Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jensen, Meiko
add a person with the name Jensen, Meiko
 

Other publications of authors with the same name

A Security Modeling Approach for Web-Service-Based Business Processes., and . ECBS, page 340-347. IEEE Computer Society, (2009)Towards Privacy-Friendly Transparency Services in Inter-organizational Business Processes.. COMPSAC Workshops, page 200-205. IEEE Computer Society, (2013)Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions., , , and . SERVICES, page 645-652. IEEE Computer Society, (2010)Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies., , , and . Privacy and Identity Management, volume 476 of IFIP Advances in Information and Communication Technology, page 97-110. Springer, (2015)Event-based application of ws-security policy on soap messages., , and . SWS, page 1-8. ACM, (2007)Generating WS-SecurityPolicy Documents via Security Model Transformation.. BPSC, volume P-147 of LNI, page 233-234. GI, (2009)Wasch mich, aber mach mich nicht nass - Anonymisierungsverfahren als Schlüssel zur datenschutzkonformen E-Mail-Filterung., and . GI-Jahrestagung, volume P-220 of LNI, page 2119-2133. GI, (2013)Aligning User Consent Management and Service Process Modeling., and . GI-Jahrestagung, volume P-232 of LNI, page 527-538. GI, (2014)Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings., and . ICWS, page 531-538. IEEE Computer Society, (2013)Attack Surfaces: A Taxonomy for Attacks on Cloud Services., and . IEEE CLOUD, page 276-279. IEEE, (2010)