|
Search the dblp DataBase
Wouter Joosen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen
Uniform Application-level Access Control Enforcement of Organizationwide Policies. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:431-440 [Conf]
- Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt, Yolande Berbers, Wouter Joosen
Comparative Evaluation of Converged Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:989-994 [Conf]
- Yolande Berbers, Bert Robben, Wouter Joosen, Kris Hermans
Event System Providing a Service for Filtering and Correlating Events. [Citation Graph (0, 0)][DBLP] Applied Informatics, 1999, pp:289-292 [Conf]
- Mathieu Braem, Kris Verlaenen, Niels Joncheere, Wim Vanderperren, Ragnhild Van Der Straeten, Eddy Truyen, Wouter Joosen, Viviane Jonckers
Isolating Process-Level Concerns Using Padus. [Citation Graph (0, 0)][DBLP] Business Process Management, 2006, pp:113-128 [Conf]
- Bert Lagaisse, Wouter Joosen
Component-Based Open Middleware Supporting Aspect-Oriented Software Composition. [Citation Graph (0, 0)][DBLP] CBSE, 2005, pp:139-154 [Conf]
- Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Bridging the gap between web application firewalls and web applications. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:67-77 [Conf]
- Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen
Assessment of Palm OS Susceptibility to Malicious Code Threats. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:240-249 [Conf]
- Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen
Adaptable Access Control Policies for Medical Information Systems. [Citation Graph (0, 0)][DBLP] DAIS, 2003, pp:133-140 [Conf]
- Sam Michiels, Kristof Verslype, Wouter Joosen, Bart De Decker
Towards a software architecture for DRM. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2005, pp:65-74 [Conf]
- Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
A Reflective Invocation Scheme to Realise Advanced Object Management. [Citation Graph (0, 0)][DBLP] ECOOP Workshop, 1993, pp:139-151 [Conf]
- Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
Sender-Initated and Receiver-Initated Coordination in a Global Object Space. [Citation Graph (0, 0)][DBLP] ECOOP Workshop, 1994, pp:14-28 [Conf]
- Peter Kenens, Sam Michiels, Frank Matthijs, Bert Robben, Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten
An AOP Case with Static and Dynamic Aspects. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:428-430 [Conf]
- Bo Nørregaard Jørgensen, Wouter Joosen
Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:503-506 [Conf]
- Bo Nørregaard Jørgensen, Wouter Joosen
Standardizing Component Interaction Patterns in Product-Lines Architectures. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1999, pp:197- [Conf]
- Frank Matthijs, Wouter Joosen, Bert Robben, Bart Vanhaute, Pierre Verbaeten
Multi-level Patterns. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1997, pp:112-115 [Conf]
- Bert Robben, Wouter Joosen, Frank Matthijs, Bart Vanhaute, Pierre Verbaeten
Components for Non-Functional Requirements. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:151-152 [Conf]
- Bert Robben, Wouter Joosen, Frank Matthijs, Bart Vanhaute, Pierre Verbaeten
A Metaobject Protocol for Correlate. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:367-368 [Conf]
- Eddy Truyen, Bert Robben, Peter Kenens, Frank Matthijs, Sam Michiels, Wouter Joosen, Pierre Verbaeten
Open Implementation of a Mobile Communication System. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:315-316 [Conf]
- Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
Observation of a Global Object Space on a Distributed Memory Machine. [Citation Graph (0, 0)][DBLP] HICSS (2), 1994, pp:615-624 [Conf]
- Kris Verlaenen, Wouter Joosen, Pierre Verbaeten
Arriclides: An Architecture Integrating Clinical Decision Support Models. [Citation Graph (0, 0)][DBLP] HICSS, 2007, pp:135- [Conf]
- Robert Bywater, Wouter Joosen, Stijn Bijnens, Pierre Verbaeten, Thomas Larsen, John W. Perram
Object-Oriented Simulation Software for Drug Design. [Citation Graph (0, 0)][DBLP] HPCN, 1994, pp:189-196 [Conf]
- Wouter Joosen, Stijn Bijnens, Johan Van Oeyen, Bert Robben, Frank Matthijs, Pierre Verbaeten, John W. Perram
Affordable Overhead in CORRELATE: Comparing two MD Simulators. [Citation Graph (0, 0)][DBLP] HPCN Europe, 1996, pp:219-227 [Conf]
- Wouter Joosen, Stijn Bijnens, Bert Robben, Johan Van Oeyen, Pierre Verbaeten
Flexible load balancing software for parallel applications in a time-sharing environment. [Citation Graph (0, 0)][DBLP] HPCN Europe, 1995, pp:398-406 [Conf]
