Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling data protection and privacy: application and experience with GDPR., , , , and . Softw. Syst. Model., 20 (6): 2071-2087 (2021)PWWM: A Personal Web Workflow Methodology., , , , , and . The Personal Web, volume 7855 of Lecture Notes in Computer Science, Springer, (2013)A relationship-based approach to model integration., , and . Innov. Syst. Softw. Eng., 8 (1): 3-18 (2012)A relationship-driven approach to view merging., , , and . ACM SIGSOFT Softw. Eng. Notes, 31 (6): 1-2 (2006)Using UML Profiles for Sector-Specific Tailoring of Safety Evidence Information., , and . ER, volume 6998 of Lecture Notes in Computer Science, page 362-378. Springer, (2011)CRESCO: Construction of Evidence Repositories for Managing Standards Compliance., , , and . ER Workshops, volume 6999 of Lecture Notes in Computer Science, page 338-342. Springer, (2011)An extended systematic literature review on provision of evidence for safety certification., , , and . Inf. Softw. Technol., 56 (7): 689-717 (2014)Evidence management for compliance of critical systems with safety standards: A survey on the state of practice., , , and . Inf. Softw. Technol., (2015)Viewpoints., , and . Encyclopedia of Software Engineering, Taylor & Francis, (2010)TAPHSIR: towards AnaPHoric ambiguity detection and ReSolution in requirements., , , and . ESEC/SIGSOFT FSE, page 1677-1681. ACM, (2022)