For best experience please turn on javascript and use a modern browser!
You are using a browser that is no longer supported by Microsoft. Please upgrade your browser. The site may not present itself correctly if you continue browsing.

Prof. dr. ing. L.H.M. (Leon) Gommans

Faculty of Science
Informatics Institute

Visiting address
  • Science Park 904
  • Room number: C3.155
Postal address
  • Postbus 94323
    1090 GH Amsterdam
  • Publications

    2022

    • Amiri, S., Belloum, A., Nalisnick, E., Klous, S., & Gommans, L. (2022). On the impact of non-IID data on the performance and fairness of differentially private federated learning. In Proceedings, 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop volume: 27-30 June 2022, Baltimore, Maryland (pp. 52-58). (DSN-W; Vol. 2022). IEEE Computer Society. https://doi.org/10.1109/DSN-W54100.2022.00018 [details]
    • Amiri, S., Nalisnick, E., Belloum, A., Klous, S., & Gommans, L. (2022). Generating Heavy-Tailed Synthetic Data with Normalizing Flows. In The 5th Workshop on Tractable Probabilistic Modeling https://openreview.net/forum?id=PbvyJ8XpNn

    2021

    • Amiri, S., Belloum, A., Klous, S., & Gommans, L. (2021). Compressive differentiallyprivate federated learning through universal vector quantization. In AAAI Workshop on Privacy-Preserving Artificial Intelligence AAAI.

    2019

    • Deljoo, A., Koning, R., van Engers, T., Gommans, L., & de Laat, C. (2019). Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust. In 2019 3rd Cyber Security in Networking Conference (CSNet 2019): Quito, Ecuador, 23-25 October 2019 (pp. 50-57). IEEE. https://doi.org/10.1109/CSNet47905.2019.9108949 [details]
    • Demchenko, Y., Cushing, R., Los, W., Grosso, P., de Laat, C., & Gommans, L. (2019). Open Data Market Architecture and Functional Components. In 2019 International Conference on High Performance Computing & Simulation (HPCS): Dublin, Ireland, 15-19 July 2019 (pp. 1017-1021). IEEE. https://doi.org/10.1109/HPCS48598.2019.9188195 [details]
    • Shakeri, S., Maccatrozzo, V., Veen, L., Bakhshi, R., Gommans, L., de Laat, C., & Grosso, P. (2019). Modeling and matching digital data marketplace policies. In IEEE 15th International Conference on eScience: proceedings : 24-27 September 2019, San Diego, California (pp. 570-577). IEEE Computer Society. https://doi.org/10.1109/eScience.2019.00078 [details]
    • Zhang, L., Cushing, R., Gommans, L., De Laat, C., & Grosso, P. (2019). Modeling of Collaboration Archetypes in Digital Market Places. IEEE Access, 7, 102689-102700. https://doi.org/10.1109/ACCESS.2019.2931762 [details]

    2018

    • Deljoo, A., van Engers, T., Gommans, L., & de Laat, C. (2018). Social Computational Trust Model (SCTM): A Framework to Facilitate Selection of Partners. In Proceedings of INDIS 2018: Innovating the Network for Data-Intensive Science: held in conjunction with SC18: The International Conference for High Performance Computing, Networking, Storage and Analysis, Dallas, Texas, November 11-16, 2018 (pp. 45-54). IEEE Computer Society. https://doi.org/10.1109/INDIS.2018.00008 [details]
    • Deljoo, A., van Engers, T., Gommans, L., & de Laat, C. (2018). The Impact of Competence and Benevolence in a Computational Model of Trust. In N. Gal-Oz, & P. R. Lewis (Eds.), Trust Management XII: 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018 : proceedings (pp. 45-57). (IFIP Advances in Information and Communication Technology; Vol. 528). Springer. https://doi.org/10.1007/978-3-319-95276-5_4, https://doi.org/10.1007/978-3-319-95276-5_4 [details]
    • Deljoo, A., van Engers, T., Koning, R., Gommans, L., & de Laat, C. (2018). Towards Trustworthy Information Sharing by Creating Cyber Security Alliances. In The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. The 12th IEEE International Conference on Big Data Science and Engineering : proceedings : 31 July-3 August 2018, New York, New York (pp. 1506-1510). (TrustCom/BigDataSE). IEEE Computer Society. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00213 [details]
    • Deljoo, A., van Engers, T., van Doesburg, R., Gommans, L., & de Laat, C. (2018). A Normative Agent-based Model for Sharing Data in Secure Trustworthy Digital Market Places. In A. P. Rocha, & J. van den Herik (Eds.), ICAART 2018: proceedings of the 10th International Conference on Agents and Artificial Intelligence : Funchal, Madeira, Purtugal, January 16-18, 2018 (Vol. 1, pp. 290-296). SciTePress. https://doi.org/10.5220/0006661602900296 [details]

