Bart De Win

According to our database1, Bart De Win authored at least 34 papers between 2000 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
A permission system for secure AOP.
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010

2009
On the secure software development process: CLASP, SDL and Touchpoints compared.
Inf. Softw. Technol., 2009

The 5<sup>th</sup> international workshop on software engineering for secure systems (SESS'09).
Proceedings of the 31st International Conference on Software Engineering, 2009

Resolving least privilege violations in software architectures.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Identifying and Resolving Least Privilege Violations in Software Architectures.
Proceedings of the The Forth International Conference on Availability, 2009

Security Middleware for Mobile Applications.
Proceedings of the Middleware for Network Eccentric and Mobile Applications, 2009

2008
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization.
Proceedings of the Security in Information Systems, 2008

Transforming Security Audit Requirements into a Software Architecture.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

A comparison of two approaches for achieving flexible and adaptive security middleware.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

The fourth international workshop on software engineering for secure systems: SESS'08 -- a trusted business world.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Transforming Security Requirements into Architecture.
Proceedings of the The Third International Conference on Availability, 2008

2007
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies.
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007

Policy Analysis Using a Hybrid Semantic Reasoning Engine.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Towards simplified specification of policies in different domains.
Proceedings of the Integrated Network Management, 2007

On the Secure Software Development Process: CLASP and SDL Compared.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment.
Proceedings of the Distributed Applications and Interoperable Systems, 2007

Empirical and statistical analysis of risk analysis-driven techniques for threat management.
Proceedings of the The Second International Conference on Availability, 2007

2006
A Modular Access Control Service for Supporting Application-Specific Policies.
IEEE Distributed Syst. Online, 2006

Ontology-Based Discovery of Data-Driven Services.
Proceedings of the 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), 2006

Improving Intrusion Detection through Alert Verification.
Proceedings of the Security in Information Systems, 2006

How secure is AOP and what can we do about it?
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

Introduction to software engineering for secure systems: SESS06 - secure by design.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

Towards a measuring framework for security properties of software.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
Towards a unifying view on security contracts.
ACM SIGSOFT Softw. Eng. Notes, 2005

Requirements traceability to support evolution of access control.
ACM SIGSOFT Softw. Eng. Notes, 2005

Software engineering for secure systems.
ACM SIGSOFT Softw. Eng. Notes, 2005

Assessment of Palm OS Susceptibility to Malicious Code Threats.
Proceedings of the Communications and Multimedia Security, 2005

Uniform Application-level Access Control Enforcement of Organizationwide Policies.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2003
Adaptable Access Control Policies for Medical Information Systems.
Proceedings of the Distributed Applications and Interoperable Systems, 2003

2002
How aspect-oriented programming can help to build secure software.
Informatica (Slovenia), 2002

2001
Developing secure software. A survey and classification of common software vulnerabilities.
Proceedings of the Integrity, 2001

Security Through Aspect-Oriented Programming.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

2000
A Security Architecture for Electronic Commerce Applications.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...