Audun Jøsang

According to our database1, Audun Jøsang authored at least 137 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations.
Int. J. Approx. Reason., 2019

2018
Behavioural Computer Science: an agenda for combining modelling of human and system behaviours.
HCIS, 2018

The Impact of Quantum Computing on Present Cryptography.
CoRR, 2018

Threat Poker: Solving Security and Privacy Threats in Agile Software Development.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Global perspectives on cybersecurity education.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Global perspectives on cybersecurity education for 2030: a case for a meta-discipline.
Proceedings of the Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Data-Driven Threat Hunting Using Sysmon.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Uncertainty Characteristics of Subjective Opinions.
Proceedings of the 21st International Conference on Information Fusion, 2018

Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic.
Proceedings of the 21st International Conference on Information Fusion, 2018

A Framework for Data-Driven Physical Security and Insider Threat Detection.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
A Consistent Definition of Authorization.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Exploit Prevention, Quo Vadis?
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique.
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017

Joint Subjective Opinions.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

A new approach for multi-biometric fusion based on subjective logic.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Multi-source trust revision.
Proceedings of the 20th International Conference on Information Fusion, 2017

Multi-source fusion in subjective logic.
Proceedings of the 20th International Conference on Information Fusion, 2017

2016
A Formal Calculus for International Relations Computation and Evaluation.
CoRR, 2016

Semantic Cyberthreat Modelling.
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016

Predictive Reasoning in Subjective Bayesian Networks.
Proceedings of the 29th Norsk Informatikkonferanse, 2016

Generalising Bayes' theorem in subjective logic.
Proceedings of the 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2016

Bayesian Deduction with Subjective Opinions.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fifteenth International Conference, 2016

Towards Behavioural Computer Science.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Principles of subjective networks.
Proceedings of the 19th International Conference on Information Fusion, 2016

Decision making under vagueness and uncertainty.
Proceedings of the 19th International Conference on Information Fusion, 2016

DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Subjective Logic - A Formalism for Reasoning Under Uncertainty
Artificial Intelligence: Foundations, Theory, and Algorithms, Springer, ISBN: 978-3-319-42337-1, 2016

2015
A normal-distribution based rating aggregation method for generating product reputations.
Web Intelligence, 2015

FIDO Trust Requirements.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Information Theory for Subjective Logic.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2015

1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Mathematical Modelling of Trust Issues in Federated Identity Management.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Cybersecurity Through Secure Software Development.
Proceedings of the Information Security Education Across the Curriculum, 2015

Subjective Networks: Perspectives and Challenges.
Proceedings of the Graph Structures for Knowledge Representation and Reasoning, 2015

Towards subjective networks: Extending conditional reasoning in subjective logic.
Proceedings of the 18th International Conference on Information Fusion, 2015

Trust revision for conflicting sources.
Proceedings of the 18th International Conference on Information Fusion, 2015

An accurate rating aggregation method for generating item reputation.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

2014
Identity management and trusted interaction in internet and mobile computing.
IET Information Security, 2014

Generating Product Feature Hierarchy from Product Reviews.
Proceedings of the Web Information Systems and Technologies, 2014

Product Feature Taxonomy Learning based on User Reviews.
Proceedings of the WEBIST 2014, 2014

A Normal-Distribution Based Reputation Model.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

A rating aggregation method for generating product reputations.
Proceedings of the 25th ACM Conference on Hypertext and Social Media, 2014

A Combined Method for Mitigating Sparsity Problem in Tag Recommendation.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Biometric data fusion based on subjective logic.
Proceedings of the 17th International Conference on Information Fusion, 2014

URREF self-confidence in information fusion trust.
Proceedings of the 17th International Conference on Information Fusion, 2014

Assurance Requirements for Mutual User and Service Provider Authentication.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Probabilistic Modelling of Humans in Security Ceremonies.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

One-Time Biometrics for Online Banking and Electronic Payment Authentication.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
The OffPAD: Requirements and Usage.
Proceedings of the Network and System Security - 7th International Conference, 2013

Combining Recommender and Reputation Systems to Produce Better Online Advice.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013

Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Extended HTTP Digest Access Authentication.
Proceedings of the Policies and Research in Identity Management, 2013

An Ontology-based Method for Sparsity Problem in Tag Recommendation.
Proceedings of the ICEIS 2013, 2013

Determining model correctness for situations of belief fusion.
Proceedings of the 16th International Conference on Information Fusion, 2013

2012
Dempster's Rule as Seen by Little Colored Balls.
Computational Intelligence, 2012

The state-of-the-art in personalized recommender systems for social networking.
Artif. Intell. Rev., 2012

Service provider authentication assurance.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Trust Transitivity and Conditional Belief Reasoning.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Robustness of Trust and Reputation Systems: Does It Matter?
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Interpretation and fusion of hyper opinions in subjective logic.
Proceedings of the 15th International Conference on Information Fusion, 2012

2011
Trust Extortion on the Internet.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Workshop Message.
Proceedings of the Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems, 2011

Taste and Trust.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Ontology Learning from User Tagging for Tag Recommendation Making.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

Redefining material implication with subjective logic.
Proceedings of the 14th International Conference on Information Fusion, 2011

2010
Managing Trust in Online Social Networks.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Guest Editors' Introduction.
JTAER, 2010

Cumulative and averaging fusion of beliefs.
Inf. Fusion, 2010

Developing Trust Networks Based on User Tagging Information for Recommendation Making.
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010

Privacy Policy Referencing.
Proceedings of the Trust, 2010

Robustness of Trust and Reputation Systems.
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010

The Mobile Phone as a Multi OTP Device Using Trusted Computing.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Multiplication of Multinomial Subjective Opinions.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Theory and Methods, 2010

Personal Federation Control with the Identity Dashboard.
Proceedings of the Policies and Research in Identity Management, 2010

Display security for online transactions: SMS-based authentication scheme.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

The Potential Relationship Between Trust and Interest Similarity.
Proceedings of the 2010 International Conference on Internet Computing, 2010

A Review of Trust in Online Social Networks to Explore New Research Agenda.
Proceedings of the 2010 International Conference on Internet Computing, 2010

The base rate fallacy in belief reasoning.
Proceedings of the 13th Conference on Information Fusion, 2010

SimTrust: A New Method of Trust Network Generation.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Conditional Reasoning with Subjective Logic.
Multiple-Valued Logic and Soft Computing, 2009

A Medical Data Reliability Assessment Model.
JTAER, 2009

A user-centric federated single sign-on system.
J. Netw. Comput. Appl., 2009

Advanced Features in Bayesian Reputation Systems.
Proceedings of the Trust, 2009

Spam filter optimality based on signal detection theory.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Security Usability of Petname Systems.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Fission of opinions in subjective logic.
Proceedings of the 12th International Conference on Information Fusion, 2009

2008
Combining Trust and Reputation Management for Web-Based Services.
Proceedings of the Trust, 2008

Optimal Trust Network Analysis with Subjective Logic.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Strengthening SMS-Based Authentication through Usability.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Continuous Ratings in Discrete Bayesian Reputation Systems.
Proceedings of the Trust Management II, 2008

Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
A survey of trust and reputation systems for online service provision.
Decis. Support Syst., 2007

Cumulative and Averaging Fission of Beliefs
CoRR, 2007

Trust and Reputation Systems.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Interpreting Belief Functions as Dirichlet Distributions.
Proceedings of the Symbolic and Quantitative Approaches to Reasoning with Uncