On the secure software development process: CLASP, SDL and Touchpoints compared B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen Information and software technology 51 (7), 1152-1171, 2009 | 175 | 2009 |
On the secure software development process: CLASP and SDL compared J Gregoire, K Buyens, B De Win, R Scandariato, W Joosen Third International Workshop on Software Engineering for Secure Systems …, 2007 | 84 | 2007 |
Empirical and statistical analysis of risk analysis-driven techniques for threat management K Buyens, B De Win, W Joosen The Second International Conference on Availability, Reliability and …, 2007 | 35 | 2007 |
Resolving least privilege violations in software architectures K Buyens, B De Win, W Joosen 2009 ICSE Workshop on Software Engineering for Secure Systems, 9-16, 2009 | 29 | 2009 |
Process activities supporting security principles K Buyens, R Scandariato, W Joosen 31st Annual International Computer Software and Applications Conference …, 2007 | 18 | 2007 |
Least privilege analysis in software architectures K Buyens, R Scandariato, W Joosen Software & Systems Modeling 12, 331-348, 2013 | 15 | 2013 |
Identifying and resolving least privilege violations in software architectures K Buyens, B De Win, W Joosen 2009 International Conference on Availability, Reliability and Security, 232-239, 2009 | 12 | 2009 |
Measuring the interplay of security principles in software architectures K Buyens, R Scandariato, W Joosen 2009 3rd International Symposium on Empirical Software Engineering and …, 2009 | 10 | 2009 |
Automated detection of least privilege violations in software architectures R Scandariato, K Buyens, W Joosen Software Architecture: 4th European Conference, ECSA 2010, Copenhagen …, 2010 | 9 | 2010 |
A software architecture to facilitate the creation of DRM systems K Buyens, S Michiels, W Joosen 4th IEEE Consumer Communications and Networking Conference (CCNC 2007), 955-959, 2007 | 8 | 2007 |
System requirements on digital newspapers T Mahieu, W Joosen, D Van Landuyt, J Grégoire, K Buyens, E Truyen CW Reports, 128-128, 2007 | 6 | 2007 |
Composition of least privilege analysis results in software architectures (position paper) K Buyens, R Scandariato, W Joosen Proceedings of the 7th International Workshop on Software Engineering for …, 2011 | 3 | 2011 |
Similarities and differences between clasp, sdl, and touchpoints: the activity-matrix K Buyens, J Grégoire, BD Win, R Scandariato, W Joosen CW Reports (CW501), Department of Computer Science, KU Leuven, Leuven, Belgium, 2007 | 3 | 2007 |
Results of threat analysis for a publishing system K Buyens, B De Win, J Grégoire, W Joosen, S Michiels CW Reports, 88-88, 2007 | 3 | 2007 |
A refined architecture for DRM K Buyens, S Michiels, W Joosen, KU Leuven Technical report, 2006 | 3 | 2006 |
DRM interoperability and reusability through a generic software S Michiels, K Buyens, K Verslype, W Joosen, BD Decker INDICARE Monitor-About Consumer and User Issues of Digital Rights 2 (11), 16-20, 2006 | 3 | 2006 |
Automated detection and resolution of least privilege violations in software architectures K Buyens, R Scandariato, W Joosen CW Reports, volume CW575 10, 2010 | 2 | 2010 |
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. K Buyens, B De Win, W Joosen WOSIS, 145-150, 2008 | 1 | 2008 |
nKatholieke Universiteit Leuven T Mahieu, W Joosen, D Van Landuyt, J Gregoire, K Buyens, E Truyen | 1 | |
Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen) K Buyens | | 2012 |