Wouter Joosen
Orcid: 0000-0002-7710-5092Affiliations:
- Catholic University of Leuven, Belgium
According to our database1,
Wouter Joosen
authored at least 623 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Future Internet, March, 2024
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric.
IEEE Trans. Inf. Forensics Secur., 2024
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models.
Comput. Law Secur. Rev., 2024
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the IEEE Secure Development Conference, 2024
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Towards Intent-Based Scheduling for Performance and Security in Edge-to-Cloud Networks.
Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, 2024
Proceedings of the Big Data Analytics and Knowledge Discovery, 2024
2023
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections.
Comput. Secur., December, 2023
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web.
Proc. Priv. Enhancing Technol., October, 2023
BeauForT: Robust Byzantine Fault Tolerance for Client-Centric Mobile Web Applications.
IEEE Trans. Parallel Distributed Syst., April, 2023
Future Internet, February, 2023
CoRR, 2023
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2023
Proceedings of the 2nd International Workshop on Middleware for the Edge, 2023
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments.
Proceedings of the Information Security - 26th International Conference, 2023
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium, 2023
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Mitigating undesired interactions between liveness detection components in biometric authentication.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication.
IET Biom., September, 2022
Machine Learning Meets Data Modification - The Potential of Pre-processing for Privacy Enchancement.
Security and Artificial Intelligence, 2022
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling.
ACM Trans. Sens. Networks, 2022
Softw. Syst. Model., 2022
Proc. Priv. Enhancing Technol., 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022
Towards Improving the Deprecation Process of Web Features through Progressive Web Security.
Proceedings of the 43rd IEEE Security and Privacy, 2022
Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress).
Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, 2022
Proceedings of the 3rd International Workshop on Distributed Infrastructure for the Common Good, 2022
Poster Abstract: Adapting Pretrained Features for Efficient Unsupervised Acoustic Anomaly Detection.
Proceedings of the 21st ACM/IEEE International Conference on Information Processing in Sensor Networks, 2022
Proceedings of the 18th International Conference on Intelligent Environments, 2022
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022
Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems, 2022
Unsupervised Acoustic Anomaly Detection Systems Based on Gaussian Mixture Density Neural Network.
Proceedings of the 30th European Signal Processing Conference, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Applying Machine Learning to use security oracles: a case study in virus and malware detection.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification.
Proceedings of the Software Architecture - 16th European Conference, 2022
Proceedings of the 18th International Conference on Distributed Computing in Sensor Systems, 2022
Proceedings of the Critical Information Infrastructures Security, 2022
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence.
J. Cybersecur. Priv., February, 2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
IEEE Trans. Parallel Distributed Syst., 2021
ACM Trans. Internet Things, 2021
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication.
IEEE Trans. Inf. Forensics Secur., 2021
SEQUOIA: A Middleware Supporting Policy-Based Access Control for Search and Aggregation in Data-Driven Applications.
IEEE Trans. Dependable Secur. Comput., 2021
GetMobile Mob. Comput. Commun., 2021
Proc. Priv. Enhancing Technol., 2021
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom.
Inf. Syst. Frontiers, 2021
CryptDICE: Distributed data protection system for secure cloud data storage and computation.
Inf. Syst., 2021
Security and Privacy Requirements for Electronic Consent: A Systematic Literature Review.
ACM Trans. Comput. Heal., 2021
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS.
Future Gener. Comput. Syst., 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
Proceedings of the Performance Evaluation and Benchmarking, 2021
The architectural divergence problem in security and privacy of eHealth IoT product lines.
Proceedings of the SPLC '21: 25th ACM International Systems and Software Product Line Conference, 2021
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Proceedings of the IEEE Secure Development Conference, 2021
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track).
Proceedings of the 16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the MPLR '21: 18th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2021
ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021
SCEW: Programmable BFT-Consensus with Smart Contracts for Client-Centric P2P Web Applications.
Proceedings of the PaPoC@EuroSys 2021, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
Ermis: a middleware for bridging data collection and data processing in IoT streaming applications.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021
2020
Simplifying CPS Application Development through Fine-grained, Automatic Timeout Predictions.
ACM Trans. Internet Things, 2020
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments.
Sensors, 2020
Secur. Commun. Networks, 2020
Automated Configuration of NoSQL Performance and Scalability Tactics for Data-Intensive Applications.
