Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , and . GI-Jahrestagung, volume P-307 of LNI, page 111-113. GI, (2020)Control as a Means towards Accountable Services in the Cloud., , and . Comput. Syst. Sci. Eng., (2013)Towards Security Certification Schemas for the Internet of Services., , , and . NTMS, page 1-5. IEEE, (2012)Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152)., , , and . Dagstuhl Reports, 8 (4): 20-31 (2018)A Formal Security Model for Microprocessor Hardware., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 718-737. Springer, (1999)Panel on granularity in access control., , , , , and . SACMAT, page 85-86. ACM, (2013)Towards Accountable Services in the Cloud., and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 470-474. Springer, (2012)Threat Scenarios as a Means to Formally Develop Secure Systems.. ESORICS, volume 1146 of Lecture Notes in Computer Science, page 242-265. Springer, (1996)Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach., , , , , and . Wirtschaftsinf., 50 (5): 383-391 (2008)Threat Scenarios as a Means to Formally Develop Secure Systems.. J. Comput. Secur., 5 (1): 31-68 (1997)