    2017

    • Deljoo, A., van Engers, T., Gommans, L., & de Laat, C. (2017). What Is Going On: Utility-Based Plan Selection in BDI Agents. In The workshops of the Thirty-First AAAI Conference on Artificial Intelligence (pp. 711-718). (Technical report: WS). AAAI Press. https://aaai.org/ocs/index.php/WS/AAAIW17/paper/view/15075 [details]
    • Koning, R., Deljoo, A., Trajanovski, S., de Graaff, B., Grosso, P., Gommans, L., van Engers, T., Fransen, F., Meijer, R., Wilson, R., & de Laat, C. (2017). Enabling e-science applications with dynamic optical networks: Secure autonomous response networks. In 2017 Optical Fiber Communications Conference and Exhibition (OFC): proceedings : Los Angeles, CA, USA, 19 March-23 March 2017 (pp. 1688-1690). OSA—The Optical Society. https://doi.org/10.1364/OFC.2017.Tu3E.1 [details]

    2015

    • Gommans, L., Vollbrecht, J., Gommans-de Bruijn, B., & de Laat, C. (2015). The Service Provider Group framework: A framework for arranging trust and power to facilitate authorization of network services. Future Generation Computer Systems, 45, 176-192. Advance online publication. https://doi.org/10.1016/j.future.2014.06.002 [details]

    2010

    • Matias, J., Jacob, E., Demchenko, Y., de Laat, C., & Gommans, L. (2010). Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks. In E. M. Macías López, A. Bogliolo, M. Perry, & M. Ran (Eds.), First International Conference on Access Networks, Services and Technologies (ACCESS 2010), Valencia, Spain (pp. 168-173). IEEE Computer Society. https://doi.org/10.1109/INTERNET.2010.37 [details]

    2009

    • Cristea, M. L., Strijkers, R. J., Marchal, D., Gommans, L., de Laat, C., & Meijer, R. J. (2009). Supporting communities in programmable grid networks: gTBN. In 2009 IFIP/IEEE International Symposium on Integrated Network Management (IM 2009): New York, NY, USA, 1-5 June 2009 (pp. 406-413). IEEE. https://doi.org/10.1109/INM.2009.5188842 [details]
    • Gommans, L., Xu, L., Demchenko, Y., Wan, A., Cristea, M., Meijer, R., & de Laat, C. (2009). Multi-domain lightpath authorization, using tokens. Future Generation Computer Systems, 25(2), 153-160. https://doi.org/10.1016/j.future.2008.07.013 [details]

    2008

    • Demchenko, Y., Mulmo, O., Gommans, L., de Laat, C., & Wan, A. (2008). Dynamic security context management in Grid-based applications. Future Generation Computer Systems, 24(5), 434-441. Advance online publication. https://doi.org/10.1016/j.future.2007.07.015 [details]

