Browsing by Author "Van Landuyt, Dimitri"
- Results Per Page
- Sort Options
Publication A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence
Proceedings paper2023, 38th Annual ACM Symposium on Applied Computing (ACM SAC), MAR 27-31, 2023, p.286-293Publication A comparison of system description models for data protection bij design
;Dewitte, Pierre ;Wuyts, Kim ;Sion, Laurens ;Van Landuyt, Dimitri ;Emanuilov, IvoValcke, PeggyProceedings paper2019, SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 8/04/2018, p.1512-1515Publication A comprehensive feature comparison study of open-source container orchestration frameworks
Journal article2019, Applied Sciences, (9) 5, p.931Publication A data utility-driven benchmark for de-identification methods
Proceedings paper2019, 16th International Conference on Trust, Privacy and Security in Digital Business, 26/08/2019, p.63-77Publication A descriptive study of assumptions made in LINDDUN privacy threat elicitation
;Van Landuyt, DimitriProceedings paper2019, 35th ACM/SIGAPP Symposium On Applied Computing, 30/03/2019Publication A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification
;Van Landuyt, DimitriProceedings paper2022, 16th European Conference on Software Architecture (ECSA), SEP 19-23, 2022, p.66-82Publication An architectural view for data protection by design
;Sion, Laurens ;Dewitte, Pierre ;Van Landuyt, Dimitri ;Wuyts, Kim ;Emanuilov, IvoValcke, PeggyProceedings paper2019, 2019 IEEE International Conference on Software Architecture (ICSA), 25/03/2019, p.11-20Publication An Overview of Runtime Data Protection Enforcement Approaches
Proceedings paper2021, 6th IEEE European Symposium on Security and Privacy (Euro S and P), SEP 06-10, 2021, p.351-358Publication Analysis of architectural variants for auditable blockchain-based private data sharing
;Reniers, Vincent ;Van Landuyt, Dimitri ;Viviani, Paolo ;Lagaisse, BertLombardi, RiccardoProceedings paper2019, SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 8/04/2019, p.346-354Publication Automated Regression Testing of BPMN 2.0 Processes: a capture and replay framework for continuous delivery
Journal article2017, ACM SIGPLAN Notices - GCPE, (52) 31, p.178-189Publication Automated Threat Analysis and Management in a Continuous Integration Pipeline
Proceedings paper2021, 6th IEEE Secure Development Conference (SecDev), OCT 18-20, 2021, p.30-37Publication Continuous and client-centric trust monitoring in multi-cloud storage
Proceedings paper2019, Proceedings of the 9th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, 2/05/2019, p.100-110Publication CryptDICE: Distributed data protection system for secure cloud data storage and computation
Journal article2021, INFORMATION SYSTEMS, 96, p.101671Publication Demonstration of the DPMF for Data Protection Analysis
Proceedings paper2023, ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS), OCT 01-06, 2023, p.75-79Publication Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewer
Book chapter2017Publication Expressive and Systematic Risk Assessments with Instance-Centric Threat Models
Proceedings paper2023, 38th Annual ACM Symposium on Applied Computing (ACM SAC), MAR 27-31, 2023, p.1450-1457Publication Knowledge is power: systematic reuse of privacy knowledge for threat elicitation
Proceedings paper2019, International Workshop on Privacy Engineering 2019, 23/05/2018, p.1-4Publication Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-Tenant SaaS
Proceedings paper2017, 2017 IEEE Trustcom/BigDataSE/ICESS, 1/08/2017, p.885-892Publication Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis
Journal article2020, IEEE ACCESS, 8, p.228420-228439