Publications

Journal

  • S. Vavilis, M. Petkovic, N. Zannone. A Severity-based Quantification of Data Leakages in Database Systems. Journal of Computer Security, 2016. [PDF]
  • S. Vavilis, A. Egner, M. Petkovic, N. Zannone. An anomaly analysis framework for database systems. Computers & Security, 53: 156-173, 2015. [PDF]
  • Donia El Kateb, Nicola Zannone, Assaad Moawad, Patrice Caire, Gregory Nain, Tejeddine Mouelhi, and Yves Le Traon. Conviviality-driven access control policy. Requirements Engineering, 2014. ISSN 0947-3602. [PDF]
  • Sokratis Vavilis, Milan Petkovic and Nicola Zannone. A Reference Model for Reputation Systems. Decision Support Systems, Volume 61, May 2014, Pages 147-154 [PDF]
  • E. Costante, F. Paci, and N. Zannone. Privacy-Aware Web Service Composition and Ranking. International Journal of Web Services Research, 2013. To appear.[PDF]
  • A. Adriansyah, B. van Dongen, and N. Zannone. Controlling Break-The-Glass Through Alignment. ASE SCIENCE Journal, 2(4):198-212, 2013.[PDF]
  • T. Veugen. "Rekenen met vercijferde data", Informatiebeveiliging. issue 6, pp. 12-14, 10/2011 [PDF]

Conference / Workshop

  • S. Vavilis, A. Egner, M. Petkovic, N. Zannone. Role mining with missing values. In Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES'16), 2016. TU/e research page
  • Charles Morriset and Nicola Zannone. Reduction of Access Control Decisions. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014), 2014. ACM Press. [PDF]
  • E. Costante,J.d. Hartog, M.Petkovic, S. Etalle, and M. Pechenizkiy. Hunting the Unknown - White-Box Database Leakage Detection. In Proceedings of the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2014), 2014 [PDF]
  • S. Vavilis, M. Petkovic, and N. Zannone. Data Leakage Quantification. In Proceedings of the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2014), 2014 [PDF] (Best Student Paper Award)
  • Stan Damen, Jerry den Hartog, and Nicola Zannone. CollAC: Collaborative Access Control. In Proceedings of the 2014 International Conference on Collaboration Technologies and Systems (CTS 2014), 2014. IEEE Computer Society Press. [PDF]
  • A. Adriansyah, B. van Dongen, and N. Zannone. Controlling Break-The-Glass Through Alignment. In Proceedings of the 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013), 2013 [PDF]
  • E. Costante, S. Vavilis, S. Etalle, J. den Hartog, M. Petkovic, and N. Zannone. Database Anomalous Activities: Detection and Quantification. In Proceedings of SECRYPT 2013 - The International Conference on Security and Cryptography. [PDF]
  • S. Vavilis, M. Petkovic, and N. Zannone. Data Reliability in Home Healthcare Services. In Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2013), IEEE. 2013. [PDF]
  • M. Egea, F. Paci, M. Petrocchi, and N. Zannone. PERSONA: A Personalized Data Protection Framework. In Proceedings of the 7th International IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2013), Springer. 2012. [PDF]
  • Meilof Veeningen, Benne de Weger, and Nicola Zannone. Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy . In Proceedings of the 8th International Workshop on Security and Trust Management (STM�12), 2012. [PDF]
  • S. Etalle, T. L. Hinrichs, A. J. Lee, D. Trivellato, and N. Zannone. Policy Administration in Tag-Based Authorization. In Proceedings of the 5th International Symposium on Foundations & Practice of Security (FPS 2012), Springer. 2012 [PDF]
  • Costante, E., Sun, Y., den Hartog, J., & Petkovic, M. A Machine Learning Solution to Assess Privacy Policy Completeness, 10th annual ACM workshop on Privacy in the electronic society, ACM. 2012. [PDF]
  • Costante, E., den Hartog, J., & Petkovic, M. , What Websites Know About You - Privacy Policy Analysis Using Information Extraction . In Proc. of 7th International Workshop on Data Privacy Management (DPM), 2012 [PDF]
  • S. Banescu, M. Petkovic, and N. Zannone. Measuring Privacy Compliance using Fitness Metrics. In Proceedings of the 10th International Conference on Business Process Management (BPM'12), 2012. [PDF]
  • M. Asim, T. Ignatenko, M. Petkovic, D. Trivellato and N. Zannone. Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. In Proceedings of the 7th International Conference on Availability, Reliability and Security (ARES'12), 2012[PDF]
  • S. Vavilis, M. Petkovic, and N. Zannone. Impact of ICT on Home Healthcare. In Proceedings of the 10th IFIP Human Choice and Computers International Conference (HCC 2012), Springer. 2012. [PDF]

Posters

  • Sokratis Vavilis, Alexandru Egner, Milan Petkovic and Nicola Zannone. An Anomaly Analysis Framework for Database Systems . 1st 3TU Cyber Security Workshop, Den Haag, 26 November 2015 [PDF]
  • Sokratis Vavilis, Milan Petkovic and Nicola Zannone. Data Reliability - Evaluating the reliability of eHealth data. COMMIT/ The Big Future of Data event, Amsterdam, 2 Ocrober 2014 [PDF]
  • E. Costante, S. Vavilis, S. Etalle, J. den Hartog, M. Petkovic, and N. Zannone. Database Anomalous Activities: Detection and Quantification. . ICT.OPEN, Eindhoven, 27-28 November 2013 [PDF]
  • Sokratis Vavilis, Milan Petkovic and Nicola Zannone. Information Reliability in Home Healthcare Services. COMMIT/ COMMUNITY DAY, Lunteren, 2-3 April 2013 [PDF]
  • Sokratis Vavilis, Milan Petkovic and Nicola Zannone. Information Reliability in Home Healthcare . ICT.OPEN, Rotterdam, 22-23 October 2012 [PDF]

PhD Thesis

  • Elisa. Costante. Privacy throughout the Data Cycle. PhD Thesis. Eindhoven: Technische universiteit Eindhoven. ((Co-)promot.: prof.dr. M. Petkovic, prof.dr. S. Etalle and dr. J.I. den Hartog) 2015. [PDF]

Master Thesis

  • Stan Damen. Collaborative Access Control . Master Thesis. Eindhoven University of Technology. 2013 [PDF]
  • Sebastian Banescu. Decision Support for Privacy Auditing . Master Thesis. Eindhoven University of Technology. 2012

Software