Efficient customization of multi-tenant software-as-a-service applications with service lines S Walraven, D Van Landuyt, E Truyen, K Handekyn, W Joosen Journal of Systems and Software 91, 48-62, 2014 | 95 | 2014 |
Solution-aware data flow diagrams for security threat modeling L Sion, K Yskout, D Van Landuyt, W Joosen Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1425-1432, 2018 | 85 | 2018 |
A comprehensive feature comparison study of open-source container orchestration frameworks E Truyen, D Van Landuyt, D Preuveneers, B Lagaisse, W Joosen Applied Sciences 9 (5), 931, 2019 | 56 | 2019 |
Towards a container-based architecture for multi-tenant SaaS applications E Truyen, D Van Landuyt, V Reniers, A Rafique, B Lagaisse, W Joosen Proceedings of the 15th international workshop on adaptive and reflective …, 2016 | 56 | 2016 |
CryptDICE: Distributed data protection system for secure cloud data storage and computation A Rafique, D Van Landuyt, EH Beni, B Lagaisse, W Joosen Information Systems 96, 101671, 2021 | 49 | 2021 |
Effective and efficient privacy threat modeling through domain refinements K Wuyts, D Van Landuyt, A Hovsepyan, W Joosen Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1175-1178, 2018 | 44 | 2018 |
Sparta: Security & privacy architecture through risk-driven threat assessment L Sion, D Van Landuyt, K Yskout, W Joosen 2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018 | 43 | 2018 |
An architectural view for data protection by design L Sion, P Dewitte, D Van Landuyt, K Wuyts, I Emanuilov, P Valcke, ... 2019 IEEE International Conference on Software Architecture (ICSA), 11-20, 2019 | 41 | 2019 |
Interaction-based privacy threat elicitation L Sion, K Wuyts, K Yskout, D Van Landuyt, W Joosen 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 79-86, 2018 | 38 | 2018 |
On the state of nosql benchmarks V Reniers, D Van Landuyt, A Rafique, W Joosen Proceedings of the 8th ACM/SPEC on International Conference on Performance …, 2017 | 37 | 2017 |
Towards an adaptive middleware for efficient multi-cloud data storage A Rafique, D Van Landuyt, V Reniers, W Joosen Proceedings of the 4th workshop on crosscloud infrastructures & platforms, 1-6, 2017 | 32 | 2017 |
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters W Delnat, E Truyen, A Rafique, D Van Landuyt, W Joosen Proceedings of the 13th International Conference on Software Engineering for …, 2018 | 29 | 2018 |
Risk-based design security analysis L Sion, K Yskout, D Van Landuyt, W Joosen Proceedings of the 1st International Workshop on Security Awareness from …, 2018 | 29 | 2018 |
Object-NoSQL Database Mappers: a benchmark study on the performance overhead V Reniers, A Rafique, D Van Landuyt, W Joosen Journal of Internet Services and Applications 8, 1-16, 2017 | 28 | 2017 |
Security threat modeling: are data flow diagrams enough? L Sion, K Yskout, D Van Landuyt, A van Den Berghe, W Joosen Proceedings of the IEEE/ACM 42nd international conference on software …, 2020 | 27 | 2020 |
Threat modeling: from infancy to maturity K Yskout, T Heyman, D Van Landuyt, L Sion, K Wuyts, W Joosen Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 27 | 2020 |
SCOPE: self-adaptive and policy-based data management middleware for federated clouds A Rafique, D Van Landuyt, E Truyen, V Reniers, W Joosen Journal of Internet Services and Applications 10, 1-19, 2019 | 27 | 2019 |
Privacy risk assessment for data subject-aware threat modeling L Sion, D Van Landuyt, K Wuyts, W Joosen 2019 IEEE Security and Privacy Workshops (SPW), 64-71, 2019 | 25 | 2019 |
A descriptive study of assumptions made in linddun privacy threat elicitation D Van Landuyt, W Joosen Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1280-1287, 2020 | 23 | 2020 |
On the performance impact of data access middleware for nosql data stores a study of the trade-off between performance and migration cost A Rafique, D Van Landuyt, B Lagaisse, W Joosen IEEE Transactions on Cloud Computing 6 (3), 843-856, 2015 | 23 | 2015 |