From post

First International Workshop on the Model-Based Design of Trustworthy Health Information Systems.

, , , и . MoDELS (Workshops), том 5002 из Lecture Notes in Computer Science, стр. 115-117. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An analysis and classification of public information security data sources used in research and practice., , , и . Comput. Secur., (2019)GoDeploy: Portable Deployment of Serverless Functions in Federated FaaS., , , и . Software Engineering, том P-343 из LNI, стр. 43-44. Gesellschaft für Informatik e.V., (2024)A technical architecture for enforcing usage control requirements in service-oriented architectures., , , , , , и . SWS, стр. 18-25. ACM, (2007)An Exploratory Study on Risk Estimation in Risk-Based Testing Approaches., , , и . SWQD, том 200 из Lecture Notes in Business Information Processing, стр. 32-43. Springer, (2015)Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis., и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 252-259. Springer, (2015)Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice., , , и . WISCS@CCS, стр. 65-70. ACM, (2016)Meeting EHR Security Requirements: SeAAS Approach., , , , и . EFMI-STC, том 155 из Studies in Health Technology and Informatics, стр. 85-91. IOS Press, (2010)Modeling Authorization in an SOA based Application Scenario., , и . IASTED Conf. on Software Engineering, стр. 79-84. IASTED/ACTA Press, (2006)A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together., , и . ICEIS (3), стр. 128-135. (2005)A Requirements Study on Model Repositories for Digital Twins in Construction Engineering., , и . CoopIS, том 14353 из Lecture Notes in Computer Science, стр. 459-469. Springer, (2023)