Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An experiment on comparing textual vs. visual industrial methods for security risk assessment., , , and . EmpiRE, page 28-35. IEEE Computer Society, (2014)Formal Modelling of Data Integration Systems Security Policies., , , , and . Data Science and Engineering, 1 (3): 139-148 (2016)An Access-Control Framework for WS-BPEL., , and . Int. J. Web Service Res., 5 (3): 20-43 (2008)Group-Based Negotiations in P2P Systems., , , , and . IEEE Trans. Parallel Distrib. Syst., 21 (10): 1473-1486 (2010)Security for Web Services and Service-Oriented Architectures., , , and . Springer, (2010)The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals., , , , and . REFSQ, volume 9013 of Lecture Notes in Computer Science, page 98-114. Springer, (2015)Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements., , , , , and . ESEM, page 24:1-24:8. ACM, (2014)Collective privacy management in social networks., , and . WWW, page 521-530. ACM, (2009)Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain., , , , and . EmpiRE, page 49-56. IEEE Computer Society, (2012)Privacy-preserving Digital Identity Management for Cloud Computing., , , and . IEEE Data Eng. Bull., 32 (1): 21-27 (2009)