Publications

<< 2009 >>

Preneel, B. and Dodunekov, S. and Rijmen, V. and Nikova, S.I., ed. (2009) Enhancing cryptographic primitives with techniques from error correcting codes. NATO Science for Peace and Security Series D - Information and Communication Security 23. IOS Press, Amsterdam. ISSN 1874-6268 ISBN 978-1-60750-002-5

Bolzoni, D. (2009) Revisiting Anomaly-based Network Intrusion Detection Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-147 ISBN 978-90-365-2853-5

Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. Technical Report TR-CTIT-09-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (RAID). pp. 1-20. Lecture Notes in Computer Science 5758. Springer Verlag. ISBN 978-3-642-04341-3

Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405

van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. Technical Report TR-CTIT-09-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Computational Science and Engineering (CSE09), volume 3, 29 Aug - 31 Aug, Vancouver, BC, Canada. pp. 353-358. IEEE Computer Society. ISBN 978-0-7695-3823-5

van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Gooi eigen servers en pc's niet weg. TIEM, Tijdschrift voor Informatie en Management, 34. pp. 8-9. ISSN 1572-5472

Czenko, M.R. (2009) TuLiP : reshaping trust management. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-148 ISBN 978-90-365-2854-2

Czenko, M.R. and Etalle, S. (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium, LOPSTR, Revised Selected Papers, 9-11 Sep 2009, Coimbra, Portugal. pp. 67-81. LNCS 6037. Springer. ISBN 978-3-642-12591-1

Dekker, M.A.C. (2009) Flexible Access Control for Dynamic Collaborative Environments. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-159 ISBN 978-90-365-2950-1

Dimkov, T. (2009) The key-free society. In: Living the ICT future. Centre for Telematics and Information Technology University of Twente, Enschede, pp. 28-29. ISBN 978-90-365-2963-1

Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. Technical Report TR-CTIT-09-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Two methodologies for physical penetration testing using social engineering. Technical Report TR-CTIT-09-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Etalle, S. and Winsborough, W.H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). 5:1-5:27. ISSN 1094-9224 *** ISI Impact 0,69 ***


Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) TuLP: A Family of Secure and Practical Message Authentication Codes for Body Sensor Networks. Technical Report TR-CTIT-09-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Gong, Zheng and Hartel, P.H. and Nikova, S.I. and Zhu, Bo (2009) Towards Secure and Practical MACs for Body Sensor Networks. In: 10th International Conference on Cryptology in India (INDOCRYPT), 13-16 Dec 2009, New Delhi, India. pp. 182-198. Lecture Notes in Computer Science 5922. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10627-9

Hartel, P.H. (2009) On the Cost and Benefits of Building a High-Quality Institutional Repository. Technical Report TR-CTIT-09-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625


Haverkort, B.R.H.M. and Remke, A.K.I. and Hartel, P.H. (2009) Betere beveiliging Scada-systemen vitaal voor Nederlandse infrastructuren. Bits en chips, 11 (16). pp. 23-23. ISSN 1879-6443

Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and its Application (extended version). Technical Report TR-CTIT-09-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: Information Security Applications, 25-27 August 2009, Busan, Korea. pp. 309-323. Lecture Notes in Computer Science 5932/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10837-2

Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th Information Security Practice and Experience Conference (ISPEC), 12-15 April 2009, Xi'an, China. pp. 1-12. Lecture Notes in Computer Science 5451. Springer. ISSN 0302-9743 ISBN 978-3-642-00842-9

Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science 5705. Springer Verlag, Berlin, pp. 121-144. ISSN 0302-9743 ISBN 978-3-642-03828-0

Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring. Master's thesis, University of Twente.

Jonker, W. and Brinkman, R. and Maubach, S. (2009) Secure storage system and method for secure storing. Patent WO2007125454 (Assigned).

Khatib, M.G. (2009) MEMS-Based Storage Devices - Integration in Energy-Constrained Mobile Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-145 ISBN 978-90-365-2847-4

Khatib, M.G. and Hartel, P.H. (2009) Policies for Probe-Wear Leveling in MEMS-Based Storage Devices. In: Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 21-23 Sep 2009, London, UK. pp. 152-161. IEEE Computer Society. ISSN 1526-7539 ISBN 978-1-4244-4928-6

Law, Yee Wei and Palaniswami, M. and van Hoesel, L.F.W. and Doumen, J.M. and Hartel, P.H. and Havinga, P.J.M. (2009) Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks, 5 (1). 6:1-6:38. ISSN 1550-4859 *** ISI Impact 1,44 ***

