BibTeX records: Jerry den Hartog

download as .bib file

@article{DBLP:journals/virology/DupontSDVMCHE24,
  author       = {Guillaume Dupont and
                  Daniel Ricardo dos Santos and
                  Stanislav Dashevskyi and
                  Sangavi Vijayakumar and
                  Sashaank P. Murali and
                  Elisa Costante and
                  Jerry den Hartog and
                  Sandro Etalle},
  title        = {Demonstration of new attacks on three healthcare network protocols
                  in a lab environment},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {20},
  number       = {2},
  pages        = {301--314},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11416-023-00479-w},
  doi          = {10.1007/S11416-023-00479-W},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/DupontSDVMCHE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/SilvaRZHC24,
  author       = {Neil Ortiz Silva and
                  Martin Rosso and
                  Emmanuele Zambon and
                  Jerry den Hartog and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {Philipp Richter and
                  Vaibhav Bajpai and
                  Esteban Carisimo},
  title        = {From Power to Water: Dissecting {SCADA} Networks Across Different
                  Critical Infrastructures},
  booktitle    = {Passive and Active Measurement - 25th International Conference, {PAM}
                  2024, Virtual Event, March 11-13, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14537},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-56249-5\_1},
  doi          = {10.1007/978-3-031-56249-5\_1},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/SilvaRZHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/LeiteHSC23,
  author       = {Cristoffer Leite and
                  Jerry den Hartog and
                  Daniel Ricardo dos Santos and
                  Elisa Costante},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {Automated Cyber Threat Intelligence Generation on Multi-Host Network
                  Incidents},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {2999--3008},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386324},
  doi          = {10.1109/BIGDATA59044.2023.10386324},
  timestamp    = {Fri, 02 Feb 2024 12:00:39 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/LeiteHSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/LeiteHK23,
  author       = {Cristoffer Leite and
                  Jerry den Hartog and
                  Paul Koster},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {A Framework for Privacy-Preserving White-Box Anomaly Detection using
                  a Lattice-Based Access Control},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {7--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593831},
  doi          = {10.1145/3589608.3593831},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/LeiteHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TommasiniRZAH22,
  author       = {Martino Tommasini and
                  Martin Rosso and
                  Emmanuele Zambon and
                  Luca Allodi and
                  Jerry den Hartog},
  title        = {Characterizing Building Automation System Attacks and Attackers},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022 - Workshops, Genoa, Italy, June 6-10, 2022},
  pages        = {139--149},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSPW55150.2022.00020},
  doi          = {10.1109/EUROSPW55150.2022.00020},
  timestamp    = {Mon, 04 Jul 2022 17:06:18 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/TommasiniRZAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LeiteHSC22,
  author       = {Cristoffer Leite and
                  Jerry den Hartog and
                  Daniel Ricardo dos Santos and
                  Elisa Costante},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Actionable Cyber Threat Intelligence for Automated Incident Response},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {368--385},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_20},
  doi          = {10.1007/978-3-031-22295-5\_20},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LeiteHSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/QinRCEHZ22,
  author       = {Xi Qin and
                  Martin Rosso and
                  Alvaro A. C{\'{a}}rdenas and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Emmanuele Zambon},
  title        = {You Can't Protect What You Don't Understand: Characterizing an Operational
                  Gas {SCADA} Network},
  booktitle    = {43rd {IEEE} Security and Privacy, {SP} Workshops 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {243--250},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SPW54247.2022.9833864},
  doi          = {10.1109/SPW54247.2022.9833864},
  timestamp    = {Thu, 21 Sep 2023 16:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/QinRCEHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coins/DupontLSCHE21,
  author       = {Guillaume Dupont and
                  Cristoffer Leite and
                  Daniel Ricardo dos Santos and
                  Elisa Costante and
                  Jerry den Hartog and
                  Sandro Etalle},
  title        = {Similarity-Based Clustering For IoT Device Classification},
  booktitle    = {2021 {IEEE} International Conference on Omni-Layer Intelligent Systems,
                  {COINS} 2021, Barcelona, Spain, August 23-25, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COINS51742.2021.9524201},
  doi          = {10.1109/COINS51742.2021.9524201},
  timestamp    = {Thu, 09 Sep 2021 16:05:21 +0200},
  biburl       = {https://dblp.org/rec/conf/coins/DupontLSCHE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DupontSCHE20,
  author       = {Guillaume Dupont and
