Author of the publication

Integration of an Ontological Information Security Concept in Risk Aware Business Process Management.

, , , , , and . HICSS, page 377. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard., , , , and . PRDC, page 381-388. IEEE Computer Society, (2007)A research agenda for Autonomous Business Process Management., , and . ARES, page 670-680. IEEE Computer Society, (2007)Integration of an Ontological Information Security Concept in Risk Aware Business Process Management., , , , , and . HICSS, page 377. IEEE Computer Society, (2008)A secure architecture for the pseudonymization of medical data., , , , , and . ARES, page 318-324. IEEE Computer Society, (2007)CASSIS - Computer-based Academy for Security and Safety in Information Systems., , , , , and . ARES, page 730-740. IEEE Computer Society, (2007)A Comparative Literature Review on RFID Security and Privacy., , , and . iiWAS, volume 229 of books@ocg.at, page 213-222. Austrian Computer Society, (2007)Ontological Mapping of Common Criteria's Security Assurance Requirements., , , and . SEC, volume 232 of IFIP, page 85-95. Springer, (2007)A process model for RFID based Business Process Analysis., , , , and . APSCC, page 478-483. IEEE, (2009)Semantic Storage: A Report on Performance and Flexibility., , , , , and . DEXA, volume 3588 of Lecture Notes in Computer Science, page 586-595. Springer, (2005)