Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using the Semantic Web to Generate Trust Indicators.. ISSE, page 106-119. Springer, (2014)A pan-European Framework on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market., , , , , , , , , and . ISSE, page 173-195. Springer, (2015)Worldbank's Secure eID Toolkit for Africa., and . ISSE, page 33-44. Springer, (2013)The security of mass transport ticketing systems., , and . ISSE, page 347-356. Vieweg+Teubner, (2008)e-Identity - Monetization and Interoperability.. ISSE, page 54-63. Springer, (2012)A Comparison of Trust Models.. ISSE, page 206-215. Springer, (2015)Improving Interpretations of Trust Claims.. IFIPTM, volume 473 of IFIP Advances in Information and Communication Technology, page 164-173. Springer, (2016)Identity and Access Control - Demonstrating Compliance., and . ISSE, page 186-195. Vieweg, (2006)Automating the Evaluation of Trustworthiness., and . TrustBus, volume 12927 of Lecture Notes in Computer Science, page 18-31. Springer, (2021)The Business Perspective on Roles Including Root Causes of Implementation Problems and Proven Ways to Overcome them.. ISSE, page 157-165. Vieweg+Teubner, (2007)