Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Not Ready for Prime Time: A Survey on Security in Model Driven Development., and . Int. J. Secur. Softw. Eng., 2 (4): 49-61 (2011)Learning from Software Security Testing., , and . ICST Workshops, page 286-294. IEEE Computer Society, (2008)Combining Misuse Cases with Attack Trees and Security Activity Models., , and . ARES, page 438-445. IEEE Computer Society, (2010)Security in Model Driven Development: A Survey., and . ARES, page 704-709. IEEE Computer Society, (2011)Federated Identity Management and Usage Control - Obstacles to Industry Adoption., and . ARES, page 31-41. IEEE Computer Society, (2013)Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.. ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 343-352. Springer, (2013)Federated Identity Management Challenges.. ARES, page 230-235. IEEE Computer Society, (2012)Reusable Security Requirements for Healthcare Applications., , , , and . ARES, page 380-385. IEEE Computer Society, (2009)Secure Software Design in Practice., and . ARES, page 1164-1171. IEEE Computer Society, (2008)Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint.. ARES, volume 6908 of Lecture Notes in Computer Science, page 1-12. Springer, (2011)