                  Daniel Ricardo dos Santos and
                  Elisa Costante and
                  Jerry den Hartog and
                  Sandro Etalle},
  editor       = {Marko H{\"{o}}lbl and
                  Kai Rannenberg and
                  Tatjana Welzer},
  title        = {A Matter of Life and Death: Analyzing the Security of Healthcare Networks},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11
                  International Conference, {SEC} 2020, Maribor, Slovenia, September
                  21-23, 2020, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {580},
  pages        = {355--369},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58201-2\_24},
  doi          = {10.1007/978-3-030-58201-2\_24},
  timestamp    = {Thu, 17 Sep 2020 14:27:06 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DupontSCHE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/FauriKSCHE19,
  author       = {Davide Fauri and
                  Michail Kapsalakis and
                  Daniel Ricardo dos Santos and
                  Elisa Costante and
                  Jerry den Hartog and
                  Sandro Etalle},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {Role Inference + Anomaly Detection = Situational Awareness in BACnet
                  Networks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {461--481},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_22},
  doi          = {10.1007/978-3-030-22038-9\_22},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/FauriKSCHE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccve/DupontHEL19,
  author       = {Guillaume Dupont and
                  Jerry den Hartog and
                  Sandro Etalle and
                  Alexios Lekidis},
  title        = {Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle
                  {CAN}},
  booktitle    = {2019 {IEEE} International Conference on Connected Vehicles and Expo,
                  {ICCVE} 2019, Graz, Austria, November 4-8, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCVE45908.2019.8965028},
  doi          = {10.1109/ICCVE45908.2019.8965028},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccve/DupontHEL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icves/DupontHEL19,
  author       = {Guillaume Dupont and
                  Jerry den Hartog and
                  Sandro Etalle and
                  Alexios Lekidis},
  title        = {A Survey of Network Intrusion Detection Systems for Controller Area
                  Network},
  booktitle    = {{IEEE} International Conference of Vehicular Electronics and Safety,
                  {ICVES} 2019, Cairo, Egypt, September 4-6, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICVES.2019.8906465},
  doi          = {10.1109/ICVES.2019.8906465},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icves/DupontHEL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BertolissiHZ19,
  author       = {Clara Bertolissi and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {Using Provenance for Secure Data Fusion in Cooperative Systems},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {185--194},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325100},
  doi          = {10.1145/3322431.3325100},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/BertolissiHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-11587,
  author       = {Guillaume Dupont and
                  Jerry den Hartog and
                  Sandro Etalle and
                  Alexios Lekidis},
  title        = {Network intrusion detection systems for in-vehicle network - Technical
                  report},
  journal      = {CoRR},
  volume       = {abs/1905.11587},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.11587},
  eprinttype    = {arXiv},
  eprint       = {1905.11587},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-11587.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LeHZ18,
  author       = {Van Huynh Le and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {Security and privacy for innovative automotive applications: {A} survey},
  journal      = {Comput. Commun.},
  volume       = {132},
  pages        = {17--41},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comcom.2018.09.010},
  doi          = {10.1016/J.COMCOM.2018.09.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LeHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/FauriKSCHE18,
  author       = {Davide Fauri and
                  Michail Kapsalakis and
                  Daniel Ricardo dos Santos and
                  Elisa Costante and
                  Jerry den Hartog and
                  Sandro Etalle},
  editor       = {Eric A. M. Luiijf and
                  Inga Zutautaite and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {Leveraging Semantics for Actionable Intrusion Detection in Building
                  Automation Systems},
  booktitle    = {Critical Information Infrastructures Security - 13th International
                  Conference, {CRITIS} 2018, Kaunas, Lithuania, September 24-26, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11260},
  pages        = {113--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05849-4\_9},
  doi          = {10.1007/978-3-030-05849-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/FauriKSCHE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/LeHZ18,
  author       = {Van Huynh Le and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Paulo Novais and
                  Panagiotis G. Sarigiannidis and
                  Sebastiano Battiato and
                  {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS,
                  {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018},
  pages        = {647--657},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006946806470657},
