From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies., и . iNetSeC, том 7039 из Lecture Notes in Computer Science, стр. 89-103. Springer, (2011)Software Security Maturity in Public Organisations., , , , и . ISC, том 9290 из Lecture Notes in Computer Science, стр. 120-138. Springer, (2015)Achieving "Good Enough" Software Security: The Role of Objectivity., , и . EASE, стр. 360-365. ACM, (2020)Tool-assisted Threat Modeling for Smart Grid Cyber Security., , , и . CyberSA, стр. 1-8. IEEE, (2021)Facing Uncertainty in Cyber Insurance Policies., , , и . STM, том 10547 из Lecture Notes in Computer Science, стр. 89-100. Springer, (2017)Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects., , , и . ASWEC, стр. 111-120. IEEE Computer Society, (2018)Assessing Information Security Risks of AMI - What Makes it so Difficult?., , и . ICISSP, стр. 56-63. SciTePress, (2015)Reusable Security Requirements for Healthcare Applications., , , , и . ARES, стр. 380-385. IEEE Computer Society, (2009)Accountability Requirements in the Cloud Provider Chain., , , , , и . Symmetry, 10 (4): 124 (2018)Handling Consent to Patient Data Access in a Hospital Setting., , и . MedInfo, том 129 из Studies in Health Technology and Informatics, стр. 242-246. IOS Press, (2007)