Author of the publication

Observations on the role life-cycle in the context of enterprise security management.

, , , and . SACMAT, page 43-51. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles., and . SAC, page 1380-1384. ACM, (2004)Security and safety of assets in business processes., , and . SAC, page 1667-1673. ACM, (2012)A Framework for Evidence Lifecycle Management.. WISE Workshops, volume 4832 of Lecture Notes in Computer Science, page 191-200. Springer, (2007)Ontology-Based Secure XML Content Distribution., , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 294-306. Springer, (2009)A lightweight approach to specification and analysis of role-based access control extensions., and . SACMAT, page 13-22. ACM, (2002)Öpen Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat Modeling., and . ICETE (2), page 417-424. SciTePress, (2019)A Secure Comparison Technique for Tree Structured Data., , and . ICIW, page 304-309. IEEE Computer Society, (2009)Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data., , , , , , , and . Sicherheit, volume P-228 of LNI, page 115-125. GI, (2014)Project OVVL - Threat Modeling Support for the entire secure development lifecycle.. Sicherheit, volume P-301 of LNI, page 121-124. Gesellschaft für Informatik e.V., (2020)Automating architectural security analysis., and . SACMAT, page 131-132. ACM, (2012)