    2007

    • Cristea, M. L., Gommans, L., Xu, L., & Bos, H. (2007). The Token Based Switch: per-packet access authorisation to optical shortcuts. In I. F. Akyildiz, R. Sivakumar, E. Ekici, J. Cavalcante de Oliveira, & J. McNair (Eds.), NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet: 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007 : proceedings (pp. 945–957). (Lecture Notes in Computer Science; Vol. 4479). Springer. https://doi.org/10.1007/978-3-540-72606-7_81 [details]
    • Demchenko, Y., Gommans, L., & de Laat, C. (2007). Using SAML and XACML for complex authorisation scenarios in dynamic resource provisioning. In The Second International Conference on Availability, Reliability and Security, 2007: ARES 2007, 10-13 April 2007, Vienna, Austria (pp. 254-262). IEEE. https://doi.org/10.1109/ARES.2007.157 [details]
    • Demchenko, Y., Gommans, L., & de Laat, C. T. A. M. (2007). Extending User-Controlled Security Domain with TPM/TCG in Grid-based Virtual Collaborative Environment. In The 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007) (pp. 57-65). IEEE. [details]
    • Demchenko, Y., Gommans, L., & de Laat, C. T. A. M. (2007). Extending role based access control model for distributed multidomain applications. IFIP International Federation for Information Processing, 232, 301-312. http://www.scopus.com/scopus/inward/record.url?eid=2-s2.0-36248967031&partnerID=40&rel=R7.0.0 [details]
    • Demchenko, Y., Gommans, L., & de Laat, C. T. A. M. (2007). Using SAML and XACML for complex resource provisioning in grid based applications. In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007 (pp. 183-187) http://www.scopus.com/scopus/inward/record.url?eid=2-s2.0-34748845082&partnerID=40&rel=R7.0.0 [details]
    • Demchenko, Y., Siebenlist, F., Gommans, L., de Laat, C. T. A. M., Groep, D., & Koeroo, O. (2007). Security and dynamics in customer controlled virtual workspace organisation. In Proceedings of the 16th International Symposium on High Performance Distributed Computing 2007, HPDC'07 (pp. 231-232) http://www.scopus.com/scopus/inward/record.url?eid=2-s2.0-34548092907&partnerID=40&rel=R7.0.0 [details]
    • Dijkstra, F., van Oudenaarde, B., Andree, B., Gommans, L., Grosso, P., van der Ham, J., Koymans, K., & de Laat, C. (2007). A Terminology for Control Models at Optical Exchanges. In A. K. Bandara, & M. Burgess (Eds.), Inter-Domain Management: First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedings (pp. 49-60). (Lecture Notes in Computer Science; Vol. 4543). Springer. https://doi.org/10.1007/978-3-540-72986-0_5 [details]

    2006

    • Demchenko, Y., Gommans, L., & de Laat, C. T. A. M. (2006). Using VO Concept for Managing Dynamic Security Associations. In Security and Privacy in Dynamic Environments (pp. 377-388). Springer. http://www.springerlink.com/content/u72qw3m562860617/ [details]
    • Demchenko, Y., Gommans, L., Tokmakoff, A., & van Buuren, R. (2006). Policy Based Access Control in Dynamic Grid-based Collaborative Environment. In The 2006 International Symposium on Collaborative Technologies and Systems, Las Vegas, May 14-18, 2006, Proceedings (pp. 64-73). IEEE Computer Society. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1644117 [details]
    • Demchenko, Y., Gommans, L., de Laat, C. T. A. M., Taal, A., Wan, A., & Mulmo, O. (2006). Using Workflow for Dynamic Security Context Management in Complex Resource Provisioning. In Proceedings of the IEEE/ACM International Conference on Grid Computing (Grid 2006) (pp. 72-79). Barcelona, Spain: IEEE Computer Society. [details]
    • Demchenko, Y., de Laat, C., Gommans, L., & van Buuren, R. (2006). Domain Based Access Control Model for Distributed Collaborative Applications. In E-Science 2006 : Second IEEE International Conference on e-Science and Grid Computing: 4-6 December 2006, Amsterdam, Netherlands Article 24 IEEE Computer Society. https://doi.org/10.1109/E-SCIENCE.2006.261108 [details]
    • Gommans, L., van Oudenaarde, B., Wan, A., de Laat, C., Meijer, R., Travostino, F., & Monga, I. (2006). Token based networking: Experiment NL-101. Future Generation Computer Systems, 22(8), 1025-1031. https://doi.org/10.1016/j.future.2006.03.025 [details]
    • Meijer, R. J., Strijkers, R. J., Gommans, L., & De Laat, C. (2006). User programmable virtualized networks. In e-Science 2006 - Second IEEE International Conference on e-Science and Grid Computing Article 4031016 IEEE. https://doi.org/10.1109/E-SCIENCE.2006.261127
    • Travostino, F., Daspit, P., Gommans, L., Jog, C., de Laat, C., Mambretti, J., Monga, I., van Oudenaarde, B., Raghunath, S., & Wang, P. Y. (2006). Seamless live migration of virtual machines over the MAN/WAN. Future Generation Computer Systems, 22(8), 901-907. https://doi.org/10.1016/j.future.2006.03.007 [details]

