|
Publications
C. Jensen: "Why Zero Trust Architectures are Not Replacing Trust". In Proceedings of
the 14th IFIP WG 11.11. International Conference on Trust Management (IFIPTM 2023), Amsterdam, The Netherlands,
October 2023.
S. Afzal-Houshmand, D. Papamartzivanos, S. Homayoun, E. Veliou, C. Jensen, A. Voulodimos,
T. Giannetsos: "Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing
Systems". In Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and
the Internet of Things (DCOSS-IoT), Pafos, Cyprus, June 2023.
K. Hageman, S. Homayoun, S. Afzal-Houshmand, C. Jensen, J.M. Pedersen: "Detecting Ambiguous
Phishing Certificates using Machine Learning" (Best Paper Award). In Proceedings of the 36th
International Conference on Information Networking (ICOIN 2022), Jeju Island, Korea, January 2022.
W-Y. Chiu, W. Meng, C. Jensen: "My data, my control: A secure data sharing and access
scheme over blockchain". In Journal of Information Security and Applications, vol. 63, Elsevier, December 2021.
S. Sultan, C. Jensen: "Metadata based need-to-know view in large-scale video surveillance
systems". In Computers & Security, vol. 111, Elsevier, December 2021.
M. Anagnostopoulos, E. Kidmose, A. Laghaout, R.L. Olsen, S. Homayoun, C. Jensen, J.M. Pedersen:
"An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence".
In Proceedings of the 15th International Conference on Network and System Security (NSS 2021), Tianjin, China,
October 2021, pp. 185-201.
S. Furnell, P. Haskell-Dowland, M. Agrawal, R. Baskerville, A. Basu, M. Bishop, J. Cuellar,
S. Foresti, L. Futcher, N. Gal-Oz, T. Herath, C. Jensen, A. Johnston, W. Joosen, G. Livraga, J. Lopez,
S. Marsh, F. Martinelli, F. Massacci, A. Pasic, S. Schinagl, A. Shahim, K-L. Thomson, J. Vaidya, T. Vance,
M. Warkentin: "Information security and privacy–challenges and outlook". In Advancing Research
in Information and Communication Technology (IFIPAICT, volume 600), August 2021, pp. 383-401.
S. Sultan, C. Jensen: "Secondary Use Prevention in Large-Scale Data Lakes".
In Procedings of the 2021 Computing Conference, Volume 3, Online, July 2021, (LNNS, volume 285), pp. 967-985.
E.O Nielsen, C. Jensen: "
Håndbog i Smart City Privacy" (in Danish).
Published by the Secure Andvendelser af Data (SAnD) project in collaboration with Copenhagen Capital Region,
(ISBN: 978-87-643-2004-6), June 2021.
S. Sultan, C. Jensen: "Ensuring Purpose Limitation in Large-Scale Infrastructures
with Provenance-Enabled Access Control". In Sensors 21(9), April 2021.
D.A. Sepúlveda Estay, R. Sahay, M.B. Barfod, C. Jensen: "Exploring CyberShip vulnerabilities
through a Systems theoretic process approach". Available at SSRN 3753663, February 2021.
W-Y. Chiu, W. Meng, C. Jensen: "ChainPKI-Towards Ethash-based Decentralized PKI with
Privacy Enhancement". In Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC 2021),
Aizuwakamatsu, Japan, January 2021.
W-Y. Chiu, W. Meng, C. Jensen: "NoPKI-a Point-to-Point Trusted Third Party Service Based
on Blockchain Consensus Algorithm". Proceedings of the Third International Conference on Frontiers in Cyber
Security (FCS 2020), Tianjin, China, November 2020, pp. 197-214.
D.A. Sepúlveda Estay, R. Sahay, M.B. Barfod, C. Jensen: "A systematic review of
cyber-resilience assessment frameworks". Computers & Security, vol. 97, Elsevier, October 2020.
W. Meng, D. Gollmann, C. Jensen, J. Zhou: "Information and
Communications Security". Proceedigs of the 22nd International Conference (ICICS 2020), Copenhagen,
Denmark, Springer Nature, August 2020.
S. Sultan, C. Jensen: "Privacy-preserving measures in smart city video surveillance
systems". In Proceedings of the 6th International Conference on Information Systems Security and Privacy,
Valetta, Malta, Febryary 2020.
