Author of the publication

Security policy specification templates for critical infrastructure services in the cloud.

, , and . ICITST, page 61-66. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usable Security Policy Specification., and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2016)Satisfying and Efficient Privacy Settings., and . MuC, Gesellschaft für Informatik e.V., (2018)Generation of Usable Policy Administration Points for Security and Privacy.. Kaiserslautern University of Technology, Germany, (2020)Enabling Users to Specify Correct Privacy Requirements., , and . REFSQ, volume 11412 of Lecture Notes in Computer Science, page 39-54. Springer, (2019)Why Users Ignore Privacy Policies - A Survey and Intention Model for Explaining User Privacy Behavior., , and . HCI (1), volume 10901 of Lecture Notes in Computer Science, page 587-598. Springer, (2018)Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms., and . MuC (Workshopband), Gesellschaft für Informatik e.V., (2019)A Framework for Generating User-and Domain-Tailored Security Policy Editors., , and . RE Workshops, page 56-61. IEEE Computer Society, (2016)Classical simulations of noisy variational quantum circuits, , , , and . (2023)cite arxiv:2306.05400Comment: 13 pages, 3 figures.Data re-uploading with a single qudit., , , and . Quantum Mach. Intell., 5 (2): 1-12 (December 2023)