Author of the publication

How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach.

, , , , and . ICAIL, page 149-153. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach., , , , and . ICAIL, page 149-153. ACM, (2007)S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System., , , , and . STM@IFIPTM, volume 244 of Electronic Notes in Theoretical Computer Science, page 27-39. Elsevier, (2008)Achieving Socio-technical Confidentiality Using Security Pattern in Smart Homes., , , and . FGCN (2), page 447-452. IEEE Computer Society, (2008)978-0-7695-3431-2.A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application., , , and . Trans. Comput. Sci., (2010)How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns., , , , and . Artif. Intell. Law, 17 (1): 1-30 (2009)An Ontological Interface for Software Developers to Select Security Patterns., , , and . DEXA Workshops, page 297-301. IEEE Computer Society, (2008)Consistency checking of role assignments in inter-organizational collaboration., , and . SPRINGL, page 82-88. ACM, (2008)SERENITY in e-Business and Smart Item Scenarios., , , and . Security and Dependability for Ambient Intelligence, volume 45 of Advances in Information Security, Springer, (2009)Security Patterns for Capturing Encryption-Based Access Control to Sensor Data., , , and . SECURWARE, page 62-67. IEEE Computer Society, (2008)