Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Process Modeling as a Basis for Auditing Information Privacy., and . BPSC, volume P-147 of LNI, page 231-232. GI, (2009)Tackling cloud compliance through information flow control.. University of Passau, Germany, (2016)On Location-determined Cloud Management for Legally Compliant Outsourcing., , , , and . ISSE, page 61-73. Springer, (2015)Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions., , , and . SERVICES, page 645-652. IEEE Computer Society, (2010)Outsourcing im Pflegedienst - Herausforderungen und Lösungen in der Praxis., , and . Datenschutz und Datensicherheit, 35 (12): 870-874 (2011)SOA and Web Services: New Technologies, New Standards - New Attacks., , , and . ECOWS, page 35-44. IEEE Computer Society, (2007)Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns., , , , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 120-129. Springer, (2010)A survey of attacks on web services., , and . Comput. Sci. Res. Dev., 24 (4): 185-197 (2009)Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec.. WOSIS, page 3-12. INSTICC Press, (2008)ASPECTS: Agile spectrum security., , , , , , , , , and . NGI, page 1-2. IEEE, (2011)