default search action
Bart De Win
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [c31]Wouter De Borger, Bart De Win, Bert Lagaisse, Wouter Joosen:
A permission system for secure AOP. AOSD 2010: 205-216
2000 – 2009
- 2009
- [j6]Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
On the secure software development process: CLASP, SDL and Touchpoints compared. Inf. Softw. Technol. 51(7): 1152-1171 (2009) - [c30]Koen Buyens, Bart De Win, Wouter Joosen:
Identifying and Resolving Least Privilege Violations in Software Architectures. ARES 2009: 232-239 - [c29]Koen Buyens, Bart De Win, Wouter Joosen:
Resolving least privilege violations in software architectures. SESS@ICSE 2009: 9-16 - [c28]Bart De Win, Seok-Won Lee, Mattia Monga:
The 5th international workshop on software engineering for secure systems (SESS'09). ICSE Companion 2009: 478-479 - [p1]Bart De Win, Tom Goovaerts, Wouter Joosen, Pieter Philippaerts, Frank Piessens, Yves Younan:
Security Middleware for Mobile Applications. Middleware for Network Eccentric and Mobile Applications 2009: 265-284 - 2008
- [c27]Koen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen:
Transforming Security Requirements into Architecture. ARES 2008: 1421-1428 - [c26]Bart De Win, Seok-Won Lee, Mattia Monga:
The fourth international workshop on software engineering for secure systems: SESS'08 -- a trusted business world. ICSE Companion 2008: 1069-1070 - [c25]Tom Goovaerts, Bart De Win, Wouter Joosen:
A comparison of two approaches for achieving flexible and adaptive security middleware. Middleware Security 2008: 19-24 - [c24]Koen Yskout, Bart De Win, Wouter Joosen:
Transforming Security Audit Requirements into a Software Architecture. MODSEC@MoDELS 2008 - [c23]Koen Buyens, Bart De Win, Wouter Joosen:
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. WOSIS 2008: 145-150 - [e2]Bart De Win, Seok-Won Lee, Mattia Monga:
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS 2008, Leipzig, Germany, May 17-18, 2008. ACM 2008, ISBN 978-1-60558-042-5 [contents] - 2007
- [c22]Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management. ARES 2007: 1034-1041 - [c21]Tom Goovaerts, Bart De Win, Wouter Joosen:
A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. DAIS 2007: 253-266 - [c20]Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen:
On the Secure Software Development Process: CLASP and SDL Compared. SESS@ICSE 2007: 1 - [c19]Danilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga:
The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. ICSE Companion 2007: 111-112 - [c18]Kris Verlaenen, Bart De Win, Wouter Joosen:
Towards simplified specification of policies in different domains. Integrated Network Management 2007: 20-29 - [c17]Kris Verlaenen, Bart De Win, Wouter Joosen:
Policy Analysis Using a Hybrid Semantic Reasoning Engine. POLICY 2007: 193-200 - [c16]Tom Goovaerts, Bart De Win, Wouter Joosen:
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. REM@ESORICS 2007: 31-43 - 2006
- [j5]Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen:
A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Syst. Online 7(6) (2006) - [c15]Riccardo Scandariato, Bart De Win, Wouter Joosen:
Towards a measuring framework for security properties of software. QoP 2006: 27-30 - [c14]Danilo Bruschi, Bart De Win, Mattia Monga:
Introduction to software engineering for secure systems: SESS06 - secure by design. SESS@ICSE 2006: 1-2 - [c13]Bart De Win, Frank Piessens, Wouter Joosen:
How secure is AOP and what can we do about it? SESS@ICSE 2006: 27-34 - [c12]Danilo Bruschi, Bart De Win, Mattia Monga:
Software engineering for secure systems. ICSE 2006: 1007-1008 - [c11]Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen:
Improving Intrusion Detection through Alert Verification. WOSIS 2006: 207-216 - [c10]Maarten Bynens, Bart De Win, Wouter Joosen, Bart Theeten:
Ontology-Based Discovery of Data-Driven Services. SOSE 2006: 175-178 - [e1]Danilo Bruschi, Bart De Win, Mattia Monga:
Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006. ACM 2006, ISBN 1-59593-411-1 [contents] - 2005
- [j4]Danilo Bruschi, Bart De Win, Mattia Monga:
Software engineering for secure systems. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-2 (2005) - [j3]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Requirements traceability to support evolution of access control. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [j2]Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:
Towards a unifying view on security contracts. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c9]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Uniform Application-level Access Control Enforcement of Organizationwide Policies. ACSAC 2005: 431-440 - [c8]Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen:
Assessment of Palm OS Susceptibility to Malicious Code Threats. Communications and Multimedia Security 2005: 240-249 - [c7]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Requirements traceability to support evolution of access control. SESS@ICSE 2005: 1-7 - [c6]Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:
Towards a unifying view on security contracts. SESS@ICSE 2005: 1-7 - [c5]Danilo Bruschi, Bart De Win, Mattia Monga:
Software engineering for secure systems. ICSE 2005: 681 - 2003
- [c4]Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen:
Adaptable Access Control Policies for Medical Information Systems. DAIS 2003: 133-140 - 2002
- [j1]Bart De Win, Bart Vanhaute, Bart De Decker:
How aspect-oriented programming can help to build secure software. Informatica (Slovenia) 26(2) (2002) - 2001
- [c3]Bart De Win, Bart Vanhaute, Bart De Decker:
Security Through Aspect-Oriented Programming. Network Security 2001: 125-138 - [c2]Frank Piessens, Bart De Decker, Bart De Win:
Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40 - 2000
- [c1]Bart De Win, Jan Van den Bergh, Frank Matthijs, Bart De Decker, Wouter Joosen:
A Security Architecture for Electronic Commerce Applications. SEC 2000: 491-500
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint