dblp.uni-trier.dewww.uni-trier.de

Audun Jøsang Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
50EEAudun Jøsang, Torleiv Maseng, Svein J. Knapskog: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings Springer 2009
49EEMd. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar: Security Usability of Petname Systems. NordSec 2009: 44-59
48EEKuldeep Singh, Audun Jøsang, Md. Sadek Ferdous, Ravishankar Borgaonkar: Spam filter optimality based on signal detection theory. SIN 2009: 219-224
47EEAudun Jøsang, Walter Quattrociocchi: Advanced Features in Bayesian Reputation Systems. TrustBus 2009: 105-114
2008
46EEMohammed Aizomai, Audun Jøsang, Adrian McCullagh, Ernest Foo: Strengthening SMS-Based Authentication through Usability. ISPA 2008: 683-688
45EEAudun Jøsang, Touhid Bhuiyan: Optimal Trust Network Analysis with Subjective Logic. SECURWARE 2008: 179-184
44EEAudun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox: Combining Trust and Reputation Management for Web-Based Services. TrustBus 2008: 90-99
43EETouhid Bhuiyan, Yue Xu, Audun Jøsang: Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making. Web Intelligence/IAT Workshops 2008: 107-110
2007
42EEAudun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara: Security Usability Principles for Vulnerability Analysis and Risk Assessment. ACSAC 2007: 269-278
41EEAudun Jøsang, Mohammed Al Zomai, Suriadi Suriadi: Usability and Privacy in Identity Management Architectures. ACSW Frontiers 2007: 143-152
40EEAudun Jøsang, Jochen Haller: Dirichlet Reputation Systems. ARES 2007: 112-119
39EEAudun Jøsang: Probabilistic Logic under Uncertainty. CATS 2007: 101-110
38EEAudun Jøsang, Zied Elouedi: Interpreting Belief Functions as Dirichlet Distributions. ECSQARU 2007: 393-404
37EEAudun Jøsang: Trust and Reputation Systems. FOSAD 2007: 209-245
36EEAudun Jøsang: Cumulative and Averaging Fission of Beliefs CoRR abs/0712.1182: (2007)
35EEAudun Jøsang, Roslan Ismail, Colin Boyd: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2): 618-644 (2007)
2006
34EEAudun Jøsang, Ross Hayward, Simon Pope: Trust network analysis with subjective logic. ACSC 2006: 85-94
33EEAudun Jøsang, Dieter Gollmann, Richard Au: A method for access authorisation through delegation networks. ACSW Frontiers 2006: 165-174
32EEAudun Jøsang, Stephen Marsh, Simon Pope: Exploring Different Types of Trust Propagation. iTrust 2006: 179-192
31EEAudun Jøsang: Belief Calculus CoRR abs/cs/0606029: (2006)
30EEAudun Jøsang: The Cumulative Rule for Belief Fusion CoRR abs/cs/0606066: (2006)
29EEAudun Jøsang, Elizabeth Gray, Michael Kinateder: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems 4(2): 139-161 (2006)
2005
28EEAudun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope: Trust Requirements in Identity Management. ACSW Frontiers 2005: 99-108
27EEAudun Jøsang, Simon Pope: Semantic Constraints for Trust Transitivity. APCCM 2005: 59-68
26EEAudun Jøsang, Simon Pope, Milan Daniel: Conditional Deduction Under Uncertainty. ECSQARU 2005: 824-835
25EEAudun Jøsang, Claudia Keser, Theodosis Dimitrakos: Can We Manage Trust? iTrust 2005: 93-107
24EEAudun Jøsang, David McAnally: Multiplication and comultiplication of beliefs. Int. J. Approx. Reasoning 38(1): 19-51 (2005)
2004
23EEDaniel Bradley, Audun Jøsang: Mesmerize - an open framework for enterprise security management. ACSW Frontiers 2004: 37-42
22EEAudun Jøsang, Daniel Bradley, Svein J. Knapskog: Belief-Based Risk Analysis. ACSW Frontiers 2004: 63-68
21 Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: Private Reputation Schemes for P2P systems. WOSIS 2004: 196-206
20 Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: An Efficient Off-Line Reputation Scheme Using Articulated Certificates. WOSIS 2004: 53-62
19EEAudun Jøsang, Stéphane Lo Presti: Analysing the Relationship between Risk and Trust. iTrust 2004: 135-145
18EEMary Anne Patton, Audun Jøsang: Technologies for Trust in Electronic Commerce. Electronic Commerce Research 4(1-2): 9-21 (2004)
2003
17EEAudun Jøsang, Gunnar Sanderud: Security in Mobile Communications: Challenges and Opportunities. ACSW Frontiers 2003: 43-48
16EEAudun Jøsang, Mary Anne Patton: User Interface Requirements for Authentication of Communication. AUIC 2003: 75-80
15EERoslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: A Security Architecture for Reputation Systems. EC-Web 2003: 176-185
14EETheodosis Dimitrakos, Ivan Djordjevic, Zoran Milosevic, Audun Jøsang, Chris I. Phillips: Contract Performance Assessment for Secure and Dynamic Virtual Collaborations. EDOC 2003: 62-75
13EEAudun Jøsang, Shane Hird, Eric Faccer: Simulating the Effect of Reputation Systems on E-markets. iTrust 2003: 179-194
2002
12EEZoran Milosevic, Audun Jøsang, Theodosis Dimitrakos, Mary Anne Patton: Discretionary Enforcement of Electronic Contracts. EDOC 2002: 39-50
11EEAudun Jøsang: The consensus operator for combining beliefs. Artif. Intell. 141(1/2): 157-170 (2002)
2001
10EEAudun Jøsang, Peter M. Møllerud, Eddy Cheung: Web Security: The Emperor's New Armour. ECIS 2001
9EEAudun Jøsang: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3): 279-212 (2001)
2000
8 Audun Jøsang, Ingar Glenn Pedersen, Dean Povey: PKI Seeks a Trusting Relationship. ACISP 2000: 191-205
7EEAudun Jøsang, Viggo A. Bondi: Legal reasoning with subjective logic. Artif. Intell. Law 8(4): 289-315 (2000)
1999
6EEAudun Jøsang: An Algebra for Assessing Trust in Certification Chains. NDSS 1999
5 Audun Jøsang, M. G. L. Bijnagte, Geert Kleinhuis: Enabling Factors for IN Service Provider Access. SMARTNET 1999: 375-388
1998
4EEAudun Jøsang: A Subjective Metric of Authentication. ESORICS 1998: 329-344
1997
3 Audun Jøsang: Prospectives for Modelling Trust in Information Security. ACISP 1997: 2-13
2 Audun Jøsang: A Trust policy framework. ICICS 1997: 192-202
1 Audun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle: How to trust systems. SEC 1997: 241-252

