Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base., , and . ARES, page 698-703. IEEE Computer Society, (2011)Enhancing Cloud Security with Context-aware Usage Control Policies., , and . GI-Jahrestagung, volume P-232 of LNI, page 211-222. GI, (2014)Progress report on the experimental evaluation of security inspection guidance., , , and . ESEM, page 485-489. IEEE Computer Society, (2009)Low-cost, customized and flexible SRAM MBIST engine., , , and . DDECS, page 382-387. IEEE Computer Society, (2010)Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments., and . MobiSec, volume 107 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 69-80. Springer, (2012)Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project., , , and . ARES, page 531-536. IEEE Computer Society, (2010)Indicator-based architecture-level security evaluation in a service-oriented environment., , , and . ECSA Companion Volume, page 221-228. ACM, (2010)Security policy specification templates for critical infrastructure services in the cloud., , and . ICITST, page 61-66. IEEE, (2014)Efficient Error-Correcting Geocoding, , , , and . CoRR, (2011)Phishing in the Wireless: Implementation and Analysis., , , , and . SEC, volume 232 of IFIP, page 145-156. Springer, (2007)