EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: VISPER: The VIrtual Security PERimeter for digital, physical, and organisational security
Home Policy Brochure Browse Search User Area Contact Help

2015

van Cleeff, A. (2015) Physical and Digital Security Mechanisms: Properties, Combinations and Trade-offs. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 15-360 ISBN 978-90-365-3884-8

2013

Nunes Leal Franqueira, V. and van Cleeff, A. and van Eck, P.A.T. and Wieringa, R.J. (2013) Engineering security agreements against external insider threat. Information Resources Management Journal, 26 (4). pp. 66-91. ISSN 1040-1628
Pieters, W. and Dimkov, T. and Pavlovic, D. (2013) Security Policy Alignment: A Formal Approach. IEEE Systems Journal, 7 (2). pp. 275-287. ISSN 1932-8184 *** ISI Impact 2,114 ***

2012

Dimkov, T. (2012) Alignment of Organizational Security Policies -- Theory and Practice. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 12-218 ISBN 978-90-365-3331-7
Nunes Leal Franqueira, V. and van Cleeff, A. and van Eck, P.A.T. and Wieringa, R.J. (2012) Securing the Extended Enterprise: A Method for Analyzing External Insider Threat. In: Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions. IGI Global, Hershey, USA, pp. 195-222. ISBN 978-1-46660-197-0
Pieters, W. and van der Ven, S. and Probst, C.W. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy. pp. 1-14. ACM. ISBN 978-1-4503-1794-8
Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M. (2012) Privacy penetration testing -- how to establish trust in your cloud provider. In: European Data Protection: In Good Health? International, Foreign and Comparative Law XVIII. Springer, London, pp. 251-266. ISBN 978-94-007-2902-5

2011

Alberts, G. and Boersma, K. and Broekhans, B. and Dijkstra, Anne and Pieters, W. and Popkema, M. and Vanheste, T. (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 7-11. ISSN 1871-0034 ISBN 978-90-8964-401-5
van Cleeff, A. and Dimkov, T. and Pieters, W. and Wieringa, R.J. (2011) Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security (ICITCS 2011), 14-16 Dec, 2011, Suwon, South Korea. pp. 51-67. Lecture Notes in Electrical Engineering 120. Springer Verlag. ISSN 1876-1100 ISBN 978-94-007-2910-0
van Cleeff, A. and Pieters, W. and Wieringa, R.J. and van Tiel, F. (2011) Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Information Security Technical Report, 16 (3-4). pp. 142-149. ISSN 1363-4127
De Capitani di Vimercati, S. and Pieters, W. and Probst, C.W. (2011) Secure Architectures in the Cloud. Technical Report 11492 Dagstuhl, Germany. ISSN 2192-5283
Dimkov, T. and Pieters, W. (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. PenTest Magazine, 2011 (2). pp. 20-23. ISSN not assigned
Dimkov, T. and Pieters, W. and Hartel, P.H. (2011) Training Students to Steal: A Practical Assignment in Computer Security Education. In: Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE 2011), 9-12 Mar 2011, Dallas, Texas, USA. pp. 21-26. ACM. ISBN 978-1-4503-0500-6
Pieters, W. (2011) Explanation and trust: what to tell the user in security and AI? Ethics and information technology, 13 (1). pp. 53-64. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063
Pieters, W. (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063
Pieters, W. (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374
Pieters, W. (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243 *** ISI Impact 1,333 ***
Pieters, W. (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 197-207. ISSN 1871-0034 ISBN 978-90-8964-401-5
Pieters, W. (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 978-94-007-0640-8
Pieters, W. (2011) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series 20. T.M.C. Asser Press, The Hague, pp. 439-452. ISSN 1570-2782 ISBN 978-90-6704-730-2
Pieters, W. and Coles-Kemp, L. (2011) Reducing normative conflicts in information security. In: Proceedings of the 2011 New security paradigms workshop, NSPW '11, 12-15 Sep 2011, Marin County, CA. pp. 11-24. ACM. ISBN 978-1-4503-1078-9
Popkema, M. and Pieters, W. and Boersma, K. and Broekhans, B. (2011) Epiloog: Het klimaat voor kennis in de kennissamenleving. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 225-231. ISSN 1871-0034 ISBN 978-90-8964-401-5

