Author of the publication

An Approach Using Formally Well-founded Domain Languages for Secure Coarse-grained IT System Modelling in a Real-world Banking Scenario.

, , , , and . ACIS, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks., , and . VTC Fall, page 1-6. IEEE, (2019)Teaching in the Cyber-Age: Technologies, Experiments, and Realizations., , and . DeLFI, volume P-66 of LNI, page 225-236. GI, (2005)Smart Cards - the Personal Safe in an E-Commerce World., , and . International Conference on Internet Computing, page 343-346. CSREA Press, (2000)An ad-hoc Wireless Sensor Networks with Application to Air Pollution Detection., , and . SNA, page 48-53. ISCA, (2009)Cognition: A Tool for Reinforcing Security in Software Defined Networks, , , , and . EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V, volume 288 of Advances in Intelligent Systems and Computing, Springer International Publishing, (2014)Measuring anonymity using network coordinate systems., , and . ISCIT, page 366-371. IEEE, (2011)Physikalische Chemie, and . Pearson Studium, München u.a., (2006)Law-aware access control for international financial environments., and . MobiDE, page 33-40. ACM, (2009)Law-Aware Access Control: About Modeling Context and Transforming Legislation., and . JSAI-isAI Workshops, volume 6284 of Lecture Notes in Computer Science, page 73-86. Springer, (2009)GCC2011 - 25 years of computational chemistry meetings., , and . J. Cheminformatics, 4 (S-1): 1 (2012)