Author of the publication

Formal Modelling and Analysis of Socio-Technical Systems.

, , and . Semantics, Logics, and Calculi, volume 9560 of Lecture Notes in Computer Science, page 54-73. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction., , and . STAIRS, volume 222 of Frontiers in Artificial Intelligence and Applications, page 251-263. IOS Press, (2010)Modular Control Flow Analysis for Libraries.. SAS, volume 2477 of Lecture Notes in Computer Science, page 165-179. Springer, (2002)Attack Tree Analysis for Insider Threats on the IoT Using Isabelle., , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 234-246. Springer, (2016)Security audits of multi-tier virtual infrastructures in public infrastructure clouds., , , , and . CCSW, page 93-102. ACM, (2010)08302 Summary - Countering Insider Threats., , , and . Countering Insider Threats, volume 08302 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)05141 Summary - Power-aware Computing Systems., , , and . Power-aware Computing Systems, volume 05141 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2005)Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores., , , , , , , and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 103-119. Springer, (2022)Fluid information systems., and . NSPW, page 125-132. ACM, (2009)Guaranteeing Privacy-Observing Data Exchange.. ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 958-969. (2016)A move in the security measurement stalemate: elo-style ratings to quantify vulnerability., , and . NSPW, page 1-14. ACM, (2012)