Author of the publication

Modeling Social and Individual Trust in Requirements Engineering Methodologies.

, , , and . iTrust, volume 3477 of Lecture Notes in Computer Science, page 161-176. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach., , , , and . ICAIL, page 149-153. ACM, (2007)EXPTIME tableaux for ALC., and . Artif. Intell., 124 (1): 87-138 (2000)Maintaining privacy on derived objects., , , and . WPES, page 10-19. ACM, (2005)An Empirical Methodology to Evaluate Vulnerability Discovery Models., and . IEEE Trans. Software Eng., 40 (12): 1147-1162 (2014)Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard., , and . ER, volume 2813 of Lecture Notes in Computer Science, page 263-276. Springer, (2003)Privacy Is Linking Permission to Purpose., and . Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, page 179-191. Springer, (2004)Formal Verification of Cardholder Registration in SET., , , and . ESORICS, volume 1895 of Lecture Notes in Computer Science, page 159-174. Springer, (2000)Diversity: A Poor Man's Solution to Drone Takeover., , and . PECCS, page 25-34. SciTePress, (2017)Exptime Tableaux for ALC., , and . Description Logics, volume WS-96-05 of AAAI Technical Report, page 107-110. AAAI Press, (1996)Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach., , , and . Information, 11 (5): 261 (2020)