  doi          = {10.5220/0006946806470657},
  timestamp    = {Wed, 29 Aug 2018 15:17:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/LeHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TurkmenHRZ17,
  author       = {Fatih Turkmen and
                  Jerry den Hartog and
                  Silvio Ranise and
                  Nicola Zannone},
  title        = {Formal analysis of {XACML} policies using {SMT}},
  journal      = {Comput. Secur.},
  volume       = {66},
  pages        = {185--203},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.01.009},
  doi          = {10.1016/J.COSE.2017.01.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TurkmenHRZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CostanteHPEP17,
  author       = {Elisa Costante and
                  Jerry den Hartog and
                  Milan Petkovic and
                  Sandro Etalle and
                  Mykola Pechenizkiy},
  title        = {A white-box anomaly-based framework for database leakage detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {32},
  pages        = {27--46},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2016.10.001},
  doi          = {10.1016/J.JISA.2016.10.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/CostanteHPEP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FauriSCHET17,
  author       = {Davide Fauri and
                  Daniel Ricardo dos Santos and
                  Elisa Costante and
                  Jerry den Hartog and
                  Sandro Etalle and
                  Stefano Tonetta},
  editor       = {Bhavani Thuraisingham and
                  Rakesh B. Bobba and
                  Awais Rashid},
  title        = {From System Specification to Anomaly Detection (and back)},
  booktitle    = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, Dallas, TX, USA, November 3, 2017},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140241.3140250},
  doi          = {10.1145/3140241.3140250},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FauriSCHET17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/FauriWHCZE17,
  author       = {Davide Fauri and
                  Bart de Wijs and
                  Jerry den Hartog and
                  Elisa Costante and
                  Emmanuele Zambon and
                  Sandro Etalle},
  title        = {Encryption in {ICS} networks: {A} blessing or a curse?},
  booktitle    = {2017 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2017, Dresden, Germany, October 23-27, 2017},
  pages        = {289--294},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SmartGridComm.2017.8340732},
  doi          = {10.1109/SMARTGRIDCOMM.2017.8340732},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/FauriWHCZE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HartogZ16,
  author       = {Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {A Policy Framework for Data Fusion and Derived Data Control},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  pages        = {47--57},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491.2875492},
  doi          = {10.1145/2875491.2875492},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HartogZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/EgnerLHZ16,
  author       = {Alexandru Ionut Egner and
                  Duc Luu and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {An Authorization Service for Collaborative Situation Awareness},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {136--138},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857740},
  doi          = {10.1145/2857705.2857740},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/EgnerLHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThalerHP16,
  author       = {Stefan Thaler and
                  Jerry den Hartog and
                  Milan Petkovic},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Towards Creating Believable Decoy Project Folders for Detecting Data
                  Theft},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {161--169},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_12},
  doi          = {10.1007/978-3-319-41483-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThalerHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MahmudluHZ16,
  author       = {Rauf Mahmudlu and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Data Governance and Transparency for Collaborative Systems},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_15},
  doi          = {10.1007/978-3-319-41483-6\_15},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MahmudluHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HartogZ16,
  author       = {Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Indrajit Ray and
                  Manoj Singh Gaur and
                  Mauro Conti and
                  Dheeraj Sanghi and
                  V. Kamakoti},
  title        = {Collaborative Access Decisions: Why Has My Decision Not Been Enforced?},
  booktitle    = {Information Systems Security - 12th International Conference, {ICISS}
                  2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {109--130},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49806-5\_6},
  doi          = {10.1007/978-3-319-49806-5\_6},
  timestamp    = {Thu, 10 Sep 2020 09:33:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/HartogZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/YukselHE16,
  author       = {{\"{O}}mer Y{\"{u}}ksel and
                  Jerry den Hartog and
                  Sandro Etalle},
  editor       = {Indrajit Ray and
                  Manoj Singh Gaur and
                  Mauro Conti and
                  Dheeraj Sanghi and
                  V. Kamakoti},
  title        = {Towards Useful Anomaly Detection for Back Office Networks},
