Author of the publication

Protection Goals for Privacy Engineering.

, , and . IEEE Symposium on Security and Privacy Workshops, page 159-166. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Best Practice Solutions.. Privacy and Identity Management for Life, Springer, (2011)Identitätsdokumente - eIDs und maschinenlesbare Ausweise., and . Datenschutz und Datensicherheit, 30 (9): 560-564 (2006)Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals.. IDMAN, volume 396 of IFIP Advances in Information and Communication Technology, page 104-106. Springer, (2013)Resilienz - eine neue Anforderung aus der Datenschutz-Grundverordnung., , and . Datenschutz und Datensicherheit, 42 (7): 442-446 (2018)Marrying Transparency Tools with User-Controlled Identity Management.. FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 199-220. Springer, (2007)Datenschutzaspekte von Identitätsmanagementsystemen - Recht und Praxis in Europa., , , and . Datenschutz und Datensicherheit, (2003)Transparenz der Verwaltung auch beim Einsatz von Algorithmen und Künstlicher Intelligenz.. Datenschutz und Datensicherheit, 42 (12): 733 (2018)Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroads., and . ACM Conference on Computer and Communications Security, page 1493-1494. ACM, (2013)E-Rezept-Verfahren: maschinenlesbare Codes schützen!. Datenschutz und Datensicherheit, 46 (10): 604 (2022)Identity Management Systems (IMS): Identification and Comparison Study, , , , and . (2003)