Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jerry den Hartog
@article{DBLP:journals/virology/DupontSDVMCHE24, author = {Guillaume Dupont and Daniel Ricardo dos Santos and Stanislav Dashevskyi and Sangavi Vijayakumar and Sashaank P. Murali and Elisa Costante and Jerry den Hartog and Sandro Etalle}, title = {Demonstration of new attacks on three healthcare network protocols in a lab environment}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {20}, number = {2}, pages = {301--314}, year = {2024}, url = {https://doi.org/10.1007/s11416-023-00479-w}, doi = {10.1007/S11416-023-00479-W}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/DupontSDVMCHE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/SilvaRZHC24, author = {Neil Ortiz Silva and Martin Rosso and Emmanuele Zambon and Jerry den Hartog and Alvaro A. C{\'{a}}rdenas}, editor = {Philipp Richter and Vaibhav Bajpai and Esteban Carisimo}, title = {From Power to Water: Dissecting {SCADA} Networks Across Different Critical Infrastructures}, booktitle = {Passive and Active Measurement - 25th International Conference, {PAM} 2024, Virtual Event, March 11-13, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14537}, pages = {3--31}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-56249-5\_1}, doi = {10.1007/978-3-031-56249-5\_1}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pam/SilvaRZHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/LeiteHSC23, author = {Cristoffer Leite and Jerry den Hartog and Daniel Ricardo dos Santos and Elisa Costante}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {2999--3008}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386324}, doi = {10.1109/BIGDATA59044.2023.10386324}, timestamp = {Fri, 02 Feb 2024 12:00:39 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/LeiteHSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LeiteHK23, author = {Cristoffer Leite and Jerry den Hartog and Paul Koster}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {7--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593831}, doi = {10.1145/3589608.3593831}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LeiteHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/TommasiniRZAH22, author = {Martino Tommasini and Martin Rosso and Emmanuele Zambon and Luca Allodi and Jerry den Hartog}, title = {Characterizing Building Automation System Attacks and Attackers}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022 - Workshops, Genoa, Italy, June 6-10, 2022}, pages = {139--149}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSPW55150.2022.00020}, doi = {10.1109/EUROSPW55150.2022.00020}, timestamp = {Mon, 04 Jul 2022 17:06:18 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/TommasiniRZAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LeiteHSC22, author = {Cristoffer Leite and Jerry den Hartog and Daniel Ricardo dos Santos and Elisa Costante}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Actionable Cyber Threat Intelligence for Automated Incident Response}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {368--385}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_20}, doi = {10.1007/978-3-031-22295-5\_20}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/LeiteHSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/QinRCEHZ22, author = {Xi Qin and Martin Rosso and Alvaro A. C{\'{a}}rdenas and Sandro Etalle and Jerry den Hartog and Emmanuele Zambon}, title = {You Can't Protect What You Don't Understand: Characterizing an Operational Gas {SCADA} Network}, booktitle = {43rd {IEEE} Security and Privacy, {SP} Workshops 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {243--250}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SPW54247.2022.9833864}, doi = {10.1109/SPW54247.2022.9833864}, timestamp = {Thu, 21 Sep 2023 16:11:09 +0200}, biburl = {https://dblp.org/rec/conf/sp/QinRCEHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coins/DupontLSCHE21, author = {Guillaume Dupont and Cristoffer Leite and Daniel Ricardo dos Santos and Elisa Costante and Jerry den Hartog and Sandro Etalle}, title = {Similarity-Based Clustering For IoT Device Classification}, booktitle = {2021 {IEEE} International Conference on Omni-Layer Intelligent Systems, {COINS} 2021, Barcelona, Spain, August 23-25, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/COINS51742.2021.9524201}, doi = {10.1109/COINS51742.2021.9524201}, timestamp = {Thu, 09 Sep 2021 16:05:21 +0200}, biburl = {https://dblp.org/rec/conf/coins/DupontLSCHE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DupontSCHE20, author = {Guillaume Dupont and Daniel Ricardo dos Santos and Elisa Costante and Jerry den Hartog and Sandro Etalle}, editor = {Marko H{\"{o}}lbl and Kai Rannenberg and Tatjana Welzer}, title = {A Matter of Life and Death: Analyzing the Security of Healthcare Networks}, booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {580}, pages = {355--369}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58201-2\_24}, doi = {10.1007/978-3-030-58201-2\_24}, timestamp = {Thu, 17 Sep 2020 14:27:06 +0200}, biburl = {https://dblp.org/rec/conf/sec/DupontSCHE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FauriKSCHE19, author = {Davide Fauri and Michail Kapsalakis and Daniel Ricardo dos Santos and Elisa Costante and Jerry den Hartog and Sandro Etalle}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {461--481}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_22}, doi = {10.1007/978-3-030-22038-9\_22}, timestamp = {Tue, 29 Dec 2020 18:36:17 +0100}, biburl = {https://dblp.org/rec/conf/dimva/FauriKSCHE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccve/DupontHEL19, author = {Guillaume Dupont and Jerry den Hartog and Sandro Etalle and Alexios Lekidis}, title = {Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle {CAN}}, booktitle = {2019 {IEEE} International Conference on Connected Vehicles and Expo, {ICCVE} 2019, Graz, Austria, November 4-8, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCVE45908.2019.8965028}, doi = {10.1109/ICCVE45908.2019.8965028}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccve/DupontHEL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icves/DupontHEL19, author = {Guillaume Dupont and Jerry den Hartog and Sandro Etalle and Alexios Lekidis}, title = {A Survey of Network Intrusion Detection Systems for Controller Area Network}, booktitle = {{IEEE} International Conference of Vehicular Electronics and Safety, {ICVES} 2019, Cairo, Egypt, September 4-6, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICVES.2019.8906465}, doi = {10.1109/ICVES.2019.8906465}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icves/DupontHEL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertolissiHZ19, author = {Clara Bertolissi and Jerry den Hartog and Nicola Zannone}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {Using Provenance for Secure Data Fusion in Cooperative Systems}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {185--194}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325100}, doi = {10.1145/3322431.3325100}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BertolissiHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-11587, author = {Guillaume Dupont and Jerry den Hartog and Sandro Etalle and Alexios Lekidis}, title = {Network intrusion detection systems for in-vehicle network - Technical report}, journal = {CoRR}, volume = {abs/1905.11587}, year = {2019}, url = {http://arxiv.org/abs/1905.11587}, eprinttype = {arXiv}, eprint = {1905.11587}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-11587.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LeHZ18, author = {Van Huynh Le and Jerry den Hartog and Nicola Zannone}, title = {Security and privacy for innovative automotive applications: {A} survey}, journal = {Comput. Commun.}, volume = {132}, pages = {17--41}, year = {2018}, url = {https://doi.org/10.1016/j.comcom.2018.09.010}, doi = {10.1016/J.COMCOM.2018.09.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LeHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FauriKSCHE18, author = {Davide Fauri and Michail Kapsalakis and Daniel Ricardo dos Santos and Elisa Costante and Jerry den Hartog and Sandro Etalle}, editor = {Eric A. M. Luiijf and Inga Zutautaite and Bernhard M. H{\"{a}}mmerli}, title = {Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems}, booktitle = {Critical Information Infrastructures Security - 13th International Conference, {CRITIS} 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11260}, pages = {113--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05849-4\_9}, doi = {10.1007/978-3-030-05849-4\_9}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/FauriKSCHE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/LeHZ18, author = {Van Huynh Le and Jerry den Hartog and Nicola Zannone}, editor = {Christian Callegari and Marten van Sinderen and Paulo Novais and Panagiotis G. Sarigiannidis and Sebastiano Battiato and {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and Pascal Lorenz and Mohammad S. Obaidat}, title = {Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS, {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018}, pages = {647--657}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006946806470657}, doi = {10.5220/0006946806470657}, timestamp = {Wed, 29 Aug 2018 15:17:08 +0200}, biburl = {https://dblp.org/rec/conf/icete/LeHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TurkmenHRZ17, author = {Fatih Turkmen and Jerry den Hartog and Silvio Ranise and Nicola Zannone}, title = {Formal analysis of {XACML} policies using {SMT}}, journal = {Comput. Secur.}, volume = {66}, pages = {185--203}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.01.009}, doi = {10.1016/J.COSE.2017.01.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TurkmenHRZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CostanteHPEP17, author = {Elisa Costante and Jerry den Hartog and Milan Petkovic and Sandro Etalle and Mykola Pechenizkiy}, title = {A white-box anomaly-based framework for database leakage detection}, journal = {J. Inf. Secur. Appl.}, volume = {32}, pages = {27--46}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2016.10.001}, doi = {10.1016/J.JISA.2016.10.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/CostanteHPEP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FauriSCHET17, author = {Davide Fauri and Daniel Ricardo dos Santos and Elisa Costante and Jerry den Hartog and Sandro Etalle and Stefano Tonetta}, editor = {Bhavani Thuraisingham and Rakesh B. Bobba and Awais Rashid}, title = {From System Specification to Anomaly Detection (and back)}, booktitle = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017}, pages = {13--24}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140241.3140250}, doi = {10.1145/3140241.3140250}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FauriSCHET17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/FauriWHCZE17, author = {Davide Fauri and Bart de Wijs and Jerry den Hartog and Elisa Costante and Emmanuele Zambon and Sandro Etalle}, title = {Encryption in {ICS} networks: {A} blessing or a curse?