Informatics, 2020
IACR Cryptol. ePrint Arch., 2020
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2020
A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks.
CoRR, 2020
IEEE Access, 2020
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020
Feasibility of container orchestration for adaptive performance isolation in multi-tenant SaaS applications.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the MobiQuitous '20: Computing, 2020
Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, 2020
Deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer).
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020
Proceedings of the ICSE-NIER 2020: 42nd International Conference on Software Engineering, New Ideas and Emerging Results, Seoul, South Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the Conceptual Modeling - 39th International Conference, 2020
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020
Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces.
Sensors, 2019
Infracomposer: Policy-driven adaptive and reflective middleware for the cloudification of simulation & optimization workflows.
J. Syst. Archit., 2019
SCOPE: self-adaptive and policy-based data management middleware for federated clouds.
J. Internet Serv. Appl., 2019
Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks.
Inf. Syst., 2019
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions.
IEEE Secur. Priv., 2019
Towards More Scalable and Secure LPWAN Networks Using Cryptographic Frequency Hopping.
Proceedings of the 2019 Wireless Days, 2019
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Journal first presentation of a comparative study of workflow customization strategies: quality implications for multi-tenant SaaS.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Detection of algorithmically generated domain names used by botnets: a dual arms race.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Analysis of architectural variants for auditable blockchain-based private data sharing.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 2019
Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 2019
You Don't Need a Ledger: Lightweight Decentralized Consensus Between Mobile Web Clients.
Proceedings of the 3rd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2019
DataBlinder: A distributed data protection middleware supporting search and computation on encrypted data.
Proceedings of the 20th International Middleware Conference Industrial Track, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019
Proceedings of the IEEE International Conference on Software Architecture, 2019
PPG<sup>2</sup>Live: Using dual PPG for active authentication and liveness detection.
Proceedings of the 2019 International Conference on Biometrics, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
AsTAR: Sustainable Battery Free Energy Harvesting for Heterogeneous Platforms and Dynamic Environments.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
A Low-Power Hardware Platform for Smart Environment as a Call for More Flexibility and Re-Usability.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
The Web Browser as Distributed Application Server: Towards Decentralized Web Applications in the Edge.
Proceedings of the 2nd International Workshop on Edge Systems, Analytics and Networking, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments.
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019
Proceedings of the 13th ACM International Conference on Distributed and Event-based Systems, 2019
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost.
IEEE Trans. Cloud Comput., 2018
A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS.
J. Syst. Softw., 2018
J. Inf. Secur. Appl., 2018
PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage.
J. Grid Comput., 2018
Enterp. Inf. Syst., 2018
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact).
Dagstuhl Artifacts Ser., 2018
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities.
CoRR, 2018
Proceedings of the 10th Central European Workshop on Services and their Composition, 2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things, 2018
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018
Proceedings of the 2018 IEEE International Conference on Software Architecture Companion, 2018
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Workshop, 2018
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018
Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Proceedings of the State of the Art in AI Applied to Ambient Intelligence, 2017
Softw. Syst. Model., 2017
Mob. Inf. Syst., 2017
QoC<sup>2</sup> Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications.
J. Reliab. Intell. Environ., 2017
J. Internet Serv. Appl., 2017
Ind. Manag. Data Syst., 2017
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows.
Future Internet, 2017
CoRR, 2017
Proceedings of the Companion Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering, 2017
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the First International Workshop on Human-centered Sensing, 2017
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017
Proceedings of the Symposium on Applied Computing, 2017
Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0.
Proceedings of the Symposium on Applied Computing, 2017
Enhanced fraud detection as a service supporting merchant-specific runtime customization.
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Companion to the first International Conference on the Art, 2017
Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, 2017
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos, Las Vegas, NV, USA, December 11, 2017
S<i>μ</i>V - the security microvisor: a virtualisation-based security middleware for the internet of things.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017
Adaptive and reflective middleware for the cloudification of simulation & optimization workflows.
Proceedings of the 16th Workshop on Adaptive and Reflective Middleware, 2017
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017
Proceedings of the 1st IEEE/ACM International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering, 2017
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017
Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms, CrossCloud@EuroSys 2017, Belgrade, Serbia, April 23, 2017
SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017
The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies.
