Author of the publication

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach.

, , , , , and . Softw. Syst. Model., 19 (2): 467-491 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dealing with multiple failures in zanshin: a control-theoretic approach., , and . SEAMS, page 165-174. ACM, (2014)A Metamodel for GDPR-based Privacy Level Agreements., , , and . ER Forum/Demos, volume 1979 of CEUR Workshop Proceedings, page 285-291. CEUR-WS.org, (2017)Leak detection in the pipeline network of an oil refinery - A pattern classification paradigm., , and . PCI, page 178-182. ACM, (2020)Fast convolution and correlation computational methods in leakage localization applications., and . PCI, page 172-177. ACM, (2021)From Requirements to Architectures for Better Adaptive Software Systems., , , , and . iStar, volume 978 of CEUR Workshop Proceedings, page 91-96. CEUR-WS.org, (2013)Optimal Adaptations over Multi-Dimensional Adaptation Spaces with a Spice of Control Theory.. University of Trento, Italy, (2016)Comparing Model-Based Predictive Approaches to Self-Adaptation: CobRA and PLA., , , , and . SEAMS@ICSE, page 42-53. IEEE Computer Society, (2017)From requirements to statecharts via design refinement., , , , and . SAC, page 995-1000. ACM, (2014)Engineering Self-Adaptive Software Systems: From Requirements to Model Predictive Control., , , and . ACM Trans. Auton. Adapt. Syst., 13 (1): 1:1-1:27 (2018)Capturing Variability in Adaptation Spaces: A Three-Peaks Approach., , and . ER, volume 9381 of Lecture Notes in Computer Science, page 384-398. Springer, (2015)