- Romain Slootmaekers, Henk Van Wulpen, Wouter Joosen
Modelling Genetic Search Agents with a Concurrent Object-Oriented Language. [Citation Graph (0, 0)][DBLP] HPCN Europe, 1998, pp:843-853 [Conf]
- Sam Michiels, Nico Janssens, Wouter Joosen, Pierre Verbaeten
Decentralized cooperative management: a bottom-up approach. [Citation Graph (0, 0)][DBLP] IADIS AC, 2005, pp:401-408 [Conf]
- Yves Younan, Wouter Joosen, Frank Piessens
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:379-398 [Conf]
- Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo Nørregaard Jørgensen
Dynamic and Selective Combination of Extensions in Component-Based Applications. [Citation Graph (0, 0)][DBLP] ICSE, 2001, pp:233-242 [Conf]
- Eddy Truyen, Wouter Joosen, Pierre Verbaeten
Consistency Management in the Presence of Simultaneous Client-Specific Views. [Citation Graph (0, 0)][DBLP] ICSM, 2002, pp:501-510 [Conf]
- Wouter Joosen, Bert Robben, Henk Van Wulpen, Pierre Verbaeten
Experiences with an Object-Oriented Parallel Language: The CORRELATE Project. [Citation Graph (0, 0)][DBLP] ISCOPE, 1997, pp:73-80 [Conf]
- Yves Younan, Wouter Joosen, Frank Piessens
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. [Citation Graph (0, 0)][DBLP] IWIA, 2005, pp:3-20 [Conf]
- Eddy Truyen, Bert Robben, Bart Vanhaute, Tim Coninx, Wouter Joosen, Pierre Verbaeten
Portable Support for Transparent Thread Migration in Java. [Citation Graph (0, 0)][DBLP] ASA/MA, 2000, pp:29-43 [Conf]
- Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
Language Constructs for Coordination in an Agent Space. [Citation Graph (0, 0)][DBLP] MAAMAW, 1994, pp:90-105 [Conf]
- Wouter Joosen, Stijn Bijnens, Frank Matthijs, Bert Robben, Johan Van Oeyen, Pierre Verbaeten
Building Multi-Agent Systems with CORRELATE. [Citation Graph (0, 0)][DBLP] MAAMAW, 1997, pp:197-209 [Conf]
- Bo Nørregaard Jørgensen, Eddy Truyen, Frank Matthijs, Wouter Joosen
Customization of Object Request Brokers by Application Specific Policies. [Citation Graph (0, 0)][DBLP] Middleware, 2000, pp:144-163 [Conf]
- Bert Lagaisse, Wouter Joosen
True and Transparent Distributed Composition of Aspect-Components. [Citation Graph (0, 0)][DBLP] Middleware, 2006, pp:42-61 [Conf]
- Thomas Larsen, Wouter Joosen, John W. Perram
The Object-Oriented Development of a Parallel Application in Polymer Dynamics. [Citation Graph (0, 0)][DBLP] PARA, 1994, pp:344-348 [Conf]
- Yolande Berbers, Bart De Decker, Wouter Joosen, Frank Matthijs, Bert Robben
Management of Events in a multi-agent system. [Citation Graph (0, 0)][DBLP] PDPTA, 1997, pp:1141-1150 [Conf]
- Frank Matthijs, Peter Kenens, Wouter Joosen, Pierre Verbaeten
Networking and Reflection: A Strong Combination. [Citation Graph (0, 0)][DBLP] Reflection, 1999, pp:141-143 [Conf]
- Bert Robben, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten
Non-functional Policies. [Citation Graph (0, 0)][DBLP] Reflection, 1999, pp:74-92 [Conf]
- Aram Hovsepyan, Stefan Van Baelen, Bert Vanhooff, Wouter Joosen, Yolande Berbers
Key Research Challenges for Successfully Applying MDD Within Real-Time Embedded Software Development. [Citation Graph (0, 0)][DBLP] SAMOS, 2006, pp:49-58 [Conf]
- Bert Vanhooff, Stefan Van Baelen, Aram Hovsepyan, Wouter Joosen, Yolande Berbers
Towards a Transformation Chain Modeling Language. [Citation Graph (0, 0)][DBLP] SAMOS, 2006, pp:39-48 [Conf]
- Bart De Win, Jan Van den Bergh 0002, Frank Matthijs, Bart De Decker, Wouter Joosen
A Security Architecture for Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:491-500 [Conf]
- Yolande Berbers, Bart De Decker, Wouter Joosen
Infrastructure for mobile agents. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1996, pp:173-180 [Conf]
- Yolande Berbers, Wouter Joosen, Pierre Verbaeten
A general purpose distributed operating system for a hypercube. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1988, pp:- [Conf]
- Yolande Berbers, Wouter Joosen, Pierre Verbaeten
On the use of load balancing mechanisms for fault tolerance support. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1990, pp:- [Conf]
- Yolande Berbers, Wouter Joosen, Pierre Verbaeten
Object-orientation as an appropriate paradigm for high-performance environments for scientific computing. [Citation Graph (0, 0)][DBLP] ACM SIGOPS European Workshop, 1992, pp:- [Conf]
- Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen
Improving Intrusion Detection through Alert Verification. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:207-216 [Conf]
- Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. [Citation Graph (0, 0)][DBLP] Software Composition, 2006, pp:34-49 [Conf]
- Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre Verbaeten
The DiPS+ Software Architecture for Self-healing Protocol Stacks. [Citation Graph (0, 0)][DBLP] WICSA, 2004, pp:233-242 [Conf]
- Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Towards preserving correctness in self-managed software systems. [Citation Graph (0, 0)][DBLP] WOSS, 2004, pp:34-38 [Conf]
- Maarten Bynens, Bart De Win, Wouter Joosen, Bart Theeten
Ontology-Based Discovery of Data-Driven Services. [Citation Graph (0, 0)][DBLP] SOSE, 2006, pp:175-178 [Conf]
- Bo Nørregaard Jørgensen, Eddy Truyen, Wouter Joosen
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration. [Citation Graph (0, 0)][DBLP] TOOLS (33), 2000, pp:181-194 [Conf]
- Bo Nørregaard Jørgensen, Wouter Joosen
Classifying Component Interaction in Product-Line Architectures. [Citation Graph (0, 0)][DBLP] TOOLS (32), 1999, pp:66-77 [Conf]
- Nico Janssens, Wouter Joosen, Pierre Verbaeten
NeCoMan: Middleware for Safe Distributed-Service Adaptation in Programmable Networks. [Citation Graph (0, 0)][DBLP] IEEE Distributed Systems Online, 2005, v:6, n:7, pp:- [Journal]
- Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen
A Modular Access Control Service for Supporting Application-Specific Policies. [Citation Graph (0, 0)][DBLP] IEEE Distributed Systems Online, 2006, v:7, n:6, pp:- [Journal]
- Frank Piessens, Bart Jacobs 0002, Wouter Joosen
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. [Citation Graph (0, 0)][DBLP] IEE Proceedings - Software, 2003, v:150, n:5, pp:303-307 [Journal]
- Frank Piessens, Bart Jacobs 0002, Eddy Truyen, Wouter Joosen
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2004, v:3, n:2, pp:27-35 [Journal]
- Eddy Truyen, Wouter Joosen
Run-Time and Atomic Weaving of Distributed Aspects. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:147-181 [Journal]
- Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen
Extended Protection against Stack Smashing Attacks without Performance Loss. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:429-438 [Conf]
- Koen Buyens, Riccardo Scandariato, Wouter Joosen
Process Activities Supporting Security Principles. [Citation Graph (0, 0)][DBLP] COMPSAC (2), 2007, pp:281-292 [Conf]
- Tom Goovaerts, Bart De Win, Wouter Joosen
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. [Citation Graph (0, 0)][DBLP] DAIS, 2007, pp:253-266 [Conf]
- Frans Sanen, Eddy Truyen, Wouter Joosen
Managing Concern Interactions in Middleware. [Citation Graph (0, 0)][DBLP] DAIS, 2007, pp:267-283 [Conf]
- Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo Nørregaard Jørgensen
A Dynamic Customization Model for Distributed Component-Based Systems. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2001, pp:147-156 [Conf]
- Kris Verlaenen, Bart De Win, Wouter Joosen
Towards simplified specification of policies in different domains. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:20-29 [Conf]
- Bert Vanhooff, Dhouha Ayed, Stefan Van Baelen, Wouter Joosen, Yolande Berbers
UniTI: A Unified Transformation Infrastructure. [Citation Graph (0, 0)][DBLP] MoDELS, 2007, pp:31-45 [Conf]
- Bert Lagaisse, Eddy Truyen, Wouter Joosen
Multi-stage Aspect-Oriented Composition of Component-Based Applications. [Citation Graph (0, 0)][DBLP] OTM Conferences (1), 2007, pp:630-647 [Conf]
- Kris Verlaenen, Bart De Win, Wouter Joosen
Policy Analysis Using a Hybrid Semantic Reasoning Engine. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:193-200 [Conf]
Empirical and statistical analysis of risk analysis-driven techniques for threat management. [Citation Graph (, )][DBLP]
Using Security Patterns to Combine Security Metrics. [Citation Graph (, )][DBLP]
Hardening XDS-Based Architectures. [Citation Graph (, )][DBLP]
Transforming Security Requirements into Architecture. [Citation Graph (, )][DBLP]
Linking Privacy Solutions to Developer Goals. [Citation Graph (, )][DBLP]
Risk-Driven Architectural Decomposition. [Citation Graph (, )][DBLP]
Identifying and Resolving Least Privilege Violations in Software Architectures. [Citation Graph (, )][DBLP]
Protecting Global and Static Variables from Buffer Overflow Attacks. [Citation Graph (, )][DBLP]
Support for distributed adaptations in aspect-oriented middleware. [Citation Graph (, )][DBLP]
Domain-driven discovery of stable abstractions for pointcut interfaces. [Citation Graph (, )][DBLP]
