Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Risk, Security, Accountability in the Cloud., , , and . CloudCom (1), page 177-184. IEEE Computer Society, (2013)An introduction to quantum cryptography.. ACM Crossroads, 11 (3): 3 (2005)Natural Language Processing of Rules and Regulations for Compliance in the Cloud.. OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 620-627. Springer, (2012)Model Checking for Communicating Quantum Processes., , , , and . IJUC, 8 (1): 73-98 (2012)Mapping legal requirements to IT controls., , , and . RELAW, page 11-20. IEEE Computer Society, (2013)A toolkit for automating compliance in cloud computing services., , , and . IJCC, 3 (1): 45-68 (2014)Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service., , , and . CLOSER, page 670-674. SciTePress, (2012)Introduction: The FIA Research Roadmap, Priorities for Future Internet Research., and . Future Internet Assembly, volume 7281 of Lecture Notes in Computer Science, page 1-5. Springer, (2012)Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 246-258. Springer, (2009)Automating Compliance for Cloud Computing Services., , , and . CLOSER, page 631-637. SciTePress, (2012)