Search
for Author
All Reviews
Joosen, Wouter
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
PERSIST: policy-based data management middleware for multi-tenant SaaS leveraging federated cloud storage
Rafique A., Van Landuyt D., Joosen W. Journal of Grid Computing 16(2): 165-194, 2018. Type: Article
NoSQL application data stores often combine on-premise and public cloud resources. As a consequence, they may deal with heterogeneous technologies, flexible but less structured storage architectures, and dynamic changes. In this paper,...
...
Jan 9 2019
Access control in multi-party wireless sensor networks
Maerien J., Michiels S., Huygens C., Hughes D., Joosen W. EWSN 2013 (Proceedings of the 10th European Conference on Wireless Sensor Networks, Ghent, Belgium, Feb 13-15, 2013) 34-49, 2013. Type: Proceedings
This paper presents an access control infrastructure for resource-constrained wireless sensor nodes. The infrastructure uses a protocol based on symmetrical encryption for authentication and a role-based access control framework for au...
...
Oct 9 2013
Instruction-level countermeasures against stack-based buffer overflow attacks
Gadaleta F., Younan Y., Jacobs B., Joosen W., De Neve E., Beosier N. VTDS 2009 (Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, Nuremberg, Germany, Mar 31, 2009) 7-12, 2009. Type: Proceedings
Gadaleta et al. explore the use of virtualization “to implement a countermeasure against buffer overflow attacks.” The idea is to emulate the already existing techniques--in particular, the return address d...
...
Jun 22 2009
Implementing a modular access control service to support application-specific policies in CaesarJ
Verhanneman T., Piessens F., De Win B., Truyen E., Joosen W. Aspect-oriented middleware development (Proceedings of the 1st Workshop on Aspect Oriented Middleware Development, Grenoble, France, Nov 28-Dec 2, 2005) Article 5 2005. Type: Proceedings
This paper describes a novel programming method for inserting a modular access control mechanism. It seems to be an attractive approach to reducing or eliminating traditional hardcoding of application access control logic. A new progra...
...
Jun 1 2006
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy