From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SES-14: Sichere und zuverlässliche Systeme: Datensouveränität., , , , , и . GI-Jahrestagung, том P-307 из LNI, стр. 111-113. GI, (2020)A Formal Security Model for Microprocessor Hardware., , и . World Congress on Formal Methods, том 1708 из Lecture Notes in Computer Science, стр. 718-737. Springer, (1999)Towards Security Certification Schemas for the Internet of Services., , , и . NTMS, стр. 1-5. IEEE, (2012)Panel on granularity in access control., , , , , и . SACMAT, стр. 85-86. ACM, (2013)Cybersecurity Certification for Agile and Dynamic Software Systems - a Process-Based Approach.. EuroS&P Workshops, стр. 85-88. IEEE, (2020)Efficient Access Control for Composite Applications., , , , и . BTW, том P-103 из LNI, стр. 613-616. GI, (2007)Formal Verification of Business Workflows and Role Based Access Control Systems., , , и . SECURWARE, стр. 201-210. IEEE Computer Society, (2007)SOA-Sicherheit für moderne Unternehmen - Anforderungen an SOA-Sicherheit auf dem Weg zum virtuellen Unternehmen.. Datenschutz und Datensicherheit, 31 (9): 644-647 (2007)Towards Accountable Services in the Cloud., и . OTM Conferences (2), том 7566 из Lecture Notes in Computer Science, стр. 470-474. Springer, (2012)Threat Scenarios as a Means to Formally Develop Secure Systems.. ESORICS, том 1146 из Lecture Notes in Computer Science, стр. 242-265. Springer, (1996)