TEACHING RESEARCH PROJECTS PUBLICATIONS ACTIVITIES

Publications


C. Jensen:
"Why Zero Trust Architectures are Not Replacing Trust". In Proceedings of the 14th IFIP WG 11.11. International Conference on Trust Management (IFIPTM 2023), Amsterdam, The Netherlands, October 2023.

S. Afzal-Houshmand, D. Papamartzivanos, S. Homayoun, E. Veliou, C. Jensen, A. Voulodimos, T. Giannetsos:
"Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems". In Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus, June 2023.

K. Hageman, S. Homayoun, S. Afzal-Houshmand, C. Jensen, J.M. Pedersen:
"Detecting Ambiguous Phishing Certificates using Machine Learning" (Best Paper Award). In Proceedings of the 36th International Conference on Information Networking (ICOIN 2022), Jeju Island, Korea, January 2022.

W-Y. Chiu, W. Meng, C. Jensen:
"My data, my control: A secure data sharing and access scheme over blockchain". In Journal of Information Security and Applications, vol. 63, Elsevier, December 2021.

S. Sultan, C. Jensen:
"Metadata based need-to-know view in large-scale video surveillance systems". In Computers & Security, vol. 111, Elsevier, December 2021.

M. Anagnostopoulos, E. Kidmose, A. Laghaout, R.L. Olsen, S. Homayoun, C. Jensen, J.M. Pedersen:
"An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence". In Proceedings of the 15th International Conference on Network and System Security (NSS 2021), Tianjin, China, October 2021, pp. 185-201.

S. Furnell, P. Haskell-Dowland, M. Agrawal, R. Baskerville, A. Basu, M. Bishop, J. Cuellar, S. Foresti, L. Futcher, N. Gal-Oz, T. Herath, C. Jensen, A. Johnston, W. Joosen, G. Livraga, J. Lopez, S. Marsh, F. Martinelli, F. Massacci, A. Pasic, S. Schinagl, A. Shahim, K-L. Thomson, J. Vaidya, T. Vance, M. Warkentin:
"Information security and privacy–challenges and outlook". In Advancing Research in Information and Communication Technology (IFIPAICT, volume 600), August 2021, pp. 383-401.

S. Sultan, C. Jensen:
"Secondary Use Prevention in Large-Scale Data Lakes". In Procedings of the 2021 Computing Conference, Volume 3, Online, July 2021, (LNNS, volume 285), pp. 967-985.

E.O Nielsen, C. Jensen:
" Håndbog i Smart City Privacy" (in Danish). Published by the Secure Andvendelser af Data (SAnD) project in collaboration with Copenhagen Capital Region, (ISBN: 978-87-643-2004-6), June 2021.

S. Sultan, C. Jensen:
"Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control". In Sensors 21(9), April 2021.

D.A. Sepúlveda Estay, R. Sahay, M.B. Barfod, C. Jensen:
"Exploring CyberShip vulnerabilities through a Systems theoretic process approach". Available at SSRN 3753663, February 2021.

W-Y. Chiu, W. Meng, C. Jensen:
"ChainPKI-Towards Ethash-based Decentralized PKI with Privacy Enhancement". In Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC 2021), Aizuwakamatsu, Japan, January 2021.

W-Y. Chiu, W. Meng, C. Jensen:
"NoPKI-a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm". Proceedings of the Third International Conference on Frontiers in Cyber Security (FCS 2020), Tianjin, China, November 2020, pp. 197-214.

D.A. Sepúlveda Estay, R. Sahay, M.B. Barfod, C. Jensen:
"A systematic review of cyber-resilience assessment frameworks". Computers & Security, vol. 97, Elsevier, October 2020.

W. Meng, D. Gollmann, C. Jensen, J. Zhou:
"Information and Communications Security". Proceedigs of the 22nd International Conference (ICICS 2020), Copenhagen, Denmark, Springer Nature, August 2020.

S. Sultan, C. Jensen:
"Privacy-preserving measures in smart city video surveillance systems". In Proceedings of the 6th International Conference on Information Systems Security and Privacy, Valetta, Malta, Febryary 2020.

