Author of the publication

Modeling and Analyzing Separation of Duties in Workflow Environments.

, and . SEC, volume 193 of IFIP Conference Proceedings, page 199-212. Kluwer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Error Rates in Cryptological Programming Assignments.. World Conference on Information Security Education, volume 650 of IFIP Advances in Information and Communication Technology, page 3-16. Springer, (2022)Security of Electronic Business Applications - Structure and Quantification., and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 25-37. Springer, (2000)Messung der Schwierigkeiten von Programmieraufgaben zur Kryptologie in Java.. ABP, page 35-42. GI, (2021)Dynamic Access Control through Petri Net Workflows.. ACSAC, page 159-167. IEEE Computer Society, (2000)Prozeßmodellierung im Krankenhaus., , , and . Wirtschaftsinformatik, page 26. Physica-Verlag, (1999)Learning and Grading Cryptology via Automated Test Driven Software Development.. WISE, volume 579 of IFIP Advances in Information and Communication Technology, page 3-17. Springer, (2020)Sicherheit von E-Business-Anwendungen - Struktur und Quantifizierung., , and . Wirtschaftsinf., 42 (6): 499-508 (2000)A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components., , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 248-258. Springer, (2009)Automatisierte Überprüfung von Webauftritten auf Fremdinhalte., and . GI-Jahrestagung, volume P-326 of LNI, page 639-650. Gesellschaft für Informatik, Bonn, (2022)A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components., , and . Critical Infrastructure Protection, volume 342 of IFIP Advances in Information and Communication Technology, page 229-244. Springer, (2010)