< Terug naar vorige pagina
Onderzoeker
Kim Wuyts
- Disciplines:Distributed computing
Affiliaties
- Gedistribueerde en Veilige Software (DistriNet) (Afdeling)
Lid
Vanaf1 aug 2020 → Heden - Afdeling Informatica (Afdeling)
Lid
Vanaf1 sep 2006 → 4 aug 2020
Projecten
1 - 1 of 1
- Artificiële intelligentie (AI) voor data-gedreven gepersonaliseerde gezondheidszorg.Vanaf1 jan 2023 → HedenFinanciering: FWO Onderzoeksproject (incl. WEAVE projecten)
Publicaties
11 - 20 van 25
- Navigating Law and Software Engineering Towards Privacy by Design: Stepping Stones for Bridging the Gap(2018)
Auteurs: Ivo Emanuilov, Kim Wuyts, Dimitri Van Landuyt, Natalie Bertels, Wouter Joosen
Pagina's: 123 - 140 - Interaction-based privacy threat elicitation(2018)
Auteurs: Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen
Pagina's: 79 - 86 - Towards a roadmap for privacy technologies and the General Data Protection Regulation: A transatlantic initiative(2018)
Auteurs: Bettina Berendt, Kim Wuyts
Pagina's: 24 - 42Aantal pagina's: 19 - Effective and Efficient Privacy Threat Modeling through Domain Refinements(2018)
Auteurs: Kim Wuyts, Dimitri Van Landuyt, Aram Hovsepyan, Wouter Joosen
Pagina's: 1175 - 1178Aantal pagina's: 4 - Empirical research on security and privacy by design - What (not) to expect as a researcher or a reviewer(2017)
Auteurs: Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, Wouter Joosen
Pagina's: 1 - 46Aantal pagina's: 46 - Privacy Threats in Software Architectures(2015)
Auteurs: Kim Wuyts, Wouter Joosen, Riccardo Scandariato
- The OCareCloudS project: toward organizing care through trusted cloud services(2014)
Auteurs: Femke De Backere, Arne Jansen, Kim Wuyts, Jan Henk Annema, Nicky Sulmon, Dimitri Van Landuyt, Dirk De Grooff
Pagina's: 1 - 19 - Empirical evaluation of a privacy-focused threat modeling methodology(2014)
Auteurs: Kim Wuyts, Riccardo Scandariato, Wouter Joosen
Pagina's: 122 - 138 - A descriptive study of Microsoft's threat modeling technique(2013)
Auteurs: Riccardo Scandariato, Kim Wuyts, Wouter Joosen
Pagina's: 163 - 180 - Integrating Patient Consent in e-Health Access Control(2013)
Auteurs: Kim Wuyts, Griet Verhenneman, Wouter Joosen
Pagina's: 285 - 308Aantal pagina's: 24