@inproceedings{RiedlGKN08, title = {Economic and Security Aspects of Applying a Threshold Scheme in e-Health}, author = {Bernhard Riedl and Veronika Grascher and Mathias Kolb and Thomas Neubauer}, year = {2008}, doi = {10.1109/ARES.2008.175}, url = {http://doi.ieeecomputersociety.org/10.1109/ARES.2008.175}, tags = {security, e-science}, researchr = {https://researchr.org/publication/RiedlGKN08}, cites = {0}, citedby = {0}, pages = {39-46}, booktitle = {IEEEares}, } @article{RiedlGN08, title = {A Secure e-Health Architecture based on the Appliance of Pseudonymization}, author = {Bernhard Riedl and Veronika Grascher and Thomas Neubauer}, year = {2008}, url = {http://www.academypublisher.com/jsw/vol03/no02/jsw03022332.html}, tags = {rule-based, architecture, e-science}, researchr = {https://researchr.org/publication/RiedlGN08}, cites = {0}, citedby = {0}, journal = {jsw}, volume = {3}, number = {2}, pages = {23-32}, } @inproceedings{RiedlGFN08, title = {Pseudonymization for improving the Privacy in E-Health Applications}, author = {Bernhard Riedl and Veronika Grascher and Stefan Fenz and Thomas Neubauer}, year = {2008}, doi = {10.1109/HICSS.2008.366}, url = {http://doi.ieeecomputersociety.org/10.1109/HICSS.2008.366}, tags = {e-science}, researchr = {https://researchr.org/publication/RiedlGFN08}, cites = {0}, citedby = {0}, pages = {255}, booktitle = {hicss}, } @article{ThurnayRNSL22, title = {Solving an Open Legal Data Puzzle With an Interdisciplinary Team}, author = {Lörinc Thurnay and Bernhard Riedl and Anna-Sophie Novak and Verena Schmid and Thomas J. Lampoltshammer}, year = {2022}, doi = {10.1109/MS.2021.3117728}, url = {https://doi.org/10.1109/MS.2021.3117728}, researchr = {https://researchr.org/publication/ThurnayRNSL22}, cites = {0}, citedby = {0}, journal = {IEEE Software}, volume = {39}, number = {1}, pages = {55-60}, } @inproceedings{RiedlGN07, title = {Applying a Threshold Scheme to the Pseudonymization of Health Data}, author = {Bernhard Riedl and Veronika Grascher and Thomas Neubauer}, year = {2007}, doi = {10.1109/PRDC.2007.24}, url = {http://doi.ieeecomputersociety.org/10.1109/PRDC.2007.24}, tags = {data-flow}, researchr = {https://researchr.org/publication/RiedlGN07}, cites = {0}, citedby = {0}, pages = {397-400}, booktitle = {prdc}, } @inproceedings{RiedlJ07, title = {Secure Access to Emergency Data in an e-Health Architecture}, author = {Bernhard Riedl and Oliver Jorns}, year = {2007}, tags = {architecture, data-flow, e-science}, researchr = {https://researchr.org/publication/RiedlJ07}, cites = {0}, citedby = {0}, pages = {297-306}, booktitle = {iiwas}, } @inproceedings{NeubauerR08, title = {Improving Patients Privacy with Pseudonymization}, author = {Thomas Neubauer and Bernhard Riedl}, year = {2008}, doi = {10.3233/978-1-58603-864-9-691}, url = {http://dx.doi.org/10.3233/978-1-58603-864-9-691}, researchr = {https://researchr.org/publication/NeubauerR08}, cites = {0}, citedby = {0}, pages = {691-696}, booktitle = {mie}, } @inproceedings{RiedlGPW07, title = {A Comparative Literature Review on RFID Security and Privacy}, author = {Bernhard Riedl and Gernot Goluch and Stefan Pöchlinger and Edgar R. Weippl}, year = {2007}, tags = {literature review, security, reviewing}, researchr = {https://researchr.org/publication/RiedlGPW07}, cites = {0}, citedby = {0}, pages = {213-222}, booktitle = {iiwas}, } @inproceedings{RiedlNGBRK07, title = {A secure architecture for the pseudonymization of medical data}, author = {Bernhard Riedl and Thomas Neubauer and Gernot Goluch and Oswald Boehm and Gert Reinauer and Alexander Krumboeck}, year = {2007}, doi = {10.1109/ARES.2007.22}, url = {http://doi.ieeecomputersociety.org/10.1109/ARES.2007.22}, tags = {architecture, data-flow}, researchr = {https://researchr.org/publication/RiedlNGBRK07}, cites = {0}, citedby = {0}, pages = {318-324}, booktitle = {IEEEares}, } @inproceedings{WinklerRB05, title = {Improvement of Design Specifications with Inspection and Testing}, author = {Dietmar Winkler and Bernhard Riedl and Stefan Biffl}, year = {2005}, doi = {10.1109/EURMIC.2005.31}, url = {http://doi.ieeecomputersociety.org/10.1109/EURMIC.2005.31}, tags = {testing, design}, researchr = {https://researchr.org/publication/WinklerRB05}, cites = {0}, citedby = {0}, pages = {222-231}, booktitle = {euromicro}, } @inproceedings{FenzGERW07, title = {Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard}, author = {Stefan Fenz and Gernot Goluch and Andreas Ekelhart and Bernhard Riedl and Edgar R. Weippl}, year = {2007}, doi = {10.1109/PRDC.2007.29}, url = {http://doi.ieeecomputersociety.org/10.1109/PRDC.2007.29}, tags = {ontologies, ontology, security}, researchr = {https://researchr.org/publication/FenzGERW07}, cites = {0}, citedby = {0}, pages = {381-388}, booktitle = {prdc}, } @inproceedings{GoluchEFJRT07, title = {CASSIS - Computer-based Academy for Security and Safety in Information Systems}, author = {Gernot Goluch and Andreas Ekelhart and Stefan Fenz and Stefan Jakoubi and Bernhard Riedl and Simon Tjoa}, year = {2007}, doi = {10.1109/ARES.2007.56}, url = {http://doi.ieeecomputersociety.org/10.1109/ARES.2007.56}, tags = {rule-based, security}, researchr = {https://researchr.org/publication/GoluchEFJRT07}, cites = {0}, citedby = {0}, pages = {730-740}, booktitle = {IEEEares}, } @inproceedings{NeubauerGR07, title = {A research agenda for Autonomous Business Process Management}, author = {Thomas Neubauer and Gernot Goluch and Bernhard Riedl}, year = {2007}, doi = {10.1109/ARES.2007.21}, url = {http://doi.ieeecomputersociety.org/10.1109/ARES.2007.21}, researchr = {https://researchr.org/publication/NeubauerGR07}, cites = {0}, citedby = {0}, pages = {670-680}, booktitle = {IEEEares}, }