M.G. Danneskiold-Samsøe, J. Sørensen, C. Jensen, S. Afzal-Houshmand, M. Andersen, A. Pall Skött (Eds.):
" Håndbog i smart city sikkerhed" (in Danish). Published by Smart City Cybersecurity Lab in collaboration with Capital Region of Denmark, (ISBN: 978-87-971357-1-6), December 2019.

R. Sahay, W. Meng, D.A. Sepúlveda Estay, C. Jensen, M.B. Barfod:
"CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships". In Future Generation Computer Systems, Volume 100, November 2019, pp. 736-750.

R. Sahay, W. Meng, C. Jensen:
"The application of Software Defined Networking on securing computer networks: A survey". In Journal of Network and Computer Applications. 131, April 2019, pp. 89-108.

M.H. Bhuyan, N.A. Azad, W. Meng, C. Jensen:
"Analyzing the communication security between smartphones and IoT based on CORAS". In Proceedings of 12th International Conference on Network and System Security, Hong Kong, China, august 2018. Springer, Vol. 11058. p. 251-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

C. Jensen, M.B. Nielsen:
"CodeTrust: Trusting Software Systems". In Proceedings of the 12th IFIP WG 11.11 Conferece on Trust Management (IFIPTM 2018), Toronto, Canada, July 2018. Springer, Vol. 528. p. 58-74 (IFIP Advances in Information and Communication Technology, Vol. 528).

R. Sahay, D.A. Sepúlveda Estay, W. Meng, C Jensen, M.B. Barfod:
" CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems". In Proceedings of the International Conference on Science of Cyber Security. Springer, p. 191-198 (Lecture Notes in Computer Science, Vol. 11287).

O. Elaswad, C. Jensen:
"Identity Management for e-Government (Libya as a case study)". In Proceedings of the 15th International Information Security for South Africa Conference (ISSA'16), Johannesburg, South Africa, August 2016.

O. Elaswad, C. Jensen:
"Introducing E-Government in Developing Countries - with an analysis of the Egyptian e-Government services". In Proceedings of the IST-Africa 2016 Conference, Durban, South Africa, May 2016.


J. Guo, C. Jensen, J. Ma :
"Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control". In Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC'16), Pisa, Italy, April 2016.


Q. Rajpoot, C. Jensen, R. Krishnan:
"Attributes Enhanced Role-Based Access Control Model". In Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'15), Valencia, Spain, September 2015.


M. Fujita, S. Arimura, Y. Ikeya, C. Jensen and M. Nishigaki :
"Physical Trust-based Persistent Authentication ". In Proceedings of the 13th International Conference on Privacy, Security and Trust (PST 2015), Izmir, Turkey, July, 2015.


Q. Rajpoot, C. Jensen, R. Krishnan:
"Integrating Attributes into Role-Based Access Control". In Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Fairfax, Virginia, U.S.A., July 2015.


C. Jensen, S. Marsh, T. Dimitrakos, Y. Murayama (Eds.):
"Trust Management IX"". Proceedings of the 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 2015. Springer Verlag, 2015.    (ISBN: 978-3-319-18491-3)


J. Guo, C. Jensen, J. Ma:
"Continuous Context-­Aware Device Comfort Evaluation Method". In Proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2015), Hamburg, Germany, May, 2015.


Q. Rajpoot, C. Jensen:
"Video Surveillance: Privacy Issues and Legal Compliance". Chapter in Vikas Kumar and Jakob Svensson (Eds.) "Promoting Social Change and Democracy through Information Technology", IGI global, 2015.


Pierangela Samarati, Javier Lopez and Fabio Martinelli (Eds.):
Sections on "Trust Management" and "Crash Commission for cyber?" in ERCIM White paper on Cyber-security and privacy research Published by European Research Consortium on Informatics and Mathematics (ERCIM).


S. Mauw, C. Jensen (Eds.):
"Proceedings of the 10th International Workshop on Security and Trust Management (STM 2014)", in conjunction with 19th European Symposium on Research in Computer Security (ESORICS 2014), Wroclaw, Poland, September 2014, Springer Verlag (LNCS 8743).


