Author of the publication

Evolving Security Requirements in Multi-layered Service-Oriented-Architectures.

, , , , , and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 190-205. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective and Efficient Security Policy Engines for Automotive On-Board Networks., and . Nets4Cars/Nets4Trains, volume 7266 of Lecture Notes in Computer Science, page 14-26. Springer, (2012)SysML-Sec Attack Graphs: Compact Representations for Complex Attacks., and . GraMSec@CSF, volume 9390 of Lecture Notes in Computer Science, page 35-49. Springer, (2015)SysML-Sec - A Model Driven Approach for Designing Safe and Secure Systems., and . MODELSWARD, page 655-664. SciTePress, (2015)Formal specification of security guidelines for program certification., , and . TASE, page 1-8. IEEE Computer Society, (2017)Bringing Common Criteria Certification to Web Services., , and . SERVICES, page 98-102. IEEE Computer Society, (2013)A Game Theoretic Model of a Protocol for Data Possession Verification., , and . WOWMOM, page 1-6. IEEE Computer Society, (2007)Tracking Dependent Information Flows., , , , and . ICISSP, page 179-189. SciTePress, (2017)Reactive Programming in Eiffel//., and . OBPDC, volume 1107 of Lecture Notes in Computer Science, page 125-147. Springer, (1995)A Quantitative Analysis of Common Criteria Certification Practice., , and . TrustBus, volume 8647 of Lecture Notes in Computer Science, page 132-143. Springer, (2014)Untraceable Secret Credentials: Trust Establishment with Privacy., , and . PerCom Workshops, page 122-126. IEEE Computer Society, (2004)