A generic and reflective debugging architecture to support runtime visibility and traceability of aspects. [Citation Graph (, )][DBLP]
From aspect-oriented models to aspect-oriented code?: the maintenance perspective. [Citation Graph (, )][DBLP]
A permission system for secure AOP. [Citation Graph (, )][DBLP]
A sensor middleware and agent-based communication platform for supply-chain management. [Citation Graph (, )][DBLP]
A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP]
Towards a measuring framework for security properties of software. [Citation Graph (, )][DBLP]
Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP]
PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems. [Citation Graph (, )][DBLP]
HProxy: Client-Side Detection of SSL Stripping Attacks. [Citation Graph (, )][DBLP]
Generic Reusable Concern Compositions. [Citation Graph (, )][DBLP]
Modeling Context-Dependent Aspect Interference Using Default Logics. [Citation Graph (, )][DBLP]
Mapping problem-space to solution-space features: a feature interaction approach. [Citation Graph (, )][DBLP]
Using Multi-Level Security Annotations to Improve Software Assurance. [Citation Graph (, )][DBLP]
Using AADL to Model a Protocol Stack. [Citation Graph (, )][DBLP]
An object-oriented approach to datatype-generic programming. [Citation Graph (, )][DBLP]
Managing Real-World System Configurations with Constraints. [Citation Graph (, )][DBLP]
A formal model for self-adaptive and self-healing organizations. [Citation Graph (, )][DBLP]
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality. [Citation Graph (, )][DBLP]
QARI: Quality Aware Software Deployment for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Federated and Shared Use of Sensor Networks through Security Middleware. [Citation Graph (, )][DBLP]
Managing your content with CIMPLE - a content-centric storage interface. [Citation Graph (, )][DBLP]
PoDIM: A Language for High-Level Configuration Management. [Citation Graph (, )][DBLP]
Federated Access Control and Workflow Enforcement in Systems Configuration. [Citation Graph (, )][DBLP]
On the integration of sensor networks and general purpose IT infrastructure. [Citation Graph (, )][DBLP]
The case for aspect-oriented reflective middleware. [Citation Graph (, )][DBLP]
Dynamic reconfiguration using template based web service composition. [Citation Graph (, )][DBLP]
Towards policy-based management of sensor networks. [Citation Graph (, )][DBLP]
A comparison of two approaches for achieving flexible and adaptive security middleware. [Citation Graph (, )][DBLP]
DAViM: a dynamically adaptable virtual machine for sensor networks. [Citation Graph (, )][DBLP]
Towards fine-grained and application-centric access control for wireless sensor networks. [Citation Graph (, )][DBLP]
A Credential-Based System for the Anonymous Delegation of Rights. [Citation Graph (, )][DBLP]
Fine-Grained Tailoring of Component Behaviour for Embedded Systems. [Citation Graph (, )][DBLP]
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. [Citation Graph (, )][DBLP]
A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions. [Citation Graph (, )][DBLP]
Weaving the Fabric of the Control Loop through Aspects. [Citation Graph (, )][DBLP]
Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages. [Citation Graph (, )][DBLP]
Adding dynamic reconfiguration support to JBoss AOP. [Citation Graph (, )][DBLP]
Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data. [Citation Graph (, )][DBLP]
Automated Detection of Least Privilege Violations in Software Architectures. [Citation Graph (, )][DBLP]
Measuring the interplay of security principles in software architectures. [Citation Graph (, )][DBLP]
LooCI: a loosely-coupled component infrastructure for networked embedded systems. [Citation Graph (, )][DBLP]
Tracking and tracing containers through distributed sensor middleware. [Citation Graph (, )][DBLP]
Managing Agent Interactions with Context-Driven Dynamic Organizations. [Citation Graph (, )][DBLP]
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. [Citation Graph (, )][DBLP]
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. [Citation Graph (, )][DBLP]
Extending middleware frameworks for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe. [Citation Graph (, )][DBLP]
DAVIM: Adaptable Middleware for Sensor Networks. [Citation Graph (, )][DBLP]
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. [Citation Graph (, )][DBLP]
The S3MS.NET Run Time Monitor: Tool Demonstration. [Citation Graph (, )][DBLP]
Search in 0.024secs, Finished in 0.029secs
|