Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Der Lebenszyklus von Identitäten., and . Datenschutz und Datensicherheit, 32 (3): 201 (2008)Investigating in Security Solutions - Can Qualified Electronic Signatures be Profitable for Mobile Operators?, and . AMCIS, page 452. Association for Information Systems, (2005)Normality Mining: Privacy Implications of Behavioral Profiles Drawn From GPS Enabled Mobile Phones., , , , and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 41 (2): 251-261 (2011)Planung und Bewertung von Enterprise Identity Managementsystemen., and . Datenschutz und Datensicherheit, 32 (3): 189-193 (2008)Innovation Management Methods in the Automotive Industry., , , and . I4CS, volume 1041 of Communications in Computer and Information Science, page 125-141. Springer, (2019)Mobilität, mobile Technologie und Identität - Mobile Identitätsmanagementsysteme., and . Datenschutz und Datensicherheit, 30 (9): 571-575 (2006)Profitability of Mobile Qualified Electronic Signatures., and . PACIS, page 112. AISeL, (2005)Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach.. ARES, page 779-786. IEEE Computer Society, (2008)Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns., , , , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 120-129. Springer, (2010)Ganzheitliche Bewertung von Enterprise Identity Management Systemen - Der Ansatz der Balanced Scorecard als taktisches Entscheidungsunterstützungsinstrument.. Sicherheit, volume P-128 of LNI, page 449-460. GI, (2008)