Browsing by Author "Wuyts, Kim"
- Results per page
- Sort Options
Publication A comparison of system description models for data protection bij design
;Dewitte, Pierre ;Wuyts, Kim ;Sion, Laurens ;Van Landuyt, Dimitri ;Emanuilov, IvoValcke, PeggyProceedings paper2019, SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 8/04/2018, p.1512-1515Publication A data utility-driven benchmark for de-identification methods
Proceedings paper2019, 16th International Conference on Trust, Privacy and Security in Digital Business, 26/08/2019, p.63-77Publication An architectural view for data protection by design
;Sion, Laurens ;Dewitte, Pierre ;Van Landuyt, Dimitri ;Wuyts, Kim ;Emanuilov, IvoValcke, PeggyProceedings paper2019, 2019 IEEE International Conference on Software Architecture (ICSA), 25/03/2019, p.11-20Publication DPMF: A modeling framework for data protection by design
Journal article2020, Enterprise Modeling and Information Systems Architectures, (15) 10, p.1-53Publication Effective and efficient privacy threat modeling through domain refinements
Proceedings paper2018, SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 9/04/2018, p.1175-1178Publication Empirical research on security and privacy by design: What (not) to expect as a researcher or a reviewer
Book chapter2017Publication Interaction-based privacy threat elicitation
Proceedings paper2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 27/04/2018Publication Knowledge is power: systematic reuse of privacy knowledge for threat elicitation
Proceedings paper2019, International Workshop on Privacy Engineering 2019, 23/05/2018, p.1-4Publication Land of the Lost: Privacy Patterns' Forgotten Properties: Enhancing Selection-Support for Privacy Patterns
Proceedings paper2021-03, ACM Symposium on Applied Computing, Proceedings of the 36th Annual ACM Symposium on Applied Computing, 22/03/2021, p.1217-1225Publication LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling
Proceedings paper2020, 5th IEEE European Symposium on Security and Privacy (IEEE Euro S and P), SEP 07-11, 2020, p.302-309Publication Mitigation Lost in Translation: Leveraging Threat Information to Improve Privacy Solution Selection
Proceedings paper2022, 37th Annual ACM Symposium on Applied Computing, APR 25-29, 2022, p.1236-1245Publication Privacy risk assessment for data subject-aware threat modeling
Proceedings paper2019, International Workshop on Privacy Engineering 2019, 23/05/2019, p.64-71Publication Threat modeling: from infancy to maturity
Proceedings paper2020, 42nd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), JUN 27-JUL 19, 2020, p.9-12Publication Towards a roadmap for privacy technologies and the general data protection regulation: A transatlantic initiative
;Schiffner, Stefan ;Berendt, Bettina ;Siil, Triin ;Degeling, MartinRiemann, RobertProceedings paper2018, 6th Annual Privacy Forum 2018. Privacy Technologies and Policy, 13/06/2018, p.24-42Publication Towards a roadmap for privacy technologies and the General Data Protection Regulation: A transatlantic initiative
;Schiffner, Stefan ;Berendt, Bettina ;Siil, Triin ;Degeling, MartinRiemann, RobertProceedings paper2018, 18th Annual Privacy Forum APF 2018: Privacy Technologies and Policy, 13/06/2018, p.24-42