Manuel Rudolph

According to our database1, Manuel Rudolph authored at least 13 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Generation of Usable Policy Administration Points for Security and Privacy.
PhD thesis, 2020

2019
Enabling Users to Specify Correct Privacy Requirements.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2019

Usable Specification of Security and Privacy Demands: Matching User Types to Specification Paradigms.
Proceedings of the Mensch und Computer 2019, 2019

2018
Satisfying and Efficient Privacy Settings.
Proceedings of the Mensch und Computer 2018, 2018

Why Users Ignore Privacy Policies - A Survey and Intention Model for Explaining User Privacy Behavior.
Proceedings of the Human-Computer Interaction. Theories, Methods, and Human Issues, 2018

2016
A Framework for Generating User-and Domain-Tailored Security Policy Editors.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Requirements Elicitation and Derivation of Security Policy Templates - An Industrial Case Study.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Usable Security Policy Specification.
Proceedings of the Mensch und Computer 2016, 2016

2014
Security policy specification templates for critical infrastructure services in the cloud.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2012
A Critical Survey of Security Indicator Approaches.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Security Evaluation of Service-Oriented Systems Using the SiSOA Method.
Int. J. Secur. Softw. Eng., 2011

Security Evaluation of Service-oriented Systems with an Extensible Knowledge Base.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Indicator-based architecture-level security evaluation in a service-oriented environment.
Proceedings of the Software Architecture, 4th European Conference, 2010


  Loading...