Author of the publication

A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.

, , , and . SECRYPT, page 26-37. SCITEPRESS, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concern-oriented language development (COLD): Fostering reuse in language engineering., , , , , , , , , and 6 other author(s). Comput. Lang. Syst. Struct., (2018)A Taxonomy of Dynamic Changes Affecting Confidentiality., , and . Softwaretechnik-Trends, 40 (2): 35-36 (2020)An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security., , , and . CoRR, (2024)Conclusion., , , and . Composing Model-Based Analysis Tools, Springer, (2021)Dynamic Access Control in Industry 4.0 Systems., , , , , , , and . Digital Transformation, Springer, (2022)Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies., , and . ICISSP, page 300-307. SCITEPRESS, (2021)1st Colloborative Workshop on Evolution and Maintenance of Long-Living-Systems (EMLS14)., , , , and . Software Engineering, volume P-227 of LNI, page 203-204. GI, (2014)Aspect-Oriented Adaptation of Access Control Rules., , , , , and . SEAA, page 363-370. IEEE, (2021)Enabling Consistency between Software Artefacts for Software Adaption and Evolution., , , and . ICSA, page 1-12. IEEE, (2021)Evaluation Methods and Replicability of Software Architecture Research Objects., , , , , , , , , and 8 other author(s). ICSA, page 157-168. IEEE, (2022)