Koen Buyens
Koen Buyens
K.U.Leuven
Verified email at buyens.org
TitleCited byYear
On the secure software development process: CLASP, SDL and Touchpoints compared
B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen
Information and software technology 51 (7), 1152-1171, 2009
1142009
On the secure software development process: CLASP and SDL compared
J Gregoire, K Buyens, BD Win, R Scandariato, W Joosen
Proceedings of the Third International Workshop on Software Engineering for …, 2007
552007
Resolving least privilege violations in software architectures
K Buyens, B De Win, W Joosen
Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure …, 2009
262009
Empirical and statistical analysis of risk analysis-driven techniques for threat management
K Buyens, B De Win, W Joosen
The Second International Conference on Availability, Reliability and …, 2007
212007
Process activities supporting security principles
K Buyens, R Scandariato, W Joosen
31st Annual International Computer Software and Applications Conference …, 2007
142007
Identifying and resolving least privilege violations in software architectures
K Buyens, B De Win, W Joosen
2009 International Conference on Availability, Reliability and Security, 232-239, 2009
132009
Automated detection of least privilege violations in software architectures
R Scandariato, K Buyens, W Joosen
European Conference on Software Architecture, 150-165, 2010
102010
Measuring the interplay of security principles in software architectures
K Buyens, R Scandariato, W Joosen
Proceedings of the 2009 3rd International Symposium on Empirical Software …, 2009
92009
Least privilege analysis in software architectures
K Buyens, R Scandariato, W Joosen
Software & Systems Modeling 12 (2), 331-348, 2013
72013
System requirements on digital newspapers
T Mahieu, W Joosen, D Van Landuyt, J Grégoire, K Buyens, E Truyen
CW Reports, 128-128, 2007
72007
A software architecture to facilitate the creation of DRM systems
K Buyens, S Michiels, W Joosen
4th IEEE Consumer Communications and Networking Conference (CCNC 2007), 955-959, 2007
62007
Composition of least privilege analysis results in software architectures (position paper)
K Buyens, R Scandariato, W Joosen
Proceedings of the 7th International Workshop on Software Engineering for …, 2011
32011
Results of threat analysis for a publishing system
K Buyens, B De Win, J Grégoire, W Joosen, S Michiels
CW Reports, 88-88, 2007
32007
Similarities and differences between clasp, sdl, and touchpoints: the activity-matrix
K Buyens, J Grégoire, B De Win, R Scandariato, W Joosen
CW Reports, 2007
32007
A refined architecture for DRM
K Buyens, S Michiels, W Joosen
CW Reports, 2006
32006
DRM interoperability and reusability through a generic software architecture
S Michiels, K Buyens, K Verslype, W Joosen, B De Decker
INDICARE Monitor-About Consumer and User Issues of Digital Rights 2 (11), 16-20, 2006
32006
Automated detection and resolution of least privilege violations in software architectures
K Buyens, R Scandariato, W Joosen
CW Reports, 2010
22010
nKatholieke Universiteit Leuven
T Mahieu, W Joosen, D Van Landuyt, J Gregoire, K Buyens, E Truyen
1
Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen)
K Buyens
2012
Improving least privilege in software architecture by guided automated compartmentalization
K Buyens, B De Win, W Joosen
WOSIS, 145-150, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20