| 
	      
		|  | A. Baumgrass, M. Strembeck: 
		  Bridging the Gap between Role Mining and Role Engineering 
		      via Migration Guides, 
		  In: Information Security Technical Report (ISTR), Vol. 17, No. 4, May 2013
		(doi,
		  pdf) |  
		|  | M. Leitner, A. Baumgrass, S. Schefer-Wenzl, S. Rinderle-Ma, M. Strembeck: 
		  A Case Study on the Suitability of Process Mining to Produce Current-State 
		  RBAC Models, In: Proc. of the Workshop on Security in Business Processes 
		  (SBP), Lecture Notes in Business Information Processing (LNBIP), Vol. 132, 
		  Springer, Tallinn, Estonia, September 2012 
		(ps,
		  pdf) |  
		|  | A. Baumgrass, M. Strembeck:
		  An Approach to Bridge the Gap between Role
		      Mining and Role Engineering via Migration Guides, In: Proc. of the 7th 
		  International Conference on Availability Reliability and Security (ARES), 
		  Prague, Czech Republic, IEEE, August 2012 
		(ps,
		  pdf) |  
		|  | A. Baumgrass, S. Schefer-Wenzl, M. Strembeck:
		  Deriving Process-Related RBAC Models from Process Execution 
		      Histories, In: Proc. of the 4th IEEE International Workshop 
		  on Security Aspects in Processes and Services Engineering (SAPSE), 
		  Izmir, Turkey, July 2012 
		(ps,
		  pdf,
		  extended version) |  
		|  | A. Baumgrass, T. Baier, J. Mendling, M. Strembeck: Conformance Checking of 
		      RBAC Policies in Process-Aware Information Systems,
		  In: Proc. of the Workshop on Workflow Security Audit and Certification (WfSAC),
		  Lecture Notes in Business Information Processing (LNBIP), Vol. 100, Springer Verlag, 
		  Clermont-Ferrand, France, August 2011
		  (ps, 
		  pdf) |  
		|  | W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, S. Dustdar: An 
		      Integrated Approach for Identity and Access Management in a SOA Context,
		  In: Proc. of the  16th ACM Symposium on Access Control
		  Models and Technologies (SACMAT), Innsbruck, Austria, June 2011
		  (ps,
		  pdf) |  
		|  | A. Baumgrass, M. Strembeck,  S. Rinderle-Ma: Deriving Role 
		      Engineering Artifacts from Business Processes and Scenario  Models,
		  In: Proc. of the  16th ACM Symposium on Access Control
		  Models and Technologies (SACMAT), Innsbruck, Austria, June 2011
		  (ps,
		  pdf,
		  extended version) |  
		|  | M. Strembeck, J. Mendling: Modeling Process-related RBAC Models 
		    with Extended UML Activity Models, 
		  In: Information and Software Technology, Vol. 53, No. 5, May 2011
		  (doi,
		  pdf) |  |  
		|  | M. Strembeck, J. Mendling: Generic Algorithms for Consistency Checking of
		      Mutual-Exclusion and Binding Constraints in a Business Process Context,
		  In: Proc. of the 18th International Conference on Cooperative Information Systems
		  (CoopIS), Lecture Notes in Computer Science (LNCS), Vol. 6426, Springer Verlag,
		  Crete, Greece, October 2010
		  (ps,
		  pdf,  
		  extended version) |  |  
		|  | S. Kunz, S. Evdokimov, B. Fabian, B. Stieger, M. Strembeck: Role-Based Access 
		      Control for Information Federations in the Industrial Service Sector 
		  In: Proc. of the 18th European Conference on Information Systems (ECIS), Pretoria, 
		  South Africa, June 2010
		  (ps,
		  pdf) |  |  
		|  | M. Strembeck: Scenario-Driven Role Engineering, 
		  In: IEEE Security & Privacy, Vol. 8, No. 1, January/February 2010 
		  (doi,
		  pdf) |  |  
		|  | J. Mendling, K. Ploesser, M. Strembeck: Specifying Separation of Duty 
		      Constraints in BPEL4People Processes, In:  Proc. of the 11th International 
		  Conference on Business Information Systems (BIS), Lecture Notes in Business 
		  Information Processing (LNBIP), Vol. 7, Springer Verlag, Innsbruck, Austria, May 2008
		  (ps,
		  pdf) |  |  
		|  | G. Stermsek, M. Strembeck, G. Neumann: A User Profile Derivation Approach based on 
		      Log-File Analysis, In: Proc.of the International Conference on Information and 
		  Knowledge Engineering (IKE), Las Vegas, NV, USA, June 2007
		  (ps, 
		  pdf) |  |  
		|  | M. Strembeck: A Role Engineering Tool for Role-Based Access Control, 
		  In: Proc. of the 3rd Symposium on Requirements Engineering for Information
		Security (SREIS), Paris, France, August 2005 
		  (ps, 
		  pdf) |  |  
		|  | M. Strembeck:
		  Embedding Policy Rules for Software-Based Systems in a Requirements Context, 
		  In: Proc. of the 6th IEEE International Workshop on Policies for Distributed
		  Systems and Networks (POLICY), Stockholm, Sweden, June 2005 
		  (ps, 
		  pdf) |  |  
		|  | M. Strembeck, G. Neumann: 
		  An Integrated Approach to Engineer and Enforce Context Constraints in 
		      RBAC Environments, In: ACM Transactions on Information and System 
		  Security (TISSEC), Vol. 7, No. 3, August 2004
		  (doi,
		  pdf) |  |  
		|  | J. Mendling, M. Strembeck, G. Stermsek, G. Neumann: 
		  An Approach to Extract RBAC Models from BPEL4WS Processes, 
		  In: Proc. of the 13th IEEE International Workshops on Enabling Technologies: 
		  Infrastructures for Collaborative Enterprises (WETICE), Modena, Italy, 
		  June 2004 (ps, 
		  pdf) |  |  
		|  | G. Neumann, M. Strembeck: A Scenario-driven Role Engineering
		      Process for Functional RBAC Roles, In: Proc. of 7th ACM Symposium
		  on Access Control Models and Technologies (SACMAT), Monterey, USA,
		  June 2002 (ps, pdf) |  |