Author of the publication

Special section on Software Engineering for Secure Systems (SESS '07).

, and . Inf. Softw. Technol., 51 (7): 1150-1151 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing data quality by a cross-layer approach., and . ICUMT, page 1-8. IEEE, (2009)An Experience on Verification of Aspect Properties., and . IWPSE, page 186-189. ACM, (2001)Carrying on the e-learning process with a workflow management engine., , and . SAC, page 940-945. ACM, (2004)Using Graph Transformation Systems to Specify and Verify Data Abstractions., , , and . ECEASST, (2008)Software Engineering for Secure Systems, , and . Proceedings of the 28th International Conference on Software Engineering (ICSE), page 1007--1008. ACM, (May 2006)Software engineering for secure systems, , and . SIGSOFT Softw. Eng. Notes, 30 (4): 1--2 (2005)Supporting Nomadic Co-Workers: an Experience with a Peer-To-Peer Configuration Management Tool. Proceedings of the International Symposium on Towards Peta-Bit Ultra-Networks, page 79--87. IEEE, A & I Ltd., Tokyo, (September 2003)Invited paper.The 3rd International Workshop on Software Engineering for Secure Systems SESS07 --- Dependable and secure, , , and . ICSE COMPANION '07: Companion to the proceedings of the 29th International Conference on Software Engineering, page 111--112. ACM, IEEE Computer Society, (May 2007)Supporting Configuration Management for Virtual Workgroups in a Peer-to-Peer Setting, , and . SEKE~'02: Proceedings of the 14th international conference on Software engineering and knowledge engineering, page 507--511. ACM, ACM Press, (July 2002)Learning Objects and Tests, , and . Proceedings of the IASTED International Conference on Web-Based Education, IASTED, (February 2004)