Floragasse 7 – 5th floor, 1040 Vienna

Stefanie Rinderle-Ma

Stefanie Rinderle-Ma

is key researcher at SBA Research, Professor at the University of Vienna and head of  the Research Group Workflow Systems and Technology.

 

Research Interests

Stefanie research interests include:

  • Flexible and Distributed Process Technologies
  • Digitalized Compliance Management
  • Business Intelligence and Process Mining
  • Application Integration and Digitalized Collaboration


Bio

Since January 2010 Stefanie is Professor at the Faculty of Computer Science at the University of Vienna. She received a doctoral’s degree from University of Ulm in 2004 and was honored with an award of the Ulmer Universitätsgesellschaft for an outstanding thesis. In 2005, she had a research stay at the University of Twente (The Netherlands) and worked at the School of Management at the University of Ottawa (Canada). In March 2006, she was a researcher at the Technical University of Eindhoven (The Netherlands). In 2006, Stefanie participated in an industry project for DaimlerChrysler Research. She received her habilitation’s degree for the work On the Controlled Evolution of Information Systems at the University of Ulm in 2009.


Publications

Full list of publications

Top Publications:

  • Generation and Transformation of CompliantProcess Collaboration Models to BPMN (2019)
    • INPROCEEDINGStruetrue
    • Frederik Bischoff and Walid Fdhila and Stefanie Rinderle-Ma
    • International Conference on Advanced Information Systems Engineering
    @INPROCEEDINGS{Bischoff2019Generation,
       author = {Frederik Bischoff and Walid Fdhila and Stefanie Rinderle-Ma},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Generation and Transformation of CompliantProcess Collaboration Models to BPMN},
       booktitle = {International Conference on Advanced Information Systems Engineering},
       year = {2019},
       month = {6},
       pdf = {https://link.springer.com/chapter/10.1007%2F978-3-030-21290-2_29},
    }
  • Server Sounds and Network Noises (2015)
    • INPROCEEDINGS--
    • Tobias Hildebrandt and Stefanie Rinderle-Ma
    • 6th IEEE Conference on Cognitive Infocommunications (CogInfoCom 2015)
    @INPROCEEDINGS{Hildebrandt2015Server,
       author = {Tobias Hildebrandt and Stefanie Rinderle-Ma},
       title = {Server Sounds and Network Noises},
       booktitle = {6th IEEE Conference on Cognitive Infocommunications (CogInfoCom 2015)},
       year = {2015},
       month = {10},
       pdf = {http://eprints.cs.univie.ac.at/4499/1/authors_copy.pdf},
    }
  • On Applying Sonification Methods to Convey Business Process Data (2012)
    • INPROCEEDINGS--
    • Tobias Hildebrandt and Simone Kriglstein and Stefanie Rinderle-Ma
    • CaISE 2012 Forum
    @INPROCEEDINGS{hildebrandt_caise,
       author = {Tobias Hildebrandt and Simone Kriglstein and Stefanie Rinderle-Ma},
       title = {On Applying Sonification Methods to Convey Business Process Data},
       booktitle = {CaISE 2012 Forum},
       year = {2012},
       month = {6},
    }
  • Beyond Visualization: On Using Sonification Methods to Make Business Processes More Accessible to Users (2012)
    • INBOOK--
    • Tobias Hildebrandt and Simone Kriglstein and Stefanie Rinderle-Ma
    • Georgia Institute of Technology
    @INBOOK{hildebrandt_soni,
       author = {Tobias Hildebrandt and Simone Kriglstein and Stefanie Rinderle-Ma},
       title = {Beyond Visualization: On Using Sonification Methods to Make Business Processes More Accessible to Users},
       booktitle = {18th International Conference on Auditory Display (ICAD 2012)},
       year = {2012},
       pages = {248--249},
       publisher = {Georgia Institute of Technology},
    }
  • Evolution of Instance-Spanning Constraints in Process Aware Information Systems (2018)
    • INPROCEEDINGStruetrue
    • Conrad Indiono and Walid Fdhila and Stefanie Rinderle-Ma
    • International Conference on Cooperative Information Systems
    @INPROCEEDINGS{Indiono2018Evolution,
       author = {Conrad Indiono and Walid Fdhila and Stefanie Rinderle-Ma},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Evolution of Instance-Spanning Constraints in Process Aware Information Systems},
       booktitle = {International Conference on Cooperative Information Systems},
       year = {2018},
       month = {10},
       pdf = {https://link.springer.com/chapter/10.1007%2F978-3-030-02610-3_17},
    }
  • A Visualization Approach for Difference Analysis of Process Models and Instance Traffic (2013)
    • INPROCEEDINGS--
    • Simone Kriglstein and Stefanie Rinderle-Ma and Günter Wallner
    • Int l Conference on Business Process Management (BPM)
    @INPROCEEDINGS{Kriglstein_A_Visualization_Approach_for_D_2013,
       author = {Simone Kriglstein and Stefanie Rinderle-Ma and Günter Wallner},
       title = {A Visualization Approach for Difference Analysis of Process Models and Instance Traffic},
       booktitle = {Int l Conference on Business Process Management (BPM)},
       year = {2013},
       publisher = {Springer},
    }
