Follow
Kim Wuyts
Kim Wuyts
DistriNet, KU Leuven
Verified email at cs.kuleuven.be
Title
Cited by
Cited by
Year
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
6812011
A descriptive study of Microsoft’s threat modeling technique
R Scandariato, K Wuyts, W Joosen
Requirements Engineering 20, 163-180, 2015
2012015
LINDDUN privacy threat modeling: a tutorial
K Wuyts, W Joosen
CW Reports, 2015
1052015
Empirical evaluation of a privacy-focused threat modeling methodology
K Wuyts, R Scandariato, W Joosen
Journal of Systems and Software 96, 122-138, 2014
862014
Linddun go: A lightweight approach to privacy threat modeling
K Wuyts, L Sion, W Joosen
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
762020
Effective and efficient privacy threat modeling through domain refinements
K Wuyts, D Van Landuyt, A Hovsepyan, W Joosen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1175-1178, 2018
522018
Privacy Threats in Software Architectures
K Wuyts
KU Leuven, Belgium, 2015
482015
An architectural view for data protection by design
L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ...
2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019
472019
Interaction-based privacy threat elicitation
L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018
432018
Threat modeling: from infancy to maturity
K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
302020
Privacy risk assessment for data subject-aware threat modeling
L Sion, D Van Landuyt, K Wuyts, W Joosen
2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019
282019
LIND (D) UN privacy threat tree catalog
K Wuyts, R Scandariato, W Joosen
CW Reports, 2014
282014
A data utility-driven benchmark for de-identification methods
O Tomashchuk, D Van Landuyt, D Pletea, K Wuyts, W Joosen
Trust, Privacy and Security in Digital Business: 16th International …, 2019
222019
Threat modeling manifesto
Z Braiterman, A Shostack, J Marcil, S de Vries, I Michlin, K Wuyts, ...
Threat Modeling Manifesto Working Group, 2020
212020
Linking privacy solutions to developer goals
K Wuyts, R Scandariato, B De Decker, W Joosen
2009 International Conference on Availability, Reliability and Security, 847-852, 2009
212009
A comparison of system description models for data protection by design
P Dewitte, K Wuyts, L Sion, D Van Landuyt, I Emanuilov, P Valcke, ...
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1512-1515, 2019
192019
Integrating patient consent in e-health access control
K Wuyts, R Scandariato, G Verhenneman, W Joosen
International Journal of Secure Software Engineering (IJSSE) 2 (2), 1-24, 2011
192011
Towards a roadmap for privacy technologies and the general data protection regulation: a transatlantic initiative
S Schiffner, B Berendt, T Siil, M Degeling, R Riemann, F Schaub, K Wuyts, ...
Privacy Technologies and Policy: 6th Annual Privacy Forum, APF 2018 …, 2018
182018
What electronic health records don’t know just yet. A privacy analysis for patient communities and health records interaction
K Wuyts, G Verhenneman, R Scandariato, W Joosen, J Dumortier
Health and Technology 2, 159-183, 2012
182012
The OCareCloudS project: toward organizing care through trusted cloud services
F De Backere, F Ongenae, F Vannieuwenborg, J Van Ooteghem, ...
Informatics for Health and Social Care 41 (2), 159-176, 2016
132016
The system can't perform the operation now. Try again later.
Articles 1–20