Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise Architecture Analysis - An Information System Evaluation Approach., , and . Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 3 (2): 31-53 (2008)A Survey on Blockchain Interoperability: Past, Present, and Future Trends., , , and . CoRR, (2020)Adaptive Access Control Modes Enforcement in Organizations., , and . CENTERIS (2), volume 110 of Communications in Computer and Information Science, page 283-294. Springer, (2010)SSIBAC: Self-Sovereign Identity Based Access Control., , , , , and . TrustCom, page 1935-1943. IEEE, (2020)Methodologies of Support to the Execution of Risk Management., , , , and . OTM Workshops, volume 6428 of Lecture Notes in Computer Science, page 12-13. Springer, (2010)The Role of Enterprise Architecture Management to Govern Microservice Architecture Adoption., , and . Forum/Posters/CIAO!DC@EEWC, volume 2408 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)e-Business Reference Modelling Framework for SMEs: An Enterprise Architecture based Approach., and . ICEIS (2), page 693-700. SCITEPRESS, (2020)Reference Architecture for Project, Program and Portfolio Governance., , and . ICEIS (Revised Selected Papers), volume 417 of Lecture Notes in Business Information Processing, page 804-832. Springer, (2020)Enterprise Architecture Patterns for GDPR Compliance., , , and . ICEIS (2), page 715-725. SCITEPRESS, (2021)Architecture Principles Compliance Analysis., , and . ICEIS (3), page 328-334. SciTePress, (2014)