Biblio

Export 14 results:
Filters: Author is Wouter Joosen  [Clear All Filters]
2016
Van Goethem T, Vanhoef M, Piessens F, Joosen W.  2016.  Request and Conquer: Exposing Cross-Origin Resource Size. 25th USENIX Security Symposium (USENIX Security 16). :447--462.
2011
Nikiforakis N, Balduzzi M, Van Acker S, Joosen W, Balzarotti D.  2011.  Exposing the Lack of Privacy in File Hosting Services. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
Vanbrabant B, Peeraer J, Joosen W.  2011.  Fine-grained Access-control for the Puppet Configuration Language. 25th Large Installation System Administration Conference (LISA 11).
2010
Delaet T, Joosen W, Vanbrabant B.  2010.  A Survey of System Configuration Tools. 24th Large Installation System Administration Conference (LISA 10).
2009
Vanbrabant B, Delaet T, Joosen W.  2009.  Federated Access Control and Workflow Enforcement in Systems Configuration. 23rd Large Installation System Administration Conference (LISA 09).
2007
Delaet T, Joosen W.  2007.  PoDIM: A Language for High-Level Configuration Management. 21st Large Installation System Administration Conference (LISA 07).