Author of the publication

External Insider Threat: A Real Security Challenge in Enterprise Value Webs.

, , , and . ARES, page 446-453. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements Engineering: Problem Analysis and Solution Specification (Extended Abstract).. ICWE, volume 3140 of Lecture Notes in Computer Science, page 13-16. Springer, (2004)Risk-Driven Conceptual Modeling of Outsourcing Decisions., , and . ER, volume 3288 of Lecture Notes in Computer Science, page 709-723. Springer, (2004)An Execution Algorithm for UML Activity Graphs., and . UML, volume 2185 of Lecture Notes in Computer Science, page 47-61. Springer, (2001)Roles and Dynamic Subclasses: A Modal Logic Approach., , and . ECOOP, volume 821 of Lecture Notes in Computer Science, page 32-59. Springer, (1994)Some Finite-Graph Models for Process Algebra., and . CONCUR, volume 527 of Lecture Notes in Computer Science, page 495-509. Springer, (1991)A Real-Time Execution Semantics for UML Activity Diagrams., and . FASE, volume 2029 of Lecture Notes in Computer Science, page 76-90. Springer, (2001)Aligning Application Architecture to the Business Context., , , and . CAiSE, volume 2681 of Lecture Notes in Computer Science, page 209-225. Springer, (2003)Integrating Semi-formal and Formal Requirements., , and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 19-32. Springer, (1997)Actor-Oriented System Specification with Dynamic Logic., and . TAPSOFT, Vol.2, volume 494 of Lecture Notes in Computer Science, page 337-357. Springer, (1991)Learning from Accidents: A Systematic Review of Accident Analysis Methods and Models., , , and . IJISCRAM, 10 (3): 42-62 (2018)