Author of the publication

Sicherheit und Rechtsverbindlichkeit mobiler Agenten Fachbeiträge zu Datenschutz und Datensicherheit

, , , and . Deutscher Universitätsverlag, Wiesbaden 2007, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , and . GI-Jahrestagung, volume P-307 of LNI, page 111-113. GI, (2020)A Formal Security Model for Microprocessor Hardware., , and . World Congress on Formal Methods, volume 1708 of Lecture Notes in Computer Science, page 718-737. Springer, (1999)Panel on granularity in access control., , , , , and . SACMAT, page 85-86. ACM, (2013)Towards Security Certification Schemas for the Internet of Services., , , and . NTMS, page 1-5. IEEE, (2012)SOA-Sicherheit für moderne Unternehmen - Anforderungen an SOA-Sicherheit auf dem Weg zum virtuellen Unternehmen.. Datenschutz und Datensicherheit, 31 (9): 644-647 (2007)Cybersecurity Certification for Agile and Dynamic Software Systems - a Process-Based Approach.. EuroS&P Workshops, page 85-88. IEEE, (2020)Efficient Access Control for Composite Applications., , , , and . BTW, volume P-103 of LNI, page 613-616. GI, (2007)Formal Verification of Business Workflows and Role Based Access Control Systems., , , and . SECURWARE, page 201-210. IEEE Computer Society, (2007)DOA-Trusted Cloud 2013 PC Co-Chairs Message., , and . OTM Conferences, volume 8185 of Lecture Notes in Computer Science, page 308. Springer, (2013)Towards a Trustworthy Service Marketplace for the Future Internet., , , , , and . Future Internet Assembly, volume 7281 of Lecture Notes in Computer Science, page 105-116. Springer, (2012)