M.G. Danneskiold-Samsøe, J. Sørensen, C. Jensen, S. Afzal-Houshmand, M. Andersen,
A. Pall Skött (Eds.): "
Håndbog i smart city sikkerhed" (in Danish). Published by Smart City Cybersecurity Lab in
collaboration with Capital Region of Denmark, (ISBN: 978-87-971357-1-6), December 2019.
R. Sahay, W. Meng, D.A. Sepúlveda Estay, C. Jensen, M.B. Barfod: "CyberShip-IoT: A Dynamic
and Adaptive SDN-Based Security Policy Enforcement Framework for Ships". In Future Generation Computer
Systems, Volume 100, November 2019, pp. 736-750.
R. Sahay, W. Meng, C. Jensen: "The application of Software Defined Networking on securing
computer networks: A survey". In Journal of Network and Computer Applications. 131, April 2019, pp. 89-108.
M.H. Bhuyan, N.A. Azad, W. Meng, C. Jensen: "Analyzing the communication security between
smartphones and IoT based on CORAS". In Proceedings of 12th International Conference on Network and System
Security, Hong Kong, China, august 2018. Springer, Vol. 11058. p. 251-265 (Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).
C. Jensen, M.B. Nielsen: "CodeTrust: Trusting Software Systems". In Proceedings of
the 12th IFIP WG 11.11 Conferece on Trust Management (IFIPTM 2018), Toronto, Canada, July 2018. Springer,
Vol. 528. p. 58-74 (IFIP Advances in Information and Communication Technology, Vol. 528).
R. Sahay, D.A. Sepúlveda Estay, W. Meng, C Jensen, M.B. Barfod: " CyberShip: An SDN-based
Autonomic Attack Mitigation Framework for Ship Systems". In Proceedings of the International Conference on
Science of Cyber Security. Springer, p. 191-198 (Lecture Notes in Computer Science, Vol. 11287).
O. Elaswad, C. Jensen: "Identity Management for e-Government (Libya as a case study)".
In Proceedings of the 15th International Information Security for South Africa Conference (ISSA'16),
Johannesburg, South Africa, August 2016.
O. Elaswad, C. Jensen: "Introducing E-Government in Developing Countries -
with an analysis of the Egyptian e-Government services". In Proceedings of the IST-Africa 2016 Conference,
Durban, South Africa, May 2016.
J. Guo, C. Jensen, J. Ma : "Feasibility study of context-awareness device comfort
calculation methods and their application to comfort-based access control". In Proceedings of the 31st Annual
ACM Symposium on Applied Computing (SAC'16), Pisa, Italy, April 2016.
Q. Rajpoot, C. Jensen, R. Krishnan: "Attributes Enhanced Role-Based Access Control
Model". In Proceedings of the 12th International Conference on Trust, Privacy and Security
in Digital Business (TrustBus'15), Valencia, Spain, September 2015.
M. Fujita, S. Arimura, Y. Ikeya, C. Jensen and M. Nishigaki : "Physical Trust-based
Persistent Authentication ". In Proceedings of the 13th International Conference on Privacy,
Security and Trust (PST 2015), Izmir, Turkey, July, 2015.
Q. Rajpoot, C. Jensen, R. Krishnan: "Integrating Attributes into Role-Based Access
Control". In Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications
Security and Privacy (DBSec 2015), Fairfax, Virginia, U.S.A., July 2015.
C. Jensen, S. Marsh, T. Dimitrakos, Y. Murayama (Eds.):
"Trust Management IX"". Proceedings of the 9th IFIP
WG 11.11 International Conference, IFIPTM 2015, Hamburg,
Germany, May 2015.
Springer Verlag, 2015. (ISBN: 978-3-319-18491-3)
J. Guo, C. Jensen, J. Ma: "Continuous Context-Aware Device Comfort Evaluation
Method". In Proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management
(IFIPTM 2015), Hamburg, Germany, May, 2015.
Q. Rajpoot, C. Jensen: "Video Surveillance: Privacy Issues and Legal Compliance".
Chapter in Vikas Kumar and Jakob Svensson (Eds.) "Promoting Social Change and Democracy through
Information Technology", IGI global, 2015.
Pierangela Samarati, Javier Lopez and Fabio Martinelli (Eds.):
Sections on "Trust Management" and "Crash Commission for cyber?" in
ERCIM White paper on Cyber-security and privacy research Published by
European Research Consortium on Informatics and Mathematics (ERCIM).
S. Mauw, C. Jensen (Eds.): "Proceedings of the 10th International Workshop on Security
and Trust Management (STM 2014)", in conjunction with 19th European Symposium on Research in Computer
Security (ESORICS 2014), Wroclaw, Poland, September 2014, Springer Verlag (LNCS 8743).