Marincic, J. and Mader, A.H. and Wieringa, R.J. (2009) A Handbook Supporting Model-Driven Software Development - a Case Study. Technical Report TR-CTIT-09-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (extended version). Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31st International Conference on Software Engineering - Companion Volume, 16-24 May 2009, Vancouver, Canada. pp. 130-140. IEEE Computer Society. ISBN 978-1-4244-3494-7

Nasution, S. and Hartel, P.H. and Suryana, N. and Azman, N. and Shahib, S. (2009) Trust Level and Routing Selection for Mobile Agents in a Smart Home (Extended version). Technical Report TR-CTIT-09-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Nasution, S. and Suryana, N. and Shahib, S. and Abu, N.A. and Hartel, P.H. (2009) The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home. In: International Technology, Education and Development Conference (INTED), 9-11 March 2009, Valencia, Spain. 702. International Association of Technology, Education and Development (IATED). ISBN 978-84-612-7578-6

Pieters, W. (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2009 (3). pp. 23-25. ISSN 1569-1063

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. Technical Report TR-CTIT-09-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands. pp. 58-60. CEPTES, University of Twente. ISBN not assigned

Pieters, W. (2009) Reve{a,i}ling the risks: a phenomenology of information security Technical Report TR-CTIT-09-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg. pp. 172-190. Lecture Notes in Computer Science 5767. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04134-1

Pieters, W. and van Cleeff, A. (2009) The Precautionary Principle in a World of Digital Dependencies. IEEE Computer, 42 (6). pp. 50-56. ISSN 0018-9162 *** ISI Impact 1,68 ***

Pieters, W. and van Cleeff, A. (2009) The precautionary principle in a world of digital dependencies. Technical Report TR-CTIT-09-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Pieters, W. and van Cleeff, A. and Wieringa, R.J. (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855, 5 Aug 2009). 25. ISSN not assigned

Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of information, communication and ethics in society, 7 (4). pp. 243-257. ISSN 1477-996X

Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, Anne and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving 5. Aksant, Amsterdam, pp. 7-20. ISSN 1871-0034 ISBN 978-90-5260-351-3

Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2

Saffarian, M. and Tang, Qiang and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. Technical Report TR-CTIT-09-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Sedghi, S. and van Liesdonk, P. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. Technical Report TR-CTIT-09-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

van Sinderen, M.J. and Pras, A. and Haverkort, B.R.H.M. and Apers, P.M.G. and Hartel, P.H. and van de Pol, J.C. and Nijholt, A. and Wieringa, R.J. and Havinga, P.J.M. and Akşit, M. (2009) Research Self-Evaluation 2003-2008, Computer Science Department, University of Twente. Technical Report Number UNSPECIFIED, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain. pp. 129-142. Lecture Notes in Computer Science 5491. Springer Verlag. ISBN 978-3-642-01464-2

Sundramoorthy, V. and Hartel, P.H. and Scholten, J. (2009) A Taxonomy of Service Discovery Systems. In: Context-Aware Computing and Self-Managing Systems. CRC Studies in Informatics. Chapman and Hall, Boca Raton, pp. 43-77. ISBN 1-420-07771-6

Tang, Qiang (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 195-208. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 978-3-642-16440-8

Tang, Qiang and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 163-178. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 3-642-16440-4

Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China. pp. 332-347. Lecture Notes in Computer Science 5487. Springer Verlag. ISBN 978-3-642-01439-0

Trivellato, D. and Spiessens, A.O.D. and Zannone, N. and Etalle, S. (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: Proceedings 12th IEEE International conference on Computational Science and Engineering, 29-31 Aug. 2009, Vancouver BC, Canada. pp. 252-258. IEEE. ISBN 978-0-7695-3823-5

Trivellato, D. and Spiessens, A.O.D. and Zonnone, N. and Etalle, S. (2009) POLIPO: Policies & ontologies for interoperability, portability, and autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 20-22 July 2009, London, UK. pp. 110-113. IEEE. ISBN 978-0-7695-3742-9

Weng, J. and Yang, Yanjiang and Tang, Qiang and Deng, R. and Bao, F. (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security - 12th International Conference, ISC, Pisa, Italy, September 7-9, 2009, Pisa, Italy. pp. 151-166. Lecture Notes in Computer Science 5735. Springer Verlag. ISBN 978-3-642-04473-1

Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. Technical Report TR-CTIT-09-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625