Author of the publication

A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study.

, , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)Building Secure Systems Using a Security Engineering Process and Security Building Blocks., , and . Software Engineering (Workshops), volume P-215 of LNI, page 529-544. GI, (2013)Secure Engineering and Modelling of a Metering Devices System., , , and . ARES, page 418-427. IEEE Computer Society, (2013)A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components., , , , , and . PDP, page 261-268. IEEE, (2012)Emergency Systems Modelling using a Security Engineering Process., , , and . SIMULTECH, page 117-124. SciTePress, (2013)A Lifecycle for Data Sharing Agreements: How it Works Out., , , , , , and . APF, volume 9857 of Lecture Notes in Computer Science, page 3-20. Springer, (2016)A Security Modelling Framework for Systems of Embedded Components., and . HASE, page 176-177. IEEE Computer Society, (2011)The Architecture of VisiOn Privacy Platform., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)Security knowledge representation artifacts for creating secure IT systems., , , and . Comput. Secur., (2017)