Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Number of items: 88.

Article

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Gooi eigen servers en pc’s niet weg. TIEM, Tijdschrift voor Informatie en Management, 34 . pp. 8-9. ISSN 1572-5472

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-). p. 6. ISSN 0002-5259

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Gooi eigen servers en pc’s niet weg. Best Practice Magazine, 4 (1). pp. 8-10. ISSN 1877-9557

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-). p. 6. ISSN 0002-5259

Cleeff, André van and Pieters, Wolter and Wieringa, Roel and Tiel, F. van (2011) Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Information Security Technical Report, 16 (3-4). pp. 142-149. ISSN 1363-4127

Pieters, Wolter (2010) Reve(a,i)ling the risks: a phenomenology of information security. Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264

Pieters, Wolter (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374

Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322

Pieters, W. (2005) Veilig online stemmen vanuit San Francisco? Idee, tijdschrift van het kenniscentrum van D66, 26 (1). pp. 8-10. ISSN 0927-2518

Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of Information, Communication and Ethics in Society, 7 (4). pp. 243-257. ISSN 1477-996X

Pieters, W. and Dimkov, T. and Pavlovic, D. (2012) Security Policy Alignment: A Formal Approach. IEEE Systems Journal . ISSN 1932-8184

Pieters, W. and Haren, R. van (2007) Temptations of turnout and modernisation: e-voting discourses in the UK and the Netherlands. Journal of Information, Communication and Ethics in Society, 5 (4). pp. 276-292. ISSN 1477-996X

Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2014) Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications . ISSN 2214-2126

Pieters, Wolter (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063

Pieters, Wolter (2010) Explanation and trust: what to tell the user in security and AI? Ethics and Information Technology . ISSN 1388-1957

Pieters, Wolter (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063

Pieters, Wolter (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063

Pieters, Wolter (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243

Pieters, Wolter (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology . ISSN 1388-1957

Pieters, Wolter and Cleeff, André van (2009) The Precautionary Principle in a World of Digital Dependencies. Computer, 42 (6). pp. 50-56. ISSN 0018-9162

Pieters, Wolter and Cleeff, André van and Wieringa, Roel (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855,). p. 25.

Pieters, Wolter and Lukszo, Z. and Hadžiosmanović, Dina and Berg, J. van den (2014) Reconciling malicious and accidental risk in cyber security. Journal of Internet Services and Information Security, 4 (2). pp. 4-26. ISSN 2182-2077

Stoelinga, Mariëlle and Pieters, Wolter (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits & chips : tweewekelijks nieuwsmagazine voor de hightechindustrie, 4 . ISSN 1879-6443

Book Section

Alberts, Gerard and Boersma, Kees and Broekhans, Bertien and Dijkstra, Anne and Pieters, Wolter and Popkema, Marcus and Vanheste, Tomas (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving, 7 . Amsterdam University Press, Amsterdam, pp. 7-11. ISBN 9789089644015

Cleeff, André van and Dimkov, Trajce and Pieters, Wolter and Wieringa, Roel (2012) Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, 120 . Springer Verlag, London, pp. 51-67. ISBN 9789400729100

Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science, 5705 . Springer Verlag, Berlin, pp. 121-144. ISBN 9783642038280

Jonker, Hugo and Pieters, Wolter (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science, 6000 . Springer Verlag, Berlin, pp. 216-230. ISBN 9783642129797

Langer, Lucie and Jonker, Hugo and Pieters, Wolter (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: Information and Communications Security. Lecture Notes in Computer Science, 6476 . Springer Verlag, Berlin, pp. 296-310. ISBN 9783642176494

Pieters, Wolter (2010) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series, 20 . T.M.C. Asser Press, The Hague. ISBN 9789067047302

Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving, 4 . Aksant, Amsterdam, pp. 17-25. ISBN 9789052603070

Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, A. and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving, 5 . Aksant, Amsterdam, pp. 7-20. ISBN 9789052603513

Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya, A.L. (2013) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and processes for managing the economics of information systems. IGI Global, Hershey, PA, USA, p. 18.

