Author of the publication

Availability and Continuity Management at Technische Universität München and the Leibniz Supercomputing Centre

, , and . 15th International Conference of European University Information Systems (EUNIS 2009), Santiago de Compostella, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Availability and Continuity Management at Technische Universität München and the Leibniz Supercomputing Centre, , and . 15th International Conference of European University Information Systems (EUNIS 2009), Santiago de Compostella, (2009)Bring Your Own Identity - Case Study from the Swiss Government., and . APF, volume 9857 of Lecture Notes in Computer Science, page 38-47. Springer, (2016)Ensuring Privacy in Natural Language Processing: A PRISMA Oriented Literature Review., , and . Intelligent Environments (Workshops), volume 31 of Ambient Intelligence and Smart Environments, page 180-189. IOS Press, (2022)Towards a Configuration Management System for hybrid cloud deployments., and . Integrated Network Management, page 1074-1077. IEEE, (2011)Herausforderungen und Lösungsansätze bei der MaRisk-Umsetzung in einem internationalen Finanzkonzern., and . GI-Jahrestagung, volume P-220 of LNI, page 1202-1215. GI, (2013)An Inter-Organizational Configuration Management Database as Key Enabler for Future IT Service Management Processes, and . Collaboration and the Knowledge Economy: Issues, Applications, Case Studies, IOS Press, Amsterdam, (2008)Das Internet of Things - zwischen Usability und Verlust der Datensouveränität., , and . HMD Prax. Wirtsch., 57 (3): 558-570 (2020)Hybrid-Cloud an der Technischen Universität München-Auswirkungen auf das IT-Management., and . GI Jahrestagung (1), volume P-175 of LNI, page 757-762. GI, (2010)Challenges in IT Security Processes and Solution Approaches with Process Mining., , and . STM, volume 12386 of Lecture Notes in Computer Science, page 123-138. Springer, (2020)Zero Trust: Die letzte Bastion für die IT-Sicherheit deutscher Behörden.. Datenschutz und Datensicherheit (dud), 47 (10): 617-622 (October 2023)