Dimitri Van Landuyt

Orcid: 0000-0001-6597-2271

According to our database1, Dimitri Van Landuyt authored at least 98 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A study of NoSQL query injection in Neo4j.
Comput. Secur., February, 2024

2023
Security and Privacy Threat Analysis for Solid.
Proceedings of the IEEE Secure Development Conference, 2023

Expressive and Systematic Risk Assessments with Instance-Centric Threat Models.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Demonstration of the DPMF for Data Protection Analysis.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2023

Joint Learning: A Pattern for Reliable and Efficient Decision-Making in Self-Adaptive Internet of Things.
Proceedings of the 28th European Conference on Pattern Languages of Programs, 2023


2022
A descriptive study of assumptions in STRIDE security threat modeling.
Softw. Syst. Model., 2022


A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification.
Proceedings of the Software Architecture - 16th European Conference, 2022

2021
CryptDICE: Distributed data protection system for secure cloud data storage and computation.
Inf. Syst., 2021

Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS.
Future Gener. Comput. Syst., 2021

A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases.
Proceedings of the Performance Evaluation and Benchmarking, 2021

The architectural divergence problem in security and privacy of eHealth IoT product lines.
Proceedings of the SPLC '21: 25th ACM International Systems and Software Product Line Conference, 2021

Automated Threat Analysis and Management in a Continuous Integration Pipeline.
Proceedings of the IEEE Secure Development Conference, 2021

Threat modeling at run time: the case for reflective and adaptive threat management (NIER track).
Proceedings of the 16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2021

Shared memory protection in a multi-tenant JVM.
Proceedings of the MPLR '21: 18th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2021

An Overview of Runtime Data Protection Enforcement Approaches.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
DPMF: A Modeling Framework for Data Protection by Design.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2020

A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks.
CoRR, 2020

Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis.
IEEE Access, 2020

Authenticated and auditable data sharing via smart contract.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A descriptive study of assumptions made in LINDDUN privacy threat elicitation.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Threat modeling: from infancy to maturity.
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020

Security Threat Modeling: Are Data Flow Diagrams Enough?
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

A Workload-Driven Document Database Schema Recommender (DBSR).
Proceedings of the Conceptual Modeling - 39th International Conference, 2020

Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
SCOPE: self-adaptive and policy-based data management middleware for federated clouds.
J. Internet Serv. Appl., 2019

Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks.
Inf. Syst., 2019

A Data Utility-Driven Benchmark for De-identification Methods.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Journal first presentation of a comparative study of workflow customization strategies: quality implications for multi-tenant SaaS.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019

Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Privacy Risk Assessment for Data Subject-Aware Threat Modeling.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Performance overhead of container orchestration frameworks for management of multi-tenant database deployments.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Analysis of architectural variants for auditable blockchain-based private data sharing.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A comparison of system description models for data protection by design.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Thread-Level CPU and Memory Usage Control of Custom Code in Multi-tenant SaaS.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

An Architectural View for Data Protection by Design.
Proceedings of the IEEE International Conference on Software Architecture, 2019

On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Continuous and Client-centric Trust Monitoring in Multi-cloud Storage.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

2018
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost.
IEEE Trans. Cloud Comput., 2018

A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS.
J. Syst. Softw., 2018

PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage.
J. Grid Comput., 2018

K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact).
Dagstuhl Artifacts Ser., 2018

Effective and efficient privacy threat modeling through domain refinements.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Solution-aware data flow diagrams for security threat modeling.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Transparent IO access control for application-level tenant isolation.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Risk-based design security analysis.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

Knowledge-enriched security and privacy threat modeling.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment.
Proceedings of the 2018 IEEE International Conference on Software Architecture Companion, 2018

Interaction-Based Privacy Threat Elicitation.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Object-NoSQL Database Mappers: a benchmark study on the performance overhead.
J. Internet Serv. Appl., 2017

On the State of NoSQL Benchmarks.
Proceedings of the Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering, 2017

Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Towards scalable and dynamic data encryption for multi-tenant SaaS.
Proceedings of the Symposium on Applied Computing, 2017

Middleware for Dynamic Upgrade Activation and Compensations in Multi-tenant SaaS.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017

Towards a Platform for Empirical Software Design Studies.
Proceedings of the 1st IEEE/ACM International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering, 2017

Towards an Adaptive Middleware for Efficient Multi-Cloud Data Storage.
Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms, CrossCloud@EuroSys 2017, Belgrade, Serbia, April 23, 2017

Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017

Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Towards systematically addressing security variability in software product lines.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Systematic quality trade-off support in the software product-line configuration process.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard.
Proceedings of the 7th International Workshop on Automating Test Case Design, 2016

Scalable and manageable customization of workflows in multi-tenant SaaS offerings.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Towards a container-based architecture for multi-tenant SaaS applications.
Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, 2016

Evolving multi-tenant SaaS applications through self-adaptive upgrade enactment and tenant mediation.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery.
Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2016

2015
PaaSHopper: Policy-driven middleware for multi-PaaS environments.
J. Internet Serv. Appl., 2015

Adaptive Performance Isolation Middleware for Multi-tenant SaaS.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Expressive Data Storage Policies for Multi-cloud Storage Configurations.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines.
Proceedings of the 19th International Conference on Software Product Line, 2015

Prototizer: Agile on Steroids.
Proceedings of the Workshop on Flexible Model Driven Engineering co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2015), 2015

On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios.
Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware, 2015

On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study.
Proceedings of the 5th IEEE/ACM International Workshop on the Twin Peaks of Requirements and Architecture, 2015

Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach.
Proceedings of the 7th IEEE/ACM International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, 2015

On the Need for Federated Authorization in Cross-organizational e-Health Platforms.
Proceedings of the HEALTHINF 2015, 2015

Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS.
Proceedings of the 2nd IEEE/ACM International Symposium on Big Data Computing, 2015

2014
Efficient customization of multi-tenant Software-as-a-Service applications with service lines.
J. Syst. Softw., 2014

Towards managing variability in the safety design of an automotive hall effect sensor.
Proceedings of the 18th International Software Product Line Conference, 2014

Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report.
Proceedings of the 1st International Workshop on Model-Driven Development Processes and Practices co-located with ACM/IEEE 17th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2014), 2014

Feature Models at Run Time: Feature Middleware for Multi-tenant SaaS applications.
Proceedings of the 9th Workshop on Models@run.time co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014), 2014

Modularizing Early Architectural Assumptions in Scenario-Based Requirements.
Proceedings of the Fundamental Approaches to Software Engineering, 2014

2013
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice.
Proceedings of the Software Composition - 12th International Conference, 2013

Federated Authorization for Software-as-a-Service Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

2012
Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces.
LNCS Trans. Aspect Oriented Softw. Dev., 2012

Documenting Early Architectural Assumptions in Scenario-Based Requirements.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012

On the modularity impact of architectural assumptions.
Proceedings of the 2012 Workshop on Next Generation Modularity Approaches for Requirements and Architecture, 2012

2011
On Robust and Reusable Interfaces in Aspect-Oriented Software Architectures (Robuuste en herbruikbare interfaces in aspectgeoriënteerde architecturen).
PhD thesis, 2011

Building a Digital Publishing Platform Using AOSD - Experiences and Lessons Learned.
LNCS Trans. Aspect Oriented Softw. Dev., 2011

2010
Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain.
LNCS Trans. Aspect Oriented Softw. Dev., 2010

2009
Automating the discovery of stable domain abstractions for reusable aspects.
Proceedings of the 2009 ICSE Workshop on Aspect-Oriented Requirements Engineering and Architecture Design, 2009

2008
A domain-specific middleware layer using AOSD: next-generation digital news publishing.
Proceedings of the Middleware 2008, 2008

2007
Comparative Evaluation of Converged Service-Oriented Architectures.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007


  Loading...