J. Zhang, C. Jensen, Z. Noorian, S. Marsh (Eds.):
"Proceedings of the Second Workshop on Incentives and Trust in E-Communities (WIT-EC'13)", in association with the 28th AAAI Conference on Artificial Intelligence (AAAI'14), Quebec, Canada, July 2014.


G. Nielsen, M. Vedel, C. Jensen:
"Improving Usability of Passphrase Authentication". In Proceedings of the 12th International Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 2014.


C. Jensen:
"The Importance of Trust in Computer Security". In Proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2014), Singapore, July 2014. (Invited keynote paper)


Q. Rajpoot, C. Jensen:
"Security and Privacy in Video Surveillance: Requirements and Challenges". In Proceedings of the 29th IFIP International Information Security and Privacy (IFIP Sec), Marrakech, Marocco, June 2014.


C. Jensen:
"Hackerne skal kun vinde én gang for at have vundet". Invited starting contribution to a blog relay on IT-security in "DenOffentlige.dk".


M.I. Ingwar, C. Jensen:
"Remote Biometrics for Robust Persistent Authentication". In Proceedings of the 6th SETOP International Workshop on Autonomous and Spontaneous Security, in conjunction with the 18th annual European research event in Computer Security (ESORICS 2013), London, England, September 2013.    


J. Zhang, C. Jensen, Z. Noorian, Y. Liu (Eds.):
Proceedings of the Second Workshop on Incentives and Trust in E-Commerce (WIT-EC'13), in associateion with the 23rd International Joint Conference on Artificial Intelligence (IJCAI'13), Beijing, China, August 2013.


J. Castellà-Roca, J. Garcia-Alfaro, C. Jensen, V. Onut, V. Torra, J. Domingo-Ferrer, A.A. Ghorbani, J.A. Manjón, N. Stakhanova, J. Zhang (Eds.):
Proceedings of the 2013 Eleventh annual Conference on Privacy, Security and Trust (PST 2013), Taragona, Spain, July 2013.   (ISBN: 978-1-4673-5839-2)


M.I. Ingwar, N. Ahmed, C. Jensen.
"Error-Rate-based Fusion of Biometric Experts". In Proceedings of the 11th Annual Conference on Privacy, Security and Trust (PST 2013), Taragona, Spain, July 2013.


C. Jensen, K. Geneser, I.C. Willemows-Wissing.
"Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness". In Proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2013), Malaga, Spain, June 2013.


N. Ahmed, C. Jensen.
"Structured Intuition: a new methodology to analyse authentication protocols". In International Journal of Critical Computer-Based Systems, Vol. 3, No. 4, pp. 262-283, 2012.


N. Ahmed, C. Jensen, E. Zenner:
"Towards Symbolic Encryption Schemes". In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), Pisa, Italy, September 2012.

M. Stevanovic, K. Revsbech, J.M. Pedersen, R. Sharp, C. Jensen:
"A Collaborative Approach to Botnet Protection". In Proceedings of the 2nd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'12), in conjunction with ARES 2012, Prague, Czech Republic, August 2012.

K. Lindberg, C. Jensen:
"Collaborative Trust Evaluation for Wiki Security". In Proceedings of the Tenth Annual Conference on Privacy, Security and Trust (PST 2012), Paris, France, July 2012.

S. Marsh, J. Zhang, C. Jensen (Eds.):
Proceedings of the First Workshop on Incentives and Trust in E-Commerce (WIT-EC'12), in associateion with the 13th ACM Conference on Electronic Commerce (EC'12)), Valencia, Spain, June 2012.


K. Lindberg, C. Jensen:
"Document and Author Promotion Strategies in the Secure Wiki Model". In Proceedings of the Sixth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2012), Surat, India, May 2012.


N. Ahmed, C. Jensen:
"Post-Session Authentication". In Proceedings of the Sixth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2012), Surat, India, May 2012.