Proceedings of the 11th European Conference on Software Architecture, 2017
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Secur. Commun. Networks, 2016
J. Syst. Softw., 2016
Semantic analysis and verification of context-driven adaptive applications in intelligent environments.
J. Reliab. Intell. Environ., 2016
Hitch Hiker 2.0: a binding model with flexible data aggregation for the Internet-of-Things.
J. Internet Serv. Appl., 2016
Security and privacy controls for streaming data in extended intelligent environments.
J. Ambient Intell. Smart Environ., 2016
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments.
J. Ambient Intell. Smart Environ., 2016
Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web.
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 20th International Systems and Software Product Line Conference, 2016
Systematic quality trade-off support in the software product-line configuration process.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016
Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard.
Proceedings of the 7th International Workshop on Automating Test Case Design, 2016
Demonstration of MicroPnP: The Zero-Configuration Wireless Sensing and Actuation Platform.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Privacy-enabled remote health monitoring applications for resource constrained wearable devices.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, 2016
Proceedings of the 15th International Workshop on Adaptive and Reflective Middleware, 2016
Proceedings of the International SoC Design Conference, 2016
Data Protection Compliance Regulations and Implications for Smart Factories of the Future.
Proceedings of the 12th International Conference on Intelligent Environments, 2016
Evolving multi-tenant SaaS applications through self-adaptive upgrade enactment and tenant mediation.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Adaptive Dissemination for Mobile Electronic Health Record Applications with Proactive Situational Awareness.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Feature-Based Variability Management for Scalable Enterprise Applications: Experiences with an E-Payment Case.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery.
Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016
Building Dynamic and Dependable Component-Based Internet-of-Things Applications with Dawn.
Proceedings of the 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering, 2016
2015
J. Internet Serv. Appl., 2015
IT Prof., 2015
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks.
Ad Hoc Networks, 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015
Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines.
Proceedings of the 19th International Conference on Software Product Line, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Amusa: middleware for efficient access control management of multi-tenant SaaS applications.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios.
Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware, 2015
Proceedings of the Doctoral Symposium of the 16th International Middleware Conference, 2015
Proceedings of the Posters and Demos Session of the 16th International Middleware Conference, 2015
Tomography: lowering management overhead for distributed component-based applications.
Proceedings of the 2nd Workshop on Middleware for Context-Aware Applications in the IoT, 2015
WF-Interop: Adaptive and Reflective REST Interfaces for Interoperability between Workflow Engines.
Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware, 2015
Proceedings of the Workshop Proceedings of the 11th International Conference on Intelligent Environments, 2015
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications.
Proceedings of the 2015 International Conference on Intelligent Environments, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 7th IEEE/ACM International Workshop on Modeling in Software Engineering, 2015
On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study.
Proceedings of the 5th IEEE/ACM International Workshop on the Twin Peaks of Requirements and Architecture, 2015
Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach.
Proceedings of the 7th IEEE/ACM International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, 2015
Proceedings of the Tenth European Conference on Computer Systems, 2015
Proceedings of the Eighth European Workshop on System Security, 2015
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Hitch Hiker: A Remote Binding Model with Priority Based Data Aggregation for Wireless Sensor Networks.
Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering, 2015
Refraction: Low-Cost Management of Reflective Meta-Data in Pervasive Component-Based Applications.
Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering, 2015
On the Need for Federated Authorization in Cross-organizational e-Health Platforms.
Proceedings of the HEALTHINF 2015, 2015
Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS.
Proceedings of the 2nd IEEE/ACM International Symposium on Big Data Computing, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
IEEE Trans. Software Eng., 2014
Softw. Syst. Model., 2014
Sci. Comput. Program., 2014
J. Syst. Softw., 2014
Efficient customization of multi-tenant Software-as-a-Service applications with service lines.
J. Syst. Softw., 2014
Cost-Effective Feature Placement of Customizable Multi-Tenant Applications in the Cloud.
J. Netw. Syst. Manag., 2014
Middleware for efficient and confidentiality-aware federation of access control policies.
J. Internet Serv. Appl., 2014
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset.
Inf. Sci., 2014
IEEE Secur. Priv., 2014
Increasing user participation: An exploratory study of querying on the Facebook and Twitter platforms.
