Wouter Joosen

Orcid: 0000-0002-7710-5092

Affiliations:
  • Catholic University of Leuven, Belgium


According to our database1, Wouter Joosen authored at least 623 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications.
Future Internet, March, 2024

A study of NoSQL query injection in Neo4j.
Comput. Secur., February, 2024

A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric.
IEEE Trans. Inf. Forensics Secur., 2024

From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models.
Comput. Law Secur. Rev., 2024

Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps.
Proceedings of the 33rd USENIX Security Symposium, 2024

Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings.
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024

Threat modeling state of practice in Dutch organizations.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

From automation to CI/CD: a comparative evaluation of threat modeling tools.
Proceedings of the IEEE Secure Development Conference, 2024

A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

How to Train your Antivirus: RL-based Hardening through the Problem Space.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks.
Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, 2024

An E-Commerce Benchmark for Evaluating Performance Trade-Offs in Document Stores.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2024

2023
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections.
Comput. Secur., December, 2023

Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web.
Proc. Priv. Enhancing Technol., October, 2023

BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications.
IEEE Trans. Parallel Distributed Syst., April, 2023

Design of a Robust MAC Protocol for LoRa.
ACM Trans. Internet Things, February, 2023

Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations.
Future Internet, February, 2023

Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses.
CoRR, 2023

From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

Analyzing Cyber Security Research Practices through a Meta-Research Framework.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Expressive and Systematic Risk Assessments with Instance-Centric Threat Models.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

AndrAS: Automated Attack Surface Extraction for Android Applications.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

T3E: A Practical Solution to Trusted Time in Secure Enclaves.
Proceedings of the Network and System Security - 17th International Conference, 2023

Demonstration of the DPMF for Data Protection Analysis.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2023

On the adversarial robustness of full integer quantized TinyML models at the edge.
Proceedings of the 2nd International Workshop on Middleware for the Edge, 2023

TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments.
Proceedings of the Information Security - 26th International Conference, 2023

Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Effective Machine Learning-based Access Control Administration through Unlearning.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations.
Proceedings of the Computer Security - ESORICS 2023, 2023

Threat Modeling: A Rough Diamond or Fool's Gold?
Proceedings of the Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium, 2023

Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Mitigating undesired interactions between liveness detection components in biometric authentication.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication.
IET Biom., September, 2022

Relationship-Based Threat Modeling: Evaluation Data.
Dataset, March, 2022

AI for Biometric Authentication Systems.
Security and Artificial Intelligence, 2022

Open-World Network Intrusion Detection.
Security and Artificial Intelligence, 2022

Intelligent Malware Defenses.
Security and Artificial Intelligence, 2022

Adversarial Machine Learning.
Security and Artificial Intelligence, 2022

Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement.
Security and Artificial Intelligence, 2022

AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling.
ACM Trans. Sens. Networks, 2022

A descriptive study of assumptions in STRIDE security threat modeling.
Softw. Syst. Model., 2022

Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor.
Proc. Priv. Enhancing Technol., 2022

PIVOT: Private and Effective Contact Tracing.
IEEE Internet Things J., 2022

Tracking the Evolution of Cookie-based Tracking on Facebook.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022

Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022

An Audit of Facebook's Political Ad Policy Enforcement.
Proceedings of the 31st USENIX Security Symposium, 2022

Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022

Towards Improving the Deprecation Process of Web Features through Progressive Web Security.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress).
Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, 2022

Secure replication for client-centric data stores.
Proceedings of the 3rd International Workshop on Distributed Infrastructure for the Common Good, 2022

Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection.
Proceedings of the 21st ACM/IEEE International Conference on Information Processing in Sensor Networks, 2022

BoboLink: Low Latency and Low Power Communication for Intelligent Environments.
Proceedings of the 18th International Conference on Intelligent Environments, 2022

Relationship-based threat modeling.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

A reimagined catalogue of software security patterns.
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022

Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network.
Proceedings of the 30th European Signal Processing Conference, 2022

Captcha me if you can: Imitation Games with Reinforcement Learning.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Applying Machine Learning to use security oracles: a case study in virus and malware detection.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

DeFIRED: decentralized authorization with receiver-revocable and refutable delegations.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022

A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification.
Proceedings of the Software Architecture - 16th European Conference, 2022

Smart-Hop: Low-Latency Multi-hop Networking for LoRa.
Proceedings of the 18th International Conference on Distributed Computing in Sensor Systems, 2022

Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2022

Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence.
J. Cybersecur. Priv., February, 2021


OWebSync: Seamless Synchronization of Distributed Web Clients.
IEEE Trans. Parallel Distributed Syst., 2021

Chimera: A Low-power Reconfigurable Platform for Internet of Things.
ACM Trans. Internet Things, 2021

On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Zero-Wire: Low-Latency Wireless Networking with Symbol-Synchronous LEDs.
GetMobile Mob. Comput. Commun., 2021

The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion.
Proc. Priv. Enhancing Technol., 2021

Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom.
Inf. Syst. Frontiers, 2021

CryptDICE: Distributed data protection system for secure cloud data storage and computation.
Inf. Syst., 2021

Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review.
ACM Trans. Comput. Heal., 2021

Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS.
Future Gener. Comput. Syst., 2021

EH-CRAM: A Sustainable Energy Harvesting Algorithm for LPWANs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases.
Proceedings of the Performance Evaluation and Benchmarking, 2021

The architectural divergence problem in security and privacy of eHealth IoT product lines.
Proceedings of the SPLC '21: 25th ACM International Systems and Software Product Line Conference, 2021

Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Morphy: Software Defined Charge Storage for the IoT.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

Automated Threat Analysis and Management in a Continuous Integration Pipeline.
Proceedings of the IEEE Secure Development Conference, 2021

Threat modeling at run time: the case for reflective and adaptive threat management (NIER track).
Proceedings of the 16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2021

Reducing cold starts during elastic scaling of containers in kubernetes.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Shared memory protection in a multi-tenant JVM.
Proceedings of the MPLR '21: 18th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2021

ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

Seamless Synchronization for Collaborative Web Services.
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021

SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications.
Proceedings of the PaPoC@EuroSys 2021, 2021

