Author of the publication

Deriving Workflow Privacy Patterns from Legal Documents.

, and . FedCSIS, volume 18 of Annals of Computer Science and Information Systems, page 555-563. (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extensible Storage Manager for Mobile DBMS., , and . BalticDB&IS, page 103-116. Institute of Cybernetics at Tallin Technical University, (2002)Die Entwicklung eines digitalen Praktikums der Cybersicherheit im Bereich "Smart Home"., and . DELFI, volume P-338 of LNI, page 23. Gesellschaft für Informatik e.V., (2023)Legally Binding but Unfair? Towards Assessing Fairness of Privacy Policies., and . IWSPA@CODASPY, page 15-22. ACM, (2024)Collaborative data privacy for the web, , and . Proceedings of the 2010 EDBT/ICDT Workshops, page 31:1--31:10. New York, NY, USA, ACM, (2010)Verteilte Anfrageverarbeitung in DHT-basierten P2P-Systemen., , , and . BTW, volume P-65 of LNI, page 165-174. GI, (2005)Is Homomorphic Encryption Feasible for Smart Mobility?, and . FedCSIS, volume 35 of Annals of Computer Science and Information Systems, page 523-532. (2023)Differentially Private Multi-Label Learning Is Harder Than You'd Think., , and . EuroS&P Workshops, page 40-47. IEEE, (2024)Effizientes Routing in verteilten skalierbaren Datenstrukturen., and . BTW, volume P-26 of LNI, page 334-343. GI, (2003)Deriving Workflow Privacy Patterns from Legal Documents., and . FedCSIS, volume 18 of Annals of Computer Science and Information Systems, page 555-563. (2019)Privacy-aware and reliable sensor-data management. (2016)base-search.net (ftubkarlsruhe:oai:EVASTAR-Karlsruhe.de:1000071614).