Pieters, Wolter (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 9789048188642

Pieters, Wolter (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 9789400706408

Pieters, Wolter (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving, 7 . Amsterdam University Press, Amsterdam, pp. 197-207. ISBN 9789089644015

Pieters, Wolter and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, A. and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISBN 9789052603841

Popkema, Marcus and Pieters, Wolter and Boersma, Kees and Broekhans, Bertien (2011) Epiloog: het klimaat voor kennis in de kennissamenleving. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving, 7 . Amsterdam University Press, Amsterdam, pp. 225-231. ISBN 9789089644015

Conference or Workshop Item

Bleikertz, Sören and Mastelic, Toni and Pape, Sebastian and Pieters, Wolter and Dimkov, Trajce (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering, IC2E, 25-27 March 2013, Redwood City, CA, USA (pp. pp. 78-87).

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), 29 Aug - 31 Aug, Vancouver, BC, Canada (pp. pp. 353-358).

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2010) Benefits of Location-Based Access Control:A Literature Study. In: 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, 18-20 Dec 2010, Hangzhou, China.

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS '10, 27-28 March 2010, Paphos, Cyprus. (In Press)

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: 17th ACM Conference on Computer and Communications Security, CCS 2010, 4-8 Oct 2010, Chicago, Illinois, US (pp. pp. 666-668).

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, 18-20 Dec 2010, Hangzhou, China.

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Two methodologies for physical penetration testing using social engineering. In: Annual Computer Security Applications Conference, ACSAC '10, 6-10 Dec 2010, Austin, Texas, USA.

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Training Students to Steal: A Practical Assignment in Computer Security Education. In: 42nd ACM Technical Symposium on Computer Science Education, SIGCSE’11, March 9-12, 2011, Dallas, Texas, USA.

Garcia, F.D. and Hasuo, I. and Pieters, W. and Rossum, P.J.B. van (2005) Provable anonymity. In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, Fairfax, VA, USA (pp. pp. 63-72).

Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2005) RIES: Internet voting in action. In: 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), 26-28 Jul 2005 (pp. pp. 417-424).

Jacobs, B.P.F. and Pieters, W. and Warnier, M. (2005) Statically checking confidentiality via dynamic labels. In: WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security, 10-11 Jan 2005, Long Beach, CA (pp. pp. 50-56).

Jonker, H.L. and Pieters, W. (2006) Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 29-30 Jun 2006, Cambridge, UK.

Kulikova, Olga and Heil, Ronald and Berg, Jan van den and Pieters, Wolter (2012) Cyber crisis management: a decision-support framework for disclosing security incident information. In: International Conference on Cyber Security, CyberSecurity 2012, 14-16 December 2012, Washington, DC, USA (pp. pp. 103-112).

Pieters, W. (2006) Acceptance of voting technology: between confidence and trust. In: K. Stølen et al.(eds) iTrust 2006 (pp. pp. 283-297).

Pieters, W. (2006) Internet voting: a conceptual challenge to democracy. In: Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference, 12-15 Jul 2006, Limerick, Ireland (pp. pp. 89-103).

Pieters, W. (2006) Internet voting: a monstrous alliance between democracy and technology? In: Fifth international conference on Cultural Attitudes towards Technology and Communication 2006, 28 Jun - 1 Jul 2006, Tartu, Estonia (pp. pp. 115-129).

Pieters, W. (2006) What proof do we prefer? Variants of verifiability in voting. In: Workshop on Electronic Voting and e-Government in the UK, 27-28 Feb 2006, Edinburgh, UK (pp. pp. 33-39).

Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands (pp. pp. 58-60).

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg (pp. pp. 172-190).