N. Ahmed, C. Jensen:
"Security of Dependable Systems". Chapter in Luigia Petre, Kaisa Sere and Elena Troubitsyna (Eds.) "Dependability and Computer Engineering: Concepts for Software-Intensive Systems", pp. 230-264, IGI Global, 2011.     (ISBN: 1-60960-747-3)

N. Ahmed, C. Jensen:
"Demarcation of Security in Authentication Protocols". In Proceedings of the 1st SysSec Workshop (SysSec 2011), Amsterdam, the Netherlands, July 2011.


C. Jensen:
"Building a Reputation System for Wikipedia". Chapter in Volker Wittke & Heidemarie Hanekop (Eds.): New Forms of Collaborative Innovation and Production on the Internet, pp. 89-111, Universitätsverlag Göttingen, 2011.    (ISBN: 978-3-86395-020-0)


I. Wakeman, E. Gudes, C. Jensen, J. Crampton (Eds.):
"Trust Management V"". Proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June/July 2011. Springer Verlag, 2011.    (ISBN: 978-3-642-22199-6)

N. Ahmed, D. Quercia, C. Jensen (Eds.):
"Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011)" (ISSN: 2079-2247), Copenhagen, Denmark, June 2011.


M. Ingwar, C. Jensen:
"Towards Secure Intelligent Buildings". In Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES'11), Copenhagen, Denmark, June 2011.


C. Jensen, P. Pilkauskas, T. Lefèvre:
"Classification of Recommender Expertise in the Wikipedia Recommender System". In Journal of Information Processing, Vol. 19, pp. 1-19, July 2011.


N. Ahmed, C. Jensen:
"Adaptable Authentication Model". In Proceedings of the 3rd International Symposium on Engineering Secure Software and Systems (ESSoS'11), Madrid, Spain, February 2011.


A. Nagarajan, C. Jensen:
"A Generic Role Based Access Control Model for Wind Power Systems". In Journal of Wireless Mobile Networks, Ubiquitous Computing, And Dependable Applications, Vol. 1, No. 4, pp. 35-49.


C. Jensen:
"Supporting Multi-Agent Reputation Calculation in the Wikipedia Recommender System". In IET Information Security, Vol. 4, No. 4, December 2010 (special issue on "Multi-Agent & Distributed Information Security").


C. Jensen, T. Lefèvre:
"Evaluating the Expertise of Recommenders in the Wikipedia Recommender System". In Short Paper Proceedings of IFIPTM 2010 (ISSN: 2079-2263), pp. 57-65, Morioka, Japan, June, 2010.


C. Jensen:
"The Role of Trust in Persistent Authentication". In Proceedings of the Joint International Workshop on Trust in Location and Communications in Decentralized Computing (TruLoCo 2010), Morioka, Japan, June, 2010.


A. Nagarajan, C. Jensen:
"A Generic Access Control Model for Wind Power Systems". In Proceedings of the International Workshop on Infrastructure Assurance (iWiA 2010), Morioka, Japani, June 2010.


C. Jensen: "NODES'10". Proceedings of the 4th Nordic Workshop on Dependability and Security, Copenhagen, Denmark, June, 2010.


N. Ahmed, C. Jensen:
"Entity Authentication: Analysis using Structured Intuition". In Proceedings of the 4th Nordic Workshop on Dependability and Security, pp. 71-84, Copenhagen, Denmark, June, 2010.


N. Ahmed, C. Jensen:
"Definition of Entity Authentication". In Proceedings of the 2nd International Workshop on Security and Communication Networks, Karlstad, Sweden, May, 2010.


N. Ahmed, C. Jensen:
"A Mechanism for Identity Delegation at Authentication Level". In Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009), pp. 148-162, Oslo, Norway, October, 2009.


C.A. Ardagna, S. De Capitani di Vimercati, C.D. Jensen, R. Küsters:
"STM 2009". Pre-Proceedings of the 5th International Workshop on Security and Trust Management, in association with ESORICS 2009, St. Malo, France, September, 2009.


N. Ahmed, C. Jensen:
"Context-Aware Identity Delegation". In Proceedings of of European Context Awareness and Trust 2009 (EuroCAT09), the 3rd Workshop on Combining Context with Trust, Security, and Privacy, Pisa, Italy, September 2009.


