From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysing Security Requirements of Information Systems Using Tropos., , , и . ICEIS (3), стр. 623-626. (2003)Using Security Attack Scenarios to Analyse Security During Information Systems Design., , и . ICEIS (3), стр. 10-17. (2004)Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation., , и . CyberICPS/SECPRE@ESORICS, том 10683 из Lecture Notes in Computer Science, стр. 210-225. Springer, (2017)Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations., , и . REFSQ, том 6182 из Lecture Notes in Computer Science, стр. 255-261. Springer, (2010)Towards the Development of a Cloud Forensics Methodology: A Conceptual Model., , , и . CAiSE Workshops, том 215 из Lecture Notes in Business Information Processing, стр. 470-481. Springer, (2015)Supporting Privacy by Design Using Privacy Process Patterns., , , и . SEC, том 502 из IFIP Advances in Information and Communication Technology, стр. 491-505. Springer, (2017)Migrating into the Cloud: Identifying the Major Security and Privacy Concerns., , , и . I3E, том 399 из IFIP Advances in Information and Communication Technology, стр. 73-87. Springer, (2013)A Security Analysis Method for Industrial Internet of Things., и . IEEE Trans. Ind. Informatics, 14 (9): 4093-4100 (2018)Eliciting Security Requirements for Business Processes of Legacy Systems., , , , , , и . PoEM, том 235 из Lecture Notes in Business Information Processing, стр. 91-107. Springer, (2015)DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance., , , , , , , , , и 3 other автор(ы). TrustBus, том 11711 из Lecture Notes in Computer Science, стр. 78-93. Springer, (2019)