dblp.uni-trier.dewww.uni-trier.de

Bart De Win

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
27 Bart De Win, Seok-Won Lee, Mattia Monga: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS 2008, Leipzig, Germany, May 17-18, 2008 ACM 2008
26EEKoen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen: Transforming Security Requirements into Architecture. ARES 2008: 1421-1428
25EEBart De Win, Seok-Won Lee, Mattia Monga: The fourth international workshop on software engineering for secure systems: SESS'08 -- a trusted business world. ICSE Companion 2008: 1069-1070
24EETom Goovaerts, Bart De Win, Wouter Joosen: A comparison of two approaches for achieving flexible and adaptive security middleware. Middleware Security 2008: 19-24
23 Koen Buyens, Bart De Win, Wouter Joosen: Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. WOSIS 2008: 145-150
22EETom Goovaerts, Bart De Win, Wouter Joosen: Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. Electr. Notes Theor. Comput. Sci. 197(1): 31-43 (2008)
2007
21EEKoen Buyens, Bart De Win, Wouter Joosen: Empirical and statistical analysis of risk analysis-driven techniques for threat management. ARES 2007: 1034-1041
20EETom Goovaerts, Bart De Win, Wouter Joosen: A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. DAIS 2007: 253-266
19EEDanilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga: The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. ICSE Companion 2007: 111-112
18EEKris Verlaenen, Bart De Win, Wouter Joosen: Towards simplified specification of policies in different domains. Integrated Network Management 2007: 20-29
17EEKris Verlaenen, Bart De Win, Wouter Joosen: Policy Analysis Using a Hybrid Semantic Reasoning Engine. POLICY 2007: 193-200
2006
16EEDanilo Bruschi, Bart De Win, Mattia Monga: Software engineering for secure systems. ICSE 2006: 1007-1008
15EERiccardo Scandariato, Bart De Win, Wouter Joosen: Towards a measuring framework for security properties of software. QoP 2006: 27-30
14EEMaarten Bynens, Bart De Win, Wouter Joosen, Bart Theeten: Ontology-Based Discovery of Data-Driven Services. SOSE 2006: 175-178
13 Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen: Improving Intrusion Detection through Alert Verification. WOSIS 2006: 207-216
12EETine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen: A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Systems Online 7(6): (2006)
2005
11EETine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen: Uniform Application-level Access Control Enforcement of Organizationwide Policies. ACSAC 2005: 431-440
10EETom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen: Assessment of Palm OS Susceptibility to Malicious Code Threats. Communications and Multimedia Security 2005: 240-249
9EEDanilo Bruschi, Bart De Win, Mattia Monga: Software engineering for secure systems. ICSE 2005: 681
8EEDanilo Bruschi, Bart De Win, Mattia Monga: Software engineering for secure systems. ACM SIGSOFT Software Engineering Notes 30(4): 1-2 (2005)
7EETine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen: Requirements traceability to support evolution of access control. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
6EEBart De Win, Frank Piessens, Jan Smans, Wouter Joosen: Towards a unifying view on security contracts. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
2003
5EETine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen: Adaptable Access Control Policies for Medical Information Systems. DAIS 2003: 133-140
2002
4 Bart De Win, Bart Vanhaute, Bart De Decker: How aspect-oriented programming can help to build secure software. Informatica (Slovenia) 26(2): (2002)
2001
3 Frank Piessens, Bart De Decker, Bart De Win: Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40
2 Bart De Win, Bart Vanhaute, Bart De Decker: Security Through Aspect-Oriented Programming. Network Security 2001: 125-138
2000
1 Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen: A Security Architecture for Electronic Commerce Applications. SEC 2000: 491-500

Coauthor Index

1Jan Van den Bergh [1]
2Danilo Bruschi [8] [9] [16] [19]
3Koen Buyens [21] [23]
4Maarten Bynens [14]
5Bart De Decker [1] [2] [3] [4] [10]
6Tom Goovaerts [10] [20] [22] [24]
7Thomas Heyman [13]
8Christophe Huygens [13]
9Liesbeth Jaco [5]
10Wouter Joosen [1] [5] [6] [7] [10] [11] [12] [13] [14] [15] [17] [18] [20] [21] [22] [23] [24] [26]
11Seok-Won Lee [19] [25] [27]
12Frank Matthijs [1]
13Mattia Monga [8] [9] [16] [19] [25] [27]
14Frank Piessens [3] [5] [6] [7] [11] [12]
15Riccardo Scandariato [15] [26]
16Jan Smans [6]
17Bart Theeten [14]
18Eddy Truyen [12]
19Bart Vanhaute [2] [4]
20Tine Verhanneman [5] [7] [11] [12]
21Kris Verlaenen [17] [18]
22Koen Yskout [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)