Author of the publication

SLOPPI -- a Framework for Secure Logging with Privacy Protection and Integrity

, , and . ICIMP 2013, The Eighth International Conference on Internet Monitoring and Protection, page 14-19. Roma, Italia, Citeseer, IARIA, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Intermediary Protocol Representation to Aid in Avionics Network Development., , and . NOMS, page 1-5. IEEE, (2023)TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks., , , and . ARES, page 67:1-67:10. ACM, (2023)A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related Environments., , , and . SAT-CPS@CODASPY, page 88-97. ACM, (2021)Enabling the JSON Web Signature Format to Support Complex and Identity-Oriented Non-web Processes., and . I4CS, volume 1876 of Communications in Computer and Information Science, page 29-47. Springer, (2023)Policy-gesteuerte Datenfreigaben und Trust Management im organisationsübergreifenden Identitäts-Management., and . Sicherheit, volume P-77 of LNI, page 91-102. GI, (2006)Effiziente Bearbeitung von Abuse-Beschwerden., , and . IMF, volume P-39 of LNI, page 13-25. GI, (2003)Herausforderungen und Anforderungen für ein organisationsweites Notfall-Passwortmanagement., , and . DFN-Forum Kommunikationstechnologien, volume P-231 of LNI, page 109-119. GI, (2014)An Inter-Organizational Configuration Management Database as Key Enabler for Future IT Service Management Processes, and . Collaboration and the Knowledge Economy: Issues, Applications, Case Studies, IOS Press, Amsterdam, (2008)Towards an Improved Taxonomy of Attacks related to Digital Identities and Identity Management Systems., and . CoRR, (2024)Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation., , and . ARES, page 91:1-91:10. ACM, (2023)