H. Akram, C. Jensen, M. Hoffmann:
"Identity Metasystem in Location Based Persistent Authentication". In Proceedings of European Context Awareness and Trust 2009 (EuroCAT09), the 3rd Workshop on Combining Context with Trust, Security and Privacy, Pisa, Italy, September 2009.


T. Korsgaard, C. Jensen:
"Reengineering the Wikipedia for Reputation". In Electronic Notes in Theoretical Computer Science, Vol. 244, pp. 81-94, Elsevier, August, 2009.
Journal version of STM 2008 paper.


C. Jensen:
"Security in Wiki-Style Authoring Systems". In Proceedings of the Third IFIP International Conference on Trust Management (IFIPTM'09), pp. 81-98. West Lafayette, Indiana, U.S.A., June, 2009.


T. Lefévre, C. Jensen, T. Korsgaard:
"WRS: The Wikipedia Recommender System". In Proceedings of the Third IFIP International Conference on Trust Management (IFIPTM'09), pp. 298-301. West Lafayette, Indiana, U.S.A., June, 2009.


N. Ahmed, C. Jensen:
"An Authentication Framework for Nomadic Users". In Proceedings of the First NOrdic workshop and doctoral symposium on DEpendability and Security (NODES'09), Linköping, Sweden, April 2009.


C. Jensen, T. Korsgaard:
"Dynamics of Trust Evolution: Auto-configuration of dispositional trust dynamics". In Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), pp. 509-517, Porto, Portugal, July, 2008.

Y. Karabulut, J. Mitchell, P. Herrmann, C. Jensen (Eds.):
"Trust Management II". Proceedings of the IFIPTM 2008 - Joint iTrust and PST Conferences on Privacy, Trust Management and Security. Springer Verlag, 2008.    (ISBN: 978-0-387-09427-4)

T. Korsgaard, C. Jensen:
"Reengineering the Wikipedia for Reputation". In Proceedings of the 4th International Workshop on Security and Trust Management (STM 08), pp. 71-84, Trondheim, Norway, June, 2008.


M. Hansen, M. Kirshmeyer, C. Jensen:
"Persistent Authentication in Smart Environments". In Proceedings of the 2nd International Workshop on Combining Context with Trust, Security, and Privacy, pp. 31-44, Trondheim, Norway, June, 2008.


T. Jansen, S. Peen, C. Jensen:
"Practical Privacy Assessments". Chapter in Online Consumer Protection: Theories of Human Relativism, by Kuanchin Chen and Adam Fadlalla (Eds.), IGI Global., 2008.   (ISBN: 978-1-60566-012-7)


E. Jónsson, C. Jensen:
"Co-Authentication: An Authentication Paradigm for the Global Computing Infrastructure". In Proceedings of the NODES 07 - NOrdic workshop and doctoral symposium on DEpendability and Security, Oslo, Norway, October 2007.


C. Jensen, R. Sharp:
"Trust Management in Open Grid Systems". In Proceedings of the NODES 07 - NOrdic workshop and doctoral symposium on DEpendability and Security, Oslo, Norway, October 2007.


S. Peen, T. Jansen, C. Jensen:
"Assessment of Privacy in Government IT systems". In Proceeding of the First International Workshop on Sustaining Privacy in Autonomous Collaborative Environments (SPACE 2007), pp. 56--66, Moncton, Canada, July 2007.


C. Jensen, F. Meira, J. Nittegaard-Nielsen:
"Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises". In Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, pp. 383-398, Moncton, Canada, July-August 2007.


C. Jensen:
"Integrity in in Open Collaborative Authoring Systems". In Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, pp. 399-402, Moncton, Canada, July-August 2007.


S. Farrell, C. Jensen:
""End-by-hop" Data Integrity". In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (LNCS 4572), pp. 142-155, Cambridge, UK, July 2007.

