Author of the publication

First international workshop on privacy and security in programming (PSP).

, , and . SPLASH (Companion Volume), page 83-84. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Services for Enhancing Human Crowdsourcing with Computing Elements., , , , , and . IEEE MS, page 149-152. IEEE Computer Society, (2014)Specifying and Analysing Trust for Internet Applications, and . (2002)Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations., , , , and . DBSec, volume 7964 of Lecture Notes in Computer Science, page 97-112. Springer, (2013)Recommendation-Based De-identification: A Practical Systems Approach towards De-identification of Unstructured Text in Healthcare., , and . SERVICES, page 155-162. IEEE Computer Society, (2012)Security Usability Principles for Vulnerability Analysis and Risk Assessment., , , , und . ACSAC, Seite 269-278. IEEE Computer Society, (2007)Hippocratic Databases: Current Capabilities and Future Trends., , und . Handbook of Database Security, Springer, (2008)Regulatory Compliance and the Correlation to Privacy Protection in Healthcare., und . Int. J. Comput. Model. Algorithms Medicine, 1 (2): 37-52 (2010)Increasing the accessibility to Big Data systems via a common services API., , , , , , , , und . IEEE BigData, Seite 883-892. IEEE Computer Society, (2014)An evaluation of feature sets and sampling techniques for de-identification of medical records., , , , , und . IHI, Seite 183-190. ACM, (2010)A Privacy Reinforcement Approach against De-identified Dataset., , , , , und . ICEBE, Seite 370-375. IEEE Computer Society, (2011)