    2005

    • Demchenko, Y., Gommans, L., De Laat, C., & Oudenaarde, B. (2005). Web services and grid security vulnerabilities and threats analysis and model. In Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing (pp. 262-267). Article 1542751 IEEE. https://doi.org/10.1109/GRID.2005.1542751
    • Demchenko, Y., Gommans, L., De Laat, C., Oudenaarde, B., Tokmakoff, A., & Snijders, M. (2005). Job-centric security model for open collaborative environment. In Proceedings - 2005 International Symposium on Collaborative Technologies and Systems (pp. 69-77). Article 1553296 IEEE. https://doi.org/10.1109/ISCST.2005.1553296
    • Van Oudenaarde, S., Hendrikse, Z., Dijkstra, F., Gommans, L., De Laat, C., & Meijer, R. J. (2005). Dynamic paths in multi-domain optical networks for grids. Future Generation Computer Systems, 21(4), 539-548. https://doi.org/10.1016/j.future.2004.10.008

    2004

    • Curti, C., Ferrari, T., Gommans, L., van Oudenaarde, S., Ronchieri, E., Giacomini, F., & Vistoli, C. (2004). On Advance Reservation of Heterogeneous Network Paths. Future Generation Computer Systems, 21(4), 525-538. https://doi.org/10.1016/j.future.2004.10.001 [details]
    • Gommans, L., Travostino, F., Vollbrecht, J., de Laat, C. T. A. M., & Meijer, R. J. (2004). Token-based authorization of Connection Oriented Network resources. In GRIDNETS conference proceedings [details]

    2003

    2016

    2006

    2002

    • Gommans, L., de Laat, C. T. A. M., van Oudenaarde, B., & Taal, A. (2002). Authorization of a QoS Path based on Generic AAA. (FGCS (IGRID2002)). Amsterdam: onbekend. [details]

    2016

    • Deljoo, A., Gommans, L., van Engers, T., & de Laat, C. (2016). An Agent-Based Framework for Multi-Domain service networks: Eduroam case study. In J. van den Herik, & J. Filipe (Eds.), ICAART 2016: proceedings of the 8th International Conference on Agents and Artificial Intelligence: February 24-26, 2016, in Rome, Italy (Vol. 1, pp. 275-280). SciTePress Science and Technology Publications. https://doi.org/10.5220/0005821502750280 [details]

    2016

    2024

    • Shakeri, S. (2024). SecConNet: Smart and secure container networks for trusted big data sharing. [Thesis, fully internal, Universiteit van Amsterdam]. [details]

    2022

    • Zhang, L. (2022). A policy compliance detection architecture for data exchange infrastructures. [Thesis, fully internal, Universiteit van Amsterdam]. [details]

    2021

    • Deljoo, A. (2021). Computational trust models for collaborative network orchestration. [Thesis, fully internal, Universiteit van Amsterdam]. [details]

    2014

    • Gommans, L. H. M. (2014). Multi-domain authorization for e-Infrastructures. [Thesis, fully internal, Universiteit van Amsterdam]. [details]
    This list of publications is extracted from the UvA-Current Research Information System. Questions? Ask the library or the Pure staff of your faculty / institute. Log in to Pure to edit your publications. Log in to Personal Page Publication Selection tool to manage the visibility of your publications on this list.
  • Ancillary activities
    • Air France KLM Group
      Werknemer IT Strategy & Technology Office, R&D