Thomas Neubauer

According to our database1, Thomas Neubauer authored at least 57 papers between 2000 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Recognition and pseudonymisation of medical records for secondary use.
Med. Biol. Engineering and Computing, 2016

SEMERGY.net: automatically identifying and optimizing energy-efficient building designs.
Computer Science - R&D, 2016

2015
The Role of ICT in a Low Carbon Society.
IEEE Technol. Soc. Mag., 2015

A taxonomy for privacy enhancing technologies.
Computers & Security, 2015

How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
Current challenges in information security risk management.
Inf. Manag. Comput. Security, 2014

2013
FORISK: Formalizing information security risk and compliance management.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records.
Proceedings of the Business Information Systems - 15th International Conference, 2012

Automated Transformation of Semi-Structured Text Elements.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
A methodology for the pseudonymization of medical data.
I. J. Medical Informatics, 2011

Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
CAIS, 2011

Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Model-Driven Development Meets Security: An Evaluation of Current Approaches.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Data Models for the Pseudonymization of DICOM Data.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Interactive selection of Web services under multiple objectives.
Information Technology and Management, 2010

Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten.
Elektrotechnik und Informationstechnik, 2010

Workshop-Based Risk Assessment for the Definition of Secure Business Processes.
Proceedings of the Second International Conference on Information, 2010

On the Security of Outsourced and Untrusted Databases.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
An Evaluation of Technologies for the Pseudonymization of Medical Data.
Proceedings of the Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, 2009

An empirical study about the status of business process management.
Business Proc. Manag. Journal, 2009

An evaluation of technologies for the pseudonymization of medical data.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Automated Risk and Utility Management.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Technologies for the Pseudonymization of Medical Data: A Legal Evaluation.
Proceedings of the Fourth International Conference on Systems, 2009

Ontology-Based Decision Support for Information Security Risk Management.
Proceedings of the Fourth International Conference on Systems, 2009

A Comparison of Security Safeguard Selection Methods.
Proceedings of the ICEIS 2009, 2009

AURUM: A Framework for Information Security Risk Management.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

How to determine threat probabilities using ontologies and Bayesian networks.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Business Process-Based Resource Importance Determination.
Proceedings of the Business Process Management, 7th International Conference, 2009

A process model for RFID based Business Process Analysis.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

A roadmap to risk-aware business process management.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

On the Singularity of Valuating IT Security Investments.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
A Secure e-Health Architecture based on the Appliance of Pseudonymization.
JSW, 2008

Multiobjective decision support for defining secure business processes: a case study.
IJBIDM, 2008

Interaktive Portfolioauswahl im IT-Servicemanagement.
HMD - Praxis Wirtschaftsinform., 2008

Interactive Selection of ISO 27001 Controls under Multiple Objectives.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Improving Patients Privacy with Pseudonymization.
Proceedings of the eHealth Beyond the Horizon, 2008

Pseudonymization for improving the Privacy in E-Health Applications.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

A Case Study on the Multicriteria Selection of Software Components.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Economic and Security Aspects of Applying a Threshold Scheme in e-Health.
Proceedings of the The Third International Conference on Availability, 2008

Defining Secure Business Processes with Respect to Multiple Objectives.
Proceedings of the The Third International Conference on Availability, 2008

Objective Types for the Valuation of Secure Business Processes.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Interaktive Entscheidungsunterstützung für die Auswahl von Software-Komponenten bei mehrfachen Zielsetzungen.
Proceedings of the eOrganisation: Service-, Prozess-, Market-Engineering: 8. Internationale Tagung Wirtschaftsinformatik, 2007

Extending business process management to determine efficient IT investments.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Applying a Threshold Scheme to the Pseudonymization of Health Data.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Multiobjective Decision Support for defining Secure Business Processes.
Proceedings of the iiWAS'2007, 2007

Formal threat descriptions for enhancing governmental risk assessment.
Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, 2007

Interactive Decision Support for Multiobjective COTS Selection.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A secure architecture for the pseudonymization of medical data.
Proceedings of the The Second International Conference on Availability, 2007

A research agenda for Autonomous Business Process Management.
Proceedings of the The Second International Conference on Availability, 2007

2006
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF.
Proceedings of the The First International Conference on Availability, 2006

Workshop-based Multiobjective Security Safeguard Selection.
Proceedings of the The First International Conference on Availability, 2006

Secure Business Process Management: A Roadmap.
Proceedings of the The First International Conference on Availability, 2006

2005
Business process-based valuation of IT-security.
ACM SIGSOFT Software Engineering Notes, 2005

2002
Performance of downlink beam switching for UMTS FDD in the presence of angular spread.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Smart-antenna space-time UMTS uplink processing for system capacity enhancement.
Annales des Télécommunications, 2001

2000
Increasing mixed service uplink capacity of UMTS by smart antennas.
Journal of Communications and Networks, 2000


  Loading...