Author of the publication

Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform.

, , , , , , , , and . RE, page 256-265. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)Building Secure Systems Using a Security Engineering Process and Security Building Blocks., , and . Software Engineering (Workshops), volume P-215 of LNI, page 529-544. GI, (2013)A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components., , , , , and . PDP, page 261-268. IEEE, (2012)Secure Engineering and Modelling of a Metering Devices System., , , and . ARES, page 418-427. IEEE Computer Society, (2013)A Lifecycle for Data Sharing Agreements: How it Works Out., , , , , , and . APF, volume 9857 of Lecture Notes in Computer Science, page 3-20. Springer, (2016)Emergency Systems Modelling using a Security Engineering Process., , , and . SIMULTECH, page 117-124. SciTePress, (2013)A Security Modelling Framework for Systems of Embedded Components., and . HASE, page 176-177. IEEE Computer Society, (2011)Security knowledge representation artifacts for creating secure IT systems., , , and . Comput. Secur., (2017)The Architecture of VisiOn Privacy Platform., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)