Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Battery Powered Vision Sensor for Forensic Evidence Gathering., , , , , , and . ICDSC, page 15:1-15:6. ACM, (2019)Introducing Ontology-based Security Policy Management in the Grid., and . ECIW, page 107-116. Academic Conferences Limited, Reading, UK, (2005)A generic Grid security policy reconciliation framework., , , and . Internet Res., 15 (5): 508-517 (2005)Employing Ontologies for the Development of Security Critical Applications., , , , , , and . I3E, volume 189 of IFIP, page 187-201. Springer, (2005)An ontology for secure e-government applications., , , , , , and . ARES, page 1033-1037. IEEE Computer Society, (2006)Incorporating Security Requirements Into the Software Development Process., , , , , and . ECIW, page 21-28. Academic Conferences Limited, Reading, UK, (2005)Robo-cook's Path: An online multiplayer board dietary game., , , , , and . PETRA, page 330-335. ACM, (2022)A survey on AI nutrition recommender systems., , , , and . PETRA, page 540-546. ACM, (2019)A Framework for Exploiting Security Expertise in Application Development., , , , , and . TrustBus, volume 4083 of Lecture Notes in Computer Science, page 62-70. Springer, (2006)Elaborating Quantitative Approaches for IT Security Evaluation., , and . SEC, volume 214 of IFIP Conference Proceedings, page 67-78. Kluwer, (2002)