Author of the publication

Software Configuration Based on Order Processes.

, , , , , and . BMSD, volume 275 of Lecture Notes in Business Information Processing, page 200-220. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Configuration Based on Order Processes., , , , , and . BMSD, volume 275 of Lecture Notes in Business Information Processing, page 200-220. (2016)From Adaptive Business Processes to Orchestrated Microflows., , and . BMSD, volume 391 of Lecture Notes in Business Information Processing, page 152-168. Springer, (2020)A Design Exploration Framework for Secure IoT-Systems., , , , and . CyberSA, page 1-8. IEEE, (2020)Patterns for common criteria certification., , , and . EuroPLoP, page 33:1-33:15. ACM, (2015)Multi-Layered IoT System Design Towards End-to-End Secure Communication., , , , , and . IECON, page 2213-2220. IEEE, (2020)Combining Business Process Variability and Software Variability Using Traceable Links., , , , , , and . BMSD, volume 309 of Lecture Notes in Business Information Processing, page 67-86. Springer, (2017)Patterns to establish a secure communication channel., , , , , and . EuroPLoP, page 13. ACM, (2016)Increasing the Visibility of Requirements Based on Combined Variability Management., , , , , and . BMSD, volume 319 of Lecture Notes in Business Information Processing, page 203-220. Springer, (2018)Evaluation paradigm selection according to Common Criteria for an incremental product development., , , and . MILS@HiPEAC, Zenodo, (2015)Security based design space exploration for CPS., , , , and . SAC, page 593-595. ACM, (2020)