J-M. Seigneur, C. Jensen:
"User-centric Identity, Trust and Privacy". Chapter in Trust in E-Services: Technologies, Practices and Challenges, by Ronggong Song et al. (Eds.), IDEA Group Inc., 2007.   (ISBN: 978-1-59904-207-7)


B. Pajkovski, C. Jensen:
"PayBAC: A Payment Based Access Control Mechanism". In Proceedings of the 11th Nordic Workshop on Secure IT-Systems (NordSec 2006), pp. 145-156, Linköping, Sweden, October 2006.


D. Søndergaard, C.W. Probst, C. Jensen, R.R. Hansen:
"Program Partitioning Using Dynamic Trust Models". In Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust (FAST2006), Hamilton, Ontario, Canada, August 2006.


E. Gray, C. Jensen, P. O'Connell, S. Weber, J-M. Seigneur, Y. Chen:
"Trust Evolution Policies for Security in Collaborative Ad Hoc Applications". In Electronic Notes in Theoretical Computer Science, Vol. 157, No. 3, pp. 95-111, Elsevier, May 2006.
Journal publication of STM 2005 paper.


C. Jensen, P. O'Connell:
"Trust-Based Route Selection in Dynamic Source Routing". In Proceedings of the 4th International Conference on Trust Management, pp. 150-163, Pisa, Italy, May 2006.


E. Gray, C. Jensen, Paul O'Connell, Stefan Weber, J-M. Seigneur, Y. Chen:
"Trust Evolution Policies for Security in Collaborative Ad Hoc Applications". In Proceedings of the 1st International Workshop on Security and Trust Management, Milan, Italy, September 2005.


J-M. Seigneur, A. Gray, C. Jensen:
"Trust Transfer: Encouraging Self-Recommendations without Sybil Attack". In Proceedings of the 3rd International Conference on Trust Management, Paris, France, May 2005.


C. Jensen, J. Krogh:
"Security in open Grid systems". In Public Service Review: Nordic States, Winter 2004 Issue, PSCA International Ltd., January 2005.


J-M. Seigneur, C. Jensen:
"The Claim Tool Kit for ad hoc recognition of peer entities". In Science of Computer Programming, Vol. 54, No. 1, pp 49-71, Elsevier, January 2005.


S.J. Engberg, M.B. Harning, C. Jensen:
"Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience". In Proceedings of Second Annual Conference on Privacy, Security and Trust, pp. 47-58, New Brunswick, Canada, October 2004.


J-M. Seigneur, N. Dimmock, C. Bryce, C. Jensen:
"Combating Spam with TEA (Trusted Email Addresses)". In Proceedings of Second Annual Conference on Privacy, Security and Trust, pp. 89-101, New Brunswick, Canada, October 2004.


S. Farrell, J-M. Seigneur, C. Jensen:
"Security in Exotic Wireless Networks". In NATO Computer and Systems Sciences Series III vol 193 "Security and Privacy in Advanced Networking Technologies", ISBN 1 58603 430 8, ISSN, 1 387-6694, IOS Press, 2004.


J-M. Seigneur, C. Jensen:
"The Role of Identity in Computational Trust". In Proceedings of The First Workshop on Security and Privacy at the Conference on Pervasive Computing, Vienna, Austria, April 2004.


C. Jensen, S. Poslad, T. Dimitrakos (Eds.):
"Trust Management, Second International Conference". Lecture Notes in Computer Science 2995, Springer Verlag, 2004.


J-M. Seigneur, C. Jensen:
"Trading Privacy for Trust". In Proceedings of the 2nd International Conference on Trust Management, pp. 93-107, Oxford, UK, March 2004.


J-M. Seigneur, C. Jensen:
"Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss". In Proceedings of the 19th Annual ACM Symposium on Applied Computing: Track on Ubiquitous Computing Applications, Nicosia, Cyprus, March 2004.


E. Gray, Y. Chen, C. Jensen:
"Initial Investigation into Cross-Context Trust and Risk Assessment". In Proceedings of the International Conference on Communication, Network, and Information Security, New York, U.S.A., December 2003.


J-M. Seigneur, C. Jensen:
"Privacy Recovery with Disposable Email Addresses". In IEEE Security and Privacy, Vol. 1, No. 6, November-December, 2003.


