Author of the publication

Leveraging privacy profiles to empower users in the digital society.

, , , and . Autom. Softw. Eng., 31 (1): 16 (June 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graphical Scenarios for Specifying Temporal Properties : an Automated Approach, , and . Automated Software Engineering, (2007)Introduction to Special Issue on Distributed and Mobile Software Engineering., and . Autom. Softw. Eng., 11 (3): 203-205 (2004)A compositional synthesis of failure-free connectors for correct components assembly, and . Proceedings of the 6th ICSE Workshop on Component-Based Software Engineering, (2003)Quantitative resource-oriented analysis of Java (Adaptable) applications., and . WOSP, page 15-25. ACM, (2007)A Framework for Analyzing and Testing the Performance of Software Services., , , , , and . ISoLA, volume 17 of Communications in Computer and Information Science, page 206-220. Springer, (2008)Integrity Constraints as Views in Deductice Databases., , and . FMLDO, page 133-140. University of Magedeburg, Faculty of Computer Science, (1996)Leveraging privacy profiles to empower users in the digital society., , , and . Autom. Softw. Eng., 31 (1): 16 (June 2024)Modelling Interoperability by CHAM: A Case Study., and . COORDINATION, volume 1061 of Lecture Notes in Computer Science, page 428-431. Springer, (1996)Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework., , and . FASE, volume 4422 of Lecture Notes in Computer Science, page 57-71. Springer, (2007)ESP-MC: An Experiment in the Use of Verification Tools., , and . ASIAN, volume 1023 of Lecture Notes in Computer Science, page 396-410. Springer, (1995)