Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control, Security, and Risk in the Cloud., and . Cloud Computing Law, Oxford University Press, (2013)Blockchain and law: Incompatible codes?. Comput. Law Secur. Rev., 34 (4): 843-846 (2018)Software licensing.. Comput. Law Secur. Rev., 3 (4): 8-11 (1987)Forced Localization of Cloud Services: Is Privacy the Real Driver?. IEEE Cloud Comput., 2 (2): 10-14 (2015)Impact of the EU data protection directive on transborder data flows.. Inf. Secur. Tech. Rep., 2 (1): 8 (1997)Four Key Challenges for Internet and E-Commerce Lawyers.. Comput. Law Secur. Rev., 16 (2): 75-77 (2000)Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States., and . Comput. Law Secur. Rev., 32 (1): 91-110 (2016)Contracts for clouds: comparison and analysis of the Terms and Conditions of cloud computing services., , and . Int. J. Law Inf. Technol., 19 (3): 187-223 (2011)Public Sector Cloud Contracts., , and . Cloud Computing Law, Oxford University Press, (2013)How Do Restrictions on International Data Transfers Work in Clouds?, and . Cloud Computing Law, Oxford University Press, (2013)