![]() | ![]() |
2008 | ||
---|---|---|
4 | EE | Tom Goovaerts, Bart De Win, Wouter Joosen: A comparison of two approaches for achieving flexible and adaptive security middleware. Middleware Security 2008: 19-24 |
3 | EE | Tom Goovaerts, Bart De Win, Wouter Joosen: Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. Electr. Notes Theor. Comput. Sci. 197(1): 31-43 (2008) |
2007 | ||
2 | EE | Tom Goovaerts, Bart De Win, Wouter Joosen: A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. DAIS 2007: 253-266 |
2005 | ||
1 | EE | Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen: Assessment of Palm OS Susceptibility to Malicious Code Threats. Communications and Multimedia Security 2005: 240-249 |
1 | Bart De Decker | [1] |
2 | Wouter Joosen | [1] [2] [3] [4] |
3 | Bart De Win | [1] [2] [3] [4] |