Browsing by Author "Van landuyt, Dimitri"
- Results Per Page
- Sort Options
Publication A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS
Journal article2018, Journal of Systems and Software, 144, p.423-438Publication A workload-driven Document Database Schema Recommender (DBSR)
Proceedings paper2020, Proceedings of 39th International Conference on Conceptual Modeling, 3/11/2020Publication Data management policies for GDPR compliance at run time
Proceedings paper2018, W-GCS 2018 : 1st Workshop on GDPR Compliant Systems, 10/12/2018, p.1-3Publication DPMF: A modeling framework for data protection by design
Journal article2020, Enterprise Modeling and Information Systems Architectures, (15) 10, p.1-53Publication Effective and efficient privacy threat modeling through domain refinements
Proceedings paper2018, SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 9/04/2018, p.1175-1178Publication Evaluation of container orchestration systems for deploying and managing NoSQL database clusters
Proceedings paper2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2/07/2018, p.468-475Publication Interaction-based privacy threat elicitation
Proceedings paper2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 27/04/2018Publication K8-scalar: A workbench to compare autoscalers for container-orchestrated database clusters
Proceedings paper2018, SEAMS '18 Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 28/05/2018, p.33-39Publication Message from the Chairs of SEAMS 2018
Proceedings paper2018, Proceedings - International Conference on Software Engineering, 27/05/2018Publication On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost
Journal article2018, IEEE Transactions on Cloud Computing, (6) 3, p.843-856Publication PERSIST: Policy-based data management middleware for multi-tenant SaaS leveraging federated cloud storage
Journal article2018, Journal of Grid Computing, (16) 2, p.165-194Publication Poster: Knowledge-enriched security and privacy threat modeling
Proceedings paper2018, ICSE '18 Proceedings of the 40th International Conference on Software Engineering, 27/05/2018, p.290-291Publication Risk-based design security analysis
Proceedings paper2018, SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 27/05/2018, p.11-18Publication Schema design support for semi-structured data: Finding the weet spot between NF and De-NF
Proceedings paper2017, IEEE International Conference on Big Data, 11/12/2017, p.2921-2930Publication Security threat modeling: Are data flow diagrams enough?
Proceedings paper2020, 1st International Workshop on Engineering and Cybersecurity of Critical Systems - EnCyCriS, 23/05/2020, p.254-257Publication Solution-aware data flow diagrams for security threat modelling
Proceedings paper2018, SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 9/04/2018, p.1425-1432Publication SPARTA: Security & privacy architecture through risk-driven threat assessment
Proceedings paper2018, 2018 IEEE International Conference on Software Architecture Companion (ICSA-C), 30/04/2018Publication Thread-level CPU and memory usage control of custom code in multi-tenant SaaS
Proceedings paper2020, Service-Oriented Computing. ICSOC 2019, 28/10/2019Publication Transparent IO access control for application-level tenant isolation
Proceedings paper2018, SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 9/04/2018, p.143-150