Maria Leitner

  • University of Vienna, Austria

According to our database1, Maria Leitner authored at least 26 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments.
J. Netw. Comput. Appl., 2020

International Workshop on Cyber Range Technologies and Applications (CACOE 2020).
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Privacy-aware Data Assessment of Online Social Network Registration Processes.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

CISA: Establishing National Cyber Situational Awareness to Counter New Threats.
ERCIM News, 2016

Evaluation Methods in Process-Aware Information Systems Research with a Perspective on Human Orientation.
Bus. Inf. Syst. Eng., 2016

An Experimental Approach to Reputation in E-Participation.
Proceedings of the International Conference on Software Security and Assurance, 2016

A Versatile, Secure and Privacy-Aware Tool for Online Participation.
Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Workshop, 2016

Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

A Cross-Layer Security Analysis for Process-Aware Information Systems.
CoRR, 2015

A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions.
Inf. Softw. Technol., 2014

Anomaly detection and visualization in generative RBAC models.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

An Experimental Study on the Design and Modeling of Security Concepts in Business Processes.
Proceedings of the Practice of Enterprise Modeling, 2013

Delta Analysis of Role-Based Access Control Models.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Definition and Enactment of Instance-Spanning Process Constraints.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

An Adaptive Heuristic Approach to Service Selection Problems in Dynamic Distributed Systems.
Proceedings of the 13th ACM/IEEE International Conference on Grid Computing, 2012

A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models.
Proceedings of the Business Process Management Workshops, 2012

SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Responsibility-driven Design and Development of Process-aware Security Policies.
Proceedings of the Sixth International Conference on Availability, 2011

AW-RBAC: Access Control in Adaptive Workflow Systems.
Proceedings of the Sixth International Conference on Availability, 2011

Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges.
Proceedings of the Sixth International Conference on Availability, 2011

On Evolving Organizational Models without Losing Control on Authorization Constraints in Web Service Orchestrations.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010