Author of the publication

Sustainable Security & Safety: Challenges and Opportunities.

, , , , , , , , and . CERTS, volume 73 of OASIcs, page 4:1-4:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reactively Simulatable Certified Mail., , and . IACR Cryptology ePrint Archive, (2006)Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data., , and . Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, page 69-84. Springer, (2002)A Toolkit for Managing Enterprise Privacy Policies., , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 162-180. Springer, (2003)Service-oriented Assurance - Comprehensive Security by Explicit Assurances., , , and . Quality of Protection, volume 23 of Advances in Information Security, Springer, (2006)Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep., , and . POLICY, page 135-146. IEEE Computer Society, (2003)Towards automated provisioning of secure virtualized networks., , , and . ACM Conference on Computer and Communications Security, page 235-245. ACM, (2007)E-P3P privacy policies and privacy authorization., , , and . WPES, page 103-109. ACM, (2002)The SEMPER Framework for Secure Electronic Commerce., , and . Wirtschaftsinformatik, page 11. Physica-Verlag, (1999)Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks., , , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 76-93. Springer, (2014)A Privacy Policy Model for Enterprises., and . CSFW, page 271-281. IEEE Computer Society, (2002)