Author of the publication

Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law.

, , , and . A4Cloud, volume 8937 of Lecture Notes in Computer Science, page 248-272. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols., , and . Journal of Automata, Languages and Combinatorics, 11 (4): 345-374 (2006)Fame for sale: Efficient detection of fake Twitter followers., , , , and . Decis. Support Syst., (2015)A Matter of Words: NLP for Quality Evaluation of Wikipedia Medical Articles., , and . ICWE, volume 9671 of Lecture Notes in Computer Science, page 448-456. Springer, (2016)Experimental Measures of News Personalization in Google News., , , and . ICWE Workshops, volume 9881 of Lecture Notes in Computer Science, page 93-104. (2016)Automated Analysis of Some Security Mechanisms of SCEP., , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 414-427. Springer, (2002)Fine Grained Access Control with Trust and Reputation Management for Globus., , , , and . OTM Conferences (2), volume 4804 of Lecture Notes in Computer Science, page 1505-1515. Springer, (2007)Discriminating Between the Wheat and the Chaff in Online Recommendation Systems., , , and . ERCIM News, (2014)Formal Modelling and Verification in Service-Oriented Computing., , , , and . ERCIM News, (2007)Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study., and . From Software Engineering to Formal Methods and Tools, and Back, volume 11865 of Lecture Notes in Computer Science, page 502-518. Springer, (2019)Automated Synthesis and Ranking of Secure BPMN Orchestrators., , , , , and . Int. J. Secur. Softw. Eng., 5 (2): 44-64 (2014)