Author of the publication

Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings.

, , , , and . MoDELS, page 23-33. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Modelsn, , , , and . Journal of Systems and Software, (2018)Ontology-driven evolution of software security., , , and . Data Knowl. Eng., (2021)Information security management and the human aspect in organizations., and . Inf. Comput. Secur., 25 (5): 494-534 (2017)Developing Secure Systems with UMLsec - From Business Processes to Implementation.. VIS, page 151-161. Vieweg+Teubner Verlag, (2001)Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.. AVoCS, volume 250 of Electronic Notes in Theoretical Computer Science, page 123-136. Elsevier, (2007)Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain., , , , and . ICBC, page 1-5. IEEE, (2022)Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings., , , , and . MoDELS, page 23-33. IEEE, (2019)Privacy-enhanced system design modeling based on privacy features., , and . SAC, page 1492-1499. ACM, (2019)Requirements document relations., , and . Softw. Syst. Model., 21 (6): 1-37 (2022)Specifying model changes with UMLchange to support security verification of potential evolution., , , and . Comput. Stand. Interfaces, 36 (4): 776-791 (2014)