First Monday, 2014
Comparing PaaS offerings in light of SaaS development - A comparison of PaaS platforms based on a practical case study.
Computing, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Towards managing variability in the safety design of an automotive hall effect sensor.
Proceedings of the 18th International Software Product Line Conference, 2014
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014
Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM.
Proceedings of the 2nd European Workshop on Practical Aspects of Health Informatics, 2014
Characterizing the performance of tenant data management in multi-tenant cloud authorization systems.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report.
Proceedings of the 1st International Workshop on Model-Driven Development Processes and Practices co-located with ACM/IEEE 17th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2014), 2014
Proceedings of the 9th Workshop on Models@run.time co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014), 2014
Proceedings of the 1st ACM Workshop on Middleware for Context-Aware Applications in the IoT, 2014
Proceedings of the 2nd International Workshop on CrossCloud Systems, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Evolutionary algorithms for classification of malware families through different network behaviors.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014
Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014
Proceedings of the Fundamental Approaches to Software Engineering, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the CBSE'14, Proceedings of the 17th International ACM SIGSOFT Symposium on Component-Based Software Engineering (part of CompArch 2014), Marcq-en-Baroeul, Lille, France, June 30, 2014
Network dialog minimization and network dialog diffing: two novel primitives for network security applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Modularity and Variability of Distributed Software Architectures through Multi-view Refinement of AO-Connectors.
LNCS Trans. Aspect Oriented Softw. Dev., 2013
Policy-driven customization of cross-organizational features in distributed service systems.
Softw. Pract. Exp., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice.
Proceedings of the Software Composition - 12th International Conference, 2013
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013
Analysis of Sensor Network Operating System Performance Throughout the Software Life Cycle.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Proceedings of the 12th International Workshop on Adaptive and Reflective Middleware, 2013
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, 2013
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the Wireless Sensor Networks - 10th European Conference, 2013
The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
LNCS Trans. Aspect Oriented Softw. Dev., 2012
A reconfigurable component model with semantic type system for dynamic WSN applications.
J. Internet Serv. Appl., 2012
J. Internet Serv. Appl., 2012
Int. J. Secur. Softw. Eng., 2012
ACM Comput. Surv., 2012
Concurr. Comput. Pract. Exp., 2012
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Developing and managing customizable Software as a Service using feature model conversion.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Feature placement algorithms for high-variability applications in cloud environments.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012
DiFiSec: An Adaptable Multi-level Security Framework for Event-Driven Communication in Wireless Sensor Networks.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012
Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, 2012
Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, 2012
Proceedings of the Seventh International Workshop on Middleware for Sensor Networks, 2012
Proceedings of the Late Breaking Papers of the 22nd International Conference on Inductive Logic Programming, 2012
Proceedings of the 34th International Conference on Software Engineering, 2012
Show me the money The importance of network effects for mobile application business models.
Proceedings of the 16th International Conference on Intelligence in Next Generation Networks, 2012
Proceedings of the Distributed Applications and Interoperable Systems, 2012
Proceedings of the Distributed Applications and Interoperable Systems, 2012
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012
Network-aware impact determination algorithms for service workflow deployment in hybrid clouds.
Proceedings of the 8th International Conference on Network and Service Management, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012
Proceedings of the 2012 Workshop on Next Generation Modularity Approaches for Requirements and Architecture, 2012
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012
Proceedings of the seventh workshop on Domain-Specific Aspect Languages, 2012
Traceability Between Run-Time and Development Time Abstractions - A Case Study on AOSD and Debugging.
Proceedings of the Software and Systems Traceability., 2012
2011
LNCS Trans. Aspect Oriented Softw. Dev., 2011
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
Requir. Eng., 2011
J. Softw., 2011
J. Braz. Comput. Soc., 2011
Int. J. Secur. Softw. Eng., 2011
Proceedings of the Software Composition - 10th International Conference, 2011
Proceedings of the Middleware 2011, 2011
Language and middleware support for dynamism in wireless sensor and actuator network applications.
Proceedings of the Sixth International Workshop on Middleware for Sensor Networks, 2011
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011
Proceedings of the 8th Middleware Doctoral Symposium of the 12th ACM/IFIP/USENIX International Middleware Conference, 2011
Proceedings of the Middleware 2011, 2011
SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-Hoc Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the Past, 2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Composition of least privilege analysis results in software architectures (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011
Proceedings of the Future Internet, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 5th International Symposium on Empirical Software Engineering and Measurement, 2011
Proceedings of the 5th International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2011), 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain.