An Overview of Runtime Data Protection Enforcement Approaches.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Network Policies in Kubernetes: Performance Evaluation and Security Analysis.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

ReFrAEN: a Reconfigurable Vibration Analysis Framework for Constrained Sensor Nodes.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

Ermis: a middleware for bridging data collection and data processing in IoT streaming applications.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

Gait Authentication based on Spiking Neural Networks.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

2020
Simplifying CPS Application Development through Fine-grained, Automatic Timeout Predictions.
ACM Trans. Internet Things, 2020

Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments.
Sensors, 2020

Distributed Security Framework for Reliable Threat Intelligence Sharing.
Secur. Commun. Networks, 2020

Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications.
Informatics, 2020

Striking the Balance: Effective yet Privacy Friendly Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

DPMF: A Modeling Framework for Data Protection by Design.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2020

A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks.
CoRR, 2020

Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis.
IEEE Access, 2020

Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020

Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Authenticated and auditable data sharing via smart contract.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A descriptive study of assumptions made in LINDDUN privacy threat elicitation.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Kairos: a self-configuring approach for short and accurate event timeouts in IoT.
Proceedings of the MobiQuitous '20: Computing, 2020

Flexible Migration in Blue-Green Deployments within a Fixed Cost.
Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, 2020

Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer).
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

Threat modeling: from infancy to maturity.
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020

Security Threat Modeling: Are Data Flow Diagrams Enough?
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

A Workload-Driven Document Database Schema Recommender (DBSR).
Proceedings of the Conceptual Modeling - 39th International Conference, 2020

MicroVault: Reliable Storage Unit for IoT Devices.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020

CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020

Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

SCF<sup>MSP</sup>: static detection of side channels in MSP430 programs.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces.
Sensors, 2019

Infracomposer: Policy-driven adaptive and reflective middleware for the cloudification of simulation & optimization workflows.
J. Syst. Archit., 2019

SCOPE: self-adaptive and policy-based data management middleware for federated clouds.
J. Internet Serv. Appl., 2019

Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks.
Inf. Syst., 2019

Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions.
IEEE Secur. Priv., 2019

Towards More Scalable and Secure LPWAN Networks Using Cryptographic Frequency Hopping.
Proceedings of the 2019 Wireless Days, 2019

Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

A Data Utility-Driven Benchmark for De-identification Methods.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Journal first presentation of a comparative study of workflow customization strategies: quality implications for multi-tenant SaaS.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019

Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Privacy Risk Assessment for Data Subject-Aware Threat Modeling.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Performance overhead of container orchestration frameworks for management of multi-tenant database deployments.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Detection of algorithmically generated domain names used by botnets: a dual arms race.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Analysis of architectural variants for auditable blockchain-based private data sharing.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

A comparison of system description models for data protection by design.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Data Privatizer for Biometric Applications and Online Identity Management.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Funny Accents: Exploring Genuine Interest in Internationalized Domain Names.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Leveraging Kubernetes for adaptive and cost-efficient resource management.
Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 2019

A framework for black-box SLO tuning of multi-tenant applications in Kubernetes.
Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 2019

You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients.
Proceedings of the 3rd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2019

DataBlinder: A distributed data protection middleware supporting search and computation on encrypted data.
Proceedings of the 20th International Middleware Conference Industrial Track, 2019

Towards Automated Security Design Flaw Detection.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Thread-Level CPU and Memory Usage Control of Custom Code in Multi-tenant SaaS.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

An Architectural View for Data Protection by Design.
Proceedings of the IEEE International Conference on Software Architecture, 2019

PPG<sup>2</sup>Live: Using dual PPG for active authentication and liveness detection.
Proceedings of the 2019 International Conference on Biometrics, 2019

TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

AsTAR: Sustainable Battery Free Energy Harvesting for Heterogeneous Platforms and Dynamic Environments.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

A Low-Power Hardware Platform for Smart Environment as a Call for More Flexibility and Re-Usability.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

The Web Browser as Distributed Application Server: Towards Decentralized Web Applications in the Edge.
Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, 2019

AutoAttacker: A reinforcement learning approach for black-box adversarial attacks.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments.
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019

Khronos: Middleware for Simplified Time Management in CPS.
Proceedings of the 13th ACM International Conference on Distributed and Event-based Systems, 2019

Continuous and Client-centric Trust Monitoring in Multi-cloud Storage.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Purchased Fame: Exploring the Ecosystem of Private Blog Networks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Premadoma: an operational solution for DNS registries to prevent malicious domain registrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost.
IEEE Trans. Cloud Comput., 2018

Trusted Operations on Sensor Data.
Sensors, 2018

A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS.
J. Syst. Softw., 2018

Managing distributed trust relationships for multi-modal authentication.
J. Inf. Secur. Appl., 2018

PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage.
J. Grid Comput., 2018

Policy reconciliation for access control in dynamic cross-enterprise collaborations.
Enterp. Inf. Syst., 2018

K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact).
Dagstuhl Artifacts Ser., 2018

Rigging Research Results by Manipulating Top Websites Rankings.
CoRR, 2018

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities.
CoRR, 2018

Supporting IoT Application Middleware on Edge and Cloud Infrastructures.
Proceedings of the 10th Central European Workshop on Services and their Composition, 2018

Fishy Faces: Crafting Adversarial Images to Poison Face Authentication.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies.
Proceedings of the 27th USENIX Security Symposium, 2018

A Lingua Franca for Security by Design.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Effective and efficient privacy threat modeling through domain refinements.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Solution-aware data flow diagrams for security threat modeling.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Transparent IO access control for application-level tenant isolation.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Automated Website Fingerprinting through Deep Learning.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Real-time Distributed In-Situ Benchmarking of Energy Harvesting IoT Devices.
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018

Expect the unexpected: Towards a middleware for policy adaptation in IoT platforms.
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018

Risk-based design security analysis.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

Knowledge-enriched security and privacy threat modeling.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

Security patterns 2.0: towards security patterns based on security building blocks.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment.
Proceedings of the 2018 IEEE International Conference on Software Architecture Companion, 2018

Dynamic QoS support for IoT backhaul networks through SDN.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

