Author of the publication

Secure development tools and techniques need more research that will increase their impact and effectiveness in practice.

, and . Commun. ACM, 63 (5): 39-41 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231)., , , and . Dagstuhl Reports, 9 (6): 1-25 (2019)The Buffet Overflow Café., , , , and . IEEE Secur. Priv., 20 (4): 4-7 (2022)Privacy Engineering for Digital Rights Management Systems., , , and . Digital Rights Management Workshop, volume 2320 of Lecture Notes in Computer Science, page 76-105. Springer, (2001)Control-Alt-Hack™: a card game for computer security outreach and education (abstract only)., , and . SIGCSE, page 729. ACM, (2013)Contextualisation of Data Flow Diagrams for Security Analysis., , , , and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 186-197. Springer, (2020)Experiences Threat Modeling at Microsoft.. MODSEC@MoDELS, volume 413 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)Observed weaknesses in security dynamics' client/server protocol.. Network Threats, volume 38 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 41-54. DIMACS/AMS, (1996)How not to design a privacy system: reflections on the process behind the Freedom product., and . CFP, page 85-87. ACM, (2000)Uncover Security Design Flaws Using The STRIDE Approach, , , and . MSDN Magazine, (November 2006)What Price Privacy? - and why identity theft is about neither identity nor theft., and . Economics of Information Security, volume 12 of Advances in Information Security, Springer, (2004)