Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Methods as a Link between Software Code and Legal Rules.. SEFM, volume 7041 of Lecture Notes in Computer Science, page 3-18. Springer, (2011)Analysis of Privacy Policies to Enhance Informed Consent., and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 177-198. Springer, (2019)Higher-Order Multiset Programming.. Specification of Parallel Algorithms, volume 18 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 179-200. DIMACS/AMS, (1994)Software Architecture Styles as Graph Grammars.. SIGSOFT FSE, page 15-23. ACM, (1996)From the Protection of Data to the Protection of Individuals: Extending the Application of Non-discrimination Principles., and . European Data Protection, Springer, (2012)Position Paper: Analyzing the Impacts of Facial Recognition., and . APF, volume 12121 of Lecture Notes in Computer Science, page 43-57. Springer, (2020)PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology., , , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 151-158. IEEE Computer Society, (2015)Algorithmic Decision Systems in the Health and Justice Sectors: Certification and Explanations for Algorithms in European and French Law., and . Eur. J. Law Technol., (2018)Describing Software Architecture Styles Using Graph Grammars.. IEEE Trans. Software Eng., 24 (7): 521-533 (1998)Body-worn cameras for police accountability: Opportunities and risks., , and . Comput. Law Secur. Rev., 31 (6): 749-762 (2015)