Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Addressing Trust Issues in Supply-Chain Management Systems Through Blockchain Software Patterns., , , and . RCIS, volume 476 of Lecture Notes in Business Information Processing, page 275-290. Springer, (2023)Socio-Technical Modelling for GDPR Principles: an Extension for the STS-ml., , , , and . RE Workshops, page 238-234. IEEE, (2022)A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement., , , and . CoRR, (2021)An Ontology for Software Patterns: Application to Blockchain-Based Software Development., , , and . EDOC Workshops, volume 466 of Lecture Notes in Business Information Processing, page 284-299. Springer, (2022)Blockchain software patterns for the design of decentralized applications: A systematic literature review., , and . CoRR, (2022)Harmonica: A Framework for Semi-automated Design and Implementation of Blockchain Applications., , and . CoRR, (2022)Trusting the Big Brother Inside My Pocket: User-Oriented Requirements for Contact Tracing., , and . CAiSE Forum, volume 452 of Lecture Notes in Business Information Processing, page 82-91. Springer, (2022)SAIaaS: A Blockchain-Based Solution for Secure Artificial Intelligence as-a-Service., , and . Deep-BDB, volume 309 of Lecture Notes in Networks and Systems, page 67-74. Springer, (2021)SDN Intent-based conformance checking: application to security policies., , , and . NetSoft, page 181-185. IEEE, (2021)Automated and Robust User Story Coverage., and . PROFES, volume 13709 of Lecture Notes in Computer Science, page 538-543. Springer, (2022)