Author of the publication

Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects.

, , , , and . Future Internet, 14 (11): 302 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAD - ein Datenmodell für den Kern eines Non-Standard-Datenbanksystems.. BTW, volume 136 of Informatik-Fachberichte, page 180-195. Springer, (1987)Improving Business Processes Through Mobile Apps - An Analysis Framework to Identify Value-added App Usage Scenarios., , , and . ICEIS (2), page 71-82. SciTePress, (2014)R2SMA - A Middleware Architecture to Access Legacy Enterprise Web Services using Lightweight REST APIs., and . ICEIS (2), page 704-711. SciTePress, (2018)Data-Driven Fault Diagnosis in End-of-Line Testing of Complex Products., , and . DSAA, page 492-503. IEEE, (2019)A Zone Reference Model for Enterprise-Grade Data Lake Management., , , , and . EDOC, page 57-66. IEEE, (2020)Query Processing in Blockchain Systems: Current State and Future Challenges., , , and . Future Internet, 14 (1): 1 (2022)Customization and provisioning of complex event processing using TOSCA., , , , and . Comput. Sci. Res. Dev., 33 (3-4): 317-327 (2018)ValueApping: An Analysis Method to Identify Value-Adding Mobile Enterprise Apps in Business Processes., , , and . ICEIS (Revised Selected Papers), volume 227 of Lecture Notes in Business Information Processing, page 222-243. Springer, (2014)Data Propagation: A Necessity for CSCSW in Design.. CSCWD, page 4-9. IEEE, (2002)Bringing privacy control back to citizens: DISPEL - a distributed privacy management platform for the internet of things., , and . SAC, page 1272-1279. ACM, (2020)