Author of the publication

Privacy and Access Control for IHE-Based Systems.

, , , , , and . eHealth, volume 1 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-153. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Living Models - Ten Principles for Change-Driven Software Engineering., , , , , and . Int. J. Software and Informatics, 5 (1-2): 267-290 (2011)Feature extraction from multi-directional multi-resolution image transformations for the classification of zoom-endoscopy images., , , , , and . Pattern Anal. Appl., 12 (4): 407-413 (2009)Towards a Systematic Development of Secure Systems., , , and . WOSIS, page 1-12. INSTICC Press, (2004)A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together., , and . ICEIS (3), page 128-135. (2005)Modeling Authorization in an SOA based Application Scenario., , and . IASTED Conf. on Software Engineering, page 79-84. IASTED/ACTA Press, (2006)Evaluation of super-resolution methods in the context of colonic polyp classification., , , and . CBMI, page 1-6. IEEE, (2014)Bridging the Resolution Gap between Endoscope Types for a Colonic Polyp Classification., , , and . ICPR, page 2739-2744. IEEE, (2014)Two-Color Satellite Laser Ranging Measurements at 10 Hz and 100 Hz at TIGO., , , , , , and . IEEE Trans. Geoscience and Remote Sensing, 52 (8): 4707-4716 (2014)Building a stateful reference monitor with coloured petri nets., , and . CollaborateCom, page 1-10. ICST / IEEE, (2009)Towards a Usage Control Policy Specification with Petri Nets., , and . OTM Conferences (2), volume 5871 of Lecture Notes in Computer Science, page 905-912. Springer, (2009)