Interaction-Based Privacy Threat Elicitation.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Idea: Visual Analytics for Web Security.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems.
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Workshop, 2018

Gait template protection using HMM-UBM.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
A Survey on Applying Machine Learning Techniques for Behavioral Awareness.
Proceedings of the State of the Art in AI Applied to Ambient Intelligence, 2017

Design notations for secure software: a systematic literature review.
Softw. Syst. Model., 2017

Leveraging Battery Usage from Mobile Devices for Active Authentication.
Mob. Inf. Syst., 2017

QoC<sup>2</sup> Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications.
J. Reliab. Intell. Environ., 2017

Object-NoSQL Database Mappers: a benchmark study on the performance overhead.
J. Internet Serv. Appl., 2017

Trustworthy data-driven networked production for customer-centric plants.
Ind. Manag. Data Syst., 2017

Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows.
Future Internet, 2017

Automated Feature Extraction for Website Fingerprinting through Deep Learning.
CoRR, 2017

On the State of NoSQL Benchmarks.
Proceedings of the Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering, 2017

One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Preserving Behavioral Authentication on Smartphones.
Proceedings of the First International Workshop on Human-centered Sensing, 2017

Niflheim: End-to-End Middleware for Applications Across all Tiers of the IoT.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Towards scalable and dynamic data encryption for multi-tenant SaaS.
Proceedings of the Symposium on Applied Computing, 2017

Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0.
Proceedings of the Symposium on Applied Computing, 2017

Enhanced fraud detection as a service supporting merchant-specific runtime customization.
Proceedings of the Symposium on Applied Computing, 2017

Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

A Modular Meta-model for Security Solutions.
Proceedings of the Companion to the first International Conference on the Art, 2017

Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Trusted Operations On Mobile Phones.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Selective Jamming of LoRaWAN using Commodity Hardware.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

A dynamic decision fusion middleware for trustworthy context-aware IoT applications.
Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, 2017

A shared multi-stakeholder platform for IoT: poster.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos, Las Vegas, NV, USA, December 11, 2017

S<i>μ</i>V - the security microvisor: a virtualisation-based security middleware for the internet of things.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017

Adaptive and reflective middleware for the cloudification of simulation & optimization workflows.
Proceedings of the 16th Workshop on Adaptive and Reflective Middleware, 2017

Middleware for Dynamic Upgrade Activation and Compensations in Multi-tenant SaaS.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017

Towards a Platform for Empirical Software Design Studies.
Proceedings of the 1st IEEE/ACM International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering, 2017

A Model for Provably Secure Software Design.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

Towards an Adaptive Middleware for Efficient Multi-Cloud Data Storage.
Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms, CrossCloud@EuroSys 2017, Belgrade, Serbia, April 23, 2017

SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

A Voucher-Based Security Middleware for Secure Business Process Outsourcing.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017

The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies.
Proceedings of the 11th European Conference on Software Architecture, 2017

Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

μPnP-WAN: Experiences with LoRa and its deployment in DR Congo.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

The Wolf of Name Street: Hijacking Domains Through Their Nameservers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Optimizing resource and data security in shared sensor networks.
Secur. Commun. Networks, 2016

Systematic scalability assessment for feature oriented multi-tenant services.
J. Syst. Softw., 2016

Semantic analysis and verification of context-driven adaptive applications in intelligent environments.
J. Reliab. Intell. Environ., 2016

Hitch Hiker 2.0: a binding model with flexible data aggregation for the Internet-of-Things.
J. Internet Serv. Appl., 2016

Security and privacy controls for streaming data in extended intelligent environments.
J. Ambient Intell. Smart Environ., 2016

SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments.
J. Ambient Intell. Smart Environ., 2016

Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web.
Proceedings of the 25th International Conference on World Wide Web, 2016

Request and Conquer: Exposing Cross-Origin Resource Size.
Proceedings of the 25th USENIX Security Symposium, 2016

Towards systematically addressing security variability in software product lines.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Systematic quality trade-off support in the software product-line configuration process.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard.
Proceedings of the 7th International Workshop on Automating Test Case Design, 2016

Demonstration of MicroPnP: The Zero-Configuration Wireless Sensing and Actuation Platform.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Privacy-enabled remote health monitoring applications for resource constrained wearable devices.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Scalable and manageable customization of workflows in multi-tenant SaaS offerings.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Towards a container-based architecture for multi-tenant SaaS applications.
Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, 2016

Component-based Orchestration of Dynamic IaaS Applications.
Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, 2016

μPnP-WAN: Wide area plug and play sensing and actuation with LoRa.
Proceedings of the International SoC Design Conference, 2016

Data Protection Compliance Regulations and Implications for Smart Factories of the Future.
Proceedings of the 12th International Conference on Intelligent Environments, 2016

Evolving multi-tenant SaaS applications through self-adaptive upgrade enactment and tenant mediation.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Towards efficient publish-subscribe middleware in the IoT with IPv6 multicast.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Adaptive Dissemination for Mobile Electronic Health Record Applications with Proactive Situational Awareness.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery.
Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2016

Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Idea: Supporting Policy-Based Access Control on Database Systems.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Is Newer Always Better?: The Case of Vulnerability Prediction Models.
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016

Building Dynamic and Dependable Component-Based Internet-of-Things Applications with Dawn.
Proceedings of the 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering, 2016

2015
A descriptive study of Microsoft's threat modeling technique.
Requir. Eng., 2015

PaaSHopper: Policy-driven middleware for multi-PaaS environments.
J. Internet Serv. Appl., 2015

Protected Web Components: Hiding Sensitive Information in the Shadows.
IT Prof., 2015

SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks.
Ad Hoc Networks, 2015

PriVaricator: Deceiving Fingerprinters with Little White Lies.
Proceedings of the 24th International Conference on World Wide Web, 2015

μPnP-Mesh: The plug-and-play mesh network for the Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Adaptive Performance Isolation Middleware for Multi-tenant SaaS.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Expressive Data Storage Policies for Multi-cloud Storage Configurations.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines.
Proceedings of the 19th International Conference on Software Product Line, 2015

SecSess: keeping your session tucked away in your browser.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

