Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-aware role-based access control., , , , , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 24:1-24:31 (2010)Supporting effective and efficient design meetings., and . INTERACT, page 365-370. North-Holland, (1990)Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery., and . Emergent Information Technologies and Enabling Policies for Counter-Terrorism, Wiley-IEEE Press, (2006)Personalizing the user experience on ibm.com., , , , and . IBM Syst. J., 42 (4): 686-701 (2003)User centered design: quality or quackery?. Interactions, 3 (4): 18-20 (1996)Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring., , , and . INTERACT, volume 3585 of Lecture Notes in Computer Science, page 671-684. Springer, (2005)Usable Policy Template Authoring for Iterative Policy Refinement., , , and . POLICY, page 18-21. IEEE Computer Society, (2010)A Negotiation Framework for Negotiation of Coalition Policies., , , , and . POLICY, page 133-136. IEEE Computer Society, (2010)Raison d'Etre: capturing design history and rationale in mutimedia narratives., , , , and . CHI Conference Companion, page 213. ACM, (1994)Practical Education for Improving Software Usability., and . CHI, page 162-169. ACM/Addison-Wesley, (1995)