From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trust and Compliance Management Models in Emerging Outsourcing Environments., , , , и . I3E, том 341 из IFIP Advances in Information and Communication Technology, стр. 237-248. Springer, (2010)Security Patterns, Towards a Further Level., , , и . SECRYPT, стр. 349-356. INSTICC Press, (2009)Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs., и . ARES, стр. 192-198. IEEE Computer Society, (2014)Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform., , , , , , , , и . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, том 11980 из Lecture Notes in Computer Science, стр. 204-223. Springer, (2019)User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project.. ARES, стр. 829-835. IEEE Computer Society, (2013)Security Considerations in 5G Networks: A Slice-Aware Trust Zone Approach., , , и . WCNC, стр. 1-8. IEEE, (2019)DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance., , , , , , , , , и 3 other автор(ы). TrustBus, том 11711 из Lecture Notes in Computer Science, стр. 78-93. Springer, (2019)DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance., , , , , , , , и . TrustBus, том 12395 из Lecture Notes in Computer Science, стр. 186-201. Springer, (2020)