Author of the publication

Extending a temporal rule language with deontic operators.

, and . SEKE, page 314-321. Knowledge Systems Institute, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eliciting security requirements with misuse cases, and . Requir. Eng., 10 (1): 34--44 (2005)Argumentative agents to handle the conflicts between web services: a prototype., and . MEDES, page 442-445. ACM, (2009)Visually Capturing Usage Context in BPMN by Small Adaptations of Diagram Notation., , and . BMMDS/EMMSAD, volume 147 of Lecture Notes in Business Information Processing, page 324-338. Springer, (2013)Diagram Notations for Mobile Work Processes., and . PoEM, volume 92 of Lecture Notes in Business Information Processing, page 52-66. Springer, (2011)Improving the Information Security Model by using TFI., , and . SEC, volume 232 of IFIP, page 73-84. Springer, (2007)Towards a Deeper Understanding of Quality in Requirements Engineering, , and . CAiSE, volume 932 of Lecture Notes in Computer Science, page 82-95. Springer, (1995)A Netnographic Study on the Dark Net Ecosystem for Ransomware., , and . CyberSA, page 1-8. IEEE, (2018)The Ransomware-as-a-Service economy within the darknet., , and . Comput. Secur., (2020)An Analytical Evaluation of BPMN Using a Semiotic Quality Framework., and . EMMSAD, volume 363 of CEUR Workshop Proceedings, page 147-158. CEUR-WS.org, (2005)E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs?, and . I3E, volume 11701 of Lecture Notes in Computer Science, page 585-596. Springer, (2019)