Author of the publication

Federated Identity Management and Usage Control - Obstacles to Industry Adoption.

, and . ARES, page 31-41. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Not Ready for Prime Time: A Survey on Security in Model Driven Development., and . Int. J. Secur. Softw. Eng., 2 (4): 49-61 (2011)Learning from Software Security Testing., , and . ICST Workshops, page 286-294. IEEE Computer Society, (2008)Fools Download Where Angels Fear to Tread., , , , and . IEEE Secur. Priv., 7 (2): 83-86 (2009)Combining Misuse Cases with Attack Trees and Security Activity Models., , and . ARES, page 438-445. IEEE Computer Society, (2010)Federated Identity Management - We Built It; Why Won't They Come?, and . IEEE Secur. Priv., 11 (2): 34-41 (2013)Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.. ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 343-352. Springer, (2013)Secure Software Design in Practice., and . ARES, page 1164-1171. IEEE Computer Society, (2008)Reusable Security Requirements for Healthcare Applications., , , , and . ARES, page 380-385. IEEE Computer Society, (2009)Federated Identity Management Challenges.. ARES, page 230-235. IEEE Computer Society, (2012)Security in Model Driven Development: A Survey., and . ARES, page 704-709. IEEE Computer Society, (2011)