Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An introduction to quantum cryptography.. ACM Crossroads, 11 (3): 3 (2005)Natural Language Processing of Rules and Regulations for Compliance in the Cloud.. OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 620-627. Springer, (2012)Privacy Risk, Security, Accountability in the Cloud., , , and . CloudCom (1), page 177-184. IEEE Computer Society, (2013)Automating Compliance for Cloud Computing Services., , , and . CLOSER, page 631-637. SciTePress, (2012)Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography., , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 166-173. Springer, (2011)Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 246-258. Springer, (2009)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 271-282. Springer, (2010)The space and motion of communicating agents author: Robin Milner publisher: cambridge university press, 2009 isbn 978-0-521-73833-0.. SIGACT News, 41 (3): 51-55 (2010)Review of algorithms and theory of computation handbook by Mikhail J. Atallah and Marina Blanton.. SIGACT News, 43 (2): 29-32 (2012)EnCoRe: Towards a Holistic Approach to Privacy., , , , and . SECRYPT, page 171-176. SciTePress, (2010)