  • A Visualization Concept for High-Level Comparison of Process Model Versions (2012)
    • INPROCEEDINGS--
    • Simone Kriglstein and Stefanie Rinderle-Ma
    • Business Process Management Workshops
    @INPROCEEDINGS{kriglstein_comparsion,
       author = {Simone Kriglstein and Stefanie Rinderle-Ma},
       title = {A Visualization Concept for High-Level Comparison of Process Model Versions},
       booktitle = {Business Process Management Workshops},
       year = {2012},
       month = {6},
       publisher = {Springer},
    }
  • An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation (2013)
    • INPROCEEDINGS--
    • Maria Leitner and Michelle Miller and Stefanie Rinderle-Ma
    • 2013 Eighth International Conference on Availability, Reliability and Security (ARES)
    @INPROCEEDINGS{Leitner2013Analysis,
       author = {Maria Leitner and Michelle Miller and Stefanie Rinderle-Ma},
       title = {An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation},
       booktitle = {2013 Eighth International Conference on Availability,
       Reliability and Security (ARES)},
       year = {2013},
       month = {9},
    }
  • An Experimental Study on the Design and Modeling of Security Concepts in Business Processes (2013)
    • INPROCEEDINGS--
    • Maria Leitner and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck
    • 6th {IFIP} {WG} 8.1 Working Conference on the Practice of Enterprice Modeling (PoEM)
    @INPROCEEDINGS{Leitner2013Experimental,
       author = {Maria Leitner and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck},
       title = {An Experimental Study on the Design and Modeling of Security Concepts in Business Processes},
       booktitle = {6th {IFIP} {WG} 8.1 Working Conference on the Practice of Enterprice Modeling (PoEM)},
       year = {2013},
       month = {11},
    }
  • Anomaly Detection and Visualization in Generative RBAC Models (2014)
    • INPROCEEDINGS--
    • Maria Leitner and Stefanie Rinderle-Ma
    • Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT)
    @INPROCEEDINGS{Leitner2014Anomaly,
       author = {Maria Leitner and Stefanie Rinderle-Ma},
       title = {Anomaly Detection and Visualization in Generative RBAC Models},
       booktitle = {Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT)},
       year = {2014},
       month = {6},
       pdf = {Leitner2014Anomaly.pdf},
       pages = {41-52},
       publisher = {ACM},
    }
  • A systematic review on security in Process-Aware Information Systems: Constitution, challenges, and future directions (2014)
    • ARTICLE--
    • Maria Leitner and Stefanie Rinderle-Ma
    • Information and Software Technology
    @ARTICLE{Leitner2014systematic,
       author = {Maria Leitner and Stefanie Rinderle-Ma},
       title = {A systematic review on security in Process-Aware Information Systems: Constitution,
       challenges,
       and future directions},
       journal = {Information and Software Technology},
       year = {2014},
       month = {3},
    }
  • A Cross-Layer Security Analysis for Process-Aware Information Systems (2015)
    • TECHREPORT--
    • Maria Leitner and Zhendong Ma and Stefanie Rinderle-Ma
    @TECHREPORT{Leitner2015CrossLayer,
       author = {Maria Leitner and Zhendong Ma and Stefanie Rinderle-Ma},
       title = {A Cross-Layer Security Analysis for Process-Aware Information Systems},
       booktitle = {arxiv.org},
       year = {2015},
       month = {7},
       pdf = {http://arxiv.org/pdf/1507.03415v1.pdf},
    }
  • A Case Study on the Suitability of Process Mining to Produce Current-State {RBAC} Models (2013)
    • INPROCEEDINGS--
    • Maria Leitner and Anne Baumgrass and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck
    • BPM Business Process Management Workshops
    @INPROCEEDINGS{leitner_case_2013,
       author = {Maria Leitner and Anne Baumgrass and Sigrid Schefer Wenzl and Stefanie Rinderle-Ma and Mark Strembeck},
       title = {A Case Study on the Suitability of Process Mining to Produce Current-State {RBAC} Models},
       booktitle = {BPM Business Process Management Workshops},
       year = {2013},
       month = {1},
       abstract = {Role based access control RBAC is commonly used to implement authorization procedures in Process aware information systems PAIS. Process mining refers to a bundle of algorithms that typically discover process models from event log data produced during the execution of realworld processes.},
       pdf = {Leitner_SBP2012.pdf},
       number = {132},
       pages = {719-724},
       publisher = {Springer Berlin Heidelberg},
    }
    Role based access control RBAC is commonly used to implement authorization procedures in Process aware information systems PAIS. Process mining refers to a bundle of algorithms that typically discover process models from event log data produced during the execution of realworld processes.
  • Definition and Enactment of Instance-spanning Process Constraints (2012)
    • INPROCEEDINGS--
    • Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma
    • Web Information System Engineering - {WISE} 2012 - 13th International Conference
