From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Data Protection Compliance., , и . SECRYPT, стр. 213-216. SciTePress, (2010)The Si* Modeling Framework: Metamodel and Applications.. International Journal of Software Engineering and Knowledge Engineering, 19 (5): 727-746 (2009)Symbolic Privacy Analysis through Linkability and Detectability., , и . IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 1-16. Springer, (2013)Flow-Based Reputation: More than Just Ranking., , и . Int. J. Inf. Technol. Decis. Mak., 11 (3): 551-578 (2012)Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management., , и . CoRR, (2012)Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology., , и . Advances in Intelligent Information Systems, том 265 из Studies in Computational Intelligence, Springer, (2010)Flow-based reputation with uncertainty: evidence-based subjective logic., , и . Int. J. Inf. Sec., 15 (4): 381-402 (2016)Formal Analysis of BPMN Via a Translation into COWS., , и . COORDINATION, том 5052 из Lecture Notes in Computer Science, стр. 249-263. Springer, (2008)Understanding Computer Security., и . Frontiers ICT, (2014)Poster: protecting information in systems of systems., , и . ACM Conference on Computer and Communications Security, стр. 865-868. ACM, (2011)