Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using an Assurance Case Framework to Develop Security Strategy and Policies., , , and . SAFECOMP Workshops, volume 10489 of Lecture Notes in Computer Science, page 27-28. Springer, (2017)Tool Support for Assurance Case Building Blocks - Providing a Helping Hand with CAE., , and . SAFECOMP Workshops, volume 9338 of Lecture Notes in Computer Science, page 62-71. Springer, (2015)Using Structured Assurance Case Approach to Analyse Security and Reliability of Critical Infrastructures., , , and . SAFECOMP Workshops, volume 9338 of Lecture Notes in Computer Science, page 345-354. Springer, (2015)Building Blocks for Assurance Cases., and . ISSRE Workshops, page 186-191. IEEE Computer Society, (2014)Security-Informed Safety., and . Computer, 49 (6): 98-102 (2016)Security-Informed Safety: If It's Not Secure, It's Not Safe., , and . SERENE, volume 8166 of Lecture Notes in Computer Science, page 17-32. Springer, (2013)Security-Informed Safety Case Approach to Analysing MILS Systems., , , and . MILS@HiPEAC, Zenodo, (2015)Is Chocolate Good for You - or, Is the Cloud Secure?, and . Computer, 50 (8): 74-78 (2017)