    @INPROCEEDINGS{leitner_definition_2012,
       author = {Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma},
       title = {Definition and Enactment of Instance-spanning Process Constraints},
       booktitle = {Web Information System Engineering - {WISE} 2012 - 13th International Conference},
       year = {2012},
       month = {11},
       pdf = {Leitner_WISE2012.pdf},
       publisher = {Springer},
       note = {(accepted)},
    }
  • SPRINT Responsibilities: Design and Development of Security (2011)
    • ARTICLE--
    • Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma
    • Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications JoWUA
    @ARTICLE{Leitner_SPRINT_Responsibilities_Design_2011,
       author = {Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma},
       title = {SPRINT Responsibilities: Design and Development of Security},
       journal = {Journal of Wireless Mobile Networks,
       Ubiquitous Computing,
       and Dependable Applications JoWUA},
       year = {2011},
       month = {12},
       pdf = {paper_mangler_2011.pdf},
       volume = {2},
       number = {4},
    }
  • Using Content Analysis for Privacy Requirement Extraction and Policy Formalization (2015)
    • INPROCEEDINGS--
    • Stefanie Rinderle-Ma and Zhendong Ma and Bernhard Madlmayr
    • 6th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA)
    @INPROCEEDINGS{RinderleMa2015Using,
       author = {Stefanie Rinderle-Ma and Zhendong Ma and Bernhard Madlmayr},
       title = {Using Content Analysis for Privacy Requirement Extraction and Policy Formalization},
       booktitle = {6th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA)},
       year = {2015},
       month = {9},
       pdf = {http://eprints.cs.univie.ac.at/4429/1/EMISA_RMM15.pdf},
    }
  • Security and Privacy in Business Processes: A Posteriori Analysis Techniques (2013)
    • ARTICLE--
    • Mark Strembeck and Stefanie Rinderle-Ma
    • Information Technology
    @ARTICLE{Strembeck2013Security,
       author = {Mark Strembeck and Stefanie Rinderle-Ma},
       title = {Security and Privacy in Business Processes: A Posteriori Analysis Techniques},
       journal = {Information Technology},
       year = {2013},
       month = {12},
    }
  • AW-RBAC: Access Control in Adaptive Workflow Systems (2011)
    • INPROCEEDINGS--
    • Maria Leitner and Stefanie Rinderle-Ma and Juergen Mangler
    • Sixth International Conference on Availability, Reliability and Security
    @INPROCEEDINGS{_AW_RBAC_Access_Control_in_Adap_2011,
       author = {Maria Leitner and Stefanie Rinderle-Ma and Juergen Mangler},
       title = {AW-RBAC: Access Control in Adaptive Workflow Systems},
       booktitle = {Sixth International Conference on Availability,
       Reliability and Security},
       year = {2011},
       month = {8},
       pdf = {mangler_aw-rbac.pdf},
       publisher = {IEEE Computer Society},
    }
  • Deriving Role Engineering Artifacts from Business Processes and Scenario Models (2011)
    • INPROCEEDINGS--
    • Anne Baumgrass and Mark Strembeck and Stefanie Rinderle-Ma
    • Proc. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT)
    @INPROCEEDINGS{_Deriving_Role_Engineering_Arti_2011,
       author = {Anne Baumgrass and Mark Strembeck and Stefanie Rinderle-Ma},
       title = {Deriving Role Engineering Artifacts from Business Processes and Scenario Models},
       booktitle = {Proc. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT)},
       year = {2011},
       month = {6},
       pdf = {sacmat11-re-extended.pdf},
    }
  • Responsibility-driven Design and Development of Process-aware Security Policies (2011)
    • INPROCEEDINGS--
    • Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma
    • Sixth International Conference on Availability, Reliability and Security
    @INPROCEEDINGS{_Design_and_Development_of_Proc_2011,
       author = {Maria Leitner and Juergen Mangler and Stefanie Rinderle-Ma},
       title = {Responsibility-driven Design and Development of Process-aware Security Policies},
       booktitle = {Sixth International Conference on Availability,
       Reliability and Security},
       year = {2011},
       month = {8},
       pdf = {mangler_responsibilities.pdf},
       publisher = {IEEE Computer Society},
    }
  • Who is Who: On Visualizing Organizational Models in Collaborative Systems (2012)
    • INPROCEEDINGS--
    • Simone Kriglstein and Juergen Mangler and Stefanie Rinderle-Ma
    • 8th IEEE International Conference onCollaborativeComputing Networking
    @INPROCEEDINGS{_Who_is_Who_On_Visualizing_Orga_2012,
       author = {Simone Kriglstein and Juergen Mangler and Stefanie Rinderle-Ma},
       title = {Who is Who: On Visualizing Organizational Models in Collaborative Systems},
       booktitle = {8th IEEE International Conference onCollaborativeComputing Networking},
       year = {2012},
       month = {10},
       pages = {279-288},
       publisher = {IEEE},
    }

 

This Website uses Cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close