• 690 Citations
19972019
If you made any changes in Pure these will be visible here soon.

Research Output 1997 2019

2019
2 Citations (Scopus)
1 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 Jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer, p. 113-125 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intelligent buildings
Intrusion detection
Intrusion Detection
Automation
Semantics
1 Downloads (Pure)

Role inference + anomaly detection = situational awareness in bacnet networks

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 6 Jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (eds.). Cham: Springer, p. 461-481 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11543 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intelligent buildings
Situational Awareness
Anomaly Detection
Intrusion detection
Network protocols

Using provenance for secure data fusion in cooperative systems

Bertolissi, C., den Hartog, J. & Zannone, N., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, Inc, p. 185-194 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Access control
2018
1 Citation (Scopus)
3 Downloads (Pure)

Feature selection for anomaly detection in vehicular ad hoc networks

Le, V. H., den Hartog, J. & Zannone, N., 1 Jan 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. de Leon, A. S. S., Novais, P., Battiato, S., Sarigiannidis, P., Obaidat, M. S., Obaidat, M. S., Callegari, C., van Sinderen, M. & Lorenz, P. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 481-491 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Vehicular ad hoc networks
Feature extraction
Information use
Communication
Accidents
9 Citations (Scopus)

Security and privacy for innovative automotive applications: a survey

Le, V. H., den Hartog, J. & Zannone, N., Nov 2018, In : Computer Communications. 132, p. 17-41 25 p.

Research output: Contribution to journalReview articleAcademicpeer-review

2017
14 Citations (Scopus)
9 Downloads (Pure)

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2017, In : Journal of Information Security and Applications. 32, p. 27-46

Research output: Contribution to journalArticleAcademicpeer-review

Agglomeration
Neural networks
Feedback
Industry
3 Downloads (Pure)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 2017, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, p. 289-294 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
Cryptography
Control systems
Telecommunication networks
11 Citations (Scopus)
2 Downloads (Pure)

Formal analysis of XACML policies using SMT

Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N., 1 May 2017, In : Computers and Security. 66, p. 185-203 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Markup languages
Query languages
XML
Specifications
4 Citations (Scopus)
3 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 13-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Monitoring
Intrusion detection
Control systems
Formal specification
2016
10 Citations (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Loss prevention
Engines
Feedback
2 Citations (Scopus)

An authorization service for collaborative situation awareness

Egner, A. I., Luu, D. M., den Hartog, J. & Zannone, N., 9 Mar 2016, CODASPY '16 Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 136-138 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
1 Downloads (Pure)

A policy framework for data fusion and derived data control

den Hartog, J. & Zannone, N., 11 Mar 2016, ABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. New York: Association for Computing Machinery, Inc, p. 47-57 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Electric fuses
Access control
Processing
1 Citation (Scopus)
1 Downloads (Pure)

Collaborative access decisions: why has my decision not been enforced?

den Hartog, J. I. & Zannone, N., 2016, Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Ray, I., Singh Gaur, M., Conti, M., Sanghi, D. & Kamakoti, V. (eds.). Dordrecht: Springer, p. 109-130 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10063 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Feedback
Collaborative Systems
Justification
Social Networks

Combining data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., den Hartog, J. I. & Zannone, N., 2016.

Research output: Contribution to conferencePosterAcademic

3 Citations (Scopus)
2 Downloads (Pure)

Data governance and transparency for collaborative systems

Mahmudlu, R., den Hartog, J. & Zannone, N., 2016, Data and Applications Security and Privacy. Springer, p. 199-216 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Collaborative Systems
Governance
Transparency
Requirements
Access Control
13 Citations (Scopus)
18 Downloads (Pure)

Reading between the fields: practical, effective intrusion detection for industrial control systems

den Hartog, J., Etalle, S. & Yüksel, O. S., 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery, Inc, p. 2063-2070

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Intrusion detection
Control systems
Telecommunication networks
Semantics
1 Downloads (Pure)