J. Zhang, C. Jensen, Z. Noorian, S. Marsh (Eds.): "Proceedings of the Second Workshop
on Incentives and Trust in E-Communities (WIT-EC'13)", in association with the 28th AAAI Conference
on Artificial Intelligence (AAAI'14), Quebec, Canada, July 2014.
G. Nielsen, M. Vedel, C. Jensen: "Improving Usability of Passphrase Authentication".
In Proceedings of the 12th International Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada,
July 2014.
C. Jensen: "The Importance of Trust in Computer Security". In Proceedings of the 8th
IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2014), Singapore, July 2014.
(Invited keynote paper)
Q. Rajpoot, C. Jensen: "Security and Privacy in Video Surveillance:
Requirements and Challenges". In Proceedings of the 29th IFIP International Information Security and
Privacy (IFIP Sec), Marrakech, Marocco, June 2014.
C. Jensen:
"Hackerne skal kun vinde én gang for at have vundet". Invited
starting contribution to a blog relay on IT-security in "DenOffentlige.dk".
M.I. Ingwar, C. Jensen: "Remote Biometrics for Robust Persistent
Authentication". In Proceedings of the 6th SETOP International Workshop on
Autonomous and Spontaneous Security, in conjunction with the 18th annual European research
event in Computer Security (ESORICS 2013), London, England, September 2013.
J. Zhang, C. Jensen, Z. Noorian, Y. Liu (Eds.):
Proceedings of the Second Workshop on Incentives and Trust in E-Commerce
(WIT-EC'13), in associateion with the 23rd International Joint Conference on Artificial
Intelligence (IJCAI'13), Beijing, China, August 2013.
J. Castellà-Roca, J. Garcia-Alfaro, C. Jensen, V. Onut, V. Torra, J. Domingo-Ferrer,
A.A. Ghorbani, J.A. Manjón, N. Stakhanova, J. Zhang (Eds.):
Proceedings of the 2013 Eleventh annual Conference on Privacy, Security and Trust (PST 2013),
Taragona, Spain, July 2013. (ISBN: 978-1-4673-5839-2)
M.I. Ingwar, N. Ahmed, C. Jensen. "Error-Rate-based Fusion of Biometric
Experts". In Proceedings of the 11th Annual Conference on Privacy, Security and Trust (PST 2013),
Taragona, Spain, July 2013.
C. Jensen, K. Geneser, I.C. Willemows-Wissing. "Sensor Enhanced Access Control:
Extending Traditional Access Control Models with Context-Awareness". In Proceedings of the 7th
IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2013), Malaga, Spain, June 2013.
N. Ahmed, C. Jensen. "Structured Intuition: a new methodology to analyse
authentication protocols". In International Journal of Critical Computer-Based Systems,
Vol. 3, No. 4, pp. 262-283, 2012.
N. Ahmed, C. Jensen, E. Zenner: "Towards Symbolic Encryption
Schemes". In Proceedings of the 17th European Symposium on Research in Computer
Security (ESORICS 2012), Pisa, Italy, September 2012.
M. Stevanovic, K. Revsbech, J.M. Pedersen, R. Sharp, C. Jensen:
"A Collaborative Approach to Botnet Protection". In Proceedings of the
2nd IFIP International Workshop on Security and Cognitive Informatics for Homeland
Defense (SeCIHD'12), in conjunction with ARES 2012, Prague, Czech Republic,
August 2012.
K. Lindberg, C. Jensen: "Collaborative Trust
Evaluation for Wiki Security". In Proceedings of the Tenth Annual
Conference on Privacy, Security and Trust (PST 2012), Paris, France,
July 2012.
S. Marsh, J. Zhang, C. Jensen (Eds.):
Proceedings of the First Workshop on Incentives and Trust in E-Commerce
(WIT-EC'12), in associateion with the 13th ACM Conference on Electronic
Commerce (EC'12)), Valencia, Spain, June 2012.
K. Lindberg, C. Jensen: "Document and Author
Promotion Strategies in the Secure Wiki Model". In Proceedings
of the Sixth IFIP WG 11.11 International Conference on Trust
Management (IFIPTM 2012), Surat, India, May 2012.
N. Ahmed, C. Jensen: "Post-Session
Authentication". In Proceedings of the Sixth IFIP WG 11.11
International Conference on Trust Management (IFIPTM 2012), Surat,
India, May 2012.
