Author of the publication

Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations.

, , , , , , , , , and . CAMAD, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Insurance of Healthcare Systems., , , , , , , , , and 1 other author(s). IOSec/MSTEC/FINSEC@ESORICS, volume 11981 of Lecture Notes in Computer Science, page 185-198. Springer, (2019)Network security supported by arguments., , and . PST, page 165-172. IEEE Computer Society, (2015)An algorithm for the appraisal of assurance indicators for complex business processes., and . QoP, page 22-27. ACM, (2007)Metric-Aware Secure Service Orchestration, , and . ICE, volume 104 of EPTCS, page 32-46. (2012)Cyber Insurance and Time-to-Compromise: An Integrated Approach., , , and . CyberSA, page 1-8. IEEE, (2019)Optimal Security Configuration for Cyber Insurance., , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 187-200. Springer, (2018)Evaluation of Risk for Complex Systems Using Attack Surface., , and . ISSRE Workshops, page 275-280. IEEE Computer Society, (2014)Security by Insurance for Services., and . QRS Companion, page 344-351. IEEE, (2016)Product Incremental Security Risk Assessment Using DevSecOps Practices., , , , , , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 666-685. Springer, (2022)Towards Policy Engineering for Attribute-Based Access Control., , , and . INTRUST, volume 8292 of Lecture Notes in Computer Science, page 85-102. Springer, (2013)