Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Engineering Self-adaptive Authorisation Infrastructures., , and . CoRR, (2019)Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies., , , , and . Aspect-Oriented Requirements Engineering, Springer, (2013)Developing a domain-specific plug-in for a modelling platform: The good, the bad, the ugly., , and . TOPI@ICSE, page 1-6. IEEE Computer Society, (2013)Bidirectional Transformations for Self-Adaptive Systems., , , , and . Engineering Adaptive Software Systems, Springer, (2019)Challenges in Engineering Self-Adaptive Authorisation Infrastructures., , and . Engineering Adaptive Software Systems, Springer, (2019)Towards Attribute-Based Authorisation for Bidirectional Programming., and . SACMAT, page 185-196. ACM, (2015)Issues in representing domain-specific concerns in model-driven engineering., , , and . MiSE, page 1-6. IEEE Computer Society, (2013)Tool support for UML-based specification and verification of role-based access control properties., , and . SIGSOFT FSE, page 456-459. ACM, (2011)Run-time generation, transformation, and verification of access control models for self-protection., , , , and . SEAMS, page 135-144. ACM, (2014)Challenges in model-based evolution and merging of access control policies., , and . EVOL/IWPSE, page 116-120. ACM, (2011)