N. Ahmed, C. Jensen: "Security of Dependable
Systems". Chapter in Luigia Petre, Kaisa Sere and Elena
Troubitsyna (Eds.) "Dependability and Computer Engineering:
Concepts for Software-Intensive Systems", pp. 230-264,
IGI Global, 2011. (ISBN: 1-60960-747-3)
N. Ahmed, C. Jensen: "Demarcation of
Security in Authentication Protocols". In Proceedings of
the 1st SysSec Workshop (SysSec 2011), Amsterdam, the
Netherlands, July 2011.
C. Jensen: "Building a Reputation System
for Wikipedia". Chapter in Volker Wittke & Heidemarie Hanekop
(Eds.): New Forms of Collaborative Innovation and Production on
the Internet, pp. 89-111, Universitätsverlag
Göttingen, 2011. (ISBN: 978-3-86395-020-0)
I. Wakeman, E. Gudes, C. Jensen, J. Crampton (Eds.):
"Trust Management V"". Proceedings of the 5th IFIP
WG 11.11 International Conference, IFIPTM 2011, Copenhagen,
Denmark, June/July 2011. Springer Verlag,
2011. (ISBN: 978-3-642-22199-6)
N. Ahmed, D. Quercia, C. Jensen (Eds.): "Workshop
Proceedings of the Fifth IFIP WG 11.11 International Conference
on Trust Management (IFIPTM 2011)" (ISSN: 2079-2247),
Copenhagen, Denmark, June 2011.
M. Ingwar, C. Jensen:
"Towards Secure Intelligent Buildings". In Proceedings
of the 5th Nordic Workshop on Dependability and Security
(NODES'11), Copenhagen, Denmark, June 2011.
C. Jensen, P. Pilkauskas, T. Lefèvre:
"Classification of Recommender Expertise in the Wikipedia
Recommender System". In Journal of Information Processing,
Vol. 19, pp. 1-19, July 2011.
N. Ahmed, C. Jensen: "Adaptable Authentication
Model". In Proceedings of the 3rd International Symposium on
Engineering Secure Software and Systems (ESSoS'11), Madrid, Spain,
February 2011.
A. Nagarajan, C. Jensen: "A Generic
Role Based Access Control Model for Wind Power Systems".
In Journal of Wireless Mobile Networks, Ubiquitous Computing,
And Dependable Applications, Vol. 1, No. 4, pp. 35-49.
C. Jensen: "Supporting Multi-Agent
Reputation Calculation in the Wikipedia Recommender
System". In IET Information Security, Vol. 4, No. 4, December 2010 (special issue on
"Multi-Agent & Distributed Information Security").
C. Jensen, T. Lefèvre: "Evaluating
the Expertise of Recommenders in the Wikipedia Recommender
System". In Short Paper Proceedings of IFIPTM 2010 (ISSN:
2079-2263), pp. 57-65, Morioka, Japan, June, 2010.
C. Jensen: "The Role of Trust in Persistent
Authentication". In Proceedings of the Joint International
Workshop on Trust in Location and Communications in
Decentralized Computing (TruLoCo 2010), Morioka, Japan, June,
2010.
A. Nagarajan, C. Jensen: "A Generic Access
Control Model for Wind Power Systems". In Proceedings of
the International Workshop on Infrastructure Assurance (iWiA
2010), Morioka, Japani, June 2010.
C. Jensen: "NODES'10". Proceedings of the
4th Nordic Workshop on Dependability and Security, Copenhagen,
Denmark, June, 2010.
N. Ahmed, C. Jensen: "Entity
Authentication: Analysis using Structured Intuition". In
Proceedings of the 4th Nordic Workshop on Dependability and
Security, pp. 71-84, Copenhagen, Denmark, June, 2010.
N. Ahmed, C. Jensen: "Definition of Entity
Authentication". In Proceedings of the 2nd International
Workshop on Security and Communication Networks, Karlstad,
Sweden, May, 2010.
N. Ahmed, C. Jensen: "A Mechanism for Identity
Delegation at Authentication Level". In Proceedings of the 14th
Nordic Conference on Secure IT Systems (NordSec 2009), pp. 148-162, Oslo, Norway,
October, 2009.
C.A. Ardagna, S. De Capitani di Vimercati, C.D. Jensen,
R. Küsters: "STM 2009". Pre-Proceedings of the 5th
International Workshop on Security and Trust Management, in association
with ESORICS 2009, St. Malo, France, September, 2009.
