Author of the publication

Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation.

, , , and . ARES, page 321-326. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architectural approach for handling semi-structured data in a user-centred working environment., , , , and . IJWIS, 3 (3): 198-211 (2007)Semantic Storage: A Report on Performance and Flexibility., , , , , and . DEXA, volume 3588 of Lecture Notes in Computer Science, page 586-595. Springer, (2005)Secure Business Process Management: A Roadmap., , and . ARES, page 457-464. IEEE Computer Society, (2006)Security Ontology: Simulating Threats to Corporate Assets., , , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 249-259. Springer, (2006)Improving Storage Concepts for Semantic Models and Ontologies., , and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation., , , and . ARES, page 321-326. IEEE Computer Society, (2011)Security Ontologies: Improving Quantitative Risk Analysis., , , and . HICSS, page 156. IEEE Computer Society, (2007)Business process-based valuation of IT-security., , and . ACM SIGSOFT Software Engineering Notes, 30 (4): 1-5 (2005)The Semantic Desktop: A Semantic Personal Information Management System Based on RDF and Topic Maps., , , , and . ODBIS, volume 4623 of Lecture Notes in Computer Science, page 135-151. Springer, (2006)Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets., , , , and . PAKM, volume 4333 of Lecture Notes in Computer Science, page 37-48. Springer, (2006)