Author of the publication

Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.

, , , , , , and . SAC, page 1217-1225. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relationship-based threat modeling., , , and . EnCyCriS@ICSE, page 41-48. ACM, (2022)Security Threat Modeling: Are Data Flow Diagrams Enough?, , , , and . ICSE (Workshops), page 254-257. ACM, (2020)Security and Privacy Threat Analysis for Solid., , , , , and . SecDev, page 196-206. IEEE, (2023)On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications., , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 195-203. Springer, (2019)An Overview of Runtime Data Protection Enforcement Approaches., , and . EuroS&P Workshops, page 351-358. IEEE, (2021)Threat modeling at run time: the case for reflective and adaptive threat management (NIER track)., , , and . SEAMS@ICSE, page 203-209. IEEE, (2021)Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation., , , and . IEEE Symposium on Security and Privacy Workshops, page 80-83. IEEE, (2019)Automating the early detection of security design flaws., , , and . MoDELS, page 332-342. ACM, (2020)Contextualisation of Data Flow Diagrams for Security Analysis., , , , and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 186-197. Springer, (2020)Towards Automated Security Design Flaw Detection., , , , and . ASE Workshops, page 49-56. IEEE, (2019)