Publications::2011

Periodicals

  1. C. Bartolini, A. Bertolino, S. Elbaum and E. Marchetti, “Bringing white-box testing to service oriented architectures through a service oriented approach”, Journal of Systems and Software, vol. 84, no. 4, April 2011.
  2. A. Bertolino, G. De Angelis, A. Di Sandro and A. Sabetta, “Is my model right? Let me ask the expert”, Journal of Systems and Software, vol. 84, no. 7, pp. 1089 – 1099, 2011.
  3. A. Bertolino, G. De Angelis, S. Kellom\”{a}ki and A. Polini, “Enhancing Trustworthiness within Service Federations by Continuous On-line Testing”, IEEE Computer, 2011.
  4. J. Bohli, A. Pashalidis, “Relations among privacy notions”, ACM Transactions on Information and System Security, vol. 14, no. 1, pp. 1-24, 2011.
  5. A. Pashalidis, B. Preneel, “Evaluating Tag-Based Preference Obfuscation Systems”, IEEE Transactions on Knowledge Engineering, Jun. 2011.
  6. G. Frankova, M. Seguran, F. Gilcher, S. Trabelsi, J. Dörflinger and M. Aiell, “Deriving business processes with service level agreements from early requirements”, Journal of Systems and Software, vol. 84, no. 8, 2011.
  7. S. Gürses, M. Seguran and N. Zannone, “Requirements engineering within a large-scale security-oriented research project: lessons learned”, Requirements Engineering, pp. 1-24, 2011.

Published Conference Proceedings

  1. I. Ciuciu, G. Zhao, D. W. Chadwick, Q. Reul, R. Meersman, C. Vasquez, M. Hibbert, S. Winfield and T. Kirkham, “Ontology Based Interoperation for Securely Shared Services”, in Proceedings of the 4th International Conference on New Technologies, Mobility and Security, Paris, France, February 2011.
  2. E. Marchetti, L. Schilders and S. Winfield, “Scenario-Based Testing applied in two real contexts: Healthcare and Employability”, in Proc. of the 1th International Workshop on Scenario-Based Testing (SCENARIOS 2011), Berlin, Germany, March 2011.
  3. G. De Angelis, T. Kirkham and S. Winfield, “Access Policy Compliance Testing in a User Centric Trust Service Infrastructure”, in Proc. of the 1th International Workshop on Quality Assurance for Service-based applications (QASBA 2011), Lugano, Switzerland, Sep. 2011.
  4. A. Bertolino, G. De Angelis and A. Polini, “(role)CAST : A Framework for On-line Service Testing”, in Proc. of the 7th International Conference on Web Information Systems and Technologies (WEBIST 2011), Noordwijkerhout, The Netherlands, May 2011.
  5. T. Kirkham, A. Smallwood, K. Coolin and S. Winfield, “Putting the life back into life long learning”, in Proceedings of the The PLE Conference 2011, Southampton, UK, Jul. 2011, pp. 1-2.
  6. T. Kirkham, S. Winfield, M. Baqar Raza and T. Haberecht, “Business Process Management and the Challenge of Dynamic Services”, in 2011 International Conference on Information Society (i-Society 2011), Jun. 2011, pp. 165-169.
  7. T. Kirkham, S. Winfield, S. Ravet and S. Kellomaki, “A Personal Data Store for an Internet of Subjects”, in 2011 International Conference on Information Society (i-Society 2011), Jun. 2011, pp. 92-97.
  8. T. . Kirkham, “Personal Data Stores and Data Privacy”, in IEEE e-Challenges 2011, 2011.
  9. J. Müller, K. . Böhm, “The Architecture of a Secure Business-Process-Management System in Service-Oriented Environments (ECOWS 2011)”, in 9th IEEE European Conference on Web Services, Lugano, Switzerland, Sep. 2011.
  10. C. Hütter, K. . Böhm, “Cooperation through Reciprocity in Multiagent Systems: An Evolutionary Analysis”, in Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011.
  11. E. Costante, J. den Hartog and M. Petkovic, “On-line Trust Perception: What Really Matters”, in Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, Milan, Italy, 2011.
  12. C. Hütter, R. Lorch and K. . Böhm, “Evolving Cooperation through Reciprocity Using a Centrality-based Reputation System”, in Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT), 2011.
  13. I. Ciuciu, G. Zhao, J. Mulle, S. von Stackelberg, C. Vasquez, . Haberecht T., R. Meersman and K. Bohm, “Semantic Support for Security-Annotated Business Process Models”, in Proc. of the 12th International Conference, BPMDS 2011 held at CAISE 2011, London, UK, 2011, pp. 284-298.
  14. J. Hermans, A. Pashalidis, F. Vercauteren and B. Preneel, “A New RFID Privacy Model”, in 2011th European Symposium on Research in Computer Security (ESORICS 2011), 2011.
  15. S. Schiffner, A. Pashalidis and E. Tischhauser, “On the limits of privacy in reputation systems”, in Proceedings of the 11th ACM workshop on Privacy in the electronic society (WPES 2011), 2011.
  16. I. Ciuciu, Y. Tang and R. Meersman, “Towards Retrieving and Recommending Security Annotations for BPM Using an Ontology-based Data Matching Strategy”, in Proc. of the 1st Symposium on Data-Driven Process Discovery and Analysis (SIMPDA), London, UK, 2011, pp. 71-81.
  17. C. Vasquez, I. . Ciuciu, “Ontology-based Approach for Context-dependent Annotation Templates Recommendations”, in SeDeS’11, OTM Conferences and Workshops, Crete, Oct. 2011, pp. 599-603.
  18. I. Shi, D. Chadwick, “A controlled natural language interface for authoring access control policies”, in Proceedings of the 2011 ACM Symposium on Applied Computing, TaiChung, Taiwan, Mar. 2011, pp. 1524-1530.
  19. D. W. Chadwick, G. Inman and K. Siu, “Expression of Interest – Improving Identity Management on the Internet”, in W3C Workshop on Identity in the Browser, Mountain View, USA, May 2011.
  20. D. W. Chadwick, S. F. Lievens, J. I. den Hartog, A. Pashalidis and J. Alhadeff, “My Private Cloud Overview – A Trust, Privacy and Security Infrastructure for the Cloud”, in Proc IEEE 4th Int Conf on Cloud Computing (IEEE Cloud 2011), Washiongton DC, USA, Jul. 2011, pp. 752-753.
  21. K. Fatema, D. W. Chadwick and B. Van Alsenoy, “Legal policies to protect privacy”, in IFIP Summer School 2011, Trento, Italy, Sep. 2011.
  22. D. Chadwick, G. Inman, K. Siu and M. Ferdous, “Leveraging Social Networks to Gain Access to Organisational Resources”, in Proc. ACM DIM’11, Chicago, Illinois, USA, Nov. 2011.
  23. I. Ciuciu, Y. Tang and R. Meersman, “Towards Evaluating an Ontology-based Data Matching Strategy for the Retrieval and Recommendation of Security Annotations for Business Process Models”, in Business Information Processing (SIMPDA 2011 post-proceedings), Oct. 2011.
  24. D. W. Chadwick, M. Casenove, “Security APIs for My Private Cloud – Granting access to anyone, from anywhere at any time”, in IEEE CloudCom 2011 Workshop, Athens, Greece, Dec. 2011.
  25. N. Zannone, M. Petkovic and S. Etalle, “Towards data protection compliance”, in Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), Athens, Greece, Apr. 2011, pp. 1-4.