SmartAuth: dynamic context fingerprinting for continuous user authentication.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Amusa: middleware for efficient access control management of multi-tenant SaaS applications.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Parking Sensors: Analyzing and Detecting Parked Domains.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Putting Sense inside Sensor Systems: A Coordinated Approach to Messaging.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

@migo: A Comprehensive Middleware Solution for Participatory Sensing Applications.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

Dawn: Dependable Networking Framework for Multimedia-enabled Internet-of-Things.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios.
Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware, 2015

Advanced monitoring and smart auto-scaling of NoSQL systems.
Proceedings of the Doctoral Symposium of the 16th International Middleware Conference, 2015

Demo: Enabling Plug-and-Play for the Internet of Things.
Proceedings of the Posters and Demos Session of the 16th International Middleware Conference, 2015

Tomography: lowering management overhead for distributed component-based applications.
Proceedings of the 2nd Workshop on Middleware for Context-Aware Applications in the IoT, 2015

WF-Interop: Adaptive and Reflective REST Interfaces for Interoperability between Workflow Engines.
Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware, 2015

Change Impact Analysis for Context-Aware Applications in Intelligent Environments.
Proceedings of the Workshop Proceedings of the 11th International Conference on Intelligent Environments, 2015

SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications.
Proceedings of the 2015 International Conference on Intelligent Environments, 2015

Do Security Patterns Really Help Designers?
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

MASC: Modelling Architectural Security Concerns.
Proceedings of the 7th IEEE/ACM International Workshop on Modeling in Software Engineering, 2015

On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study.
Proceedings of the 5th IEEE/ACM International Workshop on the Twin Peaks of Requirements and Architecture, 2015

Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach.
Proceedings of the 7th IEEE/ACM International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, 2015

<i>μ</i>PnP: plug and play peripherals for the internet of things.
Proceedings of the Tenth European Conference on Computer Systems, 2015

Mobile device fingerprinting considered harmful for risk-based authentication.
Proceedings of the Eighth European Workshop on System Security, 2015

Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

The Clock is Still Ticking: Timing Attacks in the Modern Web.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Hitch Hiker: A Remote Binding Model with Priority Based Data Aggregation for Wireless Sensor Networks.
Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering, 2015

Refraction: Low-Cost Management of Reflective Meta-Data in Pervasive Component-Based Applications.
Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering, 2015

On the Need for Federated Authorization in Cross-organizational e-Health Platforms.
Proceedings of the HEALTHINF 2015, 2015

Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS.
Proceedings of the 2nd IEEE/ACM International Symposium on Big Data Computing, 2015

Scalable and Secure Concurrent Evaluation of History-based Access Control Policies.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Entity-Based Access Control: supporting more expressive access control policies.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Empirical Assessment of Security Requirements and Architecture: Lessons Learned.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Predicting Vulnerable Software Components via Text Mining.
IEEE Trans. Software Eng., 2014

Change patterns - Co-evolving requirements and architecture.
Softw. Syst. Model., 2014

Modular type checking of anchored exception declarations.
Sci. Comput. Program., 2014

Empirical evaluation of a privacy-focused threat modeling methodology.
J. Syst. Softw., 2014

Efficient customization of multi-tenant Software-as-a-Service applications with service lines.
J. Syst. Softw., 2014

Cost-Effective Feature Placement of Customizable Multi-Tenant Applications in the Cloud.
J. Netw. Syst. Manag., 2014

Middleware for efficient and confidentiality-aware federation of access control policies.
J. Internet Serv. Appl., 2014

QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset.
Inf. Sci., 2014

Design Churn as Predictor of Vulnerabilities?
Int. J. Secur. Softw. Eng., 2014

On the Workings and Current Practices of Web-Based Device Fingerprinting.
IEEE Secur. Priv., 2014

Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms.
First Monday, 2014

On the effectiveness of virtualization-based security.
CoRR, 2014

Comparing PaaS offerings in light of SaaS development - A comparison of PaaS platforms based on a practical case study.
Computing, 2014

Stranger danger: exploring the ecosystem of ad-based URL shortening services.
Proceedings of the 23rd International World Wide Web Conference, 2014

Large-Scale Security Analysis of the Web: Challenges and Findings.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Towards managing variability in the safety design of an automotive hall effect sensor.
Proceedings of the 18th International Software Product Line Conference, 2014

Scalar: A Distributed Scalability Analysis Framework.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM.
Proceedings of the 2nd European Workshop on Practical Aspects of Health Informatics, 2014

Characterizing the performance of tenant data management in multi-tenant cloud authorization systems.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report.
Proceedings of the 1st International Workshop on Model-Driven Development Processes and Practices co-located with ACM/IEEE 17th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2014), 2014

Feature Models at Run Time: Feature Middleware for Multi-tenant SaaS applications.
Proceedings of the 9th Workshop on Models@run.time co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014), 2014

Enabling resource sharing in heterogeneous wireless sensor networks.
Proceedings of the 1st ACM Workshop on Middleware for Context-Aware Applications in the IoT, 2014

Configuration management as a multi-cloud enabler.
Proceedings of the 2nd International Workshop on CrossCloud Systems, 2014

Soundsquatting: Uncovering the Use of Homophones in Domain Squatting.
Proceedings of the Information Security - 17th International Conference, 2014

Towards portability and interoperability support in middleware for hybrid clouds.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

User-Rank: Generic Query Optimization for Participatory Social Applications.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Evolutionary algorithms for classification of malware families through different network behaviors.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Scalar: Systematic Scalability Analysis with the Universal Scalability Law.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

Modularizing Early Architectural Assumptions in Scenario-Based Requirements.
Proceedings of the Fundamental Approaches to Software Engineering, 2014

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Ensuring application integrity in shared sensing environments.
Proceedings of the CBSE'14, Proceedings of the 17th International ACM SIGSOFT Symposium on Component-Based Software Engineering (part of CompArch 2014), Marcq-en-Baroeul, Lille, France, June 30, 2014

Network dialog minimization and network dialog diffing: two novel primitives for network security applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Modularity and Variability of Distributed Software Architectures through Multi-view Refinement of AO-Connectors.
LNCS Trans. Aspect Oriented Softw. Dev., 2013

Policy-driven customization of cross-organizational features in distributed service systems.
Softw. Pract. Exp., 2013

Least privilege analysis in software architectures.
Softw. Syst. Model., 2013

Bitsquatting: exploiting bit-flips for fun, or profit?
Proceedings of the 22nd International World Wide Web Conference, 2013

Energy aware software evolution for Wireless Sensor Networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice.
Proceedings of the Software Composition - 12th International Conference, 2013

Federated Authorization for Software-as-a-Service Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Analysis of Sensor Network Operating System Performance Throughout the Software Life Cycle.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Composition-Safe re-parametrization in Distributed Component-based WSN Applications.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

ACS: Specifying "Smart" Applications Using Sense-Process-Consume Flows.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Types in Their Prime: Sub-typing of Data in Resource Constrained Environments.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Safe Reparametrization of Component-Based WSNs.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Policy-driven middleware for heterogeneous, hybrid cloud platforms.
Proceedings of the 12th International Workshop on Adaptive and Reflective Middleware, 2013

Introducing concurrency in policy-based access control.
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, 2013

Static analysis versus penetration testing: A controlled experiment.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Migrating medical communications software to a multi-tenant cloud environment.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Automated allocation and configuration of dual stack IP networks.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A framework for integrated configuration management tools.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Access Control in Multi-party Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks - 10th European Conference, 2013

The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

HeapSentry: Kernel-Assisted Protection against Heap Overflows.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

TabShots: client-side detection of tabnabbing attacks.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces.
LNCS Trans. Aspect Oriented Softw. Dev., 2012

A reconfigurable component model with semantic type system for dynamic WSN applications.
J. Internet Serv. Appl., 2012

Towards application driven security dashboards in future middleware.
J. Internet Serv. Appl., 2012

Extraction of an Architectural Model for Least Privilege Analysis.
Int. J. Secur. Softw. Eng., 2012

Runtime countermeasures for code injection attacks against C and C++ programs.
ACM Comput. Surv., 2012

Applying a metadata level for concurrency in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2012

Documenting Early Architectural Assumptions in Scenario-Based Requirements.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012

Reusable Formal Models for Secure Software Architectures.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012

A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation.
Proceedings of the SECRYPT 2012, 2012

HyperForce: Hypervisor-enForced Execution of Security-Critical Code.
Proceedings of the Information Security and Privacy Research, 2012

Context-oriented programming for customizable SaaS applications.
Proceedings of the ACM Symposium on Applied Computing, 2012

A Component and Policy-Based Approach for Efficient Sensor Network Reconfiguration.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Exploring the Ecosystem of Referrer-Anonymizing Services.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Developing and managing customizable Software as a Service using feature model conversion.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Feature placement algorithms for high-variability applications in cloud environments.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

StIgMa: Status information management for evolvable wireless sensor networks.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

LooCI: The Loosely-coupled Component Infrastructure.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

DiFiSec: An Adaptable Multi-level Security Framework for Event-Driven Communication in Wireless Sensor Networks.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

Towards performance isolation in multi-tenant SaaS applications.
Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, 2012

Toward efficient and confidentiality-aware federation of access control policies.
Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, 2012

Users as reconfigurable elements in distributed sensing applications.
Proceedings of the Seventh International Workshop on Middleware for Sensor Networks, 2012

Towards an Automated Pattern Selection Procedure in Software Models.
Proceedings of the Late Breaking Papers of the 22nd International Conference on Inductive Logic Programming, 2012

Does organizing security patterns focus architectural choices?
Proceedings of the 34th International Conference on Software Engineering, 2012

Show me the money The importance of network effects for mobile application business models.
Proceedings of the 16th International Conference on Intelligence in Next Generation Networks, 2012

Serene: Self-Reliant Client-Side Protection against Session Fixation.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

Enabling Massive Scale Sensing with the @LooCI Mobile Sensing Framework.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Network-aware impact determination algorithms for service workflow deployment in hybrid clouds.
Proceedings of the 8th International Conference on Network and Service Management, 2012

You are what you include: large-scale evaluation of remote javascript inclusions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Multi-view refinement of AO-connectors in distributed software systems.
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012

On the modularity impact of architectural assumptions.
Proceedings of the 2012 Workshop on Next Generation Modularity Approaches for Requirements and Architecture, 2012

An object-oriented framework for aspect-oriented languages.
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012

A domain specific aspect language for run-time inspection.
Proceedings of the seventh workshop on Domain-Specific Aspect Languages, 2012

Traceability Between Run-Time and Development Time Abstractions - A Case Study on AOSD and Debugging.
Proceedings of the Software and Systems Traceability., 2012

2011
Filter-resistant code injection on ARM.
J. Comput. Virol., 2011

A System of Patterns for Reusable Aspect Libraries.
LNCS Trans. Aspect Oriented Softw. Dev., 2011

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
Requir. Eng., 2011

Advanced Sensor Network Software Deployment using Application-level Quality Goals.
J. Softw., 2011

A middleware platform to support river monitoring using wireless sensor networks.
J. Braz. Comput. Soc., 2011

Integrating Patient Consent in e-Health Access Control.
Int. J. Secur. Softw. Eng., 2011

A Sequence of Patterns for Reusable Aspect Libraries with Easy Configuration.
Proceedings of the Software Composition - 10th International Conference, 2011

A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications.
Proceedings of the Middleware 2011, 2011

Language and middleware support for dynamism in wireless sensor and actuator network applications.
Proceedings of the Sixth International Workshop on Middleware for Sensor Networks, 2011

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011

Inspection of distributed and composed systems.
Proceedings of the 8th Middleware Doctoral Symposium of the 12th ACM/IFIP/USENIX International Middleware Conference, 2011

A Generic Solution for Agile Run-Time Inspection Middleware.
Proceedings of the Middleware 2011, 2011

SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-Hoc Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Fine-grained Access-control for the Puppet Configuration Language.
Proceedings of the Past, 2011

