Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New security paradigms: what other concepts do we need as well?. NSPW, page 7-18. ACM, (1993)Utilising the Internet to Improve Peasant Artisan Incomes: Evidence from Mexico., , and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 292-309. Springer, (2010)Messages, communication, information security and value.. NSPW, page 10-19. IEEE Computer Society Press, (1994)Connecting Readers with Open Access Resources: The CUFTS Free! Open Access Collections Group., , , , , , , , , and 7 other author(s). ELPUB, page 461-470. (2009)Deriving Information Requirements from Responsibility Models., , , and . CAiSE, volume 5565 of Lecture Notes in Computer Science, page 515-529. Springer, (2009)Time-Dependent Density Functional Theory beyond Linear Response: An Exchange-Correlation Potential with Memory, , and . Phys. Rev. Lett., 79 (10): 1905-- (September 1997)Inhomogeneous STLS theory and TDCDFT. PHYSICAL CHEMISTRY CHEMICAL PHYSICS, 11 (22): 4528-4534 (2009)The change and evolution of requirements as a challenge to the practice of software engineering., , and . RE, page 266-272. IEEE Computer Society, (1993)Security Models and Enterprise Models., and . DBSec, page 1-39. North-Holland, (1988)Security and Privacy Issues for the World Wide Web: Panel Discussion., , , , and . DBSec, volume 142 of IFIP Conference Proceedings, page 269-284. Kluwer, (1998)