From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Schrödinger's security: opening the box on app developers' security rationale., , , , , , , и . ICSE, стр. 149-160. ACM, (2020)Privacy Requirements: Present & Future., , и . ICSE-SEIS, стр. 13-22. IEEE Computer Society, (2017)Software Engineering for Privacy in-the-Large., и . ICSE (2), стр. 947-948. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).An approach for aspect-oriented use case modeling., и . EA@ICSE, стр. 27-34. ACM, (2008)Do the Privacy Policies Reflect the Privacy Controls on Social Networks?, , и . SocialCom/PASSAT, стр. 1155-1158. IEEE Computer Society, (2011)Aspect-oriented use case modeling for software product lines., и . EA@AOSD, стр. 5:1-5:8. ACM, (2008)Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language., , , и . ESSoS, том 9639 из Lecture Notes in Computer Science, стр. 233-250. Springer, (2016)Reducing Permission Requests in Mobile Apps., , , , , , и . Internet Measurement Conference, стр. 259-266. ACM, (2019)A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks., , и . APF, том 8319 из Lecture Notes in Computer Science, стр. 187-202. Springer, (2012)Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy., , , , , , и . AsiaCCS, стр. 694-707. ACM, (2020)