  booktitle    = {Information Systems Security - 12th International Conference, {ICISS}
                  2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {509--520},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49806-5\_30},
  doi          = {10.1007/978-3-319-49806-5\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/YukselHE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/YukselHE16,
  author       = {{\"{O}}mer Y{\"{u}}ksel and
                  Jerry den Hartog and
                  Sandro Etalle},
  editor       = {Sascha Ossowski},
  title        = {Reading between the fields: practical, effective intrusion detection
                  for industrial control systems},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {2063--2070},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851799},
  doi          = {10.1145/2851613.2851799},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/YukselHE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CostanteFEHZ16,
  author       = {Elisa Costante and
                  Davide Fauri and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {A Hybrid Framework for Data Loss Prevention and Detection},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {324--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.24},
  doi          = {10.1109/SPW.2016.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CostanteFEHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/CostanteHP15,
  author       = {Elisa Costante and
                  Jerry den Hartog and
                  Milan Petkovic},
  title        = {Understanding Perceived Trust to Reduce Regret},
  journal      = {Comput. Intell.},
  volume       = {31},
  number       = {2},
  pages        = {327--347},
  year         = {2015},
  url          = {https://doi.org/10.1111/coin.12025},
  doi          = {10.1111/COIN.12025},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/CostanteHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fiict/KaluvuriEHZ15,
  author       = {Samuel Paul Kaluvuri and
                  Alexandru Ionut Egner and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {{SAFAX} - An Extensible Authorization Service for Cloud Environments},
  journal      = {Frontiers {ICT}},
  volume       = {2},
  pages        = {9},
  year         = {2015},
  url          = {https://doi.org/10.3389/fict.2015.00009},
  doi          = {10.3389/FICT.2015.00009},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fiict/KaluvuriEHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ThalerHASH15,
  author       = {Stefan Thaler and
                  Jerry den Hartog and
                  Dhouha Ayed and
                  Dieter Sommer and
                  Michael Hitchens},
  title        = {Cross-Domain Attribute Conversion for Authentication and Authorization},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {652--659},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.41},
  doi          = {10.1109/ARES.2015.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ThalerHASH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/TurkmenHRZ15,
  author       = {Fatih Turkmen and
                  Jerry den Hartog and
                  Silvio Ranise and
                  Nicola Zannone},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Analysis of {XACML} Policies with {SMT}},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_7},
  doi          = {10.1007/978-3-662-46666-7\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/TurkmenHRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TurkmenHZ14,
  author       = {Fatih Turkmen and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Analyzing Access Control Policies with {SMT}},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1508--1510},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662366},
  doi          = {10.1145/2660267.2662366},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TurkmenHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/DamenHZ14,
  author       = {Stan Damen and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {CollAC: Collaborative access control},
  booktitle    = {2014 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2014, Minneapolis, MN, USA, May 19-23, 2014},
  pages        = {142--149},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CTS.2014.6867557},
  doi          = {10.1109/CTS.2014.6867557},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/DamenHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CostanteHPEP14,
  author       = {Elisa Costante and
                  Jerry den Hartog and
                  Milan Petkovic and
                  Sandro Etalle and
                  Mykola Pechenizkiy},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Hunting the Unknown - White-Box Database Leakage Detection},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_16},
  doi          = {10.1007/978-3-662-43936-4\_16},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CostanteHPEP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HartogM14,
  author       = {Jerry den Hartog and
                  Ilaria Matteucci},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Emil Lupu and
                  Joachim Posegga and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Introducing Probabilities in Controller Strategies},
  booktitle    = {Data Privacy Management, Autonomous Spontaneous Security, and Security
                  Assurance - 9th International Workshop, {DPM} 2014, 7th International
                  Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
                  Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8872},
  pages        = {233--249},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17016-9\_15},
  doi          = {10.1007/978-3-319-17016-9\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HartogM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AyedBCH14,