Towards creating believable decoy project folders for detecting data theft

Thaler, S., den Hartog, J. & Petkovic, M., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer, p. 161-169 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Markov processes
User Studies
Data-driven
Markov chain
Attack
4 Citations (Scopus)
4 Downloads (Pure)

Towards useful anomaly detection for back office networks

den Hartog, J., Etalle, S. & Yüksel, O. S., 24 Nov 2016, Information Systems Security 12th International Conference, ICISS 2016 Jaipur, India, December 16–20, 2016 Proceedings. Cham: Springer, p. 509-520

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Feature extraction
Experiments
2015
24 Citations (Scopus)
3 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., den Hartog, J. I., Ranise, S. & Zannone, N., 2015, Principles of Security and Trust (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11-18 April, 2015. Proceedings). Focardi, R. & Myters, A. (eds.). Dordrecht: Springer, p. 115-134 (Lecture Notes in Computer Science; vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Surface mount technology
Access control
XML
Markup languages
Specifications
48 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Compliance
Industry

Cross-domain attribute conversion for authentication and authorization

Thaler, S., Den Hartog, J., Ayed, D., Sommer, D. & Hitchens, M., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Institute of Electrical and Electronics Engineers, p. 652-659 8 p. 7299976

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Terminology
Ontology
Animals

Introducing probabilities in controller strategies

Hartog, den, J. I. & Matteucci, J., 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers): 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomarti, J., Lupu, E., Posegga, J., Aldini, A., Martonelli, F. & Suri, N. (eds.). Berlin: Springer, p. 233-249 (Lecture Notes in Computer Science; vol. 8872).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Controllers
Specifications
13 Citations (Scopus)
9 Downloads (Pure)

SAFAX: an extensible authorization service for cloud environments

Kaluvuri, S. P., Egner, A. I., Den Hartog, J. I. & Zannone, N., 2015, In : Frontiers in ICT. 2, 15 p., 9.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Access control
4 Citations (Scopus)
4 Downloads (Pure)

Understanding perceived trust to reduce regret

Costante, E., Hartog, den, J. I. & Petkovic, M., 2015, In : Computational Intelligence. 31, 2, p. 327-347 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Regret
Privacy
Health
Impact Factor
Security Model
2014
324 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., Hartog, den, J. I., Ranise, S. & Zannone, N., 2014, Eindhoven: Technische Universiteit Eindhoven. 25 p. (Computer science reports; vol. 1408)

Research output: Book/ReportReportAcademic

Open Access
File
Surface mount technology
Access control
XML
Markup languages
Specifications
68 Downloads (Pure)

Analyzing access control policies with SMT

Turkmen, F., Hartog, den, J. I. & Zannone, N., 2014, p. 1508-1510.

Research output: Contribution to conferencePosterAcademic

Open Access
File
Access control
Markup languages
Specifications
10 Citations (Scopus)
91 Downloads (Pure)

CollAC: Collaborative access control

Damen, S., Hartog, den, J. I. & Zannone, N., 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS 2014, Minneapolis MN, USA, May 19-23, 2014). Institute of Electrical and Electronics Engineers, p. 142-149

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Decision making
10 Citations (Scopus)
5 Downloads (Pure)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Industry
3 Citations (Scopus)

Integration of data-minimising authentication into authorisation systems

Ayed, D., Bichsel, P., Camenisch, J. & Hartog, den, J. I., 2014, Trust and Trustworthy Computing (7th International Conference, TRUST 2014, Heraklion, Crete, June 30-July 2, 2014. Proceedings). Holz, T. & Ioannidis, S. (eds.). Berlin: Springer, p. 179-187 (Lecture Notes in Computer Science; vol. 8564).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Information systems
2013
7 Citations (Scopus)

Linking unlinkability

Brusò, M., Chatzikokolakis, K., Etalle, S. & Hartog, den, J. I., 2013, Trustworthy Global Computing (7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers). Palamidessi, C. & Ryan, M. D. (eds.). Berlin: Springer, p. 129-144 (Lecture Notes in Computer Science; vol. 8191).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

privacy
voting
event
lack
literature
3 Downloads (Pure)

POSTER-TRIPLEX : verifying data minimisation in communication systems

Veeningen, M. G., Bruso, M., Hartog, den, J. I. & Zannone, N., 2013, p. 1415-1418.

