauer:
Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption. TrustBus 2011: 186-197 - 2010
- [j9]Thomas Neubauer, Johannes Heurix, A Min Tjoa, Edgar R. Weippl:
Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotechnik und Informationstechnik 127(5): 135-142 (2010) - [j8]Thomas Neubauer, Christian Stummer:
Interactive selection of Web services under multiple objectives. Information Technology and Management 11(1): 25-41 (2010) - [c32]Johannes Heurix, Thomas Neubauer:
On the Security of Outsourced and Untrusted Databases. ACIS-ICIS 2010: 125-132 - [c31]Thomas Neubauer, Markus Pehn:
Workshop-Based Risk Assessment for the Definition of Secure Business Processes. eKNOW 2010: 74-79
2000 – 2009
- 2009
- [j7]Thomas Neubauer:
An empirical study about the status of business process management. Business Proc. Manag. Journal 15(2): 166-183 (2009) - [c30]Thomas Neubauer, Christian Hartl:
On the Singularity of Valuating IT Security Investments. ACIS-ICIS 2009: 549-556 - [c29]Stefan Jakoubi, Thomas Neubauer, Simon Tjoa:
A roadmap to risk-aware business process management. APSCC 2009: 23-27 - [c28]Thomas Neubauer, Gernot Goluch, Stefan Jakoubi, Simon Tjoa, Martin Wisser:
A process model for RFID based Business Process Analysis. APSCC 2009: 478-483 - [c27]Stefan Fenz, Andreas Ekelhart, Thomas Neubauer:
Business Process-Based Resource Importance Determination. BPM 2009: 113-127 - [c26]Stefan Fenz, Thomas Neubauer:
How to determine threat probabilities using ontologies and Bayesian networks. CSIIRW 2009: 69 - [c25]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
AURUM: A Framework for Information Security Risk Management. HICSS 2009: 1-10 - [c24]
- [c23]Thomas Neubauer, Mathias Kolb:
Technologies for the Pseudonymization of Medical Data: A Legal Evaluation. ICONS 2009: 7-12 - [c22]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer:
Ontology-Based Decision Support for Information Security Risk Management. ICONS 2009: 80-85 - [c21]Andreas Ekelhart, Thomas Neubauer, Stefan Fenz:
Automated Risk and Utility Management. ITNG 2009: 393-398 - [c20]Thomas Neubauer, Andreas Ekelhart:
An evaluation of technologies for the pseudonymization of medical data. SAC 2009: 857-858 - [p1]Thomas Neubauer, Mathias Kolb:
An Evaluation of Technologies for the Pseudonymization of Medical Data. Computer and Information Science 2009: 47-60 - 2008
- [j6]Christian Stummer, Thomas Neubauer:
Interaktive Portfolioauswahl im IT-Servicemanagement. HMD - Praxis Wirtschaftsinform. 264 (2008) - [j5]Thomas Neubauer, Johannes Heurix:
Multiobjective decision support for defining secure business processes: a case study. IJBIDM 3(2): 177-195 (2008) - [j4]Bernhard Riedl, Veronika Grascher, Thomas Neubauer:
A Secure e-Health Architecture based on the Appliance of Pseudonymization. JSW 3(2): 23-32 (2008) - [c19]Thomas Neubauer, Johannes Heurix:
Objective Types for the Valuation of Secure Business Processes. ACIS-ICIS 2008: 231-236 - [c18]Bernhard Riedl, Veronika Grascher, Mathias Kolb, Thomas Neubauer:
Economic and Security Aspects of Applying a Threshold Scheme in e-Health. ARES 2008: 39-46 - [c17]Thomas Neubauer, Johannes Heurix:
Defining Secure Business Processes with Respect to Multiple Objectives. ARES 2008: 187-194 - [c16]Thomas Neubauer, Jan Pichler, Christian Stummer:
A Case Study on the Multicriteria Selection of Software Components. APSCC 2008: 1005-1012 - [c15]Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer:
Pseudonymization for improving the Privacy in E-Health Applications. HICSS 2008: 255 - [c14]Thomas Neubauer, Bernhard Riedl:
Improving Patients Privacy with Pseudonymization. MIE 2008: 691-696 - [c13]Thomas Neubauer, Andreas Ekelhart, Stefan Fenz:
Interactive Selection of ISO 27001 Controls under Multiple Objectives. SEC 2008: 477-492 - 2007
- [c12]Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data. ARES 2007: 318-324 - [c11]Thomas Neubauer, Gernot Goluch, Bernhard Riedl:
A research agenda for Autonomous Business Process Management. ARES 2007: 670-680 - [c10]Thomas Neubauer, Christian Stummer:
Interactive Decision Support for Multiobjective COTS Selection. HICSS 2007: 283 - [c9]Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl:
Formal threat descriptions for enhancing governmental risk assessment. ICEGOV 2007: 40-43 - [c8]Thomas Neubauer, Johannes Heurix:
Multiobjective Decision Support for defining Secure Business Processes. iiWAS 2007: 477-482 - [c7]Bernhard Riedl, Veronika Grascher, Thomas Neubauer:
Applying a Threshold Scheme to the Pseudonymization of Health Data. PRDC 2007: 397-400 - [c6]Thomas Neubauer, Christian Stummer:
Extending business process management to determine efficient IT investments. SAC 2007: 1250-1256 - [c5]Thomas Neubauer, Christian Stummer:
Interaktive Entscheidungsunterstützung für die Auswahl von Software-Komponenten bei mehrfachen Zielsetzungen. Wirtschaftsinformatik (2) 2007: 255-270 - 2006
- [c4]Thomas Neubauer, Christian Stummer, Edgar R. Weippl:
Workshop-based Multiobjective Security Safeguard Selection. ARES 2006: 366-373 - [c3]Thomas Neubauer, Markus D. Klemen, Stefan Biffl:
Secure Business Process Management: A Roadmap. ARES 2006: 457-464 - [c2]Thomas Neubauer, Edgar R. Weippl, Stefan Biffl:
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. ARES 2006: 723-731 - 2005
- [j3]Thomas Neubauer, Markus D. Klemen, Stefan Biffl:
Business process-based valuation of IT-security. ACM SIGSOFT Software Engineering Notes 30(4): 1-5 (2005) - 2002
- [c1]Thomas Baumgartner, Thomas Neubauer, Ernst Bonek:
Performance of downlink beam switching for UMTS FDD in the presence of angular spread. ICC 2002: 851-855 - 2001
- [j2]Thomas Neubauer, Ernst Bonek:
Smart-antenna space-time UMTS uplink processing for system capacity enhancement. Annales des Télécommunications 56(5-6): 306-316 (2001) - 2000
- [j1]Thomas Neubauer, Ernst Bonek:
Increasing mixed service uplink capacity of UMTS by smart antennas. Journal of Communications and Networks 2(4): 331-336 (2000)
Coauthor Index
last updated on 2019-01-09 01:28 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint