Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection., , , , , and . Insider Threats in Cyber Security, volume 49 of Advances in Information Security, Springer, (2010)Model-driven business process security requirement specification., , , , and . Journal of Systems Architecture - Embedded Systems Design, 55 (4): 211-223 (2009)A principled approach to the design of healthcare systems: Autonomy vs. governance., , , , and . Rel. Eng. & Sys. Safety, 91 (12): 1576-1585 (2006)Supporting Evidence-Based Compliance Evaluation for Partial Business Process Outsourcing Scenarios., , and . RELAW, page 31-34. IEEE Computer Society, (2008)Addressing the Signal Grounding Problem for Autonomic Systems., , and . ICAS, page 21. IEEE Computer Society, (2006)Retrofitting Zeroconf to Type-Safe Self-Organising Systems., and . DEXA Workshops, page 93-97. IEEE Computer Society, (2006)Mind Out of Programmable Matter: Exploring Unified Models of Emergent Autonomy., , and . WRAC, volume 3825 of Lecture Notes in Computer Science, page 65-73. Springer, (2005)Programming Support and Governance for Process-Oriented Software Autonomy., , , and . WEBIST (Selected Papers), volume 8 of Lecture Notes in Business Information Processing, page 3-18. Springer, (2007)Harnessing Complexity: A Logical Approach to Engineering and Controlling Self-Organizing Systems., , and . ITSSA, 2 (1): 11-20 (2006)Adjustable Deliberation of Self-Managing Systems., , , and . ECBS, page 449-456. IEEE Computer Society, (2005)