Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Reality of Libraries., and . CSMR, page 307-318. IEEE Computer Society, (2007)Tools for Traceable Security Verification., , and . BCS Int. Acad. Conf., page 367-390. British Computer Society, (2008)Model-Based Design and Analysis of Permission-Based Security., , and . ICECCS, page 224-233. IEEE Computer Society, (2005)Games In The Semantics Of Programming Languages - An Elementary Introduction.. Synthese, 133 (1-2): 131-158 (2002)Bericht über die erste Jahrestagung der GI-Fachgruppe FoMSESS vom 12. bis 13. Mai 2003 in Karlsruhe.. Softwaretechnik-Trends, (2003)Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes., , , , , and . CLOSER, page 553-561. SciTePress, (2013)Model-Driven Development for secure information systems., , , and . Information & Software Technology, 51 (5): 809-814 (2009)Formal Semantics for Interacting UML subsystems.. FMOODS, volume 209 of IFIP Conference Proceedings, page 29-43. Kluwer, (2002)Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications., and . I3E, volume 202 of IFIP Conference Proceedings, page 489-505. Kluwer, (2001)Critical Systems Development with UML: Overview with Automatic Case Study., and . SNPD, page 512-517. ACIS, (2003)