Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Number of items: 33.

Article

Bauer, Lujo and Etalle, Sandro and Hartog, Jerry den and Viganò, Luca (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433

Böhm, Klemens and Etalle, Sandro and Hartog, Jerry den and Hütter, Christian and Trabelsi, Slim and Trivellato, Daniel and Zannone, Nicola (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2006) Nonmonotonic Trust Management for P2P Applications. Electronic Notes in Theoretical Computer Science (ENTCS), 157 (3). pp. 113-130. ISSN 1571-0661

Hartog, J.I. den and Vink, E.P. de (2002) Verifying probabilistic programs using a hoare like logic. International journal of foundations of computer science, 13 (3). pp. 315-340. ISSN 0129-0541

Book Section

Dekker, Marnix and Etalle, Sandro and Hartog, Jerry den (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, Germany, pp. 383-397. ISBN 9783540698609

Conference or Workshop Item

Brusó, Mayla and Chatzikokolakis, Konstantinos and Etalle, Sandro and Hartog, Jerry den (2013) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing, TGC 2012, September 7-8, 2012, Newcastle upon Tyne, UK (pp. pp. 129-144).

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An Audit Logic for Accountability. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005, 6-8 June 2005, Stockholm, Sweden (pp. pp. 34-43).

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (pp. pp. 187-201).

Corin, R.J. and den Hartog, J.I. (2006) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs. In: ICALP 2006 track C, 9-13 Jul 2006, Venice, Italy (pp. pp. 252-263).

Etalle, S. and den Hartog, J.I. and Marsh, S. (2007) Trust and Punishment (Invited paper). In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy.

Hartog, J.I. den (1999) Verifying Probabilistic Programs Using a Hoare like Logic. In: 5th Asian Conference on Advances in Computing Science, ASIAN 1999, December 10-12, 1999, Phuket, Thailand (pp. pp. 113-125).

Hartog, J.I. den and Verschuren, J. and Vink, E.P. de and Vos, J. and Wiersma, W. (2003) PINPAS: A Tool for Power Analysis of Smartcards. In: 18th IFIP TC11 Int. Conference on Information Security and Privacy in the Age of Uncertainty (SEC), May 26-28 2003, Athens, Greece (pp. pp. 453-457).

Hartog, J.I. den and Vink, E.P. de and Bakker, J.W. de (2001) Metric Semantics and Full Abstractness for Action Refinement and Probabilistic Choice. In: First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, MFCSIT 2000, 20-21 July 2000, Cork, Ireland (pp. pp. 72-99).

Hartog, J.I. den and Vink, E.P. de (1998) Mixing Up Nondeterminism and Probability: A Preliminary Report. In: PROBMIV'98, First International Workshop on Probabilistic Methods in Verification (pp. pp. 88-110).

Hartog, J.I. den and Vink, E.P. de (2004) Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. In: Proceedings 2nd Int. Workshop on Formal Aspect of Security and Trust (pp. pp. 85-98).

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2005) Link-layer jamming attacks on S-MAC. In: Second European Workshop on Wireless Sensor Networks, EWSN, 31 Jan. - 2 Feb. 2005, Istanbul, Turkey (pp. pp. 217-225).

Rocha, Bruno P.S. and Bandhakavi, Sruthi and Hartog, Jerry den and Winsborough, William H. and Etalle, Sandro (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California (pp. pp. 93-108).

Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain (pp. pp. 129-142).

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional Principles of Registry-based Service Discovery. In: 30th Annual IEEE Conf. on Local Computer Networks, LCN, 15-17 Nov. 2005, Sydney, Australia (pp. pp. 209-217).

Report

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An audit logic for accountability. [Report]

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. [Report]

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A logic for auditing accountability in decentralized systems. [Report]

Corin, R.J. and Hartog, J.I. den (2006) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs. [Report]

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2005) Nonmonotonic trust management for P2P applications. [Report]

Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. [Report]

Dekker, M.A.C. and Hartog, J.I. den and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. [Report] (In Press)

Hartog, J.I. den and Vink, E.P. de (2004) Virtual analysis and reduction of side-channel vulnerabilities of smartcards. [Report]

Hartog, Jerry den (2007) Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic. [Report]

Hollestelle, G. and Burgers, W. and den Hartog, J.I. (2004) Power analysis on smartcard algorithms using simulation. [Report]

Law, Yee Wei and Hartel, Pieter and Hartog, Jerry den and Havinga, Paul (2004) Link-layer jamming attacks on S-MAC. [Report]

Sundramoorthy, V. and Tan, C. and Hartel, P.H. and Hartog, J.I. den and Scholten, J. (2005) Functional principles of registry-based service discovery. [Report]

Thesis

den Hartog, J.I. (2002) Probabilistic Extensions of Semantical Models. thesis.

This list was generated on Fri Jul 25 05:14:47 2014 CEST.