default search action
Andreas Schaad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Stefan Goetz, Andreas Schaad:
"You still have to study" - On the Security of LLM generated code. CoRR abs/2408.07106 (2024) - 2022
- [c61]Andreas Schaad, Dominik Binder:
Deep-Learning-Based Vulnerability Detection in Binary Executables. FPS 2022: 453-460 - [i3]Andreas Schaad, Dominik Binder:
Deep-Learning-based Vulnerability Detection in Binary Executables. CoRR abs/2212.01254 (2022) - 2021
- [c60]Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder:
Creation and Detection of German Voice Deepfakes. FPS 2021: 355-364 - [c59]Andreas Schaad, Dominik Binder:
FEX - A Feature Extractor for Real-Time IDS. ISC 2021: 221-237 - [i2]Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, Andreas Schaad, Felix Schmieder:
Creation and Detection of German Voice Deepfakes. CoRR abs/2108.01469 (2021) - 2020
- [c58]Andreas Schaad, Dominik Binder:
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool. DBSec 2020: 274-285 - [c57]Andreas Schaad:
Project OVVL - Threat Modeling Support for the entire secure development lifecycle. Sicherheit 2020: 121-124
2010 – 2019
- 2019
- [c56]Andreas Schaad, Tobias Reski:
"Open Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat Modeling. ICETE (2) 2019: 417-424 - [c55]Andreas Schaad, Tobias Reski, Oliver Winzenried:
Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger Blockchain. ICETE (2) 2019: 498-503 - [c54]Andreas Schaad, Björn Grohmann, Oliver Winzenried:
CloudProtect - A Cloud-based Software Protection Service. SACMAT 2019: 219-221 - 2018
- [c53]Andreas Schaad, Björn Grohmann, Oliver Winzenried, Ferdinand Brasser, Ahmad-Reza Sadeghi:
Towards a Cloud-based System for Software Protection and Licensing. ICETE (2) 2018: 698-702 - 2017
- [c52]Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad:
Short Paper: Industrial Feasibility of Private Information Retrieval. SECRYPT 2017: 395-400 - [i1]Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad:
Industrial Feasibility of Private Information Retrieval. IACR Cryptol. ePrint Arch. 2017: 813 (2017) - 2015
- [c51]Feng Wang, Mathias Kohler, Andreas Schaad:
Initial Encryption of large Searchable Data Sets using Hadoop. SACMAT 2015: 165-168 - 2014
- [c50]Patrick Grofig, Isabelle Hang, Martin Härterich, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Privacy by Encrypted Databases. APF 2014: 56-69 - [c49]Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Optimized and controlled provisioning of encrypted outsourced data. SACMAT 2014: 141-152 - [c48]Patrick Grofig, Martin Härterich, Isabelle Hang, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. Sicherheit 2014: 115-125 - 2013
- [c47]Florian Kerschbaum, Patrick Grofig, Isabelle Hang, Martin Härterich, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Adjustably encrypted in-memory column-store. CCS 2013: 1325-1328 - [c46]Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Optimal Re-encryption Strategy for Joins in Encrypted Databases. DBSec 2013: 195-210 - [c45]Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
An Encrypted In-Memory Column-Store: The Onion Selection Problem. ICISS 2013: 14-26 - [c44]Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss:
Secure benchmarking in the cloud. SACMAT 2013: 197-200 - [e1]Mauro Conti, Jaideep Vaidya, Andreas Schaad:
18th ACM Symposium on Access Control Models and Technologies, SACMAT '13, Amsterdam, The Netherlands, June 12-14, 2013. ACM 2013, ISBN 978-1-4503-1950-8 [contents] - 2012
- [c43]Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, Andreas Schaad:
Monitoring Security and Safety of Assets in Supply Chains. Future Security 2012: 9-20 - [c42]Andreas Schaad, Mike Borozdin:
TAM2: automated threat analysis. SAC 2012: 1103-1108 - [c41]Ganna Monakova, Achim D. Brucker, Andreas Schaad:
Security and safety of assets in business processes. SAC 2012: 1667-1673 - [c40]Andreas Schaad, Alexandr Garaga:
Automating architectural security analysis. SACMAT 2012: 131-132 - 2011
- [c39]Michael Clasen, Kai Fischbach, Rafael Pietrowski, Andreas Schaad:
Sichere Warenketten durch RescueIT. GIL Jahrestagung 2011: 53-56 - [c38]Ganna Monakova, Andreas Schaad:
Visualizing security in business processes. SACMAT 2011: 147-148
2000 – 2009
- 2009
- [j2]Christian Wolter, Michael Menzel, Andreas Schaad, Philip Miseldine, Christoph Meinel:
Model-driven business process security requirement specification. J. Syst. Archit. 55(4): 211-223 (2009) - [c37]Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad:
Towards Secure Content Based Dissemination of XML Documents. IAS 2009: 721-724 - [c36]Mathias Kohler, Achim D. Brucker, Andreas Schaad:
ProActive Caching: Generating Caching Heuristics for Business Process Environments. CSE (3) 2009: 297-304 - [c35]Khaled Gaaloul, François Charoy, Andreas Schaad:
