Author of the publication

Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics.

, , , and . Open Identity Summit, volume P-305 of LNI, page 185-192. Gesellschaft für Informatik e.V., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flooding Attack Issues of Web Services and Service-Oriented Architectures., and . GI Jahrestagung (1), volume P-133 of LNI, page 117-122. GI, (2008)Past and Present: A Case Study of Twitter's Responses to GDPR Data Requests., and . APF, volume 13888 of Lecture Notes in Computer Science, page 57-84. Springer, (2023)Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example., , , and . CODASPY, page 237-243. ACM, (2023)Where There is No CISO., , , , and . ICT4D, volume 657 of IFIP Advances in Information and Communication Technology, page 187-200. Springer, (2022)Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality., and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 3-19. Springer, (2019)Representing Data Protection Aspects in Process Models by Coloring., , and . APF, volume 12703 of Lecture Notes in Computer Science, page 143-155. Springer, (2021)Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts., and . CoRR, (2024)Extraction and Accumulation of Identity Attributes from the Internet of Things., and . Open Identity Summit, volume P-312 of LNI, page 179-192. Gesellschaft für Informatik e.V., (2021)A Policy Language to Capture Compliance of Data Protection Requirements., , , and . IFM, volume 13274 of Lecture Notes in Computer Science, page 289-309. Springer, (2022)Multi-Account Dashboard for Authentication Dependency Analysis., , and . ARES, page 39:1-39:13. ACM, (2022)