< Back to previous page
Researcher
Kim Wuyts
- Disciplines:Distributed computing
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Sep 2006 → 4 Aug 2020
Projects
1 - 1 of 1
- Artificial Intelligence (AI) for data-driven personalised medicineFrom1 Jan 2023 → TodayFunding: FWO research project (including WEAVE projects)
Publications
11 - 20 of 25
- Navigating Law and Software Engineering Towards Privacy by Design: Stepping Stones for Bridging the Gap(2018)
Authors: Ivo Emanuilov, Kim Wuyts, Dimitri Van Landuyt, Natalie Bertels, Wouter Joosen
Pages: 123 - 140 - Interaction-based privacy threat elicitation(2018)
Authors: Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen
Pages: 79 - 86 - Towards a roadmap for privacy technologies and the General Data Protection Regulation: A transatlantic initiative(2018)
Authors: Bettina Berendt, Kim Wuyts
Pages: 24 - 42Number of pages: 19 - Effective and Efficient Privacy Threat Modeling through Domain Refinements(2018)
Authors: Kim Wuyts, Dimitri Van Landuyt, Aram Hovsepyan, Wouter Joosen
Pages: 1175 - 1178Number of pages: 4 - Empirical research on security and privacy by design - What (not) to expect as a researcher or a reviewer(2017)
Authors: Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, Wouter Joosen
Pages: 1 - 46Number of pages: 46 - Privacy Threats in Software Architectures(2015)
Authors: Kim Wuyts, Wouter Joosen, Riccardo Scandariato
- The OCareCloudS project: toward organizing care through trusted cloud services(2014)
Authors: Femke De Backere, Arne Jansen, Kim Wuyts, Jan Henk Annema, Nicky Sulmon, Dimitri Van Landuyt, Dirk De Grooff
Pages: 1 - 19 - Empirical evaluation of a privacy-focused threat modeling methodology(2014)
Authors: Kim Wuyts, Riccardo Scandariato, Wouter Joosen
Pages: 122 - 138 - A descriptive study of Microsoft's threat modeling technique(2013)
Authors: Riccardo Scandariato, Kim Wuyts, Wouter Joosen
Pages: 163 - 180 - Integrating Patient Consent in e-Health Access Control(2013)
Authors: Kim Wuyts, Griet Verhenneman, Wouter Joosen
Pages: 285 - 308Number of pages: 24