From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction to software engineering for secure systems: SESS06 - secure by design., , и . SESS@ICSE, стр. 1-2. ACM, (2006)Software Engineering for Secure Systems --- Building Trustworthy Applications, , и . Proceedings of the 27th International Conference on Software Engineering (ICSE), ACM, (мая 2005)The Fourth International Workshop on Software Engineering for Secure Systems --- A Trusted Business World, , и . ICSE Companion '08: Companion of the 30th international conference on Software engineering, стр. 1067--1070. ACM, ACM, (мая 2008)Towards simplified specification of policies in different domains., , и . Integrated Network Management, стр. 20-29. IEEE, (2007)Technologies for controlled anonymity, , , , , , , , , и 1 other автор(ы). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)A permission system for secure AOP., , , и . AOSD, стр. 205-216. ACM, (2010)Introduction to Software Engineering for Secure Systems --- Secure by Design, , и . Proceedings of SESS'06, стр. 1--2. ACM, (мая 2006)The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure., , , и . ICSE Companion, стр. 111-112. IEEE Computer Society, (2007)A Security Architecture for Electronic Commerce Applications., , , , и . SEC, том 175 из IFIP Conference Proceedings, стр. 491-500. Kluwer, (2000)Software engineering for secure systems., , и . ICSE, стр. 1007-1008. ACM, (2006)