Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for software reuse in safety-critical system-of-systems., , and . SoSE, page 1-6. IEEE, (2008)Implementation and analysis of environment behavior models as a tool for testing real-time, reactive systems., , , , , and . SoSE, page 1-5. IEEE Computer Society, (2006)Use of an Experimental Policy Workbench: Description and Preliminary Results., , and . DBSec, volume A-6 of IFIP Transactions, page 47-76. North-Holland, (1991)The Role of Policy in Balancing Outsourcing and Homeland Security., , , and . IT Professional, 7 (4): 19-23 (2005)Removing the Boundaries: Steps Toward a Cloud Nirvana., , , , , and . GrC, page 167-171. IEEE Computer Society, (2010)Empowering Users through Secure On-Demand Data Provisioning.. IEEE Computer, 46 (6): 84-85 (2013)Securing the ZigBee Protocol in the Smart Grid., , , and . IEEE Computer, 45 (4): 92-94 (2012)Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy., , and . NSPW, page 69-75. ACM, (1993)Passive Fingerprinting of Network Reconnaissance Tools., and . IEEE Computer, 42 (11): 91-93 (2009)Software reuse in the IV&V of system of systems., , and . SoSE, page 1-5. IEEE, (2009)