Author of the publication

Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.

, , , , , and . UIC/ATC, page 627-632. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures., , and . HASE, page 483-486. IEEE Computer Society, (2008)Privacy-Preserving Identifiers for IoT: A Systematic Literature Review., , , , and . IEEE Access, (2020)Holistic security management framework applied in electronic commerce.. Comput. Secur., 26 (3): 256-265 (2007)Holistic security requirement engineering for electronic commerce.. Comput. Secur., 23 (1): 63-76 (2004)A Decision Matrix Approach.. SEC, volume 181 of IFIP, page 35-50. Springer, (2005)Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems., , , and . ESSoS, volume 5965 of Lecture Notes in Computer Science, page 218-230. Springer, (2010)Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry., , , , , and . UIC/ATC, page 627-632. IEEE Computer Society, (2012)Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider., and . ESSoS, volume 5429 of Lecture Notes in Computer Science, page 185-194. Springer, (2009)Security Requirement Engineering at a Telecom Provider., , and . ARES, page 1139-1147. IEEE Computer Society, (2008)Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security., , and . ARES, page 521-526. IEEE Computer Society, (2011)