Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Configuration Based on Order Processes., , , , , and . BMSD, volume 275 of Lecture Notes in Business Information Processing, page 200-220. (2016)A Design Exploration Framework for Secure IoT-Systems., , , , and . CyberSA, page 1-8. IEEE, (2020)From Adaptive Business Processes to Orchestrated Microflows., , and . BMSD, volume 391 of Lecture Notes in Business Information Processing, page 152-168. Springer, (2020)Combining Business Process Variability and Software Variability Using Traceable Links., , , , , , and . BMSD, volume 309 of Lecture Notes in Business Information Processing, page 67-86. Springer, (2017)Multi-Layered IoT System Design Towards End-to-End Secure Communication., , , , , and . IECON, page 2213-2220. IEEE, (2020)Patterns for common criteria certification., , , and . EuroPLoP, page 33:1-33:15. ACM, (2015)Increasing the Visibility of Requirements Based on Combined Variability Management., , , , , and . BMSD, volume 319 of Lecture Notes in Business Information Processing, page 203-220. Springer, (2018)Evaluation paradigm selection according to Common Criteria for an incremental product development., , , and . MILS@HiPEAC, Zenodo, (2015)Patterns to establish a secure communication channel., , , , , and . EuroPLoP, page 13. ACM, (2016)Security based design space exploration for CPS., , , , and . SAC, page 593-595. ACM, (2020)