J.I. den Hartog
University of Twente
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by J.I. den Hartog.
ieee international workshop on policies for distributed systems and networks | 2005
Jan Cederquist; R. Conn; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog
We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and may be audited by an authority requiring justifications.
CTIT technical report series | 2004
Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu
We propose a language that allows agents to distribute data with usage policies in a decentralized architecture. In our framework, the compliance with usage policies is not enforced. However, agents may be audited by an authority at an arbitrary moment in time. We design a logic that allows audited agents to prove their actions, and to prove their authorization to posses particular data. Accountability is defined in several flavors, including agent accountability and data accountability. Finally, we show the soundness of the logic.
formal aspects in security and trust | 2004
J.I. den Hartog; E.P. de Vink
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and has a suite of utilities to analyze this. The usage of the tool, for the analysis of a cryptographic algorithm is illustrated using the standard AES and RSA. Vulnerabilities of the implementations are identified and protective measures added. It is argued, that the tool can be instrumental for the design and realization of secure smartcard implementations in a systematic way.
International Journal of Information Security | 2007
Jan Cederquist; Ricardo Corin; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini
CTIT technical report series | 2005
Marcin Czenko; H. Tran; Jeroen Doumen; Sandro Etalle; Pieter H. Hartel; J.I. den Hartog
CTIT technical report series | 2006
Jan Cederquist; Ricardo Corin; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini
Archive | 1999
J.I. den Hartog; E.P. de Vink
CTIT technical report series | 2006
M.A.C. Dekker; Sandro Etalle; J.I. den Hartog
formal aspects in security and trust | 2004
Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu
CTIT technical report series | 2007
M.A.C. Dekker; J.I. den Hartog; Sandro Etalle