Exposing the Lack of Privacy in File Hosting Services.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Building blocks for secure multiparty federated wireless sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Sensor Middleware to Support Diverse Data Qualities.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Hello rootKitty: A Lightweight Invariance-Enforcing Framework.
Proceedings of the Information Security, 14th International Conference, 2011

Composition of least privilege analysis results in software architectures (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

An Efficient Modeling and Execution Framework for Complex Systems Development.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

Engineering Secure Future Internet Services.
Proceedings of the Future Internet, 2011

Abusing locality in shared web hosting.
Proceedings of the Fourth European Workshop on System Security, 2011

Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

SessionShield: Lightweight Protection against Session Hijacking.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Scalable Authorization Middleware for Service Oriented Architectures.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Automatic and Precise Client-Side Protection against CSRF Attacks.
Proceedings of the Computer Security - ESORICS 2011, 2011

Preserving Aspects via Automation: A Maintainability Study.
Proceedings of the 5th International Symposium on Empirical Software Engineering and Measurement, 2011

On-demand attribute-based service discovery for mobile WSANs.
Proceedings of the 5th International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2011), 2011

Integrated management of network and security devices in IT infrastructures.
Proceedings of the 7th International Conference on Network and Service Management, 2011

RIPE: runtime intrusion prevention evaluator.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

WebJail: least-privilege integration of third-party components in web mashups.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain.
LNCS Trans. Aspect Oriented Softw. Dev., 2010

The MACODO middleware for context-driven dynamic agent organizations.
ACM Trans. Auton. Adapt. Syst., 2010

Streamlining Development for Networked Embedded Systems Using Multiple Paradigms.
IEEE Softw., 2010

Improving Memory Management Security for C and C++.
Int. J. Secur. Softw. Eng., 2010

Building Wireless Sensor Network Applications with LooCI.
Int. J. Mob. Comput. Multim. Commun., 2010

Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe.
Computer, 2010

MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

A Secure Multi-Application Platform for Vehicle Telematics.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Middleware for Adaptive Group Communication in Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Policy-Driven Tailoring of Sensor Networks.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Expressing and Configuring Quality of Data in Multi-purpose Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Resource Management Middleware to Support Self Managing Wireless Sensor Networks.
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010

Authorizing and directing configuration updates in contemporary it infrastructures.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Towards fine-grained and application-centric access control for wireless sensor networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Security of Web Mashups: A Survey.
Proceedings of the Information Security Technology for Applications, 2010

Extending sensor networks into the Cloud using Amazon Web Services.
Proceedings of the 1st IEEE International Conference on Networked Embedded Systems for Enterprise Applications, 2010

Middleware for resource sharing in multi-purpose Wireless Sensor Networks.
Proceedings of the 1st IEEE International Conference on Networked Embedded Systems for Enterprise Applications, 2010

Optimized Resource Access Control in Shared Sensor Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Supporting reconfiguration and re-use through self-describing component interfaces.
Proceedings of the Fifth International Workshop on Middleware for Sensor Networks, 2010

A Survey of System Configuration Tools.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

QARI: Quality Aware Software Deployment for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality.
Proceedings of the IEEE International Conference on Web Services, 2010

CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Automated Detection of Least Privilege Violations in Software Architectures.
Proceedings of the Software Architecture, 4th European Conference, 2010

HProxy: Client-Side Detection of SSL Stripping Attacks.
Proceedings of the Detection of Intrusions and Malware, 2010

Dynamic Composition of Cross-Organizational Features in Distributed Software Systems.
Proceedings of the Distributed Applications and Interoperable Systems, 2010

Security in Context: Analysis and Refinement of Software Architectures.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

PAriCheck: an efficient pointer arithmetic checker for C programs.
Proceedings of the 5th ACM Symposium on Information, 2010

A Middleware Model in Alloy for Supply Chain-Wide Agent Interactions.
Proceedings of the Agent-Oriented Software Engineering XI - 11th International Workshop, 2010

From aspect-oriented models to aspect-oriented code?: the maintenance perspective.
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010

A permission system for secure AOP.
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010

2009
On the secure software development process: CLASP, SDL and Touchpoints compared.
Inf. Softw. Technol., 2009

The S3MS.NET Run Time Monitor: Tool Demonstration.
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009

Weaving the Fabric of the Control Loop through Aspects.
Proceedings of the Self-Organizing Architectures, First International Workshop, 2009

Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages.
Proceedings of the Objects, Components, Models and Patterns, 47th International Conference, 2009

Fine-Grained Tailoring of Component Behaviour for Embedded Systems.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

LooCI: a loosely-coupled component infrastructure for networked embedded systems.
Proceedings of the MoMM'2009, 2009

Flexible integration of data qualities in wireless sensor networks.
Proceedings of the Fourth International Workshop on Middleware for Sensor Networks, 2009

DARMA: adaptable service and resource management for wireless sensor networks.
Proceedings of the Fourth International Workshop on Middleware for Sensor Networks, 2009

Federated Access Control and Workflow Enforcement in Systems Configuration.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Managing your content with CIMPLE - a content-centric storage interface.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Federated and Shared Use of Sensor Networks through Security Middleware.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Extending middleware frameworks for Wireless Sensor Networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Automating the discovery of stable domain abstractions for reusable aspects.
Proceedings of the 2009 ICSE Workshop on Aspect-Oriented Requirements Engineering and Architecture Design, 2009

A formal model for self-adaptive and self-healing organizations.
Proceedings of the 2009 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, 2009

Resolving least privilege violations in software architectures.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Mapping problem-space to solution-space features: a feature interaction approach.
Proceedings of the Generative Programming and Component Engineering, 2009

Problem-Solution Feature Interactions as Configuration Knowledge in Distributed Runtime Adaptations.
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009

A Security Architecture for Web 2.0 Applications.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

Instruction-level countermeasures against stack-based buffer overflow attacks.
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009

Measuring the interplay of security principles in software architectures.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

Browser protection against cross-site request forgery.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009

A sensor middleware and agent-based communication platform for supply-chain management.
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Towards a pattern language for aspect-based design.
Proceedings of the 1st workshop on Linking aspect technology and evolution, 2009

A generic and reflective debugging architecture to support runtime visibility and traceability of aspects.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