N. Ahmed, C. Jensen: "Context-Aware Identity
Delegation". In Proceedings of of European Context Awareness
and Trust 2009 (EuroCAT09), the 3rd Workshop on Combining Context
with Trust, Security, and Privacy, Pisa, Italy, September 2009.
H. Akram, C. Jensen, M. Hoffmann: "Identity
Metasystem in Location Based Persistent Authentication". In
Proceedings of European Context Awareness and Trust 2009 (EuroCAT09),
the 3rd Workshop on Combining Context with Trust, Security and
Privacy, Pisa, Italy, September 2009.
T. Korsgaard, C. Jensen: "Reengineering the
Wikipedia for Reputation". In Electronic Notes in Theoretical
Computer Science, Vol. 244, pp. 81-94, Elsevier, August, 2009.
Journal version of STM 2008 paper.
C. Jensen: "Security in Wiki-Style
Authoring Systems". In Proceedings of the Third IFIP
International Conference on Trust Management (IFIPTM'09),
pp. 81-98. West Lafayette, Indiana, U.S.A., June, 2009.
T. Lefévre, C. Jensen, T. Korsgaard:
"WRS: The Wikipedia Recommender System". In
Proceedings of the Third IFIP International Conference on
Trust Management (IFIPTM'09), pp. 298-301. West Lafayette,
Indiana, U.S.A., June, 2009.
N. Ahmed, C. Jensen:
"An Authentication Framework for Nomadic Users". In Proceedings
of the First NOrdic workshop and doctoral symposium on DEpendability
and Security (NODES'09), Linköping, Sweden, April 2009.
C. Jensen, T. Korsgaard: "Dynamics of Trust
Evolution: Auto-configuration of dispositional trust
dynamics". In Proceedings of the International
Conference on Security and Cryptography (SECRYPT 2008), pp. 509-517,
Porto, Portugal, July, 2008.
Y. Karabulut, J. Mitchell, P. Herrmann, C. Jensen (Eds.):
"Trust Management II". Proceedings of the IFIPTM
2008 - Joint iTrust and PST Conferences on Privacy, Trust
Management and Security. Springer Verlag, 2008.
(ISBN: 978-0-387-09427-4)
T. Korsgaard, C. Jensen:
"Reengineering the Wikipedia for Reputation". In
Proceedings of the 4th International Workshop on Security and
Trust Management (STM 08), pp. 71-84, Trondheim, Norway, June,
2008.
M. Hansen, M. Kirshmeyer, C. Jensen:
"Persistent Authentication in Smart Environments".
In Proceedings of the 2nd International Workshop on Combining
Context with Trust, Security, and Privacy, pp. 31-44,
Trondheim, Norway, June, 2008.
T. Jansen, S. Peen, C. Jensen: "Practical
Privacy Assessments". Chapter in Online Consumer
Protection: Theories of Human Relativism, by Kuanchin
Chen and Adam Fadlalla (Eds.), IGI Global., 2008. (ISBN: 978-1-60566-012-7)
E. Jónsson, C. Jensen:
"Co-Authentication: An Authentication Paradigm for the
Global Computing Infrastructure". In Proceedings of the
NODES 07 - NOrdic workshop and doctoral symposium on
DEpendability and Security, Oslo, Norway, October 2007.
C. Jensen, R. Sharp:
"Trust Management in Open Grid Systems". In
Proceedings of the NODES 07 - NOrdic workshop and doctoral
symposium on DEpendability and Security, Oslo, Norway, October
2007.
S. Peen, T. Jansen, C. Jensen:
"Assessment of Privacy in Government IT systems". In
Proceeding of the First International Workshop on Sustaining
Privacy in Autonomous Collaborative Environments (SPACE 2007),
pp. 56--66, Moncton, Canada, July 2007.
C. Jensen, F. Meira, J. Nittegaard-Nielsen:
"Resilia: a Safe and Secure Distributed Backup System for
Small and Medium Enterprises". In Proceedings of the
Joint iTrust and PST Conferences on Privacy, Trust Management
and Security, pp. 383-398, Moncton, Canada, July-August
2007.
C. Jensen:
"Integrity in in Open Collaborative Authoring
Systems". In Proceedings of the Joint iTrust and PST
Conferences on Privacy, Trust Management and Security,
pp. 399-402, Moncton, Canada, July-August 2007.
S. Farrell, C. Jensen:
""End-by-hop" Data Integrity". In
Proceedings of the Fourth European Workshop on Security and
Privacy in Ad hoc and Sensor Networks (LNCS 4572), pp. 142-155,
Cambridge, UK, July 2007.
