Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms., , , , and . IOT, page 83-92. ACM, (2016)RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior., , and . EICS, page 3-12. ACM, (2013)A formal approach to analysis and refinement of policies.. Imperial College London, UK, (2005)British Library, EThOS.Using Event Calculus to Formalise Policy Specification and Analysis., , and . POLICY, page 26-. IEEE Computer Society, (2003)From Model-Driven Software Development Processes to Problem Diagnoses at Runtime., , , , and . Models@run.time@Dagstuhl, volume 8378 of Lecture Notes in Computer Science, page 188-207. Springer, (2011)ContraVision: presenting contrasting visions of future technology., , , , , , , and . CHI Extended Abstracts, page 4759-4764. ACM, (2010)Privacy Itch and Scratch: On Body Privacy Warnings and Controls., , , and . CHI Extended Abstracts, page 2417-2424. ACM, (2016)Preserving Designer Input on Concrete User Interfaces Using Constraints While Maintaining Adaptive Behavior., , and . CASFE, volume 1013 of CEUR Workshop Proceedings, page 9-16. CEUR-WS.org, (2013)Up Close & Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control., , , , and . TEI, page 7:1-7:13. ACM, (2021)How are you feeling?: Using Tangibles to Log the Emotions of Older Adults., , , , , , , , , and 2 other author(s). TEI, page 31-43. ACM, (2020)