Author of the publication

Requirements Engineering for Trust Management: Model, Methodology, and Reasoning

, , , and . International Journal of Information Security, 5 (4): 257--274 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exptime Tableaux for ALC., , and . Description Logics, volume WS-96-05 of AAAI Technical Report, page 107-110. AAAI Press, (1996)Privacy Is Linking Permission to Purpose., and . Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, page 179-191. Springer, (2004)Formal Verification of Cardholder Registration in SET., , , and . ESORICS, volume 1895 of Lecture Notes in Computer Science, page 159-174. Springer, (2000)DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , and . CoRR, (2000)Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned., , and . IEEE Trans. Emerg. Top. Comput., 4 (1): 35-46 (2016)Action, Inaction, Trust, and Cybersecurity's Common Property Problem., , and . IEEE Secur. Priv., 14 (1): 82-86 (2016)Lightweight Parsing and Slicing for Bug Identification in C., , , and . ARES, page 114:1-114:10. ACM, (2022)An Extended Ontology for Security Requirements., , , , and . CAiSE Workshops, volume 83 of Lecture Notes in Business Information Processing, page 622-636. Springer, (2011)LastPyMile: identifying the discrepancy between sources and packages., , , , and . ESEC/SIGSOFT FSE, page 780-792. ACM, (2021)Programmable enforcement framework of information flow policies., and . ICTCS, volume 1231 of CEUR Workshop Proceedings, page 197-211. CEUR-WS.org, (2014)