Author of the publication

Secure Business Processes in Service-Oriented Architectures - A Requirements Analysis.

, , , and . ECOWS, page 35-42. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Die Antikorruptionspolitik der Weltbank, eine theoretische und empirische Untersuchung des Voluntary Disclosure Program der Weltbank. Schriftenreihe Compliance . - Hamburg : Kovac;1 Kovac, J, (2010)Jens Müller.Security Mechanisms for Workflows in Service-Oriented Architectures.. Karlsruhe Institute of Technology, (2015)A Rule-Based Approach to Match Structural Patterns with Business Process Models.. RuleML, volume 5858 of Lecture Notes in Computer Science, page 208-215. Springer, (2009)Exploring former interaction qualities for tomorrow s control room design., , , and . MuC, page 377-380. Oldenbourg Verlag, (2012)Inhaltssensitive Navigation in der Verkehrsleitzentrale., , , and . MuC, page 49-58. Oldenbourg Verlag, (2011)Learning Patient Transfers with Technology: A Qualitative Investigation of the Design Space., , , , , and . MuC, page 79-90. GI / ACM, (2019)KiTT - The Kinaesthetics Transfer Teacher: Design and Evaluation of a Tablet-based System to Promote the Learning of Ergonomic Patient Transfers., , , , , and . CHI, page 233:1-233:16. ACM, (2021)Collaborative Smart Items., , , , and . GI Jahrestagung (2), volume P-110 of LNI, page 221-226. GI, (2007)Separation, Composition, or Hybrid? - Comparing Collaborative 3D Object Manipulation Techniques for Handheld Augmented Reality., , , and . ISMAR, page 403-412. IEEE, (2021)Piggyback: Using Search Engines for Robust Cross-Domain Named Entity Recognition., , , and . ACL, page 965-975. The Association for Computer Linguistics, (2011)