J-M. Seigneur, C. Jensen:
"User-centric Identity, Trust and Privacy". Chapter
in Trust in E-Services: Technologies, Practices and
Challenges, by Ronggong Song et al. (Eds.), IDEA Group Inc.,
2007. (ISBN: 978-1-59904-207-7)
B. Pajkovski, C. Jensen:
"PayBAC: A Payment Based Access Control Mechanism".
In Proceedings of the 11th Nordic Workshop on Secure
IT-Systems (NordSec 2006), pp. 145-156, Linköping, Sweden, October
2006.
D. Søndergaard, C.W. Probst,
C. Jensen, R.R. Hansen:
"Program Partitioning Using Dynamic Trust
Models". In Proceedings of the 4th International Workshop
on Formal Aspects in Security and Trust (FAST2006), Hamilton,
Ontario, Canada, August 2006.
E. Gray, C. Jensen, P. O'Connell, S. Weber,
J-M. Seigneur, Y. Chen:
"Trust Evolution Policies for Security in Collaborative
Ad Hoc Applications". In Electronic Notes in Theoretical
Computer Science, Vol. 157, No. 3, pp. 95-111, Elsevier, May
2006.
Journal publication of STM 2005 paper.
C. Jensen, P. O'Connell:
"Trust-Based Route Selection in Dynamic Source
Routing". In Proceedings of the 4th International
Conference on Trust Management, pp. 150-163, Pisa, Italy,
May 2006.
E. Gray, C. Jensen, Paul O'Connell, Stefan Weber,
J-M. Seigneur, Y. Chen:
"Trust Evolution Policies for Security in Collaborative
Ad Hoc Applications". In Proceedings of the 1st International
Workshop on Security and Trust Management, Milan, Italy,
September 2005.
J-M. Seigneur, A. Gray, C. Jensen:
"Trust Transfer: Encouraging Self-Recommendations without
Sybil Attack". In Proceedings of the 3rd International
Conference on Trust Management, Paris, France, May
2005.
C. Jensen, J. Krogh:
"Security in open Grid systems". In Public Service
Review: Nordic States, Winter 2004 Issue, PSCA International
Ltd., January 2005.
J-M. Seigneur, C. Jensen:
"The Claim Tool Kit for ad hoc recognition of peer
entities". In Science of Computer Programming, Vol. 54,
No. 1, pp 49-71, Elsevier, January 2005.
S.J. Engberg, M.B. Harning, C. Jensen:
"Zero-knowledge Device Authentication: Privacy & Security
Enhanced RFID preserving Business Value and Consumer
Convenience". In Proceedings of Second Annual Conference
on Privacy, Security and Trust, pp. 47-58, New Brunswick,
Canada, October 2004.
J-M. Seigneur, N. Dimmock, C. Bryce,
C. Jensen: "Combating Spam with TEA (Trusted Email
Addresses)". In Proceedings of Second Annual Conference
on Privacy, Security and Trust, pp. 89-101, New Brunswick,
Canada, October 2004.
S. Farrell, J-M. Seigneur, C. Jensen: "Security
in Exotic Wireless Networks". In NATO Computer and Systems
Sciences Series III vol 193 "Security and Privacy in Advanced
Networking Technologies", ISBN 1 58603 430 8, ISSN, 1 387-6694,
IOS Press, 2004.
J-M. Seigneur, C. Jensen: "The Role of Identity
in Computational Trust". In Proceedings of The First
Workshop on Security and Privacy at the Conference on
Pervasive Computing, Vienna, Austria, April
2004.
C. Jensen, S. Poslad, T. Dimitrakos (Eds.):
"Trust Management, Second International Conference".
Lecture Notes in Computer Science 2995, Springer Verlag, 2004.
J-M. Seigneur, C. Jensen: "Trading Privacy for
Trust". In Proceedings of the 2nd International
Conference on Trust Management, pp. 93-107, Oxford, UK, March 2004.
J-M. Seigneur, C. Jensen: "Trust Enhanced
Ubiquitous Payment without Too Much Privacy Loss". In
Proceedings of the 19th Annual ACM Symposium on Applied
Computing: Track on Ubiquitous Computing Applications,
Nicosia, Cyprus, March 2004.
E. Gray, Y. Chen, C. Jensen: "Initial
Investigation into Cross-Context Trust and Risk
Assessment". In Proceedings of the International
Conference on Communication, Network, and Information
Security, New York, U.S.A., December 2003.
