Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A methodology for security assurance-driven system development., , and . Requir. Eng., 16 (1): 55-73 (2011)High-level specification of security systems., , , and . GLOBECOM, page 1506-1510. IEEE, (2003)From Higher-Order pi-Calculus to pi-Calculus in the Presence of Static Operators., and . CONCUR, volume 1466 of Lecture Notes in Computer Science, page 115-130. Springer, (1998)Towards a Business Process-Driven Framework for Security Engineering with the UML., , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 381-395. Springer, (2003)Flexible Federation of Cloud Providers: The EUBrazil Cloud Connect Approach., , , , , , , and . AINA Workshops, page 165-170. IEEE Computer Society, (2016)Specification and design of advanced authentication and authorization services., , , , and . Comput. Stand. Interfaces, 27 (5): 467-478 (2005)Security and Privacy Preserving Data Aggregation in Cloud Computing., , , and . CoRR, (2019)Dynamic Channel Screening in the Higher Order pi-Calculus., and . F-WAN@ICALP, volume 66 of Electronic Notes in Theoretical Computer Science, page 170-184. Elsevier, (2002)Security assurance during the software development cycle., , and . CompSysTech, page 20. ACM, (2009)How to Specify Security Services: A Practical Approach., , , and . Communications and Multimedia Security, volume 2828 of Lecture Notes in Computer Science, page 158-171. Springer, (2003)