Koen Buyens
Koen Buyens
K.U.Leuven
Verified email at buyens.org
TitleCited byYear
On the secure software development process: CLASP, SDL and Touchpoints compared
B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen
Information and software technology 51 (7), 1152-1171, 2009
1082009
On the secure software development process: CLASP and SDL compared
J Gregoire, K Buyens, BD Win, R Scandariato, W Joosen
Proceedings of the Third International Workshop on Software Engineering for …, 2007
532007
Resolving least privilege violations in software architectures
K Buyens, B De Win, W Joosen
Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure …, 2009
262009
Empirical and statistical analysis of risk analysis-driven techniques for threat management
K Buyens, B De Win, W Joosen
The Second International Conference on Availability, Reliability and …, 2007
212007
Process activities supporting security principles
K Buyens, R Scandariato, W Joosen
31st Annual International Computer Software and Applications Conference …, 2007
152007
Identifying and resolving least privilege violations in software architectures
K Buyens, B De Win, W Joosen
2009 International Conference on Availability, Reliability and Security, 232-239, 2009
122009
Automated detection of least privilege violations in software architectures
R Scandariato, K Buyens, W Joosen
European Conference on Software Architecture, 150-165, 2010
112010
Measuring the interplay of security principles in software architectures
K Buyens, R Scandariato, W Joosen
Proceedings of the 2009 3rd International Symposium on Empirical Software …, 2009
92009
System requirements on digital newspapers
T Mahieu, W Joosen, D Van Landuyt, J Grégoire, K Buyens, E Truyen
CW Reports, 128-128, 2007
72007
Least privilege analysis in software architectures
K Buyens, R Scandariato, W Joosen
Software & Systems Modeling 12 (2), 331-348, 2013
62013
A software architecture to facilitate the creation of DRM systems
K Buyens, S Michiels, W Joosen
4th IEEE Consumer Communications and Networking Conference (CCNC 2007) 4 …, 2007
52007
DRM interoperability and reusability through a generic software architecture
S Michiels, K Buyens, K Verslype, W Joosen, B De Decker
INDICARE Monitor-About Consumer and User Issues of Digital Rights 2 (11), 16-20, 2006
42006
Composition of least privilege analysis results in software architectures (position paper)
K Buyens, R Scandariato, W Joosen
Proceedings of the 7th International Workshop on Software Engineering for …, 2011
32011
Results of threat analysis for a publishing system
K Buyens, B De Win, J Grégoire, W Joosen, S Michiels
CW Reports, 88-88, 2007
32007
Similarities and differences between clasp, sdl, and touchpoints: the activity-matrix
K Buyens, J Grégoire, B De Win, R Scandariato, W Joosen
CW Reports, 2007
32007
A refined architecture for DRM
K Buyens, S Michiels, W Joosen
CW Reports, 2006
32006
Automated detection and resolution of least privilege violations in software architectures
K Buyens, R Scandariato, W Joosen
CW Reports, 2010
22010
nKatholieke Universiteit Leuven
T Mahieu, W Joosen, D Van Landuyt, J Gregoire, K Buyens, E Truyen
1
Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen)
K Buyens
2012
Improving least privilege in software architecture by guided automated compartmentalization
K Buyens, B De Win, W Joosen
WOSIS, 145-150, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20