Follow
Kim Wuyts
Kim Wuyts
DistriNet, KU Leuven
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
4772011
A descriptive study of Microsoft’s threat modeling technique
R Scandariato, K Wuyts, W Joosen
Requirements Engineering 20 (2), 163-180, 2015
1322015
Empirical evaluation of a privacy-focused threat modeling methodology
K Wuyts, R Scandariato, W Joosen
Journal of Systems and Software 96, 122-138, 2014
632014
LINDDUN privacy threat modeling: a tutorial
K Wuyts, W Joosen
CW Reports, 2015
432015
Privacy Threats in Software Architectures
K Wuyts
KU Leuven, Belgium, 2015
372015
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
252018
Linking privacy solutions to developer goals
K Wuyts, R Scandariato, B De Decker, W Joosen
2009 International Conference on Availability, Reliability and Security, 847-852, 2009
222009
An architectural view for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ...
2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019
202019
Effective and efficient privacy threat modeling through domain refinements
K Wuyts, D Van Landuyt, A Hovsepyan, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1175-1178, 2018
202018
What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction
K Wuyts, G Verhenneman, R Scandariato, W Joosen, J Dumortier
Health and Technology 2 (3), 159-183, 2012
172012
Integrating patient consent in e-health access control
K Wuyts, R Scandariato, G Verhenneman, W Joosen
International Journal of Secure Software Engineering (IJSSE) 2 (2), 1-24, 2011
172011
A data utility-driven benchmark for de-identification methods
O Tomashchuk, DV Landuyt, D Pletea, K Wuyts, W Joosen
International Conference on Trust and Privacy in Digital Business, 63-77, 2019
152019
LIND (D) UN privacy threat tree catalog
K Wuyts, R Scandariato, W Joosen
Department of Computer Science, KU Leuven, 2014
142014
Linddun go: A lightweight approach to privacy threat modeling
K Wuyts, L Sion, W Joosen
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
132020
Privacy risk assessment for data subject-aware threat modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019
132019
Towards a roadmap for privacy technologies and the general data protection regulation: a transatlantic initiative
S Schiffner, B Berendt, T Siil, M Degeling, R Riemann, F Schaub, K Wuyts, ...
Annual Privacy Forum, 24-42, 2018
132018
Hardening XDS-based architectures
K Wuyts, R Scandariato, G Claeys, W Joosen
2008 Third International Conference on Availability, Reliability and …, 2008
132008
The OCareCloudS project: toward organizing care through trusted cloud services
F De Backere, F Ongenae, F Vannieuwenborg, J Van Ooteghem, ...
Informatics for Health and Social Care 41 (2), 159-176, 2016
102016
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
2020 IEEE/ACM 42nd International Conference on Software Engineering: New …, 2020
92020
A comparison of system description models for data protection by design
P Dewitte, K Wuyts, L Sion, D Van Landuyt, I Emanuilov, P Valcke, ...
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1512-1515, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20