User Tools

Site Tools


researchareas

This is an old revision of the document!


startSectionEdit: $data "plugin_wrap_start" is NOT an array! One of your plugins needs an update.
startSectionEdit: $data "plugin_wrap_end" is NOT an array! One of your plugins needs an update.
startSectionEdit: $data "plugin_wrap_start" is NOT an array! One of your plugins needs an update.
startSectionEdit: $data "plugin_wrap_end" is NOT an array! One of your plugins needs an update.

Research Areas

Research at the Security Group at TU/e covers both empirical and theoretical areas of computer security, including network detection and system authentication, physical security and malware engineering and trading, as well as management of health and sensible data and risk evaluation.

Below you can find an updated list of the recent and core contributions in these area of research.

Research output

Research Area Staff member(s) Sample of recent output Full publication list
Network monitoring Sandro Etalle, Jerry den Hartog S. Etalle J. Hartog
Software security Wil Michiels
Secure data management Jerry den Hartog, Milan Petkovic, Nicola Zannone Formal analysis of XACML policies using SMT.
Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone: Formal analysis of XACML policies using SMT. Computers & Security 66: 185-203 (2017)
Data Governance and Transparency for Collaborative Systems. Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone: Data Governance and Transparency for Collaborative Systems. DBSec 2016: 199-216
SAFAX - An Extensible Authorization Service for Cloud Environments.
Samuel Paul Kaluvuri, Alexandru Ionut Egner, Jerry den Hartog, Nicola Zannone: SAFAX - An Extensible Authorization Service for Cloud Environments. Front. ICT 2015 (2015)
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Jason Crampton, Charles Morisset, Nicola Zannone: On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109
GEM: A distributed goal evaluation algorithm for trust management.
Daniel Trivellato, Nicola Zannone, Sandro Etalle: GEM: A distributed goal evaluation algorithm for trust management. TPLP 14(3): 293-337 (2014)
N. Zannone
Deep learning applied to cyber security Milan Petkovic
Process mining applied to security and privacy Nicola Zannone
N. Zannone
Attacker economics and operating environment Luca Allodi L. Allodi
Cyber-risk quantification Luca Allodi
L. Allodi
Identification and Authentication Boris Skoric
Information-theoretic security Boris Skoric
researchareas.1508772534.txt.gz · Last modified: 2021/01/10 20:59 (external edit)