Author of the publication

PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology.

, , , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 151-158. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARIES: Reliable European Identity Ecosystem., , , , and . ERCIM News, (2017)PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology., , , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 151-158. IEEE Computer Society, (2015)Co-creating Security-and-Privacy-by-Design Systems., , , , , and . ARES, page 768-775. IEEE Computer Society, (2016)Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator., , , , , and . ARES, page 89:1-89:7. ACM, (2017)Characterization of JWST science performance from commissioning, , , , , , , , , and 601 other author(s). (2022)cite arxiv:2207.05632Comment: 60 pages, 30 figures.How dark the sky: the JWST backgrounds, , , , , , , , , and 10 other author(s). (2022)cite arxiv:2211.09890Comment: Submitted to the "JWST Overview" special issue of PASP.Outflows and Bubbles in Taurus: Star-formation Feedback Sufficient to Maintain Turbulence, , , , , , , , and . (Jul 23, 2015)Exploring the evolution of star formation and dwarf galaxy properties with JWST/MIRI serendipitous spectroscopic surveys, , , , , , , , , and 4 other author(s). (2017)cite arxiv:1701.07239Comment: 31 pages, 12 figures, accepted for publication in ApJ.