Author of the publication

Securing Dataverse with an Adapted Command Design Pattern.

, , and . SecDev, page 54-60. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big Data Technology Literature Review.. CoRR, (2015)Defining Semantic Variations of Diagrammatic Languages Using Behavioral Programming and Queries., , and . EXE@MoDELS, volume 1760 of CEUR Workshop Proceedings, page 5-11. CEUR-WS.org, (2016)The Open Monolith - Keeping Your Codebase (and Your Headaches) Small, and . (2017)Performance level profiles: A formal language for describing the expected performance of functional modules., , and . IROS, page 1751-1756. IEEE, (2016)BPjs: an extensible, open infrastructure for behavioral programming research., , and . MoDELS (Companion), page 59-60. ACM, (2018)BPjs - a framework for modeling reactive systems using a scripting language and BP., , and . CoRR, (2018)Securing Dataverse with an Adapted Command Design Pattern., , and . SecDev, page 54-60. IEEE Computer Society, (2017)DataTags, Data Handling Policy Spaces and the Tags Language., , and . IEEE Symposium on Security and Privacy Workshops, page 1-8. IEEE Computer Society, (2016)Computer Assisted Access to Justice via Formal Jurisprudence Modeling., , and . CoRR, (2019)Modeling and programming a leader-follower challenge problem with scenario-based tools., , , , and . MoDELS (Workshops), volume 2245 of CEUR Workshop Proceedings, page 376-385. CEUR-WS.org, (2018)