 | 2008 |
5 |  | Stefan Sackmann,
Martin Kähmer,
Maike Gilliot,
Lutz Lowis:
A Classification Model for Automating Compliance.
CEC/EEE 2008: 79-86 |
4 |  | Martin Kähmer,
Maike Gilliot,
G. Muller:
Automating Privacy Compliance with ExPDT.
CEC/EEE 2008: 87-94 |
3 |  | Martin Kähmer,
Maike Gilliot:
Extended Privacy Definition Tool.
PRIMIUM 2008 |
2 |  | Lutz Lowis,
Sebastian Höhn,
Maike Gilliot:
Vulnerability Effect Propagation in Service-Oriented Archtectures.
Sicherheit 2008: 473-484 |
| 2007 |
1 |  | Daniel Weiß,
Jörn Kaack,
Stefan Kirn,
Maike Gilliot,
Lutz Lowis,
Günter Müller,
Andrea Herrmann,
Carsten Binnig,
Timea Illes,
Barbara Paech,
Donald Kossmann:
Die SIKOSA-Methodik.
Wirtschaftsinformatik 49(3): 188-198 (2007) |