Books

  1. A. Ferreira, R. Correia, D. Chadwick, H. Santos, R. Gomes, D. Reis and L. Antunes, “Password sharing and How to Reduce It”, in Certification and Security in Health-Related Web Applications: Concepts and Solutions, Chryssanthou, Anargyros and Apostolakis, Ioannis and Varlamis, Iraklis, Jan. 2011, pp. 243-263.
  2. D. De Cock, B. Van Alsenoy, B. Preneel and J. Dumortier, “The Belgian eID approach”, in Handbook of eID security. Concepts, Practical Experiences, Technologies, Fumy, W. and Paeschke, M., Erlangen, Publicis, 2011, pp. 117-139.
  3. K. Fatema, D. Chadwick and S. Lievens, “A Multi-privacy Policy Enforcement System”, in Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, 2011, pp. 297-310.

Papers Presented at Conferences

  1. J. Alhadeff, B. Van Alsenoy and J. Dumortier, “‘The accountability principle in data protection regulation: origin, development and future directions”, presented at the Privacy and Accountability 2011, Berlin, Apr. 2011.

Theses and Dissertations

  1. L. L. Shi, “Authoring Access Control Policies with Controlled Natural Language”, PhD thesis, University of Kent, 2011.
  2. Y. Asselborn, “Design and Implementation of Permission Handling for a Workflow-Management System”, diploma thesis, IPD, KIT, Karlsruhe, Germany, 2011.
  3. M. Kavak, “Ensuring the Traceability of Workflows from an End-User Perspective”, B.Sc. thesis, IPD, KIT, Karlsruhe, Germany, 2011.
  4. d. De Cock, “Contributions to the Analysis and Design of Large-Scale Identity Management Systems”, PhD dissertation, Katholieke Universiteit Leuven, 2011.

Standards

  1. D. W. Chadwick, S. Lievens, “Break The Glass Profile For XACML V2.0 and V3.0″, Dec. 2011.
  2. D. Chadwick, “Category C Liaison to ISO/IEC JTC 1 SC 27/WG 5 work items privacy, identity and information security management”, 2011.
  3. D. Chadwick, “Study Group 17 Question 10 Correspondence Group on the Open Identity Trust Framework (CG-OITF)”, 2011.

  1. Warning: call_user_func() expects parameter 1 to be a valid callback, function ‘printPolicy’ not found or invalid function name in /home/web/tas3/content/pub.inc.php on line 56
    .
  2. Warning: call_user_func() expects parameter 1 to be a valid callback, function ‘printPolicy’ not found or invalid function name in /home/web/tas3/content/pub.inc.php on line 56
    .