Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CRAC: Confidentiality risk assessment and IT-infrastructure comparison., , , and . CNSM, page 322-325. IEEE, (2010)Towards middle-range usable design theories for software engineering.. GTSE, page 1-4. ACM, (2014)Validating the Raster Risk Assessment Method in Practice., , and . ISCRAM, ISCRAM Association, (2015)Integrated Specification of Values, Objects and Processes for Object-Oriented Models (Extended Abstract).. FMLDO, volume 90/3 of Informatik-Berichte des IfI, page 199-208. Technische Universität Clausthal, (1990)Design science methodology: principles and practice.. ICSE (2), page 493-494. ACM, (2010)978-1-60558-719-6.Towards self-configuration and management of e-service provisioning in dynamic value constellations., , , and . SAC, page 566-571. ACM, (2008)Embedding Object-Oriented Design in System Engineering.. Behavioral Specifications of Businesses and Systems, volume 523 of The Kluwer International Series in Engineering and Computer Science, Springer, (1999)The mutual exclusion problem in reasoning about action and change., , and . NMR, page 365-371. (2002)Minimal Semantics for Action Specifications in a Multi-modal Logic., , and . FMLDO, page 1-10. University of Magedeburg, Faculty of Computer Science, (1996)Requirements engineering - frameworks for understanding.. Wiley, (1996)