• 759 Citations
19972019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
1999

Full abstractness of a metric semantics for action refinement

Hartog, den, J. I., Vink, de, E. P. & Bakker, de, J. W., 1999, In : Fundamenta Informaticae. 40, 4, p. 335-382

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
2002

Verifying probabilistic programs using a Hoare-like logic

Hartog, den, J. I. & Vink, de, E. P., 2002, In : International Journal of Foundations of Computer Science. 13, 3, p. 315-340

Research output: Contribution to journalArticleAcademicpeer-review

30 Citations (Scopus)
2007

Audit-based compliance control

Cederquist, J. G., Corin, R. J., Dekker, M. A. C., Etalle, S., Hartog, den, J. I. & Lenzini, G., 2007, In : International Journal of Information Security. 6, 2-3, p. 133-151

Research output: Contribution to journalArticleAcademicpeer-review

49 Citations (Scopus)
1 Downloads (Pure)
2008
Open Access
3 Citations (Scopus)
1 Downloads (Pure)
2010

A flexible architecture for privacy-aware trust management

Böhm, K., Etalle, S., Hartog, den, J. I., Hütter, C., Trabelsi, S., Trivellato, D. & Zannone, N., 2010, In : Journal of Theoretical and Applied Electronic Commerce Research. 5, 2, p. 77-96

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
17 Citations (Scopus)
197 Downloads (Pure)
2015

SAFAX: an extensible authorization service for cloud environments

Kaluvuri, S. P., Egner, A. I., Den Hartog, J. I. & Zannone, N., 2015, In : Frontiers in ICT. 2, 15 p., 9.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
15 Citations (Scopus)
26 Downloads (Pure)

Understanding perceived trust to reduce regret

Costante, E., Hartog, den, J. I. & Petkovic, M., 2015, In : Computational Intelligence. 31, 2, p. 327-347 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
4 Downloads (Pure)
2017

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 1 Feb 2017, In : Journal of Information Security and Applications. 32, p. 27-46 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

15 Citations (Scopus)
9 Downloads (Pure)

Formal analysis of XACML policies using SMT

Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N., 1 May 2017, In : Computers and Security. 66, p. 185-203 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

15 Citations (Scopus)
2 Downloads (Pure)