  author       = {Dhouha Ayed and
                  Patrik Bichsel and
                  Jan Camenisch and
                  Jerry den Hartog},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Integration of Data-Minimising Authentication into Authorisation Systems},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {179--187},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_12},
  doi          = {10.1007/978-3-319-08593-7\_12},
  timestamp    = {Wed, 25 Sep 2019 18:21:56 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/AyedBCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VeeningenBHZ13,
  author       = {Meilof Veeningen and
                  Mayla Brus{\`{o}} and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{TRIPLEX:} verifying data minimisation in communication systems},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1415--1418},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512514},
  doi          = {10.1145/2508859.2512514},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VeeningenBHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CostanteVEHPZ13,
  author       = {Elisa Costante and
                  Sokratis Vavilis and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Milan Petkovic and
                  Nicola Zannone},
  editor       = {Pierangela Samarati},
  title        = {Database Anomalous Activities - Detection and Quantification},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {603--608},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223222/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CostanteVEHPZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CostanteHP12,
  author       = {Elisa Costante and
                  Jerry den Hartog and
                  Milan Petkovic},
  editor       = {Roberto Di Pietro and
                  Javier Herranz and
                  Ernesto Damiani and
                  Radu State},
  title        = {What Websites Know About You},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 7th International
                  Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012,
                  Pisa, Italy, September 13-14, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7731},
  pages        = {146--159},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35890-6\_11},
  doi          = {10.1007/978-3-642-35890-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CostanteHP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/BrusoCEH12,
  author       = {Mayla Brus{\`{o}} and
                  Konstantinos Chatzikokolakis and
                  Sandro Etalle and
                  Jerry den Hartog},
  editor       = {Catuscia Palamidessi and
                  Mark Dermot Ryan},
  title        = {Linking Unlinkability},
  booktitle    = {Trustworthy Global Computing - 7th International Symposium, {TGC}
                  2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8191},
  pages        = {129--144},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-41157-1\_9},
  doi          = {10.1007/978-3-642-41157-1\_9},
  timestamp    = {Wed, 07 Dec 2022 23:14:04 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/BrusoCEH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CostanteSPH12,
  author       = {Elisa Costante and
                  Yuanhao Sun and
                  Milan Petkovic and
                  Jerry den Hartog},
  editor       = {Ting Yu and
                  Nikita Borisov},
  title        = {A machine learning solution to assess privacy policy completeness:
                  (short paper)},
  booktitle    = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381966.2381979},
  doi          = {10.1145/2381966.2381979},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/CostanteSPH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/BauerEHV11,
  author       = {Lujo Bauer and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Luca Vigan{\`{o}}},
  title        = {Preface of Special Issue on "Computer Security: Foundations and
                  Automated Reasoning"},
  journal      = {J. Autom. Reason.},
  volume       = {46},
  number       = {3-4},
  pages        = {223--224},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10817-010-9184-z},
  doi          = {10.1007/S10817-010-9184-Z},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/BauerEHV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ChadwickLHPA11,
  author       = {David W. Chadwick and
                  Stijn F. Lievens and
                  Jerry den Hartog and
                  Andreas Pashalidis and
                  Joseph Alhadeff},
  editor       = {Ling Liu and
                  Manish Parashar},
  title        = {My Private Cloud Overview: {A} Trust, Privacy and Security Infrastructure
                  for the Cloud},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
                  Washington, DC, USA, 4-9 July, 2011},
  pages        = {752--753},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CLOUD.2011.113},
  doi          = {10.1109/CLOUD.2011.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/ChadwickLHPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/CostanteHP11,
  author       = {Elisa Costante and
                  Jerry den Hartog and
                  Milan Petkovic},
  title        = {On-line trust perception: What really matters},
  booktitle    = {1st Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2011, Milan, Italy, September 8, 2011},
  pages        = {52--59},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/STAST.2011.6059256},
  doi          = {10.1109/STAST.2011.6059256},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/CostanteHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jtaer/BohmEHHTTZ10,
  author       = {Klemens B{\"{o}}hm and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Christian H{\"{u}}tter and
                  Slim Trabelsi and
                  Daniel Trivellato and
                  Nicola Zannone},
  title        = {A Flexible Architecture for Privacy-Aware Trust Management},
  journal      = {J. Theor. Appl. Electron. Commer. Res.},
  volume       = {5},
  number       = {2},
  pages        = {77--96},
  year         = {2010},
  url          = {https://doi.org/10.4067/s0718-18762010000200006},
  doi          = {10.4067/S0718-18762010000200006},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jtaer/BohmEHHTTZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LuPH10,
  author       = {Jiqiang Lu and
                  Jing Pan and
                  Jerry den Hartog},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Principles on the Security of {AES} against First and Second-Order
                  Differential Power Analysis},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {168--185},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_11},
  doi          = {10.1007/978-3-642-13708-2\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LuPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BrusoCH10,
  author       = {Mayla Brus{\`{o}} and
                  Konstantinos Chatzikokolakis and
                  Jerry den Hartog},
  title        = {Formal Verification of Privacy for {RFID} Systems},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {75--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.13},
  doi          = {10.1109/CSF.2010.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BrusoCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PanWHW10,
  author       = {Jing Pan and
                  Jasper G. J. van Woudenberg and
                  Jerry den Hartog and
                  Marc F. Witteman},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Improving {DPA} by Peak Distribution Analysis},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {241--261},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_17},
  doi          = {10.1007/978-3-642-19574-7\_17},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PanWHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RochaBHWE10,
  author       = {Bruno P. S. Rocha and
                  Sruthi Bandhakavi and
                  Jerry den Hartog and
                  William H. Winsborough and
                  Sandro Etalle},
  title        = {Towards Static Flow-Based Declassification for Legacy and Untrusted
                  Programs},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {93--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.14},
  doi          = {10.1109/SP.2010.14},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RochaBHWE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PanHL09,
  author       = {Jing Pan and
                  J. I. den Hartog and
                  Jiqiang Lu},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {You Cannot Hide behind the Mask: Power Analysis on a Provably Secure
                  \emph{S}-Box Implementation},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_14},
  doi          = {10.1007/978-3-642-10838-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PanHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Hartog08,
  author       = {Jerry den Hartog},
  title        = {Towards mechanized correctness proofs for cryptographic algorithms:
                  Axiomatization of a probabilistic Hoare style logic},
  journal      = {Sci. Comput. Program.},
  volume       = {74},
  number       = {1-2},
  pages        = {52--63},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.scico.2008.09.006},
  doi          = {10.1016/J.SCICO.2008.09.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/Hartog08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SpiessensHE08,
  author       = {Fred Spiessens and
                  Jerry den Hartog and
                  Sandro Etalle},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman and
                  Fabio Martinelli},
  title        = {Know What You Trust},
  booktitle    = {Formal Aspects in Security and Trust, 5th International Workshop,
                  {FAST} 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5491},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01465-9\_9},
  doi          = {10.1007/978-3-642-01465-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SpiessensHE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PanHV08,
  author       = {Jing Pan and
                  J. I. den Hartog and
                  Erik P. de Vink},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {An Operation-Based Metric for {CPA} Resistance},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_28},
  doi          = {10.1007/978-0-387-09699-5\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PanHV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CederquistCDEHL07,
  author       = {J. G. Cederquist and
                  Ricardo Corin and
                  M. A. C. Dekker and
                  Sandro Etalle and
                  J. I. den Hartog and
                  Gabriele Lenzini},
  title        = {Audit-based compliance control},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {133--151},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0017-y},
  doi          = {10.1007/S10207-007-0017-Y},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CederquistCDEHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/autonomics/EtalleHM07,
  author       = {Sandro Etalle and
                  Jerry den Hartog and
                  Stephen Marsh},
  editor       = {Fabrizio Davide},
  title        = {Trust and punishment},
  booktitle    = {Proceedings of the 1st International Conference on Autonomic Computing
