Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PrivacyInsight: The Next Generation Privacy Dashboard., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 135-152. Springer, (2016)Detection and Labeling of Personal Identifiable Information in E-mails., and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 351-358. Springer, (2014)typokurz – Einige wichtige typografische Regeln. (May 2009)Datenschutzziele im Konflikt: Eine Metrik für Unverkettbarkeit als Hilfestellung für den Betroffenen.. GI-Jahrestagung, volume P-259 of LNI, page 455-468. GI, (2016)Liberalisierte Strommärkte, and . Beiträge zur Ordnungstheorie und Ordnungspolitik Mohr Siebeck, Tübingen, (1997)How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective.. IEEE Symposium on Security and Privacy Workshops, page 13-17. IEEE Computer Society, (2013)Umsetzung des datenschutzrechtlichen Auskunftsanspruchs auf Grundlage von Usage-Control und Data-Provenance-Technologien (Implementation of the data protection right of access based on usage control and data provenance technology). Technical University of Munich, Germany, (2018)