Author of the publication

Two experiences designing for effective security.

, , , , , , , , and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 25-34. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blending Ad Hoc and Formal Workflow Models in Support of Different Stakeholders Needs., , and . Int. J. Cooperative Inf. Syst., 24 (4): 1550007:1-1550007:29 (2015)CORBA based Architecture for Large Scale Workflow., , , and . ISADS, page 276-283. IEEE Computer Society, (1999)XE (eXtreme Editor) - Bridging the Aspect-Oriented Programming Usability Gap., , , , and . ASE, page 435-438. IEEE Computer Society, (2008)Two experiences designing for effective security., , , , , , , , and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 25-34. ACM, (2005)Experiences documenting and preserving software constraints using aspects., , and . AOSD (Companion), page 7-18. ACM, (2011)Understanding the Trade-Offs of Blending Collaboration Services in Support of Contextual Collaboration., , , and . CRIWG, volume 4154 of Lecture Notes in Computer Science, page 270-285. Springer, (2006)Managing Feature Interaction by Documenting and Enforcing Dependencies in Software Product Lines., and . ICFI, page 33-48. IOS Press, (2007)A Fully Distributed Architecture for Large Scale Workflow Enactment., , and . Int. J. Cooperative Inf. Syst., 12 (4): 411-440 (2003)The Trade-Offs of Blending Synchronous and Asynchronous Communication Services to Support Contextual Collaboration., , , and . J. Univers. Comput. Sci., 14 (1): 4-26 (2008)Contract Specification for Hardware Interoperability Testing and Fault Analysis., , and . IEEE Trans. Reliability, 60 (1): 351-362 (2011)