Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Security Certification Schemas for the Internet of Services., , , and . NTMS, page 1-5. IEEE, (2012)SAFAX - An Extensible Authorization Service for Cloud Environments., , , and . Frontiers ICT, (2015)A Quantitative Analysis of Common Criteria Certification Practice., , and . TrustBus, volume 8647 of Lecture Notes in Computer Science, page 132-143. Springer, (2014)Security validation tool for business processes., , , and . SACMAT, page 143-144. ACM, (2011)Security Certification for Service-Based Business Ecosystems., , , , , and . Comput. J., 58 (4): 709-723 (2015)A Data-Centric Approach for Privacy-Aware Business Process Enablement., and . IWEI, volume 76 of Lecture Notes in Business Information Processing, page 191-203. Springer, (2011)Towards a Trustworthy Service Marketplace for the Future Internet., , , , , and . Future Internet Assembly, volume 7281 of Lecture Notes in Computer Science, page 105-116. Springer, (2012)Security Assurance of Services through Digital Security Certificates., , , and . ICWS, page 539-546. IEEE Computer Society, (2013)Ensuring trust in service consumption through security certification., , and . QASBA, page 40-43. ACM, (2011)Bringing Common Criteria Certification to Web Services., , and . SERVICES, page 98-102. IEEE Computer Society, (2013)