Kim Wuyts

Orcid: 0000-0002-0950-9490

According to our database1, Kim Wuyts authored at least 21 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy Engineering From Principles to Practice: A Roadmap.
IEEE Secur. Priv., 2024

2023
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

2022
Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
DPMF: A Modeling Framework for Data Protection by Design.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2020

Threat modeling: from infancy to maturity.
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020

LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
A Data Utility-Driven Benchmark for De-identification Methods.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Privacy Risk Assessment for Data Subject-Aware Threat Modeling.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

A comparison of system description models for data protection by design.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

An Architectural View for Data Protection by Design.
Proceedings of the IEEE International Conference on Software Architecture, 2019

2018
Effective and efficient privacy threat modeling through domain refinements.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Interaction-Based Privacy Threat Elicitation.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2015
A descriptive study of Microsoft's threat modeling technique.
Requir. Eng., 2015

2014
Empirical evaluation of a privacy-focused threat modeling methodology.
J. Syst. Softw., 2014

2011
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
Requir. Eng., 2011

Integrating Patient Consent in e-Health Access Control.
Int. J. Secur. Softw. Eng., 2011

2009
Linking Privacy Solutions to Developer Goals.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Hardening XDS-Based Architectures.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...