Author of the publication

Privacy in the Semantic Web: What Policy Languages Have to Offer.

, , and . POLICY, page 109-118. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

sButler: A Mediator between Organizations' Workflows and the Semantic Web, , , and . Web Service Semantics: Towards Dynamic Business Integration. Workshop at The Fourteenth International World Wide Web Conference (WWW 2005), (May 2005)Generalized Algorithmic Debugging and Testing., , , and . LOPLAS, 1 (4): 303-322 (1992)Towards a structured unified process for software security., , and . SESS@ICSE, page 3-10. ACM, (2006)Unified modeling of attacks, vulnerabilities and security activities., and . SESS@ICSE, page 36-42. ACM, (2010)Interprocedural Dynamic Slicing., , and . PLILP, volume 631 of Lecture Notes in Computer Science, page 370-384. Springer, (1992)User modelling for live help systems: initial results., , and . EC, page 194-197. ACM, (2001)Template Generation for Identifying Text Patterns., and . ISMIS, volume 1932 of Lecture Notes in Computer Science, page 463-473. Springer, (2000)Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps., , and . ARES, page 27:1-27:12. ACM, (2023)Generalized Algorithmic Debugging and Testing., , , and . PLDI, page 317-326. ACM, (1991)TRIFU: The Right Information For yoU., and . HICSS (4), page 505-512. IEEE Computer Society, (1998)