Author of the publication

The 3rd International Workshop on Software Engineering for Secure Systems SESS07 --- Dependable and secure

, , , and . ICSE COMPANION '07: Companion to the proceedings of the 29th International Conference on Software Engineering, page 111--112. ACM, IEEE Computer Society, (May 2007)
DOI: http://dx.doi.org/10.1109/ICSECOMPANION.2007.75

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How aspect-oriented programming can help to build secure software., , and . Informatica (Slovenia), (2002)Towards simplified specification of policies in different domains., , and . Integrated Network Management, page 20-29. IEEE, (2007)Introduction to software engineering for secure systems: SESS06 - secure by design., , and . SESS@ICSE, page 1-2. ACM, (2006)Software Engineering for Secure Systems --- Building Trustworthy Applications, , and . Proceedings of the 27th International Conference on Software Engineering (ICSE), ACM, (May 2005)The Fourth International Workshop on Software Engineering for Secure Systems --- A Trusted Business World, , and . ICSE Companion '08: Companion of the 30th international conference on Software engineering, page 1067--1070. ACM, ACM, (May 2008)On the secure software development process: CLASP, SDL and Touchpoints compared., , , , and . Inf. Softw. Technol., 51 (7): 1152-1171 (2009)A permission system for secure AOP., , , and . AOSD, page 205-216. ACM, (2010)Introduction to Software Engineering for Secure Systems --- Secure by Design, , and . Proceedings of SESS'06, page 1--2. ACM, (May 2006)Technologies for controlled anonymity, , , , , , , , , and 1 other author(s). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)A Modular Access Control Service for Supporting Application-Specific Policies., , , , and . IEEE Distributed Syst. Online, (2006)