Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checking Regulatory Compliance of Business Processes and Information Systems., , and . ICSOFT (Selected Papers), volume 50 of Communications in Computer and Information Science, page 71-84. (2009)Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model., , , , and . JCKBSE, page 158-167. Springer, (2018)Requirements Exploration by Comparing and Combining Models of Different Information Systems., , and . JCKBSE, page 64-74. Springer, (2018)Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment., , , and . Int. J. Secur. Softw. Eng., 4 (3): 42-63 (2013)Quantitative Analysis of Goal Oriented Requirements Models.. JCKBSE, volume 19 of Learning and Analytics in Intelligent Systems, page 1-6. Springer, (2020)Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 155-166. IOS Press, (2016)Identifying Fundamental Goals from Objects in a Scenario to Facilitate System Introduction., and . COMPSAC (2), page 276-277. IEEE Computer Society, (2017)978-1-5386-0367-3.Improving Software Quality Requirements Specifications Using Spectrum Analysis., and . COMPSAC Workshops, page 379-384. IEEE Computer Society, (2012)A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking., , , , , and . KES, volume 207 of Procedia Computer Science, page 542-551. Elsevier, (2022)A Tool to Manage Traceability on Several Models and Its Use Case., , , , , , and . KES, volume 176 of Procedia Computer Science, page 1449-1458. Elsevier, (2020)