default search action
Michael Hafner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Yousaf Rahman, Abhishek Sharma, Mrdjan Jankovic, Mario A. Santillo, Michael Hafner:
Driver Intent Prediction and Collision Avoidance With Barrier Functions. IEEE CAA J. Autom. Sinica 10(2): 365-375 (2023) - 2022
- [c31]Valentin Koch, Olle G. Holmberg, Hannah Spitzer, Johannes Schiefelbein, Ben Asani, Michael Hafner, Fabian J. Theis:
Noise Transfer for Unsupervised Domain Adaptation of Retinal OCT Images. MICCAI (2) 2022: 699-708 - [i2]Subramanya Nageshrao, Yousaf Rahman, Vladimir Ivanovic, Mrdjan Jankovic, H. Eric Tseng, Michael Hafner, Dimitar P. Filev:
Robust AI Driving Strategy for Autonomous Vehicles. CoRR abs/2207.07829 (2022) - [i1]Valentin Koch, Olle G. Holmberg, Hannah Spitzer, Johannes Schiefelbein, Ben Asani, Michael Hafner, Fabian J. Theis:
Noise transfer for unsupervised domain adaptation of retinal OCT images. CoRR abs/2209.08097 (2022)
2010 – 2019
- 2018
- [j11]Lukas Schneider, Michael Hafner, Uwe Franke:
The Stixel world - A comprehensive representation of traffic scenes for autonomous driving. Autom. 66(9): 745-751 (2018) - 2014
- [j10]Cesar O. Guaitiao, Michael Hafner, Sergio K. Sobarzo, Stefan Riepl, Sergio N. Torres, Felipe Pedreros, Luis E. Arias:
Two-Color Satellite Laser Ranging Measurements at 10 Hz and 100 Hz at TIGO. IEEE Trans. Geosci. Remote. Sens. 52(8): 4707-4716 (2014) - [c30]Michael Hafner, Tom E. Pilutti:
Dynamic trajectory planning for trailer backup. SMC 2014: 2501-2506 - 2011
- [j9]Ruth Breu, Berthold Agreiter, Matthias Farwick, Michael Felderer, Michael Hafner, Frank Innerhofer-Oberperfler:
Living Models - Ten Principles for Change-Driven Software Engineering. Int. J. Softw. Informatics 5(1-2): 267-290 (2011) - 2010
- [c29]Michael Hafner:
Modeling and Managing System Evolution - Description of EternalS Task Force 2. ISoLA (2) 2010: 26-29
2000 – 2009
- 2009
- [b1]Michael Hafner, Ruth Breu:
Security engineering for service-oriented architectures. Springer 2009, ISBN 978-3-540-79538-4, pp. I-XVI, 1-245 - [j8]Michael Hafner, Mukhtiar Memon, Ruth Breu:
SeAAS - A Reference Architecture for Security Services in SOA. J. Univers. Comput. Sci. 15(15): 2916-2936 (2009) - [c28]Basel Katt, Michael Hafner, Xinwen Zhang:
Building a stateful reference monitor with coloured petri nets. CollaborateCom 2009: 1-10 - [c27]Basel Katt, Michael Hafner, Xinwen Zhang:
A usage control policy specification with Petri nets. CollaborateCom 2009: 1-8 - [c26]Basel Katt, Xinwen Zhang, Michael Hafner:
Towards a Usage Control Policy Specification with Petri Nets. OTM Conferences (2) 2009: 905-912 - [c25]Mukhtiar Memon, Michael Hafner, Ruth Breu:
Security as a Service - A Reference Architecture for SOA Security. WOSIS 2009: 79-89 - 2008
- [j7]Berthold Agreiter, Michael Hafner, Ruth Breu:
A fair Non-repudiation service in a web services peer-to-peer environment. Comput. Stand. Interfaces 30(6): 372-378 (2008) - [j6]Muhammad Alam, Michael Hafner, Ruth Breu:
Constraint based role based access control in the SECTET-frameworkA model-driven approach. J. Comput. Secur. 16(2): 223-260 (2008) - [j5]Jan Mendling, Michael Hafner:
From WS-CDL choreography to BPEL process orchestration. J. Enterp. Inf. Manag. 21(5): 525-542 (2008) - [c24]Basel Katt, Ruth Breu, Michael Hafner, Thomas Schabetsberger, Richard Mair, Florian Wozak:
Privacy and Access Control for IHE-Based Systems. eHealth 2008: 145-153 - [c23]Ruth Breu, Michael Hafner, Frank Innerhofer-Oberperfler, Florian Wozak:
Model-Driven Security Engineering of Service Oriented Systems. UNISCON 2008: 59-71 - [c22]Mukhtiar Memon, Michael Hafner, Ruth Breu:
SECTISSIMO: A Platform-Independent Framework for Security Services. MODSEC@MoDELS 2008 - [c21]Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert:
A general obligation model and continuity: enhanced policy enforcement engine for usage control. SACMAT 2008: 123-132 - 2007
- [j4]Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner:
A framework for modelling restricted delegation of rights in the SECTET. Comput. Syst. Sci. Eng. 22(5) (2007) - [j3]Muhammad Alam, Ruth Breu, Michael Hafner:
Model-Driven Security Engineering for Trust Management in SECTET. J. Softw. 2(1): 47-59 (2007) - [c20]Michael Hafner, Mukhtiar Memon, Muhammad Alam:
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet. MoDELS (Workshops) 2007: 132-144 - [c19]Berthold Agreiter, Michael Hafner, Ruth Breu:
A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. WOSIS 2007: 63-72 - [c18]Berthold Agreiter, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean-Pierre Seifert, Xinwen Zhang:
A technical architecture for enforcing usage control requirements in service-oriented architectures. SWS 2007: 18-25 - 2006
- [j2]Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:
Sectet: an extensible framework for the realization of secure inter-organizational workflows. Internet Res. 16(5): 491-506 (2006) - [c17]Muhammad Alam, Ruth Breu, Michael Hafner:
Modeling permissions in a (U/X)ML world. ARES 2006: 685-692 - [c16]Muhammad Alam, Michael Hafner, Ruth Breu:
Modeling Authorization in an SOA based Application Scenario. IASTED Conf. on Software Engineering 2006: 79-84 - [c15]Andrea Nowak, Michael Hafner, Michael Breu, Ruth Breu:
Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment. I-ESA 2006: 509-519 - [c14]Michael Hafner, Muhammad Alam, Ruth Breu:
Towards a MOF/QVT-Based Domain Architecture for Model Driven Security. MoDELS 2006: 275-290 - [c13]Muhammad Alam, Michael Hafner, Ruth Breu:
A constraint based role based access control in the SECTET a model-driven approach. PST 2006: 13 - [c12]Muhammad Alam, Michael Hafner, Ruth Breu:
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. PST 2006: 44 - [c11]Michael Hafner, Ruth Breu, Berthold Agreiter, Andrea Nowak:
SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. WOSIS 2006: 47-57 - [c10]Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner:
A Framework for Modeling Restricted Delegation in Service Oriented Architecture. TrustBus 2006: 142-151 - 2005
- [c9]Michael Hafner, Ruth Breu, Michael Breu:
A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. ICEIS (3) 2005: 128-135 - [c8]Ruth Breu, Michael Breu, Michael Hafner, Andrea Nowak:
Web Service Engineering - Advancing a New Software Engineering Discipline. ICWE 2005: 8-18 - [c7]Michael Hafner, Michael Breu, Ruth Breu, Andrea Nowak:
Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment. ICWS 2005: 533-540 - [c6]Jan Mendling, Michael Hafner:
From Inter-organizational Workflows to Process Execution: Generating BPEL from WS-CDL. OTM Workshops 2005: 506-515 - [c5]Ruth Breu, Michael Hafner, Barbara Weber, Andrea Nowak:
Model Driven Security for Inter-organizational Workflows in e-Government. TCGOV 2005: 122-133 - [c4]Michael Hafner, Ruth Breu:
Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0. MoDELS 2005: 39-53 - 2004
- [j1]Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp:
Towards a Systematic Development of Secure Systems. Inf. Secur. J. A Glob. Perspect. 13(3): 5-13 (2004) - [c3]Ruth Breu, Michael Hafner, Barbara Weber:
Modeling and Realizing Security-Critical Inter-Organizational Workflows. IASSE 2004: 139-144 - [c2]Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp:
Towards a Systematic Development of Secure Systems. WOSIS 2004: 1-12 - 2001
- [c1]Michael Hafner, Crina Vlad, Susanne Töpfer:
Calculating optimized IC-engine control maps using hinging hyperplane trees. ECC 2001: 739-744
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint