From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A technical architecture for enforcing usage control requirements in service-oriented architectures., , , , , , и . SWS, стр. 18-25. ACM, (2007)Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis., и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 252-259. Springer, (2015)An Exploratory Study on Risk Estimation in Risk-Based Testing Approaches., , , и . SWQD, том 200 из Lecture Notes in Business Information Processing, стр. 32-43. Springer, (2015)Meeting EHR Security Requirements: SeAAS Approach., , , , и . EFMI-STC, том 155 из Studies in Health Technology and Informatics, стр. 85-91. IOS Press, (2010)Evolution of Security Requirements Tests for Service-Centric Systems., , и . ESSoS, том 6542 из Lecture Notes in Computer Science, стр. 181-194. Springer, (2011)Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice., , , и . WISCS@CCS, стр. 65-70. ACM, (2016)An analysis and classification of public information security data sources used in research and practice., , , и . Comput. Secur., (2019)Modeling Authorization in an SOA based Application Scenario., , и . IASTED Conf. on Software Engineering, стр. 79-84. IASTED/ACTA Press, (2006)A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together., , и . ICEIS (3), стр. 128-135. (2005)Integration der Open Business Intelligence-Suite Pentaho in ein modellgetriebenes Analyse-Framework am Beispiel des Strategic Alignment., , и . Data Warehousing, том P-90 из LNI, стр. 125-140. GI, (2006)