The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bart De Win: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen
    Uniform Application-level Access Control Enforcement of Organizationwide Policies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:431-440 [Conf]
  2. Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen
    Assessment of Palm OS Susceptibility to Malicious Code Threats. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:240-249 [Conf]
  3. Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen
    Adaptable Access Control Policies for Medical Information Systems. [Citation Graph (0, 0)][DBLP]
    DAIS, 2003, pp:133-140 [Conf]
  4. Danilo Bruschi, Bart De Win, Mattia Monga
    Software engineering for secure systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:681- [Conf]
  5. Danilo Bruschi, Bart De Win, Mattia Monga
    Software engineering for secure systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:1007-1008 [Conf]
  6. Bart De Win, Bart Vanhaute, Bart De Decker
    Security Through Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:125-138 [Conf]
  7. Bart De Win, Jan Van den Bergh 0002, Frank Matthijs, Bart De Decker, Wouter Joosen
    A Security Architecture for Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:491-500 [Conf]
  8. Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen
    Improving Intrusion Detection through Alert Verification. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:207-216 [Conf]
  9. Frank Piessens, Bart De Decker, Bart De Win
    Developing secure software. A survey and classification of common software vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IICIS, 2001, pp:27-40 [Conf]
  10. Maarten Bynens, Bart De Win, Wouter Joosen, Bart Theeten
    Ontology-Based Discovery of Data-Driven Services. [Citation Graph (0, 0)][DBLP]
    SOSE, 2006, pp:175-178 [Conf]
  11. Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen
    A Modular Access Control Service for Supporting Application-Specific Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2006, v:7, n:6, pp:- [Journal]
  12. Bart De Win, Bart Vanhaute, Bart De Decker
    How aspect-oriented programming can help to build secure software. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  13. Tom Goovaerts, Bart De Win, Wouter Joosen
    A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. [Citation Graph (0, 0)][DBLP]
    DAIS, 2007, pp:253-266 [Conf]
  14. Danilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga
    The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. [Citation Graph (0, 0)][DBLP]
    ICSE Companion, 2007, pp:111-112 [Conf]
  15. Kris Verlaenen, Bart De Win, Wouter Joosen
    Towards simplified specification of policies in different domains. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:20-29 [Conf]
  16. Kris Verlaenen, Bart De Win, Wouter Joosen
    Policy Analysis Using a Hybrid Semantic Reasoning Engine. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:193-200 [Conf]

  17. Empirical and statistical analysis of risk analysis-driven techniques for threat management. [Citation Graph (, )][DBLP]


  18. Transforming Security Requirements into Architecture. [Citation Graph (, )][DBLP]


  19. Identifying and Resolving Least Privilege Violations in Software Architectures. [Citation Graph (, )][DBLP]


  20. A permission system for secure AOP. [Citation Graph (, )][DBLP]


  21. Towards a measuring framework for security properties of software. [Citation Graph (, )][DBLP]


  22. The fourth international workshop on software engineering for secure systems: SESS'08 -- a trusted business world. [Citation Graph (, )][DBLP]


  23. The 5th international workshop on software engineering for secure systems (SESS'09). [Citation Graph (, )][DBLP]


  24. A comparison of two approaches for achieving flexible and adaptive security middleware. [Citation Graph (, )][DBLP]


  25. Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. [Citation Graph (, )][DBLP]


  26. Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002