Modelling task delegation for human-centric eGovernment workflows. D.GO 2009: 79-87 - [c34]Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad:
A Secure Comparison Technique for Tree Structured Data. ICIW 2009: 304-309 - [c33]Florian Kerschbaum, Andreas Schaad, Debmalya Biswas:
Practical privacy-preserving protocols for criminal investigations. ISI 2009: 197-199 - [c32]Achim D. Brucker, Helmut Petritsch, Andreas Schaad:
Delegation Assistance. POLICY 2009: 84-91 - [c31]Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad:
Ontology-Based Secure XML Content Distribution. SEC 2009: 294-306 - [c30]Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad:
Document-Based Dynamic Workflows: Towards Flexible and Stateful Services. SERVICES II 2009: 87-94 - 2008
- [c29]Mathias Kohler, Andreas Schaad:
Avoiding Policy-based Deadlocks in Business Processes. ARES 2008: 709-716 - [c28]Mathias Kohler, Andreas Schaad:
ProActive Access Control for Business Process-Driven Environments. ACSAC 2008: 153-162 - [c27]Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad:
Distributed Access Control For XML Document Centric Collaborations. EDOC 2008: 267-276 - [c26]Philip Miseldine, Ulrich Flegel, Andreas Schaad:
Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios. RELAW 2008: 31-34 - [c25]Christian Wolter, Andreas Schaad, Christoph Meinel:
Task-based entailment constraints for basic workflow patterns. SACMAT 2008: 51-60 - [c24]Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy:
A Secure Task Delegation Model for Workflows. SECURWARE 2008: 10-15 - [c23]Florian Kerschbaum, Andreas Schaad:
Privacy-preserving social network analysis for criminal investigations. WPES 2008: 9-14 - 2007
- [c22]Christian Wolter, Andreas Schaad:
Modeling of Task-Based Authorization Constraints in BPMN. BPM 2007: 64-79 - [c21]Mohammad Ashiqur Rahaman, Andreas Schaad:
SOAP-based Secure Conversation and Collaboration. ICWS 2007: 471-480 - [c20]Mathias Kohler, Christian Liesegang, Andreas Schaad:
Classification Model for Access Control Constraints. IPCCC 2007: 410-417 - [c19]Christian Wolter, Andreas Schaad, Christoph Meinel:
Deriving XACML Policies from Business Process Models. WISE Workshops 2007: 142-153 - [c18]Andreas Schaad:
A Framework for Evidence Lifecycle Management. WISE Workshops 2007: 191-200 - [c17]Khaled Gaaloul, François Charoy, Andreas Schaad, Hannah Lee:
Collaboration for Human-Centric eGovernment Workflows. WISE Workshops 2007: 201-212 - 2006
- [c16]Philip Robinson, Florian Kerschbaum, Andreas Schaad:
From Business Process Choreography to Authorization Policies. DBSec 2006: 297-309 - [c15]Andreas Schaad:
Security in enterprise resource planning systems and service-oriented architectures. SACMAT 2006: 69-70 - [c14]Andreas Schaad, Volkmar Lotz, Karsten Sohr:
A model-checking approach to analysing organisational controls in a loan origination process. SACMAT 2006: 139-149 - [c13]Mohammad Ashiqur Rahaman, Andreas Schaad, Maarten Rits:
Towards secure SOAP message exchange in a SOA. SWS 2006: 77-84 - 2005
- [j1]Maarten Rits, Benjamin De Boe, Andreas Schaad:
XacT: a bridge between resource management and access control in multi-layered applications. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c12]Andreas Schaad:
Revocation of Obligation and Authorisation Policy Objects. DBSec 2005: 28-39 - [c11]Maarten Rits, Benjamin De Boe, Andreas Schaad:
XacT: a bridge between resource management and access control in multi-layered applications. SESS@ICSE 2005: 1-7 - [c10]Andreas Schaad, Pascal Spadone, Helmut Weichsel:
A case study of separation of duty properties in the context of the Austrian "eLaw" process. SAC 2005: 1328-1332 - 2004
- [c9]Andreas Schaad:
An Extended Analysis of Delegating Obligations. DBSec 2004: 49-64 - [c8]Andreas Schaad, Jonathan D. Moffett:
Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. SAC 2004: 1380-1384 - 2003
- [c7]Axel Kern, Andreas Schaad, Jonathan D. Moffett:
An administration concept for the enterprise role-based access control model. SACMAT 2003: 3-11 - 2002
- [c6]Andreas Schaad, Jonathan D. Moffett:
A Framework for Organisational Control Principles. ACSAC 2002: 229-238 - [c5]Andreas Schaad, Jonathan D. Moffett:
Delegation of Obligations. POLICY 2002: 25-35 - [c4]Andreas Schaad, Jonathan D. Moffett:
A lightweight approach to specification and analysis of role-based access control extensions. SACMAT 2002: 13-22 - [c3]Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett:
Observations on the role life-cycle in the context of enterprise security management. SACMAT 2002: 43-51 - 2001
- [c2]Andreas Schaad:
Detecting Conflicts in a Role-Based Delegation Model. ACSAC 2001: 117-126 - [c1]Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob:
The role-based access control system of a European bank: a case study and discussion. SACMAT 2001: 3-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint