Markus Klemen

is Chief Executive Officer of SBA Research and Lecturer at the TU Wien.

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88

Research Interests

His research addressed mainly topics on applied concepts of IT-security and semantic database solutions. Lately, his interests focus on motivation, non-violent communication (NVC) according to Marshall B. Rosenberg, organizational development and employee participation models.

Bio

Markus graduated with a master’s degree in International Business Administration from the University of Vienna. During 10 years of work as IT-Security consultant and software project manager he carried out various customer projects. He introduced and taught several lectures on IT-Security at theTU Wien and was responsible for the IT-Management of the Institute for Software Technology and Interactive Systems.

Markus is certified CISSP (Certified Information Security Systems Professional) and CSSLP (Certified Secure Software Lifecycle Professional).

Publications

  • Edgar R. Weippl and Markus Klemen and Stefan Raffeiner, "The Semantic Web for Knowledge and Data Management: Technologies and Practices." Idea Group, 2008, pp. 38-48. BibTeX
    @INBOOK{Weippl_ImprovingStorageConceptsforSemanticModelsandOntologies_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Stefan Raffeiner},
      title = {The Semantic Web for Knowledge and Data Management: Technologies and Practices},
      year = {2008},
      month = {1},
      chapter = {Improving Storage Concepts for Semantic Models and Ontologies},
      pages = {38--48},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek, "OCG IT-Security Zertifikat fuer Nutzer," in IRIS 2008, 2008. BibTeX
    @INPROCEEDINGS{Benditsch_OCGITSecurityZertifikat_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek},
      title = {OCG IT-Security Zertifikat fuer Nutzer},
      booktitle = {IRIS 2008},
      year = {2008},
      month = {1},
      }
  • Edgar R. Weippl and Markus Klemen and Thomas Neubauer, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Klemen_BusinessRequirementsofBackupSystems_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Thomas Neubauer},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Business Requirements of Backup Systems},
      publisher = {Wiley},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl, "Security Ontologies: Improving Quantitative Risk Analysis," in Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007, 2007, pp. 156-162. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologiesImproving_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
      title = {Security Ontologies: Improving Quantitative Risk Analysis},
      booktitle = {Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Security Ontologies Improving Quantitative Risk Analysis.pdf},
      pages = {156--162},
      publisher = {IEEE Computer Society},
      }
  • Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and Edgar R. Weippl, "Architectural approach for handling semi-structured data in a user-centered working environment," International Journal of Web Information Systems, vol. 3, pp. 198-211, 2007. BibTeX | PDF
    @ARTICLE{Ekelhart_Architecturalapproachhandling_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and {Edgar R.} Weippl},
      title = {Architectural approach for handling semi-structured data in a user-centered working environment},
      journal = {International Journal of Web Information Systems},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Architectural Approach for Handling Semi-Structured Data in a User-Centered Working Environment.pdf},
      volume = {3},
      pages = {198--211},
      }
  • Edgar R. Weippl and Markus Klemen and Benjamin Böck, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Bock_SocialEngineering_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Benjamin Böck},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Social Engineering},
      publisher = {Wiley},
      }
  • Edgar R. Weippl and Markus Klemen, "Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues." Idea Group, 2006. BibTeX
    @INBOOK{Weippl_ImplementingITSecurityforSmallandMediumSizedEnterprises_2006,
      Author = {{Edgar R.} Weippl and Markus Klemen},
      title = {Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues},
      year = {2006},
      month = {1},
      chapter = {Implementing IT Security for Small and Medium-Sized Enterprises},
      publisher = {Idea Group},
      }
  • Markus Klemen and Stefan Biffl and Thomas Neubauer, "Secure Business Process Management: A Roadmap," in Proceedings of the First International Conference on Availability, Reliability and Security (ARES), 2006, pp. 457-464. BibTeX
    @INPROCEEDINGS{Neubauer_SecureBusinessProcess_2006,
      Author = {Markus Klemen and Stefan Biffl and Thomas Neubauer},
      title = {Secure Business Process Management: A Roadmap},
      booktitle = {Proceedings of the First International Conference on Availability, Reliability and Security (ARES)},
      year = {2006},
      month = {1},
      pages = {457--464},
      publisher = {IEEE Computer Society},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl, "Security Ontology: Simulating Threats to Corporate Assets," in Second International Conference on Information Systems Security (ICISS 2006), 2006, pp. 249-259. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologySimulating_2006,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
      title = {Security Ontology: Simulating Threats to Corporate Assets},
      booktitle = {Second International Conference on Information Systems Security (ICISS 2006)},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Security Ontology Simulating Threats to Corporate Assets.pdf},
      volume = {4332_2006},
      pages = {249--259},
      publisher = {Springer Berlin Heidelberg},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and A Min Tjoa and Edgar R. Weippl, "Ontology-based Business Knowledge for Simulating Threats to Corporate Assets," in Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006, 2006, pp. 37-48. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_OntologybasedBusinessKnowledge_2006,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Ontology-based Business Knowledge for Simulating Threats to Corporate Assets},
      booktitle = {Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Ontology-based Business Knowledge for Simulating Threats to Corporate Assets.pdf},
      volume = {4333_2006},
      pages = {37--48},
      publisher = {Springer Berlin Heidelberg},
      }
  • Edgar R. Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and A Min Tjoa, "Semantic Storage: A Report on Performance and Flexibility," in Database and Expert Systems Applications, 16th International Conference, DEXA 2005, 2005, pp. 586-595. BibTeX | PDF
    @INPROCEEDINGS{Weippl_SemanticStorageReport_2005,
      Author = {{Edgar R.} Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and {A Min} Tjoa},
      title = {Semantic Storage: A Report on Performance and Flexibility},
      booktitle = {Database and Expert Systems Applications, 16th International Conference, DEXA 2005},
      year = {2005},
      month = {8},
      abstract = {Desktop search tools are becoming more popular. They have to deal with increasing amounts of locally stored data. Another approach is to analyze the semantic relationship between collected data in order to preprocess the data semantically. The goal is to allow searches based on relationships between various objects instead of focusing on the name of objects. We introduce a database architecture based on an existing software prototype, which is capable of meeting the various demands for a semantic information manager. We describe the use of an association table which stores the relationships between events. It enables adding or removing data items easily without the need for schema modifications. Existing optimization techniques of RDBMS can still be used.},
      pdf = {2005-Weippl.pdf},
      volume = {3588_2005},
      pages = {586-595},
      publisher = {Springer Berlin Heidelberg},
      }
  • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart, "The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps," in Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005, 2005, pp. 135-151. BibTeX
    @INPROCEEDINGS{Weippl_SemanticDesktopSemantic_2005,
      Author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
      title = {The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps},
      booktitle = {Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005},
      year = {2005},
      month = {10},
      number = {4623},
      pages = {135-151},
      }
  • Markus Klemen and Stefan Biffl and Thomas Neubauer, "Business Process-based Valuation of IT-Security," in International ACM Conference on Software Engineering, Proceedings of the seventh international workshop on economics-driven software engineering research (EDSER’05), 2005. BibTeX
    @INPROCEEDINGS{Neubauer_BusinessProcessbasedValuation_2005,
      Author = {Markus Klemen and Stefan Biffl and Thomas Neubauer},
      title = {Business {P}rocess-based {V}aluation of {IT}-{S}ecurity},
      booktitle = {International {ACM} {C}onference on {S}oftware {E}ngineering, {P}roceedings of the seventh international workshop on economics-driven software engineering research ({EDSER}'05)},
      year = {2005},
      month = {1},
      }

View all publications

  • Edgar R. Weippl and Markus Klemen and Stefan Raffeiner, "The Semantic Web for Knowledge and Data Management: Technologies and Practices." Idea Group, 2008, pp. 38-48. BibTeX
    @INBOOK{Weippl_ImprovingStorageConceptsforSemanticModelsandOntologies_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Stefan Raffeiner},
      title = {The Semantic Web for Knowledge and Data Management: Technologies and Practices},
      year = {2008},
      month = {1},
      chapter = {Improving Storage Concepts for Semantic Models and Ontologies},
      pages = {38--48},
      publisher = {Idea Group},
      }
  • Edgar R. Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek, "OCG IT-Security Zertifikat fuer Nutzer," in IRIS 2008, 2008. BibTeX
    @INPROCEEDINGS{Benditsch_OCGITSecurityZertifikat_2008,
      Author = {{Edgar R.} Weippl and Markus Klemen and Philippe Benditsch and Gerald Futschek},
      title = {OCG IT-Security Zertifikat fuer Nutzer},
      booktitle = {IRIS 2008},
      year = {2008},
      month = {1},
      }
  • Edgar R. Weippl and Markus Klemen and Thomas Neubauer, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Klemen_BusinessRequirementsofBackupSystems_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Thomas Neubauer},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Business Requirements of Backup Systems},
      publisher = {Wiley},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl, "Security Ontologies: Improving Quantitative Risk Analysis," in Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007, 2007, pp. 156-162. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologiesImproving_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
      title = {Security Ontologies: Improving Quantitative Risk Analysis},
      booktitle = {Proceedings of the 40th Hawaii International Conference on System Sciences, HICSS2007},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Security Ontologies Improving Quantitative Risk Analysis.pdf},
      pages = {156--162},
      publisher = {IEEE Computer Society},
      }
  • Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and Edgar R. Weippl, "Architectural approach for handling semi-structured data in a user-centered working environment," International Journal of Web Information Systems, vol. 3, pp. 198-211, 2007. BibTeX | PDF
    @ARTICLE{Ekelhart_Architecturalapproachhandling_2007,
      Author = {Andreas Ekelhart and Stefan Fenz and Gernot Goluch and Markus Klemen and {Edgar R.} Weippl},
      title = {Architectural approach for handling semi-structured data in a user-centered working environment},
      journal = {International Journal of Web Information Systems},
      year = {2007},
      month = {1},
      pdf = {2007 - Ekelhart - Architectural Approach for Handling Semi-Structured Data in a User-Centered Working Environment.pdf},
      volume = {3},
      pages = {198--211},
      }
  • Edgar R. Weippl and Markus Klemen and Benjamin Böck, "The Handbook of Computer Networks." Wiley, 2007. BibTeX
    @INBOOK{Bock_SocialEngineering_2007,
      Author = {{Edgar R.} Weippl and Markus Klemen and Benjamin Böck},
      title = {The Handbook of Computer Networks},
      year = {2007},
      month = {1},
      chapter = {Social Engineering},
      publisher = {Wiley},
      }
  • Edgar R. Weippl and Markus Klemen, "Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues." Idea Group, 2006. BibTeX
    @INBOOK{Weippl_ImplementingITSecurityforSmallandMediumSizedEnterprises_2006,
      Author = {{Edgar R.} Weippl and Markus Klemen},
      title = {Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues},
      year = {2006},
      month = {1},
      chapter = {Implementing IT Security for Small and Medium-Sized Enterprises},
      publisher = {Idea Group},
      }
  • Markus Klemen and Stefan Biffl and Thomas Neubauer, "Secure Business Process Management: A Roadmap," in Proceedings of the First International Conference on Availability, Reliability and Security (ARES), 2006, pp. 457-464. BibTeX
    @INPROCEEDINGS{Neubauer_SecureBusinessProcess_2006,
      Author = {Markus Klemen and Stefan Biffl and Thomas Neubauer},
      title = {Secure Business Process Management: A Roadmap},
      booktitle = {Proceedings of the First International Conference on Availability, Reliability and Security (ARES)},
      year = {2006},
      month = {1},
      pages = {457--464},
      publisher = {IEEE Computer Society},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and Edgar R. Weippl, "Security Ontology: Simulating Threats to Corporate Assets," in Second International Conference on Information Systems Security (ICISS 2006), 2006, pp. 249-259. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_SecurityOntologySimulating_2006,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {Edgar R.} Weippl},
      title = {Security Ontology: Simulating Threats to Corporate Assets},
      booktitle = {Second International Conference on Information Systems Security (ICISS 2006)},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Security Ontology Simulating Threats to Corporate Assets.pdf},
      volume = {4332_2006},
      pages = {249--259},
      publisher = {Springer Berlin Heidelberg},
      }
  • Andreas Ekelhart and Stefan Fenz and Markus Klemen and A Min Tjoa and Edgar R. Weippl, "Ontology-based Business Knowledge for Simulating Threats to Corporate Assets," in Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006, 2006, pp. 37-48. BibTeX | PDF
    @INPROCEEDINGS{Ekelhart_OntologybasedBusinessKnowledge_2006,
      Author = {Andreas Ekelhart and Stefan Fenz and Markus Klemen and {A Min} Tjoa and {Edgar R.} Weippl},
      title = {Ontology-based Business Knowledge for Simulating Threats to Corporate Assets},
      booktitle = {Practical Aspects of Knowledge Management, 6th International Conference, PAKM 2006},
      year = {2006},
      month = {12},
      pdf = {2006 - Ekelhart - Ontology-based Business Knowledge for Simulating Threats to Corporate Assets.pdf},
      volume = {4333_2006},
      pages = {37--48},
      publisher = {Springer Berlin Heidelberg},
      }
  • Edgar R. Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and A Min Tjoa, "Semantic Storage: A Report on Performance and Flexibility," in Database and Expert Systems Applications, 16th International Conference, DEXA 2005, 2005, pp. 586-595. BibTeX | PDF
    @INPROCEEDINGS{Weippl_SemanticStorageReport_2005,
      Author = {{Edgar R.} Weippl and Markus Klemen and Manfred Linnert and Stefan Fenz and Gernot Goluch and {A Min} Tjoa},
      title = {Semantic Storage: A Report on Performance and Flexibility},
      booktitle = {Database and Expert Systems Applications, 16th International Conference, DEXA 2005},
      year = {2005},
      month = {8},
      abstract = {Desktop search tools are becoming more popular. They have to deal with increasing amounts of locally stored data. Another approach is to analyze the semantic relationship between collected data in order to preprocess the data semantically. The goal is to allow searches based on relationships between various objects instead of focusing on the name of objects. We introduce a database architecture based on an existing software prototype, which is capable of meeting the various demands for a semantic information manager. We describe the use of an association table which stores the relationships between events. It enables adding or removing data items easily without the need for schema modifications. Existing optimization techniques of RDBMS can still be used.},
      pdf = {2005-Weippl.pdf},
      volume = {3588_2005},
      pages = {586-595},
      publisher = {Springer Berlin Heidelberg},
      }
  • A Min Tjoa and Stefan Fenz and Edgar R. Weippl and Markus Klemen and Andreas Ekelhart, "The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps," in Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005, 2005, pp. 135-151. BibTeX
    @INPROCEEDINGS{Weippl_SemanticDesktopSemantic_2005,
      Author = {{A Min} Tjoa and Stefan Fenz and {Edgar R.} Weippl and Markus Klemen and Andreas Ekelhart},
      title = {The Semantic Desktop: A Semantic Personal Information Management System based on RDF and Topic Maps},
      booktitle = {Proceedings of the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB) 2005},
      year = {2005},
      month = {10},
      number = {4623},
      pages = {135-151},
      }
  • Markus Klemen and Stefan Biffl and Thomas Neubauer, "Business Process-based Valuation of IT-Security," in International ACM Conference on Software Engineering, Proceedings of the seventh international workshop on economics-driven software engineering research (EDSER’05), 2005. BibTeX
    @INPROCEEDINGS{Neubauer_BusinessProcessbasedValuation_2005,
      Author = {Markus Klemen and Stefan Biffl and Thomas Neubauer},
      title = {Business {P}rocess-based {V}aluation of {IT}-{S}ecurity},
      booktitle = {International {ACM} {C}onference on {S}oftware {E}ngineering, {P}roceedings of the seventh international workshop on economics-driven software engineering research ({EDSER}'05)},
      year = {2005},
      month = {1},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close