From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Symbolic Privacy Analysis through Linkability and Detectability., , и . IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 1-16. Springer, (2013)Flow-Based Reputation: More than Just Ranking., , и . Int. J. Inf. Technol. Decis. Mak., 11 (3): 551-578 (2012)Poster: protecting information in systems of systems., , и . ACM Conference on Computer and Communications Security, стр. 865-868. ACM, (2011)Formal analysis of XACML policies using SMT., , , и . Comput. Secur., (2017)How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns., , , , и . Artif. Intell. Law, 17 (1): 1-30 (2009)Privacy Analysis of User Behavior Using Alignments., , и . it Inf. Technol., 55 (6): 255-260 (2013)A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities., , и . Requir. Eng., 15 (1): 41-62 (2010)Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management., , и . CoRR, (2012)Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology., , и . Advances in Intelligent Information Systems, том 265 из Studies in Computational Intelligence, Springer, (2010)Flow-based reputation with uncertainty: evidence-based subjective logic., , и . Int. J. Inf. Sec., 15 (4): 381-402 (2016)