Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudSurfer - A Cloud Broker Application for Security Concerns., , , , , , , and . CLOSER, page 199-206. SciTePress, (2013)An experimental evaluation of bow-tie analysis for security., , , , and . Inf. Comput. Secur., (2019)Visualizing Cyber Security Risks with Bow-Tie Diagrams., , , , and . GraMSec@CSF, volume 10744 of Lecture Notes in Computer Science, page 38-56. Springer, (2017)Information Security Incident Management: Identified Practice in Large Organizations., , , and . IMF, page 27-46. IEEE Computer Society, (2014)Security-by-design challenges for medical device manufacturers., and . EICC, page 155-160. ACM, (2024)Security SLAs - An Idea Whose Time Has Come?, , and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 123-130. Springer, (2012)On the Certificate Revocation Problem in the Maritime Sector., , , and . NordSec, volume 12556 of Lecture Notes in Computer Science, page 142-157. Springer, (2020)Accountability Requirements for the Cloud., , , , , and . CloudCom, page 375-382. IEEE Computer Society, (2017)Thunder in the Clouds: Security challenges and solutions for federated Clouds., , , and . CloudCom, page 113-120. IEEE Computer Society, (2012)Learning Privacy Preferences., , and . ARES, page 621-626. IEEE Computer Society, (2011)