Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of an Experimental Policy Workbench: Description and Preliminary Results., , and . DBSec, volume A-6 of IFIP Transactions, page 47-76. North-Holland, (1991)The Promise of Interactive Shared Augmented Reality., and . Computer, 53 (1): 45-52 (2020)Cyberthreats in 2025., , and . Computer, 53 (6): 16-27 (2020)Perspectives on the SolarWinds Incident., , , , , , , , , and . IEEE Secur. Priv., 19 (2): 7-13 (2021)Removing the Boundaries: Steps Toward a Cloud Nirvana., , , , , and . GrC, page 167-171. IEEE Computer Society, (2010)Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy., , and . NSPW, page 69-75. ACM, (1993)Implementation and analysis of environment behavior models as a tool for testing real-time, reactive systems., , , , , and . SoSE, page 1-5. IEEE Computer Society, (2006)A framework for software reuse in safety-critical system-of-systems., , and . SoSE, page 1-6. IEEE, (2008)Making Decisions about Legal Responses to Cyber Attacks., , , , , and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 283-294. Springer, (2005)Algorithms, Algorithms, Algorithms., and . Computer, 53 (11): 13-15 (2020)