J-M. Seigneur, C. Jensen: "Privacy Recovery
with Disposable Email Addresses". In IEEE Security and
Privacy, Vol. 1, No. 6, November-December, 2003.
Y. Chen, C. Jensen, E. Gray, V. Cahill and J-M
Seigneur: "A
General Risk Assessment of Security in Pervasive
Computing". Technical Report TCD-CS-2003-45,
Department of Computer Science, Trinity College Dublin, 6
November 2003.
S. Farrell, C. Jensen: "Scaling an
Interplanetary Internet". In Proceedings of the
International Conference on Recent Advances in Space
Technologies (RAST 2003), Istanbul, Turkey, November 2003.
S. Farrell, C. Jensen: "Trajectory Based
Addressing". In Proceedings of the 8th Cabernet Radicals
Workshop, Ajacio, Corsica, October 2003.
J-M. Seigneur, A. Lambert, P. G. Argyroudis and
C. Jensen: "PR3
Email Honeypot". Technical Report TCD-CS-2003-39,
Department of Computer Science, Trinity College Dublin, 12
September 2003.
V. Cahill, E. Gray, J-M. Seigneur, C.D. Jensen,
Y. Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English,
W. Wagealla, S. Terzis, P. Nixon, G. di Marzo Serugendo,
C. Bryce, M. Carbone, K. Krukow, M. Nielsen:
"Using trust for secure collaboration in uncertain
environments". In IEEE Pervasive computing, Vol. 2(3),
pp. 52-61, July-September 2003.
J-M. Seigneur, G. Biegel, C. Jensen:
"P2P with JXTA-Java pipes". In Proceedings of the
2nd International Conference on the Principles and Practice of
Programming in Java, Kilkenny City, Ireland, June 2003.
Y. Chen, C. Jensen, E. Gray, J-M. Seigneur:
"Risk Probability Estimating Based on Clustering".
In Proceedings of the 4th IEEE Anual Information Assurance
Workshop, West Point, New York, U.S.A., June 2003.
A. Harrington, C. Jensen:
"Cryptographic Access Control in a Distributed File
System". In Proceedings of the 8th ACM Symposium on
Access Control Models and Technologies, pp. 158-165, Como,
Italy, June 2003.
J. Abendroth, C. Jensen: "Partial
Outsourcing: A New Paradigm for Access Control". In
Proceedings of the 8th ACM Symposium on Access Control Models
and Technologies, pp. 134-141, Como, Italy, June 2003.
E. Gray and J.-M. Seigneur and C. Yong and C. Jensen:
"Trust Propagation in Small Worlds". In Proceedings
of the First International Conference on Trust Management,
pp. 239-254, Heraklion, Crete, Grece, May 2003.
J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"Towards security auto-configuration for smart
appliances". In Proceedings of the Smart Objects
Conference, Grenoble, France, May 2003.
J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"End-to-end trust in pervasive computing starts with
recognition". In Proceedings of the First International
Conference on Security in Pervasive Computing, Boppard,
Germany, March 2003.
J. Abendroth, C. Jensen:
"A Unified Security Framework for Networked
Applications". In Proceedings of the Eighteenth ACM
Symposium on Applied Computing, Melbourne, Florida, U.S.A.,
March 2003.
E. Gray, P. O'Connell, C. Jensen, S. Weber,
J-M. Seigneur, C. Yong:
"Towards
a Framework for Assessing Trust-Based Admission Control in
Collaborative Ad Hoc Applications". Technical Report
TCD-CS-2002-66, Department of Computer Science, Trinity
College Dublin, December 2002.
J-M. Seigneur, J. Abendroth, C. Jensen:
"Bank Accounting and Ubiquitous Brokering of
Trustos". In proceedings of the 7th Cabernet Radicals
Workshop, Bertinoro, Italy, October 2002.
J-M. Seigneur, S. Farrell, C. Jensen:
"Secure Ubiquitous Computing based on Entity Recognition".
In UBICOMP2002 - Workshop on Security in Ubiquitous Computing,
Göteborg, Sweden, September 2002.
C. Jensen:
"Secure Environments for Collaboration among Ubiquitous
Roaming Entities". In Proceedings of the First Internal
iTrust Workshop on Trust Management in Dynamic Open Systems,
Glasgow, Scotland, September 2002.
J. Andersson, C. Jensen, S. Weber:
"PEM3 - the Policy Enhanced Memory Management Model".
