Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Web-Based File Exchange Server: Software Requirements Specification Document, , , and . CoRR, (2011)Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)., and . PST, page 349-354. IEEE Computer Society, (2017)New aspect-oriented constructs for security hardening concerns., , , and . Comput. Secur., 28 (6): 341-358 (2009)Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers, , , and . CoRR, (2011)Design and Implementation of a Secure Web-Based File Exchange Server: Specification Design Document, , , and . CoRR, (2011)RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications., , and . Inf. Softw. Technol., (2021)Taint analysis of manual service compositions using Cross-Application Call Graphs., , and . SANER, page 585-589. IEEE Computer Society, (2015)Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Specification Design Document, , , and . CoRR, (2009)A High-level Aspect-oriented-based Framework for Software Security Hardening., , and . Inf. Secur. J. A Glob. Perspect., 17 (2): 56-74 (2008)Control Flow Based Pointcuts for Security Hardening Concerns., , , and . IFIPTM, volume 238 of IFIP, page 301-316. Springer, (2007)