Y. Chen, C. Jensen, E. Gray, V. Cahill and J-M Seigneur:
"A General Risk Assessment of Security in Pervasive Computing". Technical Report TCD-CS-2003-45, Department of Computer Science, Trinity College Dublin, 6 November 2003.


S. Farrell, C. Jensen:
"Scaling an Interplanetary Internet". In Proceedings of the International Conference on Recent Advances in Space Technologies (RAST 2003), Istanbul, Turkey, November 2003.


S. Farrell, C. Jensen:
"Trajectory Based Addressing". In Proceedings of the 8th Cabernet Radicals Workshop, Ajacio, Corsica, October 2003.


J-M. Seigneur, A. Lambert, P. G. Argyroudis and C. Jensen:
"PR3 Email Honeypot". Technical Report TCD-CS-2003-39, Department of Computer Science, Trinity College Dublin, 12 September 2003.


V. Cahill, E. Gray, J-M. Seigneur, C.D. Jensen, Y. Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English, W. Wagealla, S. Terzis, P. Nixon, G. di Marzo Serugendo, C. Bryce, M. Carbone, K. Krukow, M. Nielsen:
"Using trust for secure collaboration in uncertain environments". In IEEE Pervasive computing, Vol. 2(3), pp. 52-61, July-September 2003.


J-M. Seigneur, G. Biegel, C. Jensen:
"P2P with JXTA-Java pipes". In Proceedings of the 2nd International Conference on the Principles and Practice of Programming in Java, Kilkenny City, Ireland, June 2003.


Y. Chen, C. Jensen, E. Gray, J-M. Seigneur:
"Risk Probability Estimating Based on Clustering". In Proceedings of the 4th IEEE Anual Information Assurance Workshop, West Point, New York, U.S.A., June 2003.


A. Harrington, C. Jensen:
"Cryptographic Access Control in a Distributed File System". In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 158-165, Como, Italy, June 2003.


J. Abendroth, C. Jensen:
"Partial Outsourcing: A New Paradigm for Access Control". In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 134-141, Como, Italy, June 2003.


E. Gray and J.-M. Seigneur and C. Yong and C. Jensen:
"Trust Propagation in Small Worlds". In Proceedings of the First International Conference on Trust Management, pp. 239-254, Heraklion, Crete, Grece, May 2003.


J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"Towards security auto-configuration for smart appliances". In Proceedings of the Smart Objects Conference, Grenoble, France, May 2003.


J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"End-to-end trust in pervasive computing starts with recognition". In Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, March 2003.


J. Abendroth, C. Jensen:
"A Unified Security Framework for Networked Applications". In Proceedings of the Eighteenth ACM Symposium on Applied Computing, Melbourne, Florida, U.S.A., March 2003.


E. Gray, P. O'Connell, C. Jensen, S. Weber, J-M. Seigneur, C. Yong:
"Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications". Technical Report TCD-CS-2002-66, Department of Computer Science, Trinity College Dublin, December 2002.


J-M. Seigneur, J. Abendroth, C. Jensen:
"Bank Accounting and Ubiquitous Brokering of Trustos". In proceedings of the 7th Cabernet Radicals Workshop, Bertinoro, Italy, October 2002.


J-M. Seigneur, S. Farrell, C. Jensen:
"Secure Ubiquitous Computing based on Entity Recognition". In UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002.


C. Jensen:
"Secure Environments for Collaboration among Ubiquitous Roaming Entities". In Proceedings of the First Internal iTrust Workshop on Trust Management in Dynamic Open Systems, Glasgow, Scotland, September 2002.


J. Andersson, C. Jensen, S. Weber:
"PEM3 - the Policy Enhanced Memory Management Model". In Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, California, U.S.A., June 2002.


C. Jensen:
"Secure Collaboration in Global Computing Systems". In ERCIM NEWS, No. 49, April 2002.


C. Jensen:
"Fingerprinting Text in Logical Markup Languages". In Proceedings of the 2001 Information Security Conference, Malaga, Spain, October 2001.


J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM on a single address space architecture". In proceedings of the 4th International Conference on SCI-based Technology and Research, Dublin, Ireland, October 2001.


