• 681 Citations
19972019
If you made any changes in Pure these will be visible here soon.

Research Output 1997 2019

Filter
Article
2017
13 Citations (Scopus)

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2017, In : Journal of Information Security and Applications. 32, p. 27-46

Research output: Contribution to journalArticleAcademicpeer-review

Agglomeration
Neural networks
Feedback
Industry
11 Citations (Scopus)

Formal analysis of XACML policies using SMT

Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N., 1 May 2017, In : Computers and Security. 66, p. 185-203 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Markup languages
Query languages
XML
Specifications
2015
12 Citations (Scopus)

SAFAX: an extensible authorization service for cloud environments

Kaluvuri, S. P., Egner, A. I., Den Hartog, J. I. & Zannone, N., 2015, In : Frontiers in ICT. 2, 15 p., 9

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Access control
4 Citations (Scopus)

Understanding perceived trust to reduce regret

Costante, E., Hartog, den, J. I. & Petkovic, M., 2015, In : Computational Intelligence. 31, 2, p. 327-347 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Regret
Privacy
Health
Impact Factor
Security Model
2010
17 Citations (Scopus)

A flexible architecture for privacy-aware trust management

Böhm, K., Etalle, S., Hartog, den, J. I., Hütter, C., Trabelsi, S., Trivellato, D. & Zannone, N., 2010, In : Journal of Theoretical and Applied Electronic Commerce Research. 5, 2, p. 77-96

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Privacy
Trust management
Management system
Factors
Authorization
2008
3 Citations (Scopus)
Open Access
Computer science
Formal verification
2007
48 Citations (Scopus)

Audit-based compliance control

Cederquist, J. G., Corin, R. J., Dekker, M. A. C., Etalle, S., Hartog, den, J. I. & Lenzini, G., 2007, In : International Journal of Information Security. 6, 2-3, p. 133-151

Research output: Contribution to journalArticleAcademicpeer-review

Compliance control
Access control
Compliance
2002
27 Citations (Scopus)

Verifying probabilistic programs using a Hoare-like logic

Hartog, den, J. I. & Vink, de, E. P., 2002, In : International Journal of Foundations of Computer Science. 13, 3, p. 315-340

Research output: Contribution to journalArticleAcademicpeer-review

1999
1 Citation (Scopus)

Full abstractness of a metric semantics for action refinement

Hartog, den, J. I., Vink, de, E. P. & Bakker, de, J. W., 1999, In : Fundamenta Informaticae. 40, 4, p. 335-382

Research output: Contribution to journalArticleAcademicpeer-review