Follow
Koen Buyens
Koen Buyens
Unknown affiliation
Verified email at buyens.org
Title
Cited by
Cited by
Year
On the secure software development process: CLASP, SDL and Touchpoints compared
B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen
Information and software technology 51 (7), 1152-1171, 2009
1722009
On the secure software development process: CLASP and SDL compared
J Gregoire, K Buyens, B De Win, R Scandariato, W Joosen
Third International Workshop on Software Engineering for Secure Systems …, 2007
812007
Empirical and statistical analysis of risk analysis-driven techniques for threat management
K Buyens, B De Win, W Joosen
The Second International Conference on Availability, Reliability and …, 2007
322007
Resolving least privilege violations in software architectures
K Buyens, B De Win, W Joosen
2009 ICSE Workshop on Software Engineering for Secure Systems, 9-16, 2009
292009
Process activities supporting security principles
K Buyens, R Scandariato, W Joosen
31st Annual International Computer Software and Applications Conference …, 2007
182007
Least privilege analysis in software architectures
K Buyens, R Scandariato, W Joosen
Software & Systems Modeling 12, 331-348, 2013
142013
Identifying and resolving least privilege violations in software architectures
K Buyens, B De Win, W Joosen
2009 International Conference on Availability, Reliability and Security, 232-239, 2009
122009
Measuring the interplay of security principles in software architectures
K Buyens, R Scandariato, W Joosen
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
112009
Automated detection of least privilege violations in software architectures
R Scandariato, K Buyens, W Joosen
Software Architecture: 4th European Conference, ECSA 2010, Copenhagen …, 2010
102010
System requirements on digital newspapers
T Mahieu, W Joosen, D Van Landuyt, J Grégoire, K Buyens, E Truyen
CW Reports, 128-128, 2007
82007
A software architecture to facilitate the creation of DRM systems
K Buyens, S Michiels, W Joosen
4th IEEE Consumer Communications and Networking Conference (CCNC 2007), 955-959, 2007
82007
Similarities and differences between clasp, sdl, and touchpoints: the activity-matrix
K Buyens, J Grégoire, B De Win, R Scandariato, W Joosen
CW Reports, 2007
42007
Results of threat analysis for a publishing system
K Buyens, B De Win, J Grégoire, W Joosen, S Michiels
CW Reports, 88-88, 2007
42007
DRM interoperability and reusability through a generic software architecture
S Michiels, K Buyens, K Verslype, W Joosen, B De Decker
INDICARE Monitor-About Consumer and User Issues of Digital Rights 2 (11), 16-20, 2006
42006
Composition of least privilege analysis results in software architectures (position paper)
K Buyens, R Scandariato, W Joosen
Proceedings of the 7th International Workshop on Software Engineering for …, 2011
32011
A refined architecture for DRM
K Buyens, S Michiels, W Joosen
CW Reports, 2006
32006
Automated detection and resolution of least privilege violations in software architectures
K Buyens, R Scandariato, W Joosen
CW Reports, 2010
22010
nKatholieke Universiteit Leuven
T Mahieu, W Joosen, D Van Landuyt, J Gregoire, K Buyens, E Truyen
1
Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen)
K Buyens
2012
Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization.
K Buyens, B De Win, W Joosen
WOSIS, 145-150, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20