Repository logo Institutional repository
  • Communities & Collections
  • Scientific publicationsOpen knowledge
Search repository
High contrast
  1. Home
  2. Browse by Author

Browsing by Author "Wuyts, Kim"

Filter results by typing the first few letters
Now showing 1 - 15 of 15
  • Results per page
  • Sort Options
  • Loading...
    Thumbnail Image
    Publication

    A comparison of system description models for data protection bij design

    Dewitte, Pierre
    ;
    Wuyts, Kim
    ;
    Sion, Laurens
    ;
    Van Landuyt, Dimitri
    ;
    Emanuilov, Ivo
    ;
    Valcke, Peggy
    Proceedings paper
    2019, SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 8/04/2018, p.1512-1515
  • Loading...
    Thumbnail Image
    Publication

    A data utility-driven benchmark for de-identification methods

    Tomashchuk, Oleksandr
    ;
    Van Landuyt, Dimitri
    ;
    Pletea, Daniel
    ;
    Wuyts, Kim
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, 16th International Conference on Trust, Privacy and Security in Digital Business, 26/08/2019, p.63-77
  • Loading...
    Thumbnail Image
    Publication

    An architectural view for data protection by design

    Sion, Laurens
    ;
    Dewitte, Pierre
    ;
    Van Landuyt, Dimitri
    ;
    Wuyts, Kim
    ;
    Emanuilov, Ivo
    ;
    Valcke, Peggy
    Proceedings paper
    2019, 2019 IEEE International Conference on Software Architecture (ICSA), 25/03/2019, p.11-20
  • Loading...
    Thumbnail Image
    Publication

    DPMF: A modeling framework for data protection by design

    Sion, Laurens
    ;
    Dewitte, Pierre
    ;
    Van landuyt, Dimitri
    ;
    Wuyts, Kim
    ;
    Valcke, Peggy
    ;
    Joosen, Wouter  
    Journal article
    2020, Enterprise Modeling and Information Systems Architectures, (15) 10, p.1-53
  • Loading...
    Thumbnail Image
    Publication

    Effective and efficient privacy threat modeling through domain refinements

    Wuyts, Kim
    ;
    Van landuyt, Dimitri
    ;
    Hovsepyan, Aram
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 9/04/2018, p.1175-1178
  • Loading...
    Thumbnail Image
    Publication

    Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewer

    Yskout, Koen
    ;
    Wuyts, Kim
    ;
    Van Landuyt, Dimitri
    ;
    Scandariato, Ricardo
    ;
    Joosen, Wouter  
    Book chapter
    2017
  • Loading...
    Thumbnail Image
    Publication

    Interaction-based privacy threat elicitation

    Sion, Laurens
    ;
    Wuyts, Kim
    ;
    Yskout, Koen
    ;
    Van landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 27/04/2018
  • Loading...
    Thumbnail Image
    Publication

    Knowledge is power: systematic reuse of privacy knowledge for threat elicitation

    Wuyts, Kim
    ;
    Sion, Laurens
    ;
    Van Landuyt, Dimitri
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, International Workshop on Privacy Engineering 2019, 23/05/2018, p.1-4
  • Loading...
    Thumbnail Image
    Publication

    Land of the Lost: Privacy Patterns' Forgotten Properties: Enhancing Selection-Support for Privacy Patterns

    Al-Momani, Ala'a
    ;
    Wuyts, Kim
    ;
    Sion, Laurens
    ;
    Kargl, Frank
    ;
    Joosen, Wouter  
    ;
    Erb, Benjamin
    Proceedings paper
    2021-03, ACM Symposium on Applied Computing, Proceedings of the 36th Annual ACM Symposium on Applied Computing, 22/03/2021, p.1217-1225
  • Loading...
    Thumbnail Image
    Publication

    LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling

    Wuyts, Kim
    ;
    Sion, Laurens
    ;
    Joosen, Wouter  
    Proceedings paper
    2020, 5th IEEE European Symposium on Security and Privacy (IEEE Euro S and P), SEP 07-11, 2020, p.302-309
  • Loading...
    Thumbnail Image
    Publication

    Mitigation Lost in Translation: Leveraging Threat Information to Improve Privacy Solution Selection

    Al-Momani, Ala'a
    ;
    Boesch, Christoph
    ;
    Wuyts, Kim
    ;
    Sion, Laurens
    ;
    Joosen, Wouter  
    ;
    Kargl, Frank
    Proceedings paper
    2022, 37th Annual ACM Symposium on Applied Computing, APR 25-29, 2022, p.1236-1245
  • Loading...
    Thumbnail Image
    Publication

    Privacy risk assessment for data subject-aware threat modeling

    Sion, Laurens
    ;
    Van Landuyt, Dimitri
    ;
    Wuyts, Kim
    ;
    Joosen, Wouter  
    Proceedings paper
    2019, International Workshop on Privacy Engineering 2019, 23/05/2019, p.64-71
  • Loading...
    Thumbnail Image
    Publication

    Threat modeling: from infancy to maturity

    Yskout, Koen
    ;
    Heyman, Thomas
    ;
    Van Landuyt, Dimitri
    ;
    Sion, Laurens
    ;
    Wuyts, Kim
    ;
    Joosen, Wouter  
    Proceedings paper
    2020, 42nd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), JUN 27-JUL 19, 2020, p.9-12
  • Loading...
    Thumbnail Image
    Publication

    Towards a roadmap for privacy technologies and the general data protection regulation: A transatlantic initiative

    Schiffner, Stefan
    ;
    Berendt, Bettina
    ;
    Siil, Triin
    ;
    Degeling, Martin
    ;
    Riemann, Robert
    Proceedings paper
    2018, 6th Annual Privacy Forum 2018. Privacy Technologies and Policy, 13/06/2018, p.24-42
  • Loading...
    Thumbnail Image
    Publication

    Towards a roadmap for privacy technologies and the General Data Protection Regulation: A transatlantic initiative

    Schiffner, Stefan
    ;
    Berendt, Bettina
    ;
    Siil, Triin
    ;
    Degeling, Martin
    ;
    Riemann, Robert
    Proceedings paper
    2018, 18th Annual Privacy Forum APF 2018: Privacy Technologies and Policy, 13/06/2018, p.24-42

Follow imec on

VimeoLinkedInFacebook

The repository

  • Contact us
  • Policy
  • About imec
Privacy statement | Cookie settings