Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Process Modeling as a Basis for Auditing Information Privacy., and . BPSC, volume P-147 of LNI, page 231-232. GI, (2009)Tackling cloud compliance through information flow control.. University of Passau, Germany, (2016)On Location-determined Cloud Management for Legally Compliant Outsourcing., , , , and . ISSE, page 61-73. Springer, (2015)Outsourcing im Pflegedienst - Herausforderungen und Lösungen in der Praxis., , and . Datenschutz und Datensicherheit, 35 (12): 870-874 (2011)Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions., , , and . SERVICES, page 645-652. IEEE Computer Society, (2010)SOA and Web Services: New Technologies, New Standards - New Attacks., , , and . ECOWS, page 35-44. IEEE Computer Society, (2007)Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns., , , , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 120-129. Springer, (2010)Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec.. WOSIS, page 3-12. INSTICC Press, (2008)A survey of attacks on web services., , and . Comput. Sci. Res. Dev., 24 (4): 185-197 (2009)Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services., , and . SWWS, page 80-86. CSREA Press, (2006)