Pieters, W. and Becker, M.J. (2005) Ethics of e-voting: an essay on requirements and values in Internet elections. In: Ethics of New Information Technology: Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), 17-19 Jul 2005, Enschede (pp. pp. 307-318).

Pieters, W. and Consoli, L. (2006) Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract). In: Proceedings of the European Computing and Philosophy Conference (E-CAP 2006), 22-24 Jun 2006, Trondheim, Norway.

Pieters, W. and Jonker, H.L. (2007) Vote buying revisited: implications for receipt-freeness. In: Proceedings of the 2nd Benelux Workshop on Information and System Security (WISSec 2007), 20-21 Sep 2007, Luxembourg city, Luxembourg.

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada (pp. pp. 240-251).

Pieters, W. and Ven, S. van der and Probst, C. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy (pp. pp. 1-14).

Pieters, Wolter (2010) Informational precaution. In: 8th Conference on Computing and Philosophy, ECAP10, 4-6 Oct 2010, Munich, Germany (pp. pp. 320-325).

Pieters, Wolter (2013) Defining "The weakest link" comparative security in complex systems of systems. In: IEEE 5th International Conference on Cloud Computing Technology and Science, CloudÇom 2013, 2-5 December 2013, Bristol, UK (pp. pp. 39-44).

Pieters, Wolter and Coles-Kemp, Lizzie (2011) Reducing normative conflicts in information security. In: 2011 New Security Paradigms Workshop, NSPW 2011, 12-15 September 2011, Marin County, CA (pp. pp. 11-24).

Pieters, Wolter and Padget, Julian and Dechesne, Francien and Dignum, Virginia and Aldewereld, Huib (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: 6th International Conference on Security of Information and Networks, SIN 2013, 26-28 November 2013, Aksaray, Turkey (pp. pp. 54-61).

Report

Arnold, Florian and Pieters, Wolter and Stoelinga, Mariëlle (2013) Quantitative penetration testing with item response theory (extended version). [Report]

Cleeff, André van and Pieters, Wolter and Wieringa, Roel (2009) Security Implications of Virtualization: A Literature Study. [Report]

De Capitani di Vimercati, Sabrina and Pieters, Wolter and Probst, Christian W. (2011) Secure Architectures in the Cloud. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2009) Two methodologies for physical penetration testing using social engineering. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. [Report]

Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. [Report]

Dimkov, Trajce and Pieters, Wolter (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. [Report]

Dimkov, Trajce and Pieters, Wolter and Hartel, Pieter (2010) Portunes: analyzing multi-domain insider threats. [Report]

Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2004) RIES: Internet voting in action. [Report]

Ionita, Dan and Hartel, Pieter and Pieters, Wolter and Wieringa, Roel (2013) Current established risk assessment methodologies and tools. [Report]

Koopman, P. and Hubbers, E.M.G.M. and Pieters, W. and Poll, E. and Vries, R. de (2007) Testing the eSTV program for the Scottish Local Government Elections. [Report]

Pieters, W. (2001) Free will and intelligent machines: Why case-based reasoning systems do what they do. [Report]

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. [Report]

Pieters, W. (2009) Reve\{a,i\}ling the risks: a phenomenology of information security. [Report]

Pieters, W. and Haren, R. van (2007) E-voting discourses in the UK and the Netherlands. [Report]

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. [Report]

Pieters, Wolter (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. [Report]

Pieters, Wolter (2010) Explanation and trust: what to tell the user in security and AI? [Report]

Pieters, Wolter (2010) Security in the clouds: a bird's eye view. [Report]

Pieters, Wolter and Cleeff, André van (2009) The precautionary principle in a world of digital dependencies. [Report]

Thesis

Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. thesis.

Masters Thesis

Pieters, W. (2003) A pragmatic phenomenological approach in environmental planning. [Masters Thesis]

Pieters, W. (2002) Case-based techniques for conversational agents in virtual environments. [Masters Thesis]

This list was generated on Thu Oct 23 05:30:00 2014 CEST.