From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Exploratory Study on Risk Estimation in Risk-Based Testing Approaches., , , и . SWQD, том 200 из Lecture Notes in Business Information Processing, стр. 32-43. Springer, (2015)Modeling Authorization in an SOA based Application Scenario., , и . IASTED Conf. on Software Engineering, стр. 79-84. IASTED/ACTA Press, (2006)A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together., , и . ICEIS (3), стр. 128-135. (2005)Model-based regression testing by OCL., , , , и . Int. J. Softw. Tools Technol. Transf., 19 (1): 115-131 (2017)Living Models - Ten Principles for Change-Driven Software Engineering., , , , , и . Int. J. Softw. Informatics, 5 (1-2): 267-290 (2011)ChronoSphere: a graph-based EMF model repository for IT landscape models., , , , , и . Softw. Syst. Model., 18 (6): 3487-3526 (2019)An analysis and classification of public information security data sources used in research and practice., , , и . Comput. Secur., (2019)Is business domain language support beneficial for creating test case specifications: A controlled experiment., , и . Inf. Softw. Technol., (2016)Meeting EHR Security Requirements: SeAAS Approach., , , , и . EFMI-STC, том 155 из Studies in Health Technology and Informatics, стр. 85-91. IOS Press, (2010)Security im Produkt-Lifecycle -- Lästige Pflicht oder Chance?, , и . Informatik-Spektrum, 39 (5): 353--361 (октября 2016)