Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security management and the human aspect in organizations., and . Inf. Comput. Secur., 25 (5): 494-534 (2017)Ontology-driven evolution of software security., , , and . Data Knowl. Eng., (2021)A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Modelsn, , , , and . Journal of Systems and Software, (2018)Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain., , , , and . ICBC, page 1-5. IEEE, (2022)Developing Secure Systems with UMLsec - From Business Processes to Implementation.. VIS, page 151-161. Vieweg+Teubner Verlag, (2001)Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.. AVoCS, volume 250 of Electronic Notes in Theoretical Computer Science, page 123-136. Elsevier, (2007)Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings., , , , and . MoDELS, page 23-33. IEEE, (2019)Privacy-enhanced system design modeling based on privacy features., , and . SAC, page 1492-1499. ACM, (2019)Ensuring Genuineness for Selectively Disclosed Confidential Data Using Distributed Ledgers: Applications to Rail Wayside Monitoring., , , and . Blockchain, page 477-482. IEEE, (2019)Seventh international workshop on software engineering for secure systems: (SESS 2011), , and . Proceedings of the 33th International Conference on Software Engineering (ICSE), page 1200--1201. ACM, (2011)