Bart De Decker

According to our database1, Bart De Decker authored at least 88 papers between 1991 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Listing the ingredients for IFTTT recipes.
Proceedings of the IEEE International Conference on Trust, 2022

2021
PhD Forum: Trust Management for Context-aware Access Control Systems in IoT.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Trackers in Your Inbox: Criticizing Current Email Tracking Practices.
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021

2020
A Context-Aware Break Glass Access Control System for IoT Environments.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

2017
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems.
Proceedings of the Computer Network Security, 2017

Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices.
Secur. Commun. Networks, 2016

Ethical aspects in eHealth - design of a privacy-friendly system.
J. Inf. Commun. Ethics Soc., 2016

PACCo: Privacy-friendly Access Control with Context.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

An Assessment of Security Analysis Tools for Cyber-Physical Systems.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

Attribute-Based Privacy-Friendly Access Control with Context.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

2015
An Efficient, Anonymous and Unlinkable Incentives Scheme.
Int. J. Inf. Secur. Priv., 2015

uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Privacy-Preserving Public Transport Ticketing System.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Formal Reasoning About Privacy and Trust in Loyalty Systems.
Proceedings of the Business Information Systems Workshops, 2015

2014
inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Trusted Computing to Increase Security and Privacy in eID Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

A keyboard that manages your passwords in Android.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

A SysML Extension for Security Analysis of Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

Secure Storage on Android with Context-Aware Access Control.
Proceedings of the Communications and Multimedia Security, 2014

EmailCloak: A Practical and Flexible Approach to Improve Email Privacy.
Proceedings of the Ninth International Conference on Availability, 2014

2013
User-centric identity management using trusted modules.
Math. Comput. Model., 2013

An Advanced, Privacy-Friendly Loyalty System.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services.
Proceedings of the Information Systems Security - 9th International Conference, 2013

A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

Client-Side Biometric Verification Based on Trusted Computing.
Proceedings of the Communications and Multimedia Security, 2013

2012
Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System.
Proceedings of the Information Security and Privacy Research, 2012

Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation.
Proceedings of the Information Security and Privacy Research, 2012

Claim-Based versus Network-Based Identity Management: A Hybrid Approach.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

Privacy-Preserving Scheduling Mechanism for eHealth Systems.
Proceedings of the Communications and Multimedia Security, 2012

Data-Minimizing Authentication Goes Mobile.
Proceedings of the Communications and Multimedia Security, 2012

2011
Privacy Preserving Mechanisms for a Pervasive eHealth System.
Proceedings of the Privacy and Identity Management for Life, 2011

Designing Privacy-Enhancing Mobile Applications.
Proceedings of the Privacy and Identity Management for Life, 2011

Using a Smartphone to Access Personalized Web Services on a Workstation.
Proceedings of the Privacy and Identity Management for Life, 2011

Commercial Home Assistance (eHealth) Services.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Secure Negotiation for Manual Authentication Protocols.
Proceedings of the Communications and Multimedia Security, 2011

Analysis of Revocation Strategies for Anonymous Idemix Credentials.
Proceedings of the Communications and Multimedia Security, 2011

A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning.
Proceedings of the Communications and Multimedia Security, 2011

2010
Building advanced applications with the Belgian eID.
Secur. Commun. Networks, 2010

Performance Analysis of Accumulator-Based Revocation Mechanisms.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

A Smart Card Based Solution for User-Centric Identity Management.
Proceedings of the Privacy and Identity Management for Life, 2010

Personalized Mobile Services with Lightweight Security in a Sports Association.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

A Mobile and Reliable Anonymous ePoll Infrastructure.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Privacy in Commercial Medical Storage Systems.
Proceedings of the Electronic Healthcare - Third International Conference, 2010

<i>PriMan</i> : A Privacy-Preserving Identity Framework.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
Service and Timeframe Dependent Unlinkable One-time Pseudonyms.
Proceedings of the SECRYPT 2009, 2009

Security and Privacy Improvements for the Belgian eID Technology.
Proceedings of the Emerging Challenges for Security, 2009

Extending the Belgian eID Technology with Mobile Security Functionality.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Privacy Policies, Tools and Mechanisms of the Future.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Flexible and Time-Based Anonymous Access Restrictions.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Anonymous, Yet Trustworthy Auctions.
Proceedings of the Software Services for e-Business and e-Society, 2009

Privacy-Preserving Telemonitoring for eHealth.
Proceedings of the Data and Applications Security XXIII, 2009

Specification of Fair Data Practice Principles Using Privacy Policy Languages.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Linking Privacy Solutions to Developer Goals.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Ubiquitous Privacy-Preserving Identity Managment.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System.
Proceedings of the Public Key Infrastructure, 2008

A Privacy-Preserving Ticketing System.
Proceedings of the Data and Applications Security XXII, 2008

2007
Enhancing privacy in identity management systems.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

A Credential-Based System for the Anonymous Delegation of Rights.
Proceedings of the New Approaches for Security, 2007

A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
A Methodology for Designing Controlled Anonymous Applications.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Privacy Friendly Information Disclosure.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Flexible and Open DRM Framework.
Proceedings of the Communications and Multimedia Security, 2006

A Fair Anonymous Submission and Review System.
Proceedings of the Communications and Multimedia Security, 2006

2005
Accountable Anonymous E-Mail.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Towards a software architecture for DRM.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

Assessment of Palm OS Susceptibility to Malicious Code Threats.
Proceedings of the Communications and Multimedia Security, 2005

Privacy-Preserving Electronic Health Records.
Proceedings of the Communications and Multimedia Security, 2005

2003
Secure Vickrey Auctions without a Trusted Third Party.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
How aspect-oriented programming can help to build secure software.
Informatica (Slovenia), 2002

2001
Developing secure software. A survey and classification of common software vulnerabilities.
Proceedings of the Integrity, 2001

On Securely Scheduling a Meeting.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Security Through Aspect-Oriented Programming.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Securing RMI Communication.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Second Price Auctions - A Case Study of Secure Distributed Computating.
Proceedings of the New Developments in Distributed Applications and Interoperable Systems, 2001

2000
A Security Architecture for Electronic Commerce Applications.
Proceedings of the Information Security for Global Information Infrastructures, 2000

On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations.
Proceedings of the Mobile Agents for Telecommunication Applications, 2000

1997
Management of Events in a multi-agent system.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

Introduction to Computer Security.
Proceedings of the State of the Art in Applied Cryptography, 1997

1996
Infrastructure for mobile agents.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

CAMUS: A Cognitive Model for Reverse Engineering-Bases Program Analysis.
Proceedings of the 8th Annual Workshop of the Psychology of Programming Interest Group, 1996

Panel Discussion: The Use of Internet in Education.
Proceedings of the Computer Aided Learning and Instruction in Science and Engineering, 1996

1993
Interconnecting domains with heterogeneous key distribution and authentication protocols.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

1991
Unix Security & Kerberos.
Proceedings of the Computer Security and Industrial Cryptography, 1991


  Loading...