Research output: Contribution to conferencePosterAcademic

Communication systems
Communication
10 Citations (Scopus)

Trust management and user's trust perception in e-business

Costante, E., Petkovic, M. & den Hartog, J., 28 Feb 2013, IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 64-83 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Industry
Access control
User interfaces
Websites
Internet
8 Citations (Scopus)
11 Downloads (Pure)

What websites know about you : privacy policy analysis using information extraction

Costante, E., Hartog, den, J. I. & Petkovic, M., 2013, Data Privacy Management and Autonomous Spontaneous Security (7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers). Di Pietro, R., Herranz, J., Damiani, E. & State, R. (eds.). Berlin: Springer, p. 146-159 (Lecture Notes in Computer Science; vol. 7731).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Information analysis
Data privacy
Websites
Internet
2012
27 Citations (Scopus)

A machine learning solution to assess privacy policy completeness

Costante, E., Sun, Y., Petkovic, M. & Hartog, den, J. I., 2012, Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES co-located with CCS 2012), October 15, 2012, Raleigh NC, USA. Association for Computing Machinery, Inc, p. 91-96

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Learning systems
Data privacy
Websites

Trust management and user's trust perception in e-business

Costante, E., Hartog, den, J. I. & Petkovic, M., 2012, Handbook of research on e-business standards and protocols : documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 321-341

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

End users
Electronic business
Trust management
Service provider
Privacy policies
2011
20 Citations (Scopus)
1 Downloads (Pure)

Improving DPA by peak distribution analysis

Pan, J., Woudenberg, van, J. G. J., Hartog, den, J. I. & Witteman, M. F., 2011, Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers). Biryukov, A., Gong, G. & Stinson, D. R. (eds.). Berlin: Springer, p. 241-261 (Lecture Notes in Computer Science; vol. 6544).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Smart cards
Electric power utilization
Experiments
Side channel attack
4 Citations (Scopus)
67 Downloads (Pure)

My private cloud overview : a trust, privacy and security infrastructure for the cloud

Chadwick, D. W., Lievens, S. F., Hartog, den, J. I., Pashalidis, A. & Alhadeff, J., 2011, Proceedings of the 4th IEEE International Conference on Cloud Computing (CLOUD 2011, Washington DC, USA, July 4-9, 2011). IEEE Computer Society, p. 752-753

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
privacy
infrastructure
legal agreement
management
audit
17 Citations (Scopus)
802 Downloads (Pure)

On-line trust perception: what really matters

Costante, E., Hartog, den, J. I. & Petkovic, M., 2011, Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust (STAST'11, Milan, Italy, September 8, 2011). Institute of Electrical and Electronics Engineers, p. 52-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Websites
Health
Internet

Preface of special issue on "Computer security : foundations and automated reasoning"

Bauer, L., Etalle, S., Hartog, den, J. I. & Viganò, L., 2011, In : Journal of Automated Reasoning. 46, 3-4, p. 223-224 2 p.

