Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , and . GI-Jahrestagung, volume P-307 of LNI, page 111-113. GI, (2020)Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152)., , , and . Dagstuhl Reports, 8 (4): 20-31 (2018)Towards Security Certification Schemas for the Internet of Services., , , and . NTMS, page 1-5. IEEE, (2012)Control as a Means towards Accountable Services in the Cloud., , and . Comput. Syst. Sci. Eng., (2013)A Formal Security Model for Microprocessor Hardware., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 718-737. Springer, (1999)Panel on granularity in access control., , , , , and . SACMAT, page 85-86. ACM, (2013)Towards Accountable Services in the Cloud., and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 470-474. Springer, (2012)Threat Scenarios as a Means to Formally Develop Secure Systems.. ESORICS, volume 1146 of Lecture Notes in Computer Science, page 242-265. Springer, (1996)ASSERT4SOA: Toward Security Certification of Service-Oriented Applications., , , , , , , , , and . OTM Workshops, volume 6428 of Lecture Notes in Computer Science, page 38-40. Springer, (2010)Preface., , and . STM@ESORICS, volume 197 of Electronic Notes in Theoretical Computer Science, page 1-2. Elsevier, (2007)