}, booktitle = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, pages = {289--294}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SmartGridComm.2017.8340732}, doi = {10.1109/SMARTGRIDCOMM.2017.8340732}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/FauriWHCZE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HartogZ16, author = {Jerry den Hartog and Nicola Zannone}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {A Policy Framework for Data Fusion and Derived Data Control}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, pages = {47--57}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491.2875492}, doi = {10.1145/2875491.2875492}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HartogZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/EgnerLHZ16, author = {Alexandru Ionut Egner and Duc Luu and Jerry den Hartog and Nicola Zannone}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {An Authorization Service for Collaborative Situation Awareness}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {136--138}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857740}, doi = {10.1145/2857705.2857740}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/EgnerLHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThalerHP16, author = {Stefan Thaler and Jerry den Hartog and Milan Petkovic}, editor = {Silvio Ranise and Vipin Swarup}, title = {Towards Creating Believable Decoy Project Folders for Detecting Data Theft}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {161--169}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_12}, doi = {10.1007/978-3-319-41483-6\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ThalerHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MahmudluHZ16, author = {Rauf Mahmudlu and Jerry den Hartog and Nicola Zannone}, editor = {Silvio Ranise and Vipin Swarup}, title = {Data Governance and Transparency for Collaborative Systems}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {199--216}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_15}, doi = {10.1007/978-3-319-41483-6\_15}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MahmudluHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HartogZ16, author = {Jerry den Hartog and Nicola Zannone}, editor = {Indrajit Ray and Manoj Singh Gaur and Mauro Conti and Dheeraj Sanghi and V. Kamakoti}, title = {Collaborative Access Decisions: Why Has My Decision Not Been Enforced?}, booktitle = {Information Systems Security - 12th International Conference, {ICISS} 2016, Jaipur, India, December 16-20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {109--130}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49806-5\_6}, doi = {10.1007/978-3-319-49806-5\_6}, timestamp = {Thu, 10 Sep 2020 09:33:08 +0200}, biburl = {https://dblp.org/rec/conf/iciss/HartogZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/YukselHE16, author = {{\"{O}}mer Y{\"{u}}ksel and Jerry den Hartog and Sandro Etalle}, editor = {Indrajit Ray and Manoj Singh Gaur and Mauro Conti and Dheeraj Sanghi and V. Kamakoti}, title = {Towards Useful Anomaly Detection for Back Office Networks}, booktitle = {Information Systems Security - 12th International Conference, {ICISS} 2016, Jaipur, India, December 16-20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {509--520}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49806-5\_30}, doi = {10.1007/978-3-319-49806-5\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/YukselHE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/YukselHE16, author = {{\"{O}}mer Y{\"{u}}ksel and Jerry den Hartog and Sandro Etalle}, editor = {Sascha Ossowski}, title = {Reading between the fields: practical, effective intrusion detection for industrial control systems}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {2063--2070}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851799}, doi = {10.1145/2851613.2851799}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/YukselHE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CostanteFEHZ16, author = {Elisa Costante and Davide Fauri and Sandro Etalle and Jerry den Hartog and Nicola Zannone}, title = {A Hybrid Framework for Data Loss Prevention and Detection}, booktitle = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {324--333}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SPW.2016.24}, doi = {10.1109/SPW.2016.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CostanteFEHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/CostanteHP15, author = {Elisa Costante and Jerry den Hartog and Milan Petkovic}, title = {Understanding Perceived Trust to Reduce Regret}, journal = {Comput. Intell.}, volume = {31}, number = {2}, pages = {327--347}, year = {2015}, url = {https://doi.org/10.1111/coin.12025}, doi = {10.1111/COIN.12025}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/CostanteHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fiict/KaluvuriEHZ15, author = {Samuel Paul Kaluvuri and Alexandru Ionut Egner and Jerry den Hartog and Nicola Zannone}, title = {{SAFAX} - An Extensible Authorization Service for Cloud Environments}, journal = {Frontiers {ICT}}, volume = {2}, pages = {9}, year = {2015}, url = {https://doi.org/10.3389/fict.2015.00009}, doi = {10.3389/FICT.2015.00009}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fiict/KaluvuriEHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ThalerHASH15, author = {Stefan Thaler and Jerry den Hartog and Dhouha Ayed and Dieter Sommer and Michael Hitchens}, title = {Cross-Domain Attribute Conversion for Authentication and Authorization}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {652--659}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.41}, doi = {10.1109/ARES.2015.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ThalerHASH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/TurkmenHRZ15, author = {Fatih Turkmen and Jerry den Hartog and Silvio Ranise and Nicola Zannone}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Analysis of {XACML} Policies with {SMT}}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {115--134}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_7}, doi = {10.1007/978-3-662-46666-7\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/TurkmenHRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TurkmenHZ14, author = {Fatih Turkmen and Jerry den Hartog and Nicola Zannone}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Analyzing Access Control Policies with {SMT}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1508--1510}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662366}, doi = {10.1145/2660267.2662366}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TurkmenHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/DamenHZ14, author = {Stan Damen and Jerry den Hartog and Nicola Zannone}, title = {CollAC: Collaborative access control}, booktitle = {2014 International Conference on Collaboration Technologies and Systems, {CTS} 2014, Minneapolis, MN, USA, May 19-23, 2014}, pages = {142--149}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CTS.2014.6867557}, doi = {10.1109/CTS.2014.6867557}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/DamenHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CostanteHPEP14, author = {Elisa Costante and Jerry den Hartog and Milan Petkovic and Sandro Etalle and Mykola Pechenizkiy}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Hunting the Unknown - White-Box Database Leakage Detection}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {243--259}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_16}, doi = {10.1007/978-3-662-43936-4\_16}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CostanteHPEP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HartogM14, author = {Jerry den Hartog and Ilaria Matteucci}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Introducing Probabilities in Controller Strategies}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {233--249}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_15}, doi = {10.1007/978-3-319-17016-9\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HartogM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/AyedBCH14, author = {Dhouha Ayed and Patrik Bichsel and Jan Camenisch and Jerry den Hartog}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Integration of Data-Minimising Authentication into Authorisation Systems}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {179--187}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_12}, doi = {10.1007/978-3-319-08593-7\_12}, timestamp = {Wed, 25 Sep 2019 18:21:56 +0200}, biburl = {https://dblp.org/rec/conf/trust/AyedBCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeeningenBHZ13, author = {Meilof Veeningen and Mayla Brus{\`{o}} and Jerry den Hartog and Nicola Zannone}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{TRIPLEX:} verifying data minimisation in communication systems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1415--1418}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512514}, doi = {10.1145/2508859.2512514}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeeningenBHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CostanteVEHPZ13, author = {Elisa Costante and Sokratis Vavilis and Sandro Etalle and Jerry den Hartog and Milan Petkovic and Nicola Zannone}, editor = {Pierangela Samarati}, title = {Database Anomalous Activities - Detection and Quantification}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {603--608}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223222/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CostanteVEHPZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CostanteHP12, author = {Elisa Costante and Jerry den Hartog and Milan Petkovic}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {What Websites Know About You}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {146--159}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_11}, doi = {10.1007/978-3-642-35890-6\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CostanteHP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/BrusoCEH12, author = {Mayla Brus{\`{o}} and Konstantinos Chatzikokolakis and Sandro Etalle and Jerry den Hartog}, editor = {Catuscia Palamidessi and Mark Dermot Ryan}, title = {Linking Unlinkability}, booktitle = {Trustworthy Global Computing - 7th International Symposium, {TGC} 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8191}, pages = {129--144}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-41157-1\_9}, doi = {10.1007/978-3-642-41157-1\_9}, timestamp = {Wed, 