Maria Leitner

Learn More
The IL-1 family of cytokines encompasses eleven proteins that each share a similar β-barrel structure and bind to Ig-like receptors. Some of the IL-1-like cytokines have been well characterised, and play key roles in the development and regulation of inflammation. Indeed, IL-1α (IL-1F1), IL-1β (IL-1F2), and IL-18 (IL-1F4) are well-known inflammatory(More)
Chronic heart failure (CHEF) is a growing public health problem. Current guidelines provide detailed information regarding pharmacotherapy but little guidance about the value of exercise/cardiac rehabilitation programmes for individuals with this condition. To investigate the effects of exercise training upon CHF patients, a systematic literature review was(More)
In recent years, business process models are used to de ne security properties for the corresponding business information systems. In this context, a number of approaches emerged that integrate security properties into standard process modeling languages. Often, these security properties are depicted as text annotations or graphical extensions. However,(More)
BACKGROUND It has been estimated that violence accounts for more than 1.6 million deaths worldwide each year and these fatal assaults represent only a fraction of all assaults that actually occur. The problem has widespread consequences for the individual and for the wider society in physical, psychological, social and economic terms. A wide range of(More)
Process-Aware Information Systems (PAIS) enable the definition, execution, and management of business processes. Typically, processes are specified by control flow, data flow, and users or services, authorized to execute process tasks. During process execution, it is often necessary to access sensitive data such as patient or customer information. To secure(More)
In recent years the British government has sought to target service provision both on people with severe enduring mental illness and on those considered to be at risk of suicide. The study reported here suggests these policies may have had unforeseen repercussions on services for people who self-harm but have no identifiable mental illness. This paper(More)
Flexibility is one of the key challenges for Workflow Systems nowadays. Typically, a workflow covers the following four aspects which might all be subject to change: control flow, data flow, organizational structures, and application components (services). Existing work in research and practice shows that changes must be applied in a controlled manner in(More)
Enhancing existing business process modeling languages with security concepts has attracted increased attention in research and several graphical notations and symbols have been proposed. How these extensions can be comprehended by users has not been evaluated yet. However, the comprehensibility of security concepts integrated within business process models(More)
Currently, many approaches address the enforcement and monitoring of constraints over business processes. However, main focus has been put on constraint veri cation for intra-instance process constraints so far, i.e., constraints that a ect single instances. Existing approaches addressing instance-spanning constraints only consider certain scenarios. In(More)