Author of the publication

Security Through Aspect-Oriented Programming.

, , and . Network Security, volume 206 of IFIP Conference Proceedings, page 125-138. Kluwer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the secure software development process: CLASP, SDL and Touchpoints compared., , , , and . Inf. Softw. Technol., 51 (7): 1152-1171 (2009)Introduction to software engineering for secure systems: SESS06 - secure by design., , and . SESS@ICSE, page 1-2. ACM, (2006)How aspect-oriented programming can help to build secure software., , and . Informatica (Slovenia), (2002)Software Engineering for Secure Systems --- Building Trustworthy Applications, , and . Proceedings of the 27th International Conference on Software Engineering (ICSE), ACM, (May 2005)The Fourth International Workshop on Software Engineering for Secure Systems --- A Trusted Business World, , and . ICSE Companion '08: Companion of the 30th international conference on Software engineering, page 1067--1070. ACM, ACM, (May 2008)Towards simplified specification of policies in different domains., , and . Integrated Network Management, page 20-29. IEEE, (2007)A Modular Access Control Service for Supporting Application-Specific Policies., , , , and . IEEE Distributed Syst. Online, (2006)A permission system for secure AOP., , , and . AOSD, page 205-216. ACM, (2010)Technologies for controlled anonymity, , , , , , , , , and 1 other author(s). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)Introduction to Software Engineering for Secure Systems --- Secure by Design, , and . Proceedings of SESS'06, page 1--2. ACM, (May 2006)