Author of the publication

An Industrial Experience of Using an Incremental Model of Technology Transfer of Formal Development Methods.

, , , , , , and . Diffusion, Transfer and Implementation of Information Technology, volume A-45 of IFIP Transactions, page 289-308. Elsevier, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Experience of Educational Innovation for the Collaborative Learning in Software Engineering., and . Int. J. Emerg. Technol. Learn., 6 (2): 26-32 (2011)A Personal Data Framework for Exchanging Knowledge about Users in New Financial Services., , and . FINREC, volume 1349 of CEUR Workshop Proceedings, page 19-26. CEUR-WS.org, (2015)Engineering privacy requirements valuable lessons from another realm., , and . ESPRE, page 19-24. IEEE Computer Society, (2014)Self-service Privacy: User-Centric Privacy for Network-Centric Identity., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 17-31. Springer, (2010)Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects., , , , , , , , , and . SN Comput. Sci., 1 (4): 217 (2020)An Industrial Experience of Using an Incremental Model of Technology Transfer of Formal Development Methods., , , , , , and . Diffusion, Transfer and Implementation of Information Technology, volume A-45 of IFIP Transactions, page 289-308. Elsevier, (1993)A user-centric approach to service creation and delivery over next generation networks., , , and . Comput. Commun., 34 (2): 209-222 (2011)An Industrial Experience on LOTOS-Based Prototyping for Switching Systems Design., , , , and . FME, volume 670 of Lecture Notes in Computer Science, page 83-92. Springer, (1993)Evolving a Core Banking Enterprise Architecture - Leveraging Business Events Exploitation., , and . ICEIS (3), page 181-189. SciTePress, (2014)Privacy and Data Protection in a User-Centric Business Model for Telecommunications Services., , and . FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 447-461. Springer, (2007)