Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model driven security: From UML models to access control infrastructures., , and . ACM Trans. Softw. Eng. Methodol., 15 (1): 39-91 (2006)Model driven security for process-oriented systems., , and . SACMAT, page 100-109. ACM, (2003)An MDA Framework Supporting OCL., , and . ECEASST, (2006)Automated analysis of security-design models., , , and . Information & Software Technology, 51 (5): 815-831 (2009)A Model Transformation Semantics and Analysis Methodology for SecureUML., , and . MoDELS, volume 4199 of Lecture Notes in Computer Science, page 306-320. Springer, (2006)A Metamodel-Based Approach for Analyzing Security-Design Models., , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 420-435. Springer, (2007)Semantic Issues of OCL: Past, Present, and Future., , and . ECEASST, (2006)SecureUML: A UML-Based Modeling Language for Model-Driven Security., , and . UML, volume 2460 of Lecture Notes in Computer Science, page 426-441. Springer, (2002)The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises., , , , , , , , , and 7 other author(s). I-ESA, page 365-375. Springer, (2006)