Protecting Global and Static Variables from Buffer Overflow Attacks.
Proceedings of the The Forth International Conference on Availability, 2009

Linking Privacy Solutions to Developer Goals.
Proceedings of the The Forth International Conference on Availability, 2009

Risk-Driven Architectural Decomposition.
Proceedings of the The Forth International Conference on Availability, 2009

Identifying and Resolving Least Privilege Violations in Software Architectures.
Proceedings of the The Forth International Conference on Availability, 2009

Security Middleware for Mobile Applications.
Proceedings of the Middleware for Network Eccentric and Mobile Applications, 2009

2008
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
IEEE Trans. Software Eng., 2008

Security-by-contract on the .NET platform.
Inf. Secur. Tech. Rep., 2008

DAVIM: Adaptable Middleware for Sensor Networks.
IEEE Distributed Syst. Online, 2008

Identity in federated electronic healthcare.
Proceedings of the 1st IFIP Wireless Days, 2008

A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions.
Proceedings of the Software Composition - 7th International Symposium, 2008

Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization.
Proceedings of the Security in Information Systems, 2008

Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

Transforming Security Audit Requirements into a Software Architecture.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Towards policy-based management of sensor networks.
Proceedings of the Third International Workshop on Middleware for Sensor Networks, 2008

A comparison of two approaches for achieving flexible and adaptive security middleware.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Dynamic reconfiguration using template based web service composition.
Proceedings of the 3rd Workshop on Middleware for Service Oriented Computing, 2008

Endogenous versus exogenous self-management.
Proceedings of the 2008 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, 2008

Managing Real-World System Configurations with Constraints.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Using AADL to Model a Protocol Stack.
Proceedings of the 13th International Conference on Engineering of Complex Computer Systems (ICECCS 2008), March 31 2008, 2008

Using Multi-Level Security Annotations to Improve Software Assurance.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Policy-based management of middleware for distributed sensor applications.
Proceedings of the 6th Workshop on Middleware for Network Eccentric and Mobile Applications, 2008

A reference model for cross-organizational coordination architectures.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Modeling Context-Dependent Aspect Interference Using Default Logics.
Proceedings of the RAM-SE'08-ECOOP'08 Workshop on Reflection, 2008

Generic Reusable Concern Compositions.
Proceedings of the Model Driven Architecture, 2008

Tracking and tracing containers through distributed sensor middleware.
Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, 2008

Support for distributed adaptations in aspect-oriented middleware.
Proceedings of the 7th International Conference on Aspect-Oriented Software Development, 2008

Towards an aspect-oriented architecture for self-adaptive frameworks.
Proceedings of the ACP4IS@AOSD 2008: Proceedings of the 2008 AOSD workshop on Aspects, components, and patterns for infrastructure software, Brussels, Belgium, 31 March, 2008

Transforming Security Requirements into Architecture.
Proceedings of the The Third International Conference on Availability, 2008

Hardening XDS-Based Architectures.
Proceedings of the The Third International Conference on Availability, 2008

Using Security Patterns to Combine Security Metrics.
Proceedings of the The Third International Conference on Availability, 2008

2007
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies.
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007

A Credential-Based System for the Anonymous Delegation of Rights.
Proceedings of the New Approaches for Security, 2007

Policy Analysis Using a Hybrid Semantic Reasoning Engine.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Multi-stage Aspect-Oriented Composition of Component-Based Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

UniTI: A Unified Transformation Infrastructure.
Proceedings of the Model Driven Engineering Languages and Systems, 2007

On the integration of sensor networks and general purpose IT infrastructure.
Proceedings of the Second International Workshop on Middleware for Sensor Networks, 2007

The case for aspect-oriented reflective middleware.
Proceedings of the 6th Workshop on Adaptive and Reflective Middleware, 2007

PoDIM: A Language for High-Level Configuration Management.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Towards simplified specification of policies in different domains.
Proceedings of the Integrated Network Management, 2007

An Analysis of the Security Patterns Landscape.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

On the Secure Software Development Process: CLASP and SDL Compared.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Arriclides: An Architecture Integrating Clinical Decision Support Models.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Adding dynamic reconfiguration support to JBoss AOP.
Proceedings of the 1st Workshop on Middleware-Application Interaction, 2007

Managing Agent Interactions with Context-Driven Dynamic Organizations.
Proceedings of the Engineering Environment-Mediated Multi-Agent Systems, 2007

Managing Concern Interactions in Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2007

A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment.
Proceedings of the Distributed Applications and Interoperable Systems, 2007

Process Activities Supporting Security Principles.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

A Software Architecture to Facilitate the Creation of DRM Systems.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

The elementary pointcut pattern.
Proceedings of the 2nd Workshop on Best Practices in Applying Aspect-Oriented Software Development, 2007

Comparative Evaluation of Converged Service-Oriented Architectures.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Empirical and statistical analysis of risk analysis-driven techniques for threat management.
Proceedings of the The Second International Conference on Availability, 2007

2006
Run-Time and Atomic Weaving of Distributed Aspects.
LNCS Trans. Aspect Oriented Softw. Dev., 2006

A Model Curriculum for Aspect-Oriented Software Development.
IEEE Softw., 2006

A Modular Access Control Service for Supporting Application-Specific Policies.
IEEE Distributed Syst. Online, 2006

Ontology-Based Discovery of Data-Driven Services.
Proceedings of the 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), 2006

Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems.
Proceedings of the Software Composition - 5th International Symposium, 2006

Improving Intrusion Detection through Alert Verification.
Proceedings of the Security in Information Systems, 2006

Towards a Transformation Chain Modeling Language.
Proceedings of the Embedded Computer Systems: Architectures, 2006

Key Research Challenges for Successfully Applying MDD Within Real-Time Embedded Software Development.
Proceedings of the Embedded Computer Systems: Architectures, 2006

DAViM: a dynamically adaptable virtual machine for sensor networks.
Proceedings of the First International Workshop on Middleware for Sensor Networks, 2006

True and Transparent Distributed Composition of Aspect-Components.
Proceedings of the Middleware 2006, 2006

How secure is AOP and what can we do about it?
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