                  and Communication Systems, Autonomics 2007, 28-30 October 2007, Rome,
                  Italy},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {302},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.4108/ICST.AUTONOMICS2007.2107},
  doi          = {10.4108/ICST.AUTONOMICS2007.2107},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/autonomics/EtalleHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/DekkerEH07,
  author       = {Marnix Dekker and
                  Sandro Etalle and
                  Jerry den Hartog},
  editor       = {Milan Petkovic and
                  Willem Jonker},
  title        = {Privacy Policies},
  booktitle    = {Security, Privacy, and Trust in Modern Data Management},
  series       = {Data-Centric Systems and Applications},
  pages        = {383--397},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69861-6\_25},
  doi          = {10.1007/978-3-540-69861-6\_25},
  timestamp    = {Tue, 16 May 2017 14:01:42 +0200},
  biburl       = {https://dblp.org/rec/books/sp/07/DekkerEH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CorinH06,
  author       = {Ricardo Corin and
                  Jerry den Hartog},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {252--263},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_22},
  doi          = {10.1007/11787006\_22},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/CorinH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/LawHHH05,
  author       = {Yee Wei Law and
                  Pieter H. Hartel and
                  Jerry den Hartog and
                  Paul J. M. Havinga},
  title        = {Link-layer jamming attacks on {S-MAC}},
  booktitle    = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul,
                  Turkey, January 31 - February 2, 2005, Proceedings},
  pages        = {217--225},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/EWSN.2005.1462013},
  doi          = {10.1109/EWSN.2005.1462013},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/LawHHH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/SundramoorthyHHST05,
  author       = {Vasughi Sundramoorthy and
                  Pieter H. Hartel and
                  Jerry den Hartog and
                  Hans Scholten and
                  C. Tan},
  title        = {Functional Principles of Registry-based Service Discovery},
  booktitle    = {30th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2005),
                  15-17 November 2005, Sydney, Australia, Proceedings},
  pages        = {209--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/LCN.2005.71},
  doi          = {10.1109/LCN.2005.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/SundramoorthyHHST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/CederquistCDEH05,
  author       = {J. G. Cederquist and
                  Ricardo Corin and
                  M. A. C. Dekker and
                  Sandro Etalle and
                  J. I. den Hartog},
  title        = {An Audit Logic for Accountability},
  booktitle    = {6th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2005), 6-8 June 2005, Stockholm, Sweden},
  pages        = {34--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/POLICY.2005.5},
  doi          = {10.1109/POLICY.2005.5},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/CederquistCDEH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06,
  author       = {Marcin Czenko and
                  Ha Tran and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Jerry den Hartog},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Nonmonotonic Trust Management for {P2P} Applications},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {113--130},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.037},
  doi          = {10.1016/J.ENTCS.2005.09.037},
  timestamp    = {Fri, 20 Jan 2023 11:50:26 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0502091,
  author       = {J. G. Cederquist and
                  Ricardo Corin and
                  M. A. C. Dekker and
                  Sandro Etalle and
                  J. I. den Hartog},
  title        = {An Audit Logic for Accountability},
  journal      = {CoRR},
  volume       = {abs/cs/0502091},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0502091},
  eprinttype    = {arXiv},
  eprint       = {cs/0502091},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0502091.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0510061,
  author       = {Marcin Czenko and
                  Ha Tran and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Jerry den Hartog},
  title        = {Nonmonotonic Trust Management for {P2P} Applications},
  journal      = {CoRR},
  volume       = {abs/cs/0510061},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0510061},
  eprinttype    = {arXiv},
  eprint       = {cs/0510061},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0510061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorinH05,
  author       = {Ricardo Corin and
                  Jerry den Hartog},
  title        = {A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs
                  (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorinH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/HartogV04,
  author       = {Jerry den Hartog and
                  Erik P. de Vink},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Virtual Analysis and Reduction of Side-Channel Vulnerabilities of
                  Smartcards},
  booktitle    = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7}
                  Workshop on Formal Aspects in Security and Trust (FAST), an event
                  of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse,
                  France},
  series       = {{IFIP}},
  volume       = {173},
  pages        = {85--98},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24098-5\_7},
