Author of the publication

Towards Adaptive Security for Ubiquitous Computing Systems.

, , and . Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises, IGI Global, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , and . GI-Jahrestagung, volume P-307 of LNI, page 111-113. GI, (2020)Control as a Means towards Accountable Services in the Cloud., , and . Comput. Syst. Sci. Eng., (2013)Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152)., , , and . Dagstuhl Reports, 8 (4): 20-31 (2018)Towards Security Certification Schemas for the Internet of Services., , , and . NTMS, page 1-5. IEEE, (2012)Panel on granularity in access control., , , , , and . SACMAT, page 85-86. ACM, (2013)A Formal Security Model for Microprocessor Hardware., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 718-737. Springer, (1999)Threat Scenarios as a Means to Formally Develop Secure Systems.. ESORICS, volume 1146 of Lecture Notes in Computer Science, page 242-265. Springer, (1996)Towards Accountable Services in the Cloud., and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 470-474. Springer, (2012)Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach., , , , , and . Wirtschaftsinf., 50 (5): 383-391 (2008)Threat Scenarios as a Means to Formally Develop Secure Systems.. J. Comput. Secur., 5 (1): 31-68 (1997)