Author of the publication

Umsetzungskonzept der Universitäten des Landes Baden-Württemberg für das High Performance Computing (HPC), Data Intensive Computing (DIC) und Large Scale Scientific Data Management (LS² DM)

, , , , , , , , , , and . (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Filter-resistant code injection on ARM., , , , , and . Journal in Computer Virology, 7 (3): 173-188 (2011)Monitors for Usage Control., , , , and . IFIPTM, volume 238 of IFIP, page 411-414. Springer, (2007)Usage Control Policy Enforcement in OpenOffice.org and Information Flow., , , and . ISSA, page 393-406. ISSA, Pretoria, South Africa, (2009)Classification of Specification and Validation Methods for Distributed Systems.. FBT, page 3-13. Verlag Shaker, (1998)Test Case Specification with Real-time TTCN., and . FBT, volume 315 of GMD-Studien, page 231-240. GMD-Forschungszentrum Informationstechnik GmbH, (1997)A Common Semantics Representation for SDL and TTCN., , , and . PSTV, volume C-8 of IFIP Transactions, page 335-346. North-Holland, (1992)Context-Aware Access Control; Making Access Control Decisions Based on Context Information., , , , and . MobiQuitous, page 1-8. IEEE Computer Society, (2006)Aktivierung der erwerbsfähigen Hilfebedürftigen mit arbeitsmarktpolitischen Maßnahmen - Wer wird gefördert?, , and . AStA Wirtschafts- und Sozialstatistisches Archiv, 4 (4): 269-292 (2011)Usage Control Enforcement: Present and Future., , , , and . IEEE Security & Privacy, 6 (4): 44-53 (2008)CPM: Masking Code Pointers to Prevent Code Injection Attacks., , , , , and . ACM Trans. Inf. Syst. Secur., 16 (1): 1:1-1:27 (2013)