Author of the publication

Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward.

, , , , and . ARES, page 158-165. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Aniketos Design-Time Framework Applied - A Case in Air Traffic Management., , , and . Secure and Trustworthy Service Composition, volume 8900 of Lecture Notes in Computer Science, Springer, (2014)The Use and Usefulness of Threats in Goal-Oriented Modelling., , and . ARES, page 428-436. IEEE Computer Society, (2013)Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward., , , , and . ARES, page 158-165. IEEE Computer Society, (2014)Security Incident Information Exchange for Cloud Services., , , and . IoTBD, page 391-398. SciTePress, (2016)Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective., , , and . CD-ARES, volume 9817 of Lecture Notes in Computer Science, page 175-190. Springer, (2016)Personal Health Information on Display: Balancing Needs, Usability and Legislative Requirements., , , , and . MIE, volume 169 of Studies in Health Technology and Informatics, page 606-610. IOS Press, (2011)Gamification of Information Security Awareness and Training., , , and . ICISSP, page 59-70. SciTePress, (2017)A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting., , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 26-37. Springer, (2011)Gamification of Information Security Awareness and Training., , , and . ICISSP, page 59--70. (2017)Representing Threats in BPMN 2.0., and . ARES, page 542-550. IEEE Computer Society, (2012)