Author of the publication

Interaktive Portfolioauswahl im IT-Servicemanagement.

, and . HMD - Praxis Wirtschaftsinform., (2008)subsequently labeled as volume 45 number 6 by Springer.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of downlink beam switching for UMTS FDD in the presence of angular spread., , and . ICC, page 851-855. IEEE, (2002)Data Models for the Pseudonymization of DICOM Data., , and . HICSS, page 1-11. IEEE Computer Society, (2011)Model-Driven Development Meets Security: An Evaluation of Current Approaches., , and . HICSS, page 1-9. IEEE Computer Society, (2011)Objective Types for the Valuation of Secure Business Processes., and . ACIS-ICIS, page 231-236. IEEE Computer Society, (2008)A process model for RFID based Business Process Analysis., , , , and . APSCC, page 478-483. IEEE, (2009)Pseudonymization for improving the Privacy in E-Health Applications., , , and . HICSS, page 255. IEEE Computer Society, (2008)Combining Measures of Signal Complexity and Machine Learning for Time Series Analyis: A Review., and . Entropy, 23 (12): 1672 (2021)Information Security Risk Management: In Which Security Solutions Is It Worth Investing?, , and . CAIS, (2011)On the Security of Outsourced and Untrusted Databases., and . ACIS-ICIS, page 125-132. IEEE Computer Society, (2010)Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption., and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 186-197. Springer, (2011)