Coauthor Index

1Mohammed Aizomai [46]
2Bander AlFayyadh [42]
3Richard Au [33]
4Touhid Bhuiyan [43] [44] [45]
5M. G. L. Bijnagte [5]
6Viggo A. Bondi [7]
7Ravishankar Borgaonkar [48] [49]
8Colin Boyd [15] [20] [21] [35]
9Daniel Bradley [22] [23]
10Eddy Cheung [10]
11Clive Cox [44]
12James Dalziel [28]
13Milan Daniel [26]
14Theodosis Dimitrakos [12] [14] [25]
15Ivan Djordjevic [14]
16Zied Elouedi [38]
17John Fabre [28]
18Eric Faccer [13]
19Md. Sadek Ferdous [48] [49]
20Ernest Foo [46]
21Dieter Gollmann [33]
22Tyrone Grandison [42]
23Elizabeth Gray [29]
24Jochen Haller [40]
25Brian Hay [28]
26Ross Hayward [34]
27Shane Hird [13]
28Roslan Ismail [15] [20] [21] [35]
29Claudia Keser [25]
30Michael Kinateder [29]
31Geert Kleinhuis [5]
32Svein J. Knapskog [1] [22] [50]
33F. Van Laenen [1]
34Stephen Marsh [32]
35Torleiv Maseng [50]
36David McAnally [24]
37Adrian McCullagh [46]
38Judith McNamara [42]
39Zoran Milosevic [12] [14]
40Peter M. Møllerud [10]
41Mary Anne Patton [12] [16] [18]
42Ingar Glenn Pedersen [8]
43Chris I. Phillips [14]
44Simon Pope [26] [27] [28] [32] [34]
45Dean Povey [8]
46Stéphane Lo Presti [19]
47Walter Quattrociocchi [47]
48Selwyn Russell [15] [20] [21]
49Gunnar Sanderud [17]
50Kuldeep Singh [48] [49]
51Suriadi Suriadi [41]
52Joos Vandewalle [1]
53Yue Xu [43] [44]
54Mohammed Al Zomai [41] [42]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)