J. Regan, C. Jensen:
"Capability File Names: Separating Authorisation from User Management in an Internet File System". In Proceedings of the 2001 USENIX Security Symposium, pp. 221-234, Washington D.C., U.S.A., August 2001.


J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM featuring a single address space architecture". In Proceedings of the USENIX Java Virtual Machine Research and Technology Symposium, Monterey, California, U.S.A., April 2001.


B. Aziz, C. Jensen:
"Adaptability in CORBA: the Mobile Proxy Approach". In Proceedings of the 2nd Symposium on Distributed Objects & Applications, pp. 295-305, Antwerp, Belgium, September 2000.


C. Jensen:
"CryptoCache: A Secure Sharable File Cache for Roaming Users". In Proceedings of the Ninth ACM SIGOPS European Workshop, Kolding, Denmark, September 2000.


C. Jensen, M. Haahr:
"Towards a Security Framework for Ad-hoc Applications". In Proceedings of the 2nd Workshop on Distributed Object Security, In association with OOPSLA'99, Denver, USA, November 1999.


C. Jensen:
"Un modèle de contrôle générique et sa réalisation dans la mémoire virtuelle répartie unique Arias". Ph.D. Thesis, Université Joseph Fourier (Grenoble I), October 1999.


J. Vitek and C.D. Jensen (Eds.):
"Secure Internet Programming". Lecture Notes in Computer Science 1603, Springer Verlag, 1999.


C. Jensen, G. Coulouris and D. Hagimont:
"Distributed Object Security". Chapter in Serge Demeyer and Jan Bosch (Eds.): "Object-Oriented Technology: ECOOP'98 Workshop Reader", Lecture Notes in Computer Science 1543, pp. 273-287, Springer Verlag, 1998.


C. Jensen, D. Hagimont:
"Protection Wrappers". In Proceedings of the Eighth ACM SIGOPS European Workshop, Sintra, Portugal, September 1998.


C. Jensen:
"Secure Software Architectures". In Proceedings of the Eighth Nordic Workshop on Programming Environment Research, pp. 239-246, Ronneby, August 1998.


C. Jensen (Editor):
Joint Proceedings of the ECOOP Workshop on Distributed Object Security and the 4th Workshop on Mobile Object Systems (Secure Internet Mobile Computations), In association with ECOOP'98, Brussels, Belgium, July 1998.


C. Jensen and D. Hagimont:
"Mutual Suspicion in a Generic Object-Support System". In Proceedings of the ECOOP Workshop on Distributed Object Security, pp. 15-20, Brussels, Belgium, July 1998.


C. Jensen and D. Hagimont:
"Protection Reconfiguration for Reusable Software". In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering, pp. 74-80, Florence, Italy, March 1998.


C. Jensen:
"Reducing Complexity of Distributed Application Protection". 4th Cabernet Radicals Workshop, Rithymnon, Crete, September 1997.


C. Jensen and L. Ismail:
"Capability Based Protection for Hosting Mobile Code". In Proceedings of the 2nd European Research Seminar on Advances in Distributed Systems, pp. 234-240, Zinal, Switzerland, March 1997.


C. Jensen:
"Fine-grained load distribution in object based systems. An experiment with grain sizes in Guide2". In Calculateurs Parallèles, pp. 31-48, Vol. 8, No. 1, 1996.


C. Jensen:
"An Investigation of Grain Sizes of Load Distribution in an Object Based System". In Proceedings of Journées de Recherche sur Le Placement Dynamique et la Répartition de Charge : Application aux Systèmes Répartis et Parallès, Paris, May 1995.


C. Jensen:
"Load Distribution in the Guide-2 operating system". System Implementors Workshop at ECOOP'94, Bologna, Italy, July 1994.

 
Christian Damsgaard Jensen
Richard Petersens Plads
Building 324, Office 211
Technical University of Denmark
2800 Kgs. Lyngby, Denmark
    Telephone: +45 4525 3351
Direct line: +45 4525 3724
e-mail: Christian.Jensen@imm.dtu.dk