Author of the publication

Towards Aligning GDPR Compliance with Software Development: A Research Agenda.

, , and . ICISSP, page 389-396. SciTePress, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flooding Attack Issues of Web Services and Service-Oriented Architectures., and . GI Jahrestagung (1), volume P-133 of LNI, page 117-122. GI, (2008)Past and Present: A Case Study of Twitter's Responses to GDPR Data Requests., and . APF, volume 13888 of Lecture Notes in Computer Science, page 57-84. Springer, (2023)Towards Aligning GDPR Compliance with Software Development: A Research Agenda., , and . ICISSP, page 389-396. SciTePress, (2019)A Policy Language to Capture Compliance of Data Protection Requirements., , , and . IFM, volume 13274 of Lecture Notes in Computer Science, page 289-309. Springer, (2022)Multi-Account Dashboard for Authentication Dependency Analysis., , and . ARES, page 39:1-39:13. ACM, (2022)Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks., , , and . BIOSIG, volume P-315 of LNI, page 81-90. Gesellschaft für Informatik e.V., (2021)Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services., , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 188-203. Springer, (2019)Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication., , , , and . CoRR, (2024)Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example., , , and . CODASPY, page 237-243. ACM, (2023)Extraction and Accumulation of Identity Attributes from the Internet of Things., and . Open Identity Summit, volume P-312 of LNI, page 179-192. Gesellschaft für Informatik e.V., (2021)