Author of the publication

Conceptual Framework and Architecture for Privacy Audit.

, , , , , and . APF, volume 8319 of Lecture Notes in Computer Science, page 17-40. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for privacy aware data management in relational databases., and . Int. J. Inf. Priv. Secur. Integr., 2 (1): 56-78 (2014)Dealing with anonymity in wireless sensor networks., , and . SAC, page 2216-2223. ACM, (2010)Introducing privacy in a hospital information system., , , , and . SESS, page 9-16. ACM, (2008)Bridging the gap between requirements and design: An approach based on Problem Frames and SysML., , and . J. Syst. Softw., 85 (3): 717-745 (2012)A Meta-model Supporting the Decomposition of Problem Descriptions., , , and . ICSEA, page 50-57. IEEE Computer Society, (2010)Towards Virtual Private NoSQL datastores., and . ICDE, page 193-204. IEEE Computer Society, (2016)Efficient enforcement of action-aware purpose-based access control within relational database management systems., and . ICDE, page 1516-1517. IEEE Computer Society, (2016)Conceptual Framework and Architecture for Privacy Audit., , , , , and . APF, volume 8319 of Lecture Notes in Computer Science, page 17-40. Springer, (2012)A UML 2-compatible language and tool for formal modeling real-time system architectures., , and . SAC, page 1785-1790. ACM, (2006)Fine-Grained Access Control Within NoSQL Document-Oriented Datastores., and . Data Sci. Eng., 1 (3): 127-138 (2016)