In Proceedings of the IEEE 3rd International Workshop on
Policies for Distributed Systems and Networks, Monterey,
California, U.S.A., June 2002.
C. Jensen:
"Secure Collaboration in Global Computing Systems".
In ERCIM NEWS, No. 49, April 2002.
C. Jensen:
"Fingerprinting Text in Logical Markup Languages". In
Proceedings of the 2001 Information Security Conference,
Malaga, Spain, October 2001.
J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM on a single address space
architecture". In proceedings of the 4th International
Conference on SCI-based Technology and Research, Dublin, Ireland,
October 2001.
J. Regan, C. Jensen:
"Capability File Names: Separating Authorisation from
User Management in an Internet File System". In
Proceedings of the 2001 USENIX Security Symposium,
pp. 221-234, Washington D.C., U.S.A., August 2001.
J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM featuring a single address
space architecture". In Proceedings of the USENIX Java
Virtual Machine Research and Technology Symposium, Monterey,
California, U.S.A., April 2001.
B. Aziz, C. Jensen:
"Adaptability in CORBA: the Mobile Proxy
Approach". In Proceedings of the 2nd Symposium on
Distributed Objects & Applications, pp. 295-305, Antwerp,
Belgium, September 2000.
C. Jensen:
"CryptoCache: A Secure Sharable File Cache for Roaming
Users". In Proceedings of the Ninth ACM SIGOPS European
Workshop, Kolding, Denmark, September 2000.
C. Jensen, M. Haahr:
"Towards a Security Framework for Ad-hoc
Applications". In Proceedings of the 2nd Workshop on
Distributed Object Security, In association with OOPSLA'99,
Denver, USA, November 1999.
C. Jensen:
"Un
modèle de contrôle générique et sa
réalisation dans la mémoire virtuelle
répartie unique Arias". Ph.D. Thesis,
Université Joseph Fourier (Grenoble I), October
1999.
J. Vitek and C.D. Jensen (Eds.):
"Secure Internet Programming". Lecture Notes in
Computer Science 1603, Springer Verlag, 1999.
C. Jensen, G. Coulouris and D. Hagimont:
"Distributed Object Security". Chapter in Serge
Demeyer and Jan Bosch (Eds.): "Object-Oriented Technology:
ECOOP'98 Workshop Reader", Lecture Notes in Computer Science
1543, pp. 273-287, Springer Verlag, 1998.
C. Jensen, D. Hagimont:
"Protection Wrappers". In Proceedings of the Eighth
ACM SIGOPS European Workshop, Sintra, Portugal, September 1998.
C. Jensen:
"Secure Software Architectures". In Proceedings of
the Eighth Nordic Workshop on Programming Environment
Research, pp. 239-246, Ronneby, August 1998.
C. Jensen (Editor):
Joint Proceedings of the ECOOP Workshop on Distributed Object
Security and the 4th Workshop on Mobile Object Systems (Secure
Internet Mobile Computations), In association with ECOOP'98,
Brussels, Belgium, July 1998.
C. Jensen and D. Hagimont:
"Mutual Suspicion in a Generic Object-Support System".
In Proceedings of the ECOOP Workshop on Distributed Object
Security, pp. 15-20, Brussels, Belgium, July 1998.
C. Jensen and D. Hagimont:
"Protection Reconfiguration for Reusable Software".
In Proceedings of the 2nd Euromicro Conference on Software
Maintenance and Reengineering, pp. 74-80, Florence, Italy,
March 1998.
C. Jensen:
"Reducing Complexity of Distributed Application
Protection". 4th Cabernet Radicals Workshop, Rithymnon,
Crete, September 1997.
C. Jensen and L. Ismail:
"Capability Based Protection for Hosting Mobile
Code". In Proceedings of the 2nd European Research
Seminar on Advances in Distributed Systems, pp. 234-240,
Zinal, Switzerland, March 1997.
C. Jensen:
"Fine-grained load distribution in object based
systems. An experiment with grain sizes in Guide2". In
Calculateurs Parallèles, pp. 31-48, Vol. 8, No. 1,
1996.
C. Jensen:
"An Investigation of Grain Sizes of Load Distribution in
an Object Based System". In Proceedings of
Journées de Recherche sur Le Placement Dynamique et la
Répartition de Charge : Application aux Systèmes
Répartis et Parallès, Paris, May 1995.
C. Jensen:
"Load Distribution in the Guide-2 operating
system". System Implementors Workshop at ECOOP'94,
Bologna, Italy, July 1994.
|
|