Login / Signup
Kim Wuyts
ORCID
Publication Activity (10 Years)
Years Active: 2008-2024
Publications (10 Years): 17
Top Topics
Security Measures
Personal Information
Privacy Policies
Modeling Framework
Top Venues
SAC
IEEE Symposium on Security and Privacy Workshops
EuroS&P Workshops
ICSE (NIER)
</>
Publications
</>
Frank Pallas
,
Katharina Koerner
,
Isabel Barberá
,
Jaap-Henk Hoepman
,
Meiko Jensen
,
Nandita Rao Narla
,
Nikita Samarin
,
Max-Robert Ulbricht
,
Isabel Wagner
,
Kim Wuyts
,
Christian Zimmermann
Privacy Engineering From Principles to Practice: A Roadmap.
IEEE Secur. Priv.
22 (2) (2024)
Frank Pallas
,
Katharina Koerner
,
Isabel Barberá
,
Jaap-Henk Hoepman
,
Meiko Jensen
,
Nandita Rao Narla
,
Nikita Samarin
,
Max-Robert Ulbricht
,
Isabel Wagner
,
Kim Wuyts
,
Christian Zimmermann
Privacy Engineering From Principles to Practice: A Roadmap.
CoRR
(2024)
Christof Koolen
,
Kim Wuyts
,
Wouter Joosen
,
Peggy Valcke
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models.
Comput. Law Secur. Rev.
52 (2024)
Yana Dimova
,
Mrunmayee Kode
,
Shirin Kalantari
,
Kim Wuyts
,
Wouter Joosen
,
Jan Tobias Mühlberg
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.
WPES@CCS
(2023)
Ala'a Al-Momani
,
Christoph Bösch
,
Kim Wuyts
,
Laurens Sion
,
Wouter Joosen
,
Frank Kargl
Mitigation lost in translation: leveraging threat information to improve privacy solution selection.
SAC
(2022)
Ala'a Al-Momani
,
Kim Wuyts
,
Laurens Sion
,
Frank Kargl
,
Wouter Joosen
,
Benjamin Erb
,
Christoph Bösch
Land of the lost: privacy patterns' forgotten properties: enhancing selection-support for privacy patterns.
SAC
(2021)
Koen Yskout
,
Thomas Heyman
,
Dimitri Van Landuyt
,
Laurens Sion
,
Kim Wuyts
,
Wouter Joosen
Threat modeling: from infancy to maturity.
ICSE (NIER)
(2020)
Laurens Sion
,
Pierre Dewitte
,
Dimitri Van Landuyt
,
Kim Wuyts
,
Peggy Valcke
,
Wouter Joosen
DPMF: A Modeling Framework for Data Protection by Design.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model.
15 (2020)
Kim Wuyts
,
Laurens Sion
,
Wouter Joosen
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling.
EuroS&P Workshops
(2020)
Kim Wuyts
,
Laurens Sion
,
Dimitri Van Landuyt
,
Wouter Joosen
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation.
IEEE Symposium on Security and Privacy Workshops
(2019)
Laurens Sion
,
Pierre Dewitte
,
Dimitri Van Landuyt
,
Kim Wuyts
,
Ivo Emanuilov
,
Peggy Valcke
,
Wouter Joosen
An Architectural View for Data Protection by Design.
ICSA
(2019)
Oleksandr Tomashchuk
,
Dimitri Van Landuyt
,
Daniel Pletea
,
Kim Wuyts
,
Wouter Joosen
A Data Utility-Driven Benchmark for De-identification Methods.
TrustBus
(2019)
Pierre Dewitte
,
Kim Wuyts
,
Laurens Sion
,
Dimitri Van Landuyt
,
Ivo Emanuilov
,
Peggy Valcke
,
Wouter Joosen
A comparison of system description models for data protection by design.
SAC
(2019)
Laurens Sion
,
Dimitri Van Landuyt
,
Kim Wuyts
,
Wouter Joosen
Privacy Risk Assessment for Data Subject-Aware Threat Modeling.
IEEE Symposium on Security and Privacy Workshops
(2019)
Laurens Sion
,
Kim Wuyts
,
Koen Yskout
,
Dimitri Van Landuyt
,
Wouter Joosen
Interaction-Based Privacy Threat Elicitation.
EuroS&P Workshops
(2018)
Kim Wuyts
,
Dimitri Van Landuyt
,
Aram Hovsepyan
,
Wouter Joosen
Effective and efficient privacy threat modeling through domain refinements.
SAC
(2018)
Stefan Schiffner
,
Bettina Berendt
,
Triin Siil
,
Martin Degeling
,
Robert Riemann
,
Florian Schaub
,
Kim Wuyts
,
Massimo Attoresi
,
Seda F. Gürses
,
Achim Klabunde
,
Jules Polonetsky
,
Norman M. Sadeh
,
Gabriela Zanfir-Fortuna
Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
APF
(2018)
Riccardo Scandariato
,
Kim Wuyts
,
Wouter Joosen
A descriptive study of Microsoft's threat modeling technique.
Requir. Eng.
20 (2) (2015)
Kim Wuyts
,
Riccardo Scandariato
,
Wouter Joosen
Empirical evaluation of a privacy-focused threat modeling methodology.
J. Syst. Softw.
96 (2014)
Mina Deng
,
Kim Wuyts
,
Riccardo Scandariato
,
Bart Preneel
,
Wouter Joosen
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
Requir. Eng.
16 (1) (2011)
Kim Wuyts
,
Riccardo Scandariato
,
Griet Verhenneman
,
Wouter Joosen
Integrating Patient Consent in e-Health Access Control.
Int. J. Secur. Softw. Eng.
2 (2) (2011)
Kim Wuyts
,
Riccardo Scandariato
,
Bart De Decker
,
Wouter Joosen
Linking Privacy Solutions to Developer Goals.
ARES
(2009)
Kim Wuyts
,
Riccardo Scandariato
,
Geert Claeys
,
Wouter Joosen
Hardening XDS-Based Architectures.
ARES
(2008)