Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Risk Assessment Model for Business Process Deployment in the Cloud., , , , and . IEEE SCC, page 307-314. IEEE Computer Society, (2014)Adopting an Agent and Event Driven Approach for Enabling Mutual Auditability and Security Transparency in Cloud based Services., , , , and . CLOSER, page 565-572. SciTePress, (2015)Goal-oriented compliance with multiple regulations., , , and . RE, page 73-82. IEEE Computer Society, (2014)On the Use of a Formal R. E. Language - The Generalized Railroad Crossing Problem., , and . RE, page 128-. IEEE Computer Society, (1997)An Improvement of Process Reference Model Design and Validation Using Business Process Management., , , , and . SPICE, volume 349 of Communications in Computer and Information Science, page 73-83. Springer, (2013)Towards a Formal Agent-Oriented Requirements Definition of Manufacturing Systems., , , , and . DIISM, volume B-14 of IFIP Transactions, page 141-158. North-Holland, (1993)Supporting the Analyst when Reasoning on Requirements Specifications for Real-Time and Distributed Systems., , and . ISORC, page 215-. IEEE Computer Society, (1998)On the Use of Ray-tracing for Viewpoint Interpolation in Panoramic Imagery., , , and . CRV, page 200-207. IEEE Computer Society, (2009)A framework for dealing with and specifying security requirements in information systems., and . SEC, volume 54 of IFIP Conference Proceedings, page 88-99. Chapman & Hall, (1996)The Discrete Fourier Transform Over Finite Rings with Application to Fast Convolution., and . IEEE Trans. Computers, 27 (7): 586-593 (1978)