An object-oriented approach to datatype-generic programming.
Proceedings of the ACM SIGPLAN Workshop on Generic Programming, 2006

Towards a measuring framework for security properties of software.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

Bridging the gap between web application firewalls and web applications.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

Isolating Process-Level Concerns Using Padus.
Proceedings of the Business Process Management, 4th International Conference, 2006

Extended Protection against Stack Smashing Attacks without Performance Loss.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Connecting Embedded Devices Using a Component Platform for Adaptable Protocol Stacks.
Proceedings of the Component-Based Software Development for Embedded Systems, 2005

A Session Layer Concept for Overlay Networks.
Wirel. Pers. Commun., 2005

Towards a unifying view on security contracts.
ACM SIGSOFT Softw. Eng. Notes, 2005

Requirements traceability to support evolution of access control.
ACM SIGSOFT Softw. Eng. Notes, 2005

NeCoMan: Middleware for Safe Distributed-Service Adaptation in Programmable Networks.
IEEE Distributed Syst. Online, 2005

A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Decentralized cooperative management: a bottom-up approach.
Proceedings of the AC 2005, 2005

Towards a software architecture for DRM.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

Assessment of Palm OS Susceptibility to Malicious Code Threats.
Proceedings of the Communications and Multimedia Security, 2005

Component-Based Open Middleware Supporting Aspect-Oriented Software Composition.
Proceedings of the Component-Based Software Engineering, 8th International Symposium, 2005

Uniform Application-level Access Control Enforcement of Organizationwide Policies.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature.
J. Object Technol., 2004

Towards preserving correctness in self-managed software systems.
Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, 2004

The DiPS+ Software Architecture for Self-healing Protocol Stacks.
Proceedings of the 4th Working IEEE / IFIP Conference on Software Architecture (WICSA 2004), 2004

Threat Modelling for Web Services Based Web Applications.
Proceedings of the Communications and Multimedia Security, 2004

A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.
Proceedings of the Communications and Multimedia Security, 2004

2003
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure.
IEE Proc. Softw., 2003

Adaptable Access Control Policies for Medical Information Systems.
Proceedings of the Distributed Applications and Interoperable Systems, 2003

2002
Consistency Management in the Presence of Simultaneous Client-Specific Views.
Proceedings of the 18th International Conference on Software Maintenance (ICSM 2002), 2002

2001
Dynamic and Selective Combination of Extensions in Component-Based Applications.
Proceedings of the 23rd International Conference on Software Engineering, 2001

A Dynamic Customization Model for Distributed Component-Based Systems.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

2000
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration.
Proceedings of the TOOLS 2000: 33rd International Conference on Technology of Object-Oriented Languages and Systems, 2000

A Security Architecture for Electronic Commerce Applications.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Customization of Object Request Brokers by Application Specific Policies.
Proceedings of the Middleware 2000, 2000

Portable Support for Transparent Thread Migration in Java.
Proceedings of the Agent Systems, 2000

1999
Classifying Component Interaction in Product-Line Architectures.
Proceedings of the TOOLS Pacific 1999: 32nd International Conference on Technology of Object-Oriented Languages and Systems, 1999

Non-functional Policies.
Proceedings of the Meta-Level Architectures and Reflection, 1999

Networking and Reflection: A Strong Combination.
Proceedings of the Meta-Level Architectures and Reflection, 1999

Standardizing Component Interaction Patterns in Product-Lines Architectures.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

Event System Providing a Service for Filtering and Correlating Events.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1998
Modelling Genetic Search Agents with a Concurrent Object-Oriented Language.
Proceedings of the High-Performance Computing and Networking, 1998

Open Implementation of a Mobile Communication System.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

A Metaobject Protocol for Correlate.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Components for Non-Functional Requirements.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

An AOP Case with Static and Dynamic Aspects.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

1997
Management of Events in a multi-agent system.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

Building Multi-Agent Systems with CORRELATE.
Proceedings of the Multi-Agent Rationality, 1997

Experiences with an Object-Oriented Parallel Language: The CORRELATE Project.
Proceedings of the Scientific Computing in Object-Oriented Parallel Environments, 1997

Multi-level Patterns.
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997

1996
Infrastructure for mobile agents.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Affordable Overhead in CORRELATE: Comparing two MD Simulators.
Proceedings of the High-Performance Computing and Networking, 1996

1995
Flexible load balancing software for parallel applications in a time-sharing environment.
Proceedings of the High-Performance Computing and Networking, 1995

1994
The Efficient Management Of Task Clusters In A Dynamic Load Balancer.
Proceedings of the Second Euromicro Workshop on Parallel and Distributed Processing, 1994

The Object-Oriented Development of a Parallel Application in Polymer Dynamics.
Proceedings of the Parallel Scientific Computing, First International Workshop, 1994

Language Constructs for Coordination in an Agent Space.
Proceedings of the Distributed Software Agents and Applications, 1994

Object-Oriented Simulation Software for Drug Design.
Proceedings of the High-Performance Computing and Networking, 1994

Observation of a Global Object Space on a Distributed Memory Machine.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994

Sender-Initated and Receiver-Initated Coordination in a Global Object Space.
Proceedings of the Object-Based Models and Languages for Concurrent Systems, 1994

1993
A reusable load balancer for parallel search problems.
Microprocess. Microprogramming, 1993

Load balanced parallel program verification on a shared memory machine.
Proceedings of the 1993 Euromicro Workshop on Parallel and Distributed Processing, 1993

A Reflective Invocation Scheme to Realise Advanced Object Management.
Proceedings of the Object-Based Distributed Programming, 1993

1992
Object-orientation as an appropriate paradigm for high-performance environments for scientific computing.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992

1990
On the use of process migration in distributed systems.
Microprocessing and Microprogramming, 1990

Dynamic load balancing in transputer applications with geometric parallelism.
Microprocessing and Microprogramming, 1990

On the use of load balancing mechanisms for fault tolerance support.
Proceedings of the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, 1990

1988
A general purpose distributed operating system for a hypercube.
Proceedings of the 3rd ACM SIGOPS European Workshop: Autonomy or Interdependence in Distributed Systems? Cambridge, 1988


  Loading...