Author of the publication

Trust beyond computation alone: human aspects of trust in blockchain technologies.

, and . ICSE-SEIS, page 21-30. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

μ-DSU: A Micro-Language Based Approach to Dynamic Software Updating., , , and . Comput. Lang. Syst. Struct., (2018)A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks., , and . APF, volume 8319 of Lecture Notes in Computer Science, page 187-202. Springer, (2012)It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe., , , , , , and . EuroS&P, page 423-438. IEEE, (2016)On to Aspect Persistence.. GCSE, volume 2177 of Lecture Notes in Computer Science, page 26-36. Springer, (2000)EA-tracer: identifying traceability links between code aspects and early aspects., , , and . SAC, page 1035-1042. ACM, (2012)JAT: A Test Automation Framework for Multi-Agent Systems., , , , , and . ICSM, page 425-434. IEEE Computer Society, (2007)Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers., , , , , and . Softw. Pract. Exp., 50 (3): 275-298 (2020)Special issue on Early aspects: aspect-oriented requirements engineering and architecture design., , and . IEE Proc. Softw., 151 (4): 153-156 (2004)CyBOK: The Cyber Security Body of Knowledge, , , , and . , 1.0. The National Cyber Security Centre, UK, (October 2019)When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?, , and . Big Data Soc., 9 (1): 205395172211083 (January 2022)