Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where J.I. den Hartog is active.

Publication


Featured researches published by J.I. den Hartog.


ieee international workshop on policies for distributed systems and networks | 2005

An audit logic for accountability

Jan Cederquist; R. Conn; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog

We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and may be audited by an authority requiring justifications.


CTIT technical report series | 2004

A logic for auditing accountability in decentralized systems

Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu

We propose a language that allows agents to distribute data with usage policies in a decentralized architecture. In our framework, the compliance with usage policies is not enforced. However, agents may be audited by an authority at an arbitrary moment in time. We design a logic that allows audited agents to prove their actions, and to prove their authorization to posses particular data. Accountability is defined in several flavors, including agent accountability and data accountability. Finally, we show the soundness of the logic.


formal aspects in security and trust | 2004

Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards

J.I. den Hartog; E.P. de Vink

This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and has a suite of utilities to analyze this. The usage of the tool, for the analysis of a cryptographic algorithm is illustrated using the standard AES and RSA. Vulnerabilities of the implementations are identified and protective measures added. It is argued, that the tool can be instrumental for the design and realization of secure smartcard implementations in a systematic way.


International Journal of Information Security | 2007

Audit-based compliance control

Jan Cederquist; Ricardo Corin; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini


CTIT technical report series | 2005

Nonmonotonic Trust Management for P2P Applications

Marcin Czenko; H. Tran; Jeroen Doumen; Sandro Etalle; Pieter H. Hartel; J.I. den Hartog


CTIT technical report series | 2006

The Audit Logic: Policy Compliance in Distributed Systems

Jan Cederquist; Ricardo Corin; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini


Archive | 1999

Taking chances on MERGE and FAIL: Extending strong and probabilistic bisimulation

J.I. den Hartog; E.P. de Vink


CTIT technical report series | 2006

Privacy in an Ambient World

M.A.C. Dekker; Sandro Etalle; J.I. den Hartog


formal aspects in security and trust | 2004

A Logic for Auditing Accountability in Decentralized Systems.

Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu


CTIT technical report series | 2007

Audit-based Compliance Control (AC2) for EHR Systems

M.A.C. Dekker; J.I. den Hartog; Sandro Etalle

Collaboration


Dive into the J.I. den Hartog's collaboration.

Top Co-Authors

Avatar

Sandro Etalle

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

E.P. de Vink

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wan Fokkink

VU University Amsterdam

View shared research outputs
Top Co-Authors

Avatar

Jun Pang

University of Luxembourg

View shared research outputs
Researchain Logo
Decentralizing Knowledge