Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role Model Optimization for Secure Role-Based Identity Management., , and . ECIS, (2014)Near real-time forensic disaster analysis., , , , , and . ISCRAM, ISCRAM Association, (2013)CASE. Auslaufmodell oder Technologie der Zukunft? Die Aufgaben haben sich gewandelt, , and . Computerwoche : CW ; die aktuelle Wochenzeitung für die Computerwelt. Extra, (February 1995)Adaptive identity and access management - contextual data based policies., , , , and . EURASIP J. Information Security, (2016)Attribute quality management for dynamic identity and access management., , , , and . J. Inf. Secur. Appl., (2019)Analyzing Recent Trends in Enterprise Identity Management., , , , and . DEXA Workshops, page 273-277. IEEE Computer Society, (2014)Untersuchung der Fahrer-, Fahrzeug- und Verkehrsabhängigkeit von Getriebelastkollektiven mittels Fahrsimulation, , and . Simulation im Maschinenbau : Softwaretools und Anwendungen in Lehre, Forschung und Praxis, Dresden, Eigenverl., (2000)Analyzing Quality Criteria in Role-based Identity and Access Management., , , and . ICISSP, page 64-72. SciTePress, (2015)Tendenzen der CASE-Tool Evaluierung, , and . volume 2 of Studien zur Systementwicklung des Lehrstuhls für Wirtschaftsinformatik der Universität zu Köln, page 227-236. Köln, (1994)Build Your City! - Engaging Citizens in Crowdfunding Projects., , and . ECIS, page 46. (2017)