Koen Buyens

According to our database1, Koen Buyens authored at least 13 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Least privilege analysis in software architectures.
Softw. Syst. Model., 2013

2012
Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen) ; Analyzing Software Architectures for Least Privilege Violations.
PhD thesis, 2012

2011
Composition of least privilege analysis results in software architectures (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

2010
Automated Detection of Least Privilege Violations in Software Architectures.
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
On the secure software development process: CLASP, SDL and Touchpoints compared.
Inf. Softw. Technol., 2009

Resolving least privilege violations in software architectures.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Measuring the interplay of security principles in software architectures.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

Identifying and Resolving Least Privilege Violations in Software Architectures.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization.
Proceedings of the Security in Information Systems, 2008

2007
On the Secure Software Development Process: CLASP and SDL Compared.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Process Activities Supporting Security Principles.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

A Software Architecture to Facilitate the Creation of DRM Systems.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Empirical and statistical analysis of risk analysis-driven techniques for threat management.
Proceedings of the The Second International Conference on Availability, 2007


  Loading...