Author of the publication

Ontological Mapping of Common Criteria's Security Assurance Requirements.

, , , and . SEC, volume 232 of IFIP, page 85-95. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XML security - A comparative literature review., , , , and . Journal of Systems and Software, 81 (10): 1715-1724 (2008)Fortification of IT Security by Automatic Security Advisory Processing., , and . AINA, page 575-582. IEEE Computer Society, (2008)Ontological Mapping of Information Security Best-Practice Guidelines., , and . BIS, volume 21 of Lecture Notes in Business Information Processing, page 49-60. Springer, (2009)Security aspects in Semantic Web Services Filtering., , , , , , and . iiWAS, volume 229 of books@ocg.at, page 21-31. Austrian Computer Society, (2007)CASSIS - Computer-based Academy for Security and Safety in Information Systems., , , , , and . ARES, page 730-740. IEEE Computer Society, (2007)How to Increase the Inventory Efficiency in Information Security Risk and Compliance Management., , and . ECIS, (2015)A taxonomy for privacy enhancing technologies., , , and . Computers & Security, (2015)Ontology-based information security compliance determination and control selection on the example of ISO 27002., and . Inf. & Comput. Security, 26 (5): 551-567 (2018)Security Ontology: Simulating Threats to Corporate Assets., , , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 249-259. Springer, (2006)How to determine threat probabilities using ontologies and Bayesian networks., and . CSIIRW, page 69. ACM, (2009)