Research output: Contribution to journalEditorialAcademicpeer-review

Security of data
2010
17 Citations (Scopus)
176 Downloads (Pure)

A flexible architecture for privacy-aware trust management

Böhm, K., Etalle, S., Hartog, den, J. I., Hütter, C., Trabelsi, S., Trivellato, D. & Zannone, N., 2010, In : Journal of Theoretical and Applied Electronic Commerce Research. 5, 2, p. 77-96

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Privacy
Trust management
Management system
Factors
Authorization
41 Citations (Scopus)
2 Downloads (Pure)

Formal verification of privacy for RFID systems

Bruso, M., Chatzikokolakis, K. & Hartog, den, J. I., 2010, Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10, Edinburgh, UK, July 17-19, 2010). IEEE Computer Society, p. 75-88

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Radio frequency identification (RFID)
Network protocols
Formal verification
7 Citations (Scopus)
1 Downloads (Pure)

Principles on the security of AES against first and second-order differential power analysis

Lu, J., Pan, J. & Hartog, den, J. I., 2010, Applied Cryptography and Network Security (8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings). Zhou, J. & Yung, M. (eds.). Berlin: Springer, p. 168-185 (Lecture Notes in Computer Science; vol. 6123).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
10 Citations (Scopus)

Towards static flow-based declassification for legacy and untrusted programs

Pontes Soares Rocha, B., Bandhakavi, S., Hartog, den, J. I., Winsborough, W. H. & Etalle, S., 2010, Proceedings IEEE Symposium on Security and Privacy (SP, Oakland CA, USA, May 16-19, 2010). Institute of Electrical and Electronics Engineers, p. 93-108

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Static analysis
2009
1 Citation (Scopus)

Know what you trust: Analyzing and designing trust policies with Scoll

Spiessens, F., Hartog, den, J. I. & Etalle, S., 2009, Formal Aspects in Security and Trust (5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008. Revised Selected Papers). Degano, P., Guttman, J. & Martinelli, F. (eds.). Berlin: Springer, p. 129-142 (Lecture Notes in Computer Science; vol. 5491).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

19 Citations (Scopus)
109 Downloads (Pure)

You cannot hide behind the mask : power analysis on a provably secure S-box implementation

Pan, J., Hartog, den, J. I. & Lu, J., 2009, Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers ). Youm, H. Y. & Yung, M. (eds.). Berlin: Springer, p. 178-192 (Lecture Notes in Computer Science; vol. 5932).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Masks
Formal methods
Pattern matching
Experiments
Side channel attack
2008
4 Citations (Scopus)
1 Downloads (Pure)

An operation-based metric for CPA resistance

Pan, J., Hartog, den, J. I. & Vink, de, E. P., 2008, Proceedings of the IFIP TC-11 23rd International Information Security Conference (IFIP 20th World Computer Congress, IFIP SEC’08, Milano, Italy, September 7-10, 2008). Jajodia, S., Samarati, P. & Cimato, S. (eds.). Boston: Springer, p. 429-443 (IFIP Conference Proceedings; vol. 278).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Hardware
Experiments
Side channel attack
3 Citations (Scopus)
1 Downloads (Pure)
Open Access
Computer science
Formal verification
2007
66 Downloads (Pure)

A comparison of Java Cards : state-of-affairs 2006

Mostowski, W., Pan, J., Akkiraju, S., Vink, de, E. P., Poll, E. & Hartog, den, J. I., 2007, Eindhoven: Technische Universiteit Eindhoven. 64 p. (Computer science reports; vol. 0706)

Research output: Book/ReportReportAcademic

Open Access
File
Cryptography
Data storage equipment
Testing
Compliance
48 Citations (Scopus)
1 Downloads (Pure)

Audit-based compliance control

Cederquist, J. G., Corin, R. J., Dekker, M. A. C., Etalle, S., Hartog, den, J. I. & Lenzini, G., 2007, In : International Journal of Information Security. 6, 2-3, p. 133-151

Research output: Contribution to journalArticleAcademicpeer-review

Compliance control
Access control
Compliance

Audit-based compliance control (AC2) for EHR systems

Dekker, M. A. C., Hartog, den, J. I. & Etalle, S., 2007, Enschede: Universiteit Twente. 15 p. (CTIT Technical Report; vol. TR-CTIT-07-46)

Research output: Book/ReportReportAcademic