  doi          = {10.1007/0-387-24098-5\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/HartogV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/CorinEHLS04,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  J. I. den Hartog and
                  Gabriele Lenzini and
                  I. Staicu},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {A Logic for Auditing Accountability in Decentralized Systems},
  booktitle    = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7}
                  Workshop on Formal Aspects in Security and Trust (FAST), an event
                  of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse,
                  France},
  series       = {{IFIP}},
  volume       = {173},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24098-5\_14},
  doi          = {10.1007/0-387-24098-5\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/CorinEHLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HartogVVVW03,
  author       = {Jerry den Hartog and
                  Jan Verschuren and
                  Erik P. de Vink and
                  Jaap de Vos and
                  W. Wiersma},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {{PINPAS:} {A} Tool for Power Analysis of Smartcards},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {453--457},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Wed, 28 Jan 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/HartogVVVW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/HartogV02,
  author       = {Jerry den Hartog and
                  Erik P. de Vink},
  title        = {Verifying Probabilistic Programs Using a Hoare Like Logic},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {13},
  number       = {3},
  pages        = {315--340},
  year         = {2002},
  url          = {https://doi.org/10.1142/S012905410200114X},
  doi          = {10.1142/S012905410200114X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/HartogV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HartogVB00,
  author       = {Jerry den Hartog and
                  Erik P. de Vink and
                  J. W. de Bakker},
  editor       = {Ted Hurley and
                  M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and
                  Michel P. Schellekens and
                  Anthony Karel Seda},
  title        = {Metric Semantics and Full Abstractness for Action Refinement and Probabilistic
                  Choice},
  booktitle    = {First Irish Conference on the Mathematical Foundations of Computer
                  Science and Information Technology, {MFCSIT} 2000, Cork, Ireland,
                  July 20-21, 2000},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {40},
  pages        = {72--99},
  publisher    = {Elsevier},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1571-0661(05)80038-6},
  doi          = {10.1016/S1571-0661(05)80038-6},
  timestamp    = {Wed, 30 Nov 2022 10:58:03 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/HartogVB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HartogVB99,
  author       = {Jerry den Hartog and
                  Erik P. de Vink and
                  J. W. de Bakker},
  title        = {Full Abstractness of a Metric Semantics for Action Refinement},
  journal      = {Fundam. Informaticae},
  volume       = {40},
  number       = {4},
  pages        = {335--382},
  year         = {1999},
  url          = {https://doi.org/10.3233/FI-1999-40402},
  doi          = {10.3233/FI-1999-40402},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/HartogVB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/Hartog99,
  author       = {Jerry den Hartog},
  editor       = {P. S. Thiagarajan and
                  Roland H. C. Yap},
  title        = {Verifying Probabilistic Programs Using a Hoare like Logic},
  booktitle    = {Advances in Computing Science - ASIAN'99, 5th Asian Computing Science
                  Conference, Phuket, Thailand, December 10-12, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1742},
  pages        = {113--125},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46674-6\_11},
  doi          = {10.1007/3-540-46674-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/Hartog99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HartogV99,
  author       = {Jerry den Hartog and
                  Erik P. de Vink},
  editor       = {Christel Baier and
                  Michael Huth and
                  Marta Z. Kwiatkowska and
                  Mark Ryan},
  title        = {Mixing Up Nondeterminism and Probability: a preliminary report},
  booktitle    = {First International Workshop on Probabilistic Methods in Verification,
                  {PROBMIV} 1998, Indianapolis, Indiana, USA, June 19-20, 1998},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {22},
  pages        = {88--110},
  publisher    = {Elsevier},
  year         = {1998},
  url          = {https://doi.org/10.1016/S1571-0661(05)82521-6},
  doi          = {10.1016/S1571-0661(05)82521-6},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/HartogV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/slp/TodoranHV97,
  author       = {Eneia Todoran and
                  Jerry den Hartog and
                  Erik P. de Vink},
  editor       = {Jan Maluszynski},
  title        = {Comparative Metric Semantics for Commit in OR-Parallel Logic Programming},
  booktitle    = {Logic Programming, Proceedings of the 1997 International Symposium,
                  Port Jefferson, Long Island, NY, USA, October 13-16, 1997},
  pages        = {101--115},
  publisher    = {{MIT} Press},
  year         = {1997},
  timestamp    = {Fri, 10 Jul 2015 12:20:33 +0200},
  biburl       = {https://dblp.org/rec/conf/slp/TodoranHV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics