Author of the publication

A Formal Model for Soft Enforcement: Influencing the Decision-Maker.

, , , and . STM, volume 8743 of Lecture Notes in Computer Science, page 113-128. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and analysis of influence power for information security decisions., , and . Perform. Evaluation, (2016)WRAD: Tool Support for Workflow Resiliency Analysis and Design., , and . SERENE, volume 9823 of Lecture Notes in Computer Science, page 79-87. Springer, (2016)Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review., and . CoRR, (2021)On Attribute Retrieval in ABAC., , and . FPS, volume 12056 of Lecture Notes in Computer Science, page 225-241. Springer, (2019)Impact of Using a Privacy Model on Smart Buildings Data for CO2 Prediction., , , , , and . DBSec, volume 13942 of Lecture Notes in Computer Science, page 133-140. Springer, (2023)State Based Robustness Testing for Components., , , and . FACS, volume 260 of Electronic Notes in Theoretical Computer Science, page 173-188. Elsevier, (2008)Interventions over smart card swiping behaviour., , and . STAST, page 2:1-2:11. ACM, (2018)Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems., and . STM, volume 10547 of Lecture Notes in Computer Science, page 224-233. Springer, (2017)Nudging for Quantitative Access Control Systems., , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 340-351. Springer, (2014)Resiliency Variance in Workflows with Choice., , and . SERENE, volume 9274 of Lecture Notes in Computer Science, page 128-143. Springer, (2015)