LNCS Trans. Aspect Oriented Softw. Dev., 2010
ACM Trans. Auton. Adapt. Syst., 2010
IEEE Softw., 2010
Int. J. Mob. Comput. Multim. Commun., 2010
Computer, 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010
Expressing and Configuring Quality of Data in Multi-purpose Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Towards fine-grained and application-centric access control for wireless sensor networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the 1st IEEE International Conference on Networked Embedded Systems for Enterprise Applications, 2010
Proceedings of the 1st IEEE International Conference on Networked Embedded Systems for Enterprise Applications, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the Fifth International Workshop on Middleware for Sensor Networks, 2010
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality.
Proceedings of the IEEE International Conference on Web Services, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Software Architecture, 4th European Conference, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
Dynamic Composition of Cross-Organizational Features in Distributed Software Systems.
Proceedings of the Distributed Applications and Interoperable Systems, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Agent-Oriented Software Engineering XI - 11th International Workshop, 2010
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010
2009
Inf. Softw. Technol., 2009
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009
Proceedings of the Self-Organizing Architectures, First International Workshop, 2009
Proceedings of the Objects, Components, Models and Patterns, 47th International Conference, 2009
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009
Proceedings of the First International Conference on Networks and Communications, 2009
Proceedings of the MoMM'2009, 2009
Proceedings of the Fourth International Workshop on Middleware for Sensor Networks, 2009
Proceedings of the Fourth International Workshop on Middleware for Sensor Networks, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
Proceedings of the 2009 ICSE Workshop on Aspect-Oriented Requirements Engineering and Architecture Design, 2009
Proceedings of the 2009 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, 2009
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009
Proceedings of the Generative Programming and Component Engineering, 2009
Problem-Solution Feature Interactions as Configuration Knowledge in Distributed Runtime Adaptations.
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009
A sensor middleware and agent-based communication platform for supply-chain management.
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009
Proceedings of the 1st workshop on Linking aspect technology and evolution, 2009
A generic and reflective debugging architecture to support runtime visibility and traceability of aspects.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the Middleware for Network Eccentric and Mobile Applications, 2009
2008
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
IEEE Trans. Software Eng., 2008
Proceedings of the 1st IFIP Wireless Days, 2008
Proceedings of the Software Composition - 7th International Symposium, 2008
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization.
Proceedings of the Security in Information Systems, 2008
Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the Third International Workshop on Middleware for Sensor Networks, 2008
A comparison of two approaches for achieving flexible and adaptive security middleware.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008
Proceedings of the 3rd Workshop on Middleware for Service Oriented Computing, 2008
Proceedings of the 2008 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, 2008
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
Proceedings of the 13th International Conference on Engineering of Complex Computer Systems (ICECCS 2008), March 31 2008, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 6th Workshop on Middleware for Network Eccentric and Mobile Applications, 2008
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
Modeling Context-Dependent Aspect Interference Using Default Logics.
Proceedings of the RAM-SE'08-ECOOP'08 Workshop on Reflection, 2008
Proceedings of the Model Driven Architecture, 2008
Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems, 2008
Proceedings of the 7th International Conference on Aspect-Oriented Software Development, 2008
Proceedings of the ACP4IS@AOSD 2008: Proceedings of the 2008 AOSD workshop on Aspects, components, and patterns for infrastructure software, Brussels, Belgium, 31 March, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies.
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Model Driven Engineering Languages and Systems, 2007
Proceedings of the Second International Workshop on Middleware for Sensor Networks, 2007
Proceedings of the 6th Workshop on Adaptive and Reflective Middleware, 2007
Proceedings of the 21th Large Installation System Administration Conference, 2007
Proceedings of the Integrated Network Management, 2007
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 1st Workshop on Middleware-Application Interaction, 2007
Proceedings of the Engineering Environment-Mediated Multi-Agent Systems, 2007
Proceedings of the Distributed Applications and Interoperable Systems, 2007
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment.
Proceedings of the Distributed Applications and Interoperable Systems, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
Proceedings of the 2nd Workshop on Best Practices in Applying Aspect-Oriented Software Development, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Empirical and statistical analysis of risk analysis-driven techniques for threat management.
Proceedings of the The Second International Conference on Availability, 2007
2006
LNCS Trans. Aspect Oriented Softw. Dev., 2006
IEEE Distributed Syst. Online, 2006
Proceedings of the 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), 2006
Proceedings of the Software Composition - 5th International Symposium, 2006
Improving Intrusion Detection through Alert Verification.
Proceedings of the Security in Information Systems, 2006
Proceedings of the Embedded Computer Systems: Architectures, 2006
Key Research Challenges for Successfully Applying MDD Within Real-Time Embedded Software Development.
Proceedings of the Embedded Computer Systems: Architectures, 2006
Proceedings of the First International Workshop on Middleware for Sensor Networks, 2006
Proceedings of the Middleware 2006, 2006
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the ACM SIGPLAN Workshop on Generic Programming, 2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
Proceedings of the Business Process Management, 4th International Conference, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Connecting Embedded Devices Using a Component Platform for Adaptable Protocol Stacks.
Proceedings of the Component-Based Software Development for Embedded Systems, 2005
ACM SIGSOFT Softw. Eng. Notes, 2005
NeCoMan: Middleware for Safe Distributed-Service Adaptation in Programmable Networks.
IEEE Distributed Syst. Online, 2005
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Decentralized cooperative management: a bottom-up approach.
Proceedings of the AC 2005, 2005
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Component-Based Software Engineering, 8th International Symposium, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature.
J. Object Technol., 2004
Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, 2004
Proceedings of the 4th Working IEEE / IFIP Conference on Software Architecture (WICSA 2004), 2004
Proceedings of the Communications and Multimedia Security, 2004
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.
Proceedings of the Communications and Multimedia Security, 2004
2003
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure.
IEE Proc. Softw., 2003
Proceedings of the Distributed Applications and Interoperable Systems, 2003
2002
Proceedings of the 18th International Conference on Software Maintenance (ICSM 2002), 2002
2001
Proceedings of the 23rd International Conference on Software Engineering, 2001
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001
2000
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration.
Proceedings of the TOOLS 2000: 33rd International Conference on Technology of Object-Oriented Languages and Systems, 2000
A Security Architecture for Electronic Commerce Applications.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Middleware 2000, 2000
Proceedings of the Agent Systems, 2000
1999
Proceedings of the TOOLS Pacific 1999: 32nd International Conference on Technology of Object-Oriented Languages and Systems, 1999
Proceedings of the Meta-Level Architectures and Reflection, 1999
Proceedings of the Meta-Level Architectures and Reflection, 1999
Standardizing Component Interaction Patterns in Product-Lines Architectures.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999
Event System Providing a Service for Filtering and Correlating Events.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999
1998
Proceedings of the High-Performance Computing and Networking, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
1997
Management of Events in a multi-agent system.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997
Proceedings of the Multi-Agent Rationality, 1997
Proceedings of the Scientific Computing in Object-Oriented Parallel Environments, 1997
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997
1996
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996
Proceedings of the High-Performance Computing and Networking, 1996
1995
Flexible load balancing software for parallel applications in a time-sharing environment.
Proceedings of the High-Performance Computing and Networking, 1995
1994
Proceedings of the Second Euromicro Workshop on Parallel and Distributed Processing, 1994
Proceedings of the Parallel Scientific Computing, First International Workshop, 1994
Proceedings of the Distributed Software Agents and Applications, 1994
Proceedings of the High-Performance Computing and Networking, 1994
Observation of a Global Object Space on a Distributed Memory Machine.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994
Proceedings of the Object-Based Models and Languages for Concurrent Systems, 1994
1993
Microprocess. Microprogramming, 1993
Proceedings of the 1993 Euromicro Workshop on Parallel and Distributed Processing, 1993
Proceedings of the Object-Based Distributed Programming, 1993
1992
Object-orientation as an appropriate paradigm for high-performance environments for scientific computing.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992
1990
Microprocessing and Microprogramming, 1990
Microprocessing and Microprogramming, 1990
Proceedings of the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, 1990
1988
Proceedings of the 3rd ACM SIGOPS European Workshop: Autonomy or Interdependence in Distributed Systems? Cambridge, 1988