Author of the publication

Die teilautomatisierte Verifizierung der getrennten Verarbeitung in der Cloud.

, , , and . Datenschutz und Datensicherheit, 40 (5): 305-309 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging context in user-centric entity detection systems., , and . CIKM, page 691-700. ACM, (2007)Die Kontrolle des Umsetzungsgrades des Zugangs- und Zugriffsschutzes., , , and . Datenschutz und Datensicherheit, 40 (4): 239-243 (2016)A scalable machine-learning approach for semi-structured named entity recognition., and . WWW, page 461-470. ACM, (2010)Designing a distributed access control processor for network services on the Web.. XML Security, page 36-52. ACM, (2002)Web-Based Searching and Browsing of Multimedia Data., , , , and . IEEE International Conference on Multimedia and Expo (III), page 1717-1720. IEEE Computer Society, (2000)Contextual Ranking of Keywords Using Click Data., , and . ICDE, page 457-468. IEEE Computer Society, (2009)IT Security Investment and Costing Emphasizing Benefits in Times of Limited Budgets., and . ISSE, page 37-47. Springer, (2012)A Practical Approach for an IT Security Risk Analysis in Hospitals., and . ISSE, page 217-226. Springer, (2013)Die teilautomatisierte Verifizierung der getrennten Verarbeitung in der Cloud., , , and . Datenschutz und Datensicherheit, 40 (5): 305-309 (2016)Werkzeuge zur Messung der datenschutzkonformen Einhaltung des Verarbeitungsstandorts in der Cloud., , , and . GI-Jahrestagung, volume P-246 of LNI, page 525-537. GI, (2015)