From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards automated provisioning of secure virtualized networks., , , и . ACM Conference on Computer and Communications Security, стр. 235-245. ACM, (2007)From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise., , и . NSPW, стр. 43-50. ACM, (2002)Unternehmensweites Datenschutzmanagement bei IBM, , и . Datenschutz als Wettbewerbsvorteil. Privacy sells: Mit modernen Datenschutzkomponenten Erfolg beim Kunden, стр. 68--79. Braunschweig, Wiesbaden, Vieweg, (2002)Certified Mail.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Automated Information Flow Analysis of Virtualized Infrastructures., , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 392-415. Springer, (2011)Secure cloud maintenance: protecting workloads against insider attacks., , , и . AsiaCCS, стр. 83-84. ACM, (2012)Data Security and Privacy in 2025?. Secure Data Management, том 8425 из Lecture Notes in Computer Science, стр. 37-41. Springer, (2013)Fair Exchange.. Encyclopedia of Cryptography and Security, Springer, (2005)Security audits of multi-tier virtual infrastructures in public infrastructure clouds., , , , и . CCSW, стр. 93-102. ACM, (2010)Intel Software Guard Extensions: Introduction and Open Research Challenges.. SPRO@CCS, стр. 1. ACM, (2016)