Author of the publication

Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications.

, , , and . NordSec, volume 7127 of Lecture Notes in Computer Science, page 187-192. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Access-Control Framework for WS-BPEL., , and . Int. J. Web Serv. Res., 5 (3): 20-43 (2008)Group-Based Negotiations in P2P Systems., , , , and . IEEE Trans. Parallel Distributed Syst., 21 (10): 1473-1486 (2010)Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements., , , , , and . ESEM, page 24:1-24:8. ACM, (2014)Security for Web Services and Service-Oriented Architectures., , , and . Springer, (2010)Formal Modelling of Data Integration Systems Security Policies., , , , and . Data Sci. Eng., 1 (3): 139-148 (2016)Access control in Internet-of-Things: A survey., , , and . J. Netw. Comput. Appl., (2019)The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals., , , , and . REFSQ, volume 9013 of Lecture Notes in Computer Science, page 98-114. Springer, (2015)Collective privacy management in social networks., , and . WWW, page 521-530. ACM, (2009)An experiment on comparing textual vs. visual industrial methods for security risk assessment., , , and . EmpiRE, page 28-35. IEEE Computer Society, (2014)Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain., , , , and . EmpiRE, page 49-56. IEEE Computer Society, (2012)