Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework to support alignment of secure software engineering with legal regulations., , and . Softw. Syst. Model., 10 (3): 369-394 (2011)Cyber-attack path discovery in a dynamic supply chain maritime risk management system., , and . Comput. Stand. Interfaces, (2018)Cyber Security Resilience in Business Informatics: An Exploratory Paper., , and . BIR, volume 398 of Lecture Notes in Business Information Processing, page 53-66. Springer, (2020)An architectural description language for secure Multi-Agent Systems., , , and . Web Intell. Agent Syst., 8 (1): 99-122 (2010)Apparatus: A framework for security analysis in internet of things systems., , , and . Ad Hoc Networks, (2019)Towards the Derivation of Secure Business Process Designs., , and . ER Workshops, volume 9382 of Lecture Notes in Computer Science, page 248-258. Springer, (2015)Supporting Secure Business Process Design via Security Process Patterns., , and . BPMDS/EMMSAD@CAiSE, volume 287 of Lecture Notes in Business Information Processing, page 19-33. Springer, (2017)Selecting a Cloud Service Provider in the age of cybercrime., and . Comput. Secur., (2013)Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach., , and . Domain-Specific Conceptual Modeling, Springer, (2016)Security-Aware Elasticity for NoSQL Databases., , , and . MEDI, volume 9344 of Lecture Notes in Computer Science, page 181-197. Springer, (2015)