Author of the publication

Privacy and Access Control for IHE-Based Systems.

, , , , , and . eHealth, volume 1 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-153. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a stateful reference monitor with coloured petri nets., , and . CollaborateCom, page 1-10. ICST / IEEE, (2009)Towards a Usage Control Policy Specification with Petri Nets., , and . OTM Conferences (2), volume 5871 of Lecture Notes in Computer Science, page 905-912. Springer, (2009)A Socio-Technical Framework to Improve Cyber Security Training: A Work in Progress., , , , and . STPIS@ECIS, volume 2398 of CEUR Workshop Proceedings, page 81-96. CEUR-WS.org, (2019)Meeting EHR Security Requirements: Authentication as a Security Service., , , , and . perspeGKtive, volume P-174 of LNI, page 103-110. GI, (2010)Mobile device management (MDM) technologies, issues and challenges., and . ICCSP, page 143-147. ACM, (2019)Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security., and . EASE, page 90-99. ACM, (2019)A Comprehensive Overview of Security Monitoring Solutions for E-Health Systems.. ICHI, page 364. IEEE Computer Society, (2014)An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain., , , and . eHealth, volume 69 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-9. Springer, (2010)Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing., , , and . ISoLA Workshops, volume 336 of Communications in Computer and Information Science, page 162-180. Springer, (2011)Cyber Security Skill Set Analysis for Common Curricula Development., and . ARES, page 37:1-37:8. ACM, (2019)