07 Dec 2022 23:14:04 +0100}, biburl = {https://dblp.org/rec/conf/tgc/BrusoCEH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/CostanteSPH12, author = {Elisa Costante and Yuanhao Sun and Milan Petkovic and Jerry den Hartog}, editor = {Ting Yu and Nikita Borisov}, title = {A machine learning solution to assess privacy policy completeness: (short paper)}, booktitle = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012}, pages = {91--96}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381966.2381979}, doi = {10.1145/2381966.2381979}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/wpes/CostanteSPH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/BauerEHV11, author = {Lujo Bauer and Sandro Etalle and Jerry den Hartog and Luca Vigan{\`{o}}}, title = {Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning"}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {223--224}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9184-z}, doi = {10.1007/S10817-010-9184-Z}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/BauerEHV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ChadwickLHPA11, author = {David W. Chadwick and Stijn F. Lievens and Jerry den Hartog and Andreas Pashalidis and Joseph Alhadeff}, editor = {Ling Liu and Manish Parashar}, title = {My Private Cloud Overview: {A} Trust, Privacy and Security Infrastructure for the Cloud}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {752--753}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CLOUD.2011.113}, doi = {10.1109/CLOUD.2011.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ChadwickLHPA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/CostanteHP11, author = {Elisa Costante and Jerry den Hartog and Milan Petkovic}, title = {On-line trust perception: What really matters}, booktitle = {1st Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2011, Milan, Italy, September 8, 2011}, pages = {52--59}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/STAST.2011.6059256}, doi = {10.1109/STAST.2011.6059256}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/stast/CostanteHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jtaer/BohmEHHTTZ10, author = {Klemens B{\"{o}}hm and Sandro Etalle and Jerry den Hartog and Christian H{\"{u}}tter and Slim Trabelsi and Daniel Trivellato and Nicola Zannone}, title = {A Flexible Architecture for Privacy-Aware Trust Management}, journal = {J. Theor. Appl. Electron. Commer. Res.}, volume = {5}, number = {2}, pages = {77--96}, year = {2010}, url = {https://doi.org/10.4067/s0718-18762010000200006}, doi = {10.4067/S0718-18762010000200006}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jtaer/BohmEHHTTZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuPH10, author = {Jiqiang Lu and Jing Pan and Jerry den Hartog}, editor = {Jianying Zhou and Moti Yung}, title = {Principles on the Security of {AES} against First and Second-Order Differential Power Analysis}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {168--185}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_11}, doi = {10.1007/978-3-642-13708-2\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BrusoCH10, author = {Mayla Brus{\`{o}} and Konstantinos Chatzikokolakis and Jerry den Hartog}, title = {Formal Verification of Privacy for {RFID} Systems}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {75--88}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.13}, doi = {10.1109/CSF.2010.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BrusoCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PanWHW10, author = {Jing Pan and Jasper G. J. van Woudenberg and Jerry den Hartog and Marc F. Witteman}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Improving {DPA} by Peak Distribution Analysis}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {241--261}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_17}, doi = {10.1007/978-3-642-19574-7\_17}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/PanWHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RochaBHWE10, author = {Bruno P. S. Rocha and Sruthi Bandhakavi and Jerry den Hartog and William H. Winsborough and Sandro Etalle}, title = {Towards Static Flow-Based Declassification for Legacy and Untrusted Programs}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {93--108}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.14}, doi = {10.1109/SP.2010.14}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/RochaBHWE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PanHL09, author = {Jing Pan and J. I. den Hartog and Jiqiang Lu}, editor = {Heung Youl Youm and Moti Yung}, title = {You Cannot Hide behind the Mask: Power Analysis on a Provably Secure \emph{S}-Box Implementation}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {178--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_14}, doi = {10.1007/978-3-642-10838-9\_14}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PanHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Hartog08, author = {Jerry den Hartog}, title = {Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic}, journal = {Sci. Comput. Program.}, volume = {74}, number = {1-2}, pages = {52--63}, year = {2008}, url = {https://doi.org/10.1016/j.scico.2008.09.006}, doi = {10.1016/J.SCICO.2008.09.006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/Hartog08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SpiessensHE08, author = {Fred Spiessens and Jerry den Hartog and Sandro Etalle}, editor = {Pierpaolo Degano and Joshua D. Guttman and Fabio Martinelli}, title = {Know What You Trust}, booktitle = {Formal Aspects in Security and Trust, 5th International Workshop, {FAST} 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5491}, pages = {129--142}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01465-9\_9}, doi = {10.1007/978-3-642-01465-9\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SpiessensHE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PanHV08, author = {Jing Pan and J. I. den Hartog and Erik P. de Vink}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {An Operation-Based Metric for {CPA} Resistance}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {429--443}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_28}, doi = {10.1007/978-0-387-09699-5\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PanHV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CederquistCDEHL07, author = {J. G. Cederquist and Ricardo Corin and M. A. C. Dekker and Sandro Etalle and J. I. den Hartog and Gabriele Lenzini}, title = {Audit-based compliance control}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {133--151}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0017-y}, doi = {10.1007/S10207-007-0017-Y}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CederquistCDEHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/autonomics/EtalleHM07, author = {Sandro Etalle and Jerry den Hartog and Stephen Marsh}, editor = {Fabrizio Davide}, title = {Trust and punishment}, booktitle = {Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007, 28-30 October 2007, Rome, Italy}, series = {{ACM} International Conference Proceeding Series}, volume = {302}, pages = {5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.4108/ICST.AUTONOMICS2007.2107}, doi = {10.4108/ICST.AUTONOMICS2007.2107}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/autonomics/EtalleHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/DekkerEH07, author = {Marnix Dekker and Sandro Etalle and Jerry den Hartog}, editor = {Milan Petkovic and Willem Jonker}, title = {Privacy Policies}, booktitle = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, pages = {383--397}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6\_25}, doi = {10.1007/978-3-540-69861-6\_25}, timestamp = {Tue, 16 May 2017 14:01:42 +0200}, biburl = {https://dblp.org/rec/books/sp/07/DekkerEH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/CorinH06, author = {Ricardo Corin and Jerry den Hartog}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {252--263}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_22}, doi = {10.1007/11787006\_22}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/CorinH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/LawHHH05, author = {Yee Wei Law and Pieter H. Hartel and Jerry den Hartog and Paul J. M. Havinga}, title = {Link-layer jamming attacks on {S-MAC}}, booktitle = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul, Turkey, January 31 - February 2, 2005, Proceedings}, pages = {217--225}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/EWSN.2005.1462013}, doi = {10.1109/EWSN.2005.1462013}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/LawHHH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/SundramoorthyHHST05, author = {Vasughi Sundramoorthy and Pieter H. Hartel and Jerry den Hartog and Hans Scholten and C. Tan}, title = {Functional Principles of Registry-based Service Discovery}, booktitle = {30th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2005), 15-17 November 2005, Sydney, Australia, Proceedings}, pages = {209--217}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/LCN.2005.71}, doi = {10.1109/LCN.2005.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/SundramoorthyHHST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/CederquistCDEH05, author = {J. G. Cederquist and Ricardo Corin and M. A. C. Dekker and Sandro Etalle and J. I. den Hartog}, title = {An Audit Logic for Accountability}, booktitle = {6th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2005), 6-8 June 2005, Stockholm, Sweden}, pages = {34--43}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/POLICY.2005.5}, doi = {10.1109/POLICY.2005.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/CederquistCDEH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Nonmonotonic Trust Management for {P2P} Applications}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {113--130}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.037}, doi = {10.1016/J.ENTCS.2005.09.037}, timestamp = {Fri, 20 Jan 2023 11:50:26 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0502091, author = {J. G. Cederquist and Ricardo Corin and M. A. C. Dekker and Sandro Etalle and J. I. den Hartog}, title = {An Audit Logic for Accountability}, journal = {CoRR}, volume = {abs/cs/0502091}, year = {2005}, url = {http://arxiv.org/abs/cs/0502091}, eprinttype = {arXiv}, eprint = {cs/0502091}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0502091.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0510061, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, title = {Nonmonotonic Trust Management for {P2P} Applications}, journal = {CoRR}, volume = {abs/cs/0510061}, year = {2005}, url = {http://arxiv.org/abs/cs/0510061}, eprinttype = {arXiv}, eprint = {cs/0510061}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0510061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorinH05, author = {Ricardo Corin and Jerry den Hartog}, title = {A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2005}, url = {http://eprint.iacr.org/2005/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorinH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/HartogV04, author = {Jerry den Hartog and Erik P. de Vink}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards}, booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7} Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse, France}, series = {{IFIP}}, volume = {173}, pages = {85--98}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24098-5\_7}, doi = {10.1007/0-387-24098-5\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/HartogV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CorinEHLS04, author = {Ricardo Corin and Sandro Etalle and J. I. den Hartog and Gabriele Lenzini and I. Staicu}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {A Logic for Auditing Accountability in Decentralized Systems}, booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7} Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse, France}, series = {{IFIP}}, volume = {173}, pages = {187--201}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24098-5\_14}, doi = {10.1007/0-387-24098-5\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CorinEHLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HartogVVVW03, author = {Jerry den Hartog and Jan Verschuren and Erik P. de Vink and Jaap de Vos and W. Wiersma}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {{PINPAS:} {A} Tool for Power Analysis of Smartcards}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {453--457}, publisher = {Kluwer}, year = {2003}, timestamp = {Wed, 28 Jan 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/HartogVVVW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/HartogV02, author = {Jerry den Hartog and Erik P. de Vink}, title = {Verifying Probabilistic Programs Using a Hoare Like Logic}, journal = {Int. J. Found. Comput. Sci.}, volume = {13}, number = {3}, pages = {315--340}, year = {2002}, url = {https://doi.org/10.1142/S012905410200114X}, doi = {10.1142/S012905410200114X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/HartogV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HartogVB00, author = {Jerry den Hartog and Erik P. de Vink and J. W. de Bakker}, editor = {Ted Hurley and M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and Michel P. Schellekens and Anthony Karel Seda}, title = {Metric Semantics and Full Abstractness for Action Refinement and Probabilistic Choice}, booktitle = {First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, {MFCSIT} 2000, Cork, Ireland, July 20-21, 2000}, series = {Electronic Notes in Theoretical Computer Science}, volume = {40}, pages = {72--99}, publisher = {Elsevier}, year = {2000}, url = {https://doi.org/10.1016/S1571-0661(05)80038-6}, doi = {10.1016/S1571-0661(05)80038-6}, timestamp = {Wed, 30 Nov 2022 10:58:03 +0100}, biburl = {https://dblp.org/rec/journals/entcs/HartogVB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/HartogVB99, author = {Jerry den Hartog and Erik P. de Vink and J. W. de Bakker}, title = {Full Abstractness of a Metric Semantics for Action Refinement}, journal = {Fundam. Informaticae}, volume = {40}, number = {4}, pages = {335--382}, year = {1999}, url = {https://doi.org/10.3233/FI-1999-40402}, doi = {10.3233/FI-1999-40402}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/HartogVB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/Hartog99, author = {Jerry den Hartog}, editor = {P. S. Thiagarajan and Roland H. C. Yap}, title = {Verifying Probabilistic Programs Using a Hoare like Logic}, booktitle = {Advances in Computing Science - ASIAN'99, 5th Asian Computing Science Conference, Phuket, Thailand, December 10-12, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1742}, pages = {113--125}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46674-6\_11}, doi = {10.1007/3-540-46674-6\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/Hartog99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HartogV99, author = {Jerry den Hartog and Erik P. de Vink}, editor = {Christel Baier and Michael Huth and Marta Z. Kwiatkowska and Mark Ryan}, title = {Mixing Up Nondeterminism and Probability: a preliminary report}, booktitle = {First International Workshop on Probabilistic Methods in Verification, {PROBMIV} 1998, Indianapolis, Indiana, USA, June 19-20, 1998}, series = {Electronic Notes in Theoretical Computer Science}, volume = {22}, pages = {88--110}, publisher = {Elsevier}, year = {1998}, url = {https://doi.org/10.1016/S1571-0661(05)82521-6}, doi = {10.1016/S1571-0661(05)82521-6}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/journals/entcs/HartogV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/slp/TodoranHV97, author = {Eneia Todoran and Jerry den Hartog and Erik P. de Vink}, editor = {Jan Maluszynski}, title = {Comparative Metric Semantics for Commit in OR-Parallel Logic Programming}, booktitle = {Logic Programming, Proceedings of the 1997 International Symposium, Port Jefferson, Long Island, NY, USA, October 13-16, 1997}, pages = {101--115}, publisher = {{MIT} Press}, year = {1997}, timestamp = {Fri, 10 Jul 2015 12:20:33 +0200}, biburl = {https://dblp.org/rec/conf/slp/TodoranHV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.