2010

van Cleeff, A. (2010) A Risk Management Process for Consumers. Technical Report TR-CTIT-10-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Cleeff, A. (2010) A Risk Management Process for Consumers: The Next Step in Information Security. In: Proceedings of the 2010 Workshop on New Security Paradigms, NSPW 2010, 21-23 Sep 2010, Concord, MA, USA. pp. 107-114. ACM. ISBN 978-1-4503-0415-3
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-2010). 6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Gooi eigen servers en pc’s niet weg. Best Practice Magazine, 4 (1). pp. 8-10. ISSN 0891-060X
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-2010). pp. 6-6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Benefits of Location-Based Access Control:A Literature Study. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec, 2010, Hangzhou, China. pp. 739-746. IEEE Computer Society. ISBN 978-1-4244-9779-9
Dimkov, T. and van Cleeff, A. and Pieters, W. and Hartel, P.H. (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), 06-10 Dec 2010, Austin, Texas, USA. pp. 399-408. ACM. ISBN 978-1-4503-0133-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, 27-28 March 2010, Paphos, Cyprus. pp. 112-129. Lecture Notes in Computer Science 6186. Springer Verlag. ISBN 978-3-642-16074-5
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. Technical Report TR-CTIT-10-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: analyzing multi-domain insider threats. Technical Report TR-CTIT-10-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 4-8 Oct 2010, Chicago, Illinois, US. pp. 666-668. ACM. ISBN 978-1-4503-0245-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec 2010, Hangzhou, China. pp. 727-732. IEEE Computer Society. ISBN 978-1-4244-9779-9
Jonker, H.L. and Pieters, W. (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science 6000. Springer Verlag, Berlin, pp. 216-230. ISSN 0302-9743 ISBN 978-3-642-12979-7
Langer, L. and Jonker, H.L. and Pieters, W. (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: 12th International Conference Information and Communications Security, ICICS 2010, 15-17 Dec 2010, Barcelona, Spain. pp. 296-310. Lecture Notes in Computer Science 6476. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17649-4
Nunes Leal Franqueira, V. and van Cleeff, A. and van Eck, P.A.T. and Wieringa, R.J. (2010) External Insider Threat: a Real Security Challenge in Enterprise Value Webs. In: Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES'2010), 15-18 February 2010, Krakow, Poland. pp. 446-453. IEEE Computer Society. ISBN 978-0-7695-3965-2
Pieters, W. (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. Technical Report TR-CTIT-10-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Explanation and trust: what to tell the user in security and AI? Technical Report TR-CTIT-10-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Security and privacy in the clouds: a bird's eye view. Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Reve{a,i}ling the risks: a phenomenology of information security Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264
Pieters, W. (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 978-90-481-8864-2
Pieters, W. (2010) Informational precaution. In: 8th Conference on Computing and Philosophy (ECAP10), 4-6 Oct 2010, Munich, Germany. pp. 320-325. Verlag Dr. Hut. ISBN 978-3-86853-546-4
Pieters, W. and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, Anne and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISSN 1871-0034 ISBN 978-90-5260-384-1

2009

van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. Technical Report TR-CTIT-09-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Computational Science and Engineering (CSE09), volume 3, 29 Aug - 31 Aug, Vancouver, BC, Canada. pp. 353-358. IEEE Computer Society. ISBN 978-0-7695-3823-5
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Gooi eigen servers en pc's niet weg. TIEM, Tijdschrift voor Informatie en Management, 34. pp. 8-9. ISSN 1572-5472
van Cleeff, A. and Wieringa, R.J. (2009) Rethinking De-Perimeterisation: Problem Analysis And Solutions. In: Proceedings of the IADIS International Conference Information Systems 2009, 25-27 Feb 2009, Barcelona. pp. 105-112. IADIS press. ISBN 978-972-8924-79-9
Dimkov, T. (2009) The key-free society. In: Living the ICT future. Centre for Telematics and Information Technology University of Twente, Enschede, pp. 28-29. ISBN 978-90-365-2963-1
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. Technical Report TR-CTIT-09-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Two methodologies for physical penetration testing using social engineering. Technical Report TR-CTIT-09-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science 5705. Springer Verlag, Berlin, pp. 121-144. ISSN 0302-9743 ISBN 978-3-642-03828-0
Pieters, W. (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2009 (3). pp. 23-25. ISSN 1569-1063
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. Technical Report TR-CTIT-09-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands. pp. 58-60. CEPTES, University of Twente. ISBN not assigned
Pieters, W. (2009) Reve{a,i}ling the risks: a phenomenology of information security Technical Report TR-CTIT-09-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg. pp. 172-190. Lecture Notes in Computer Science 5767. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04134-1
Pieters, W. and van Cleeff, A. (2009) The Precautionary Principle in a World of Digital Dependencies. IEEE Computer, 42 (6). pp. 50-56. ISSN 0018-9162 *** ISI Impact 1,115 ***
Pieters, W. and van Cleeff, A. (2009) The precautionary principle in a world of digital dependencies. Technical Report TR-CTIT-09-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and van Cleeff, A. and Wieringa, R.J. (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855, 5 Aug 2009). 25. ISSN not assigned
Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of information, communication and ethics in society, 7 (4). pp. 243-257. ISSN 1477-996X
Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, Anne and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving 5. Aksant, Amsterdam, pp. 7-20. ISSN 1871-0034 ISBN 978-90-5260-351-3
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2

2008

van Cleeff, A. (2008) Future consumer mobile phone security: A case study using the data-centric security model. Information Security Technical Report, 13 (3). pp. 112-117. ISSN 1363-4127
van Cleeff, A. and Wieringa, R.J. (2008) De-perimeterisation as a cycle: tearing down and rebuilding security perimeters. Technical Report TR-CTIT-08-65, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Proceedings of the Workshop on Modeling Security (MODSEC08), 28 Sep 2008, Toulouse. 18. CEUR Workshop Proceedings. ISSN 1613-0073
Dimkov, T. and Tang, Qiang and Hartel, P.H. (2008) Inability of existing security models to cope with data mobility in dynamic organizations. Technical Report TR-CTIT-08-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2004

Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. (Invited) In: Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), March 10-14, 2004, Marseille, France. pp. 172-191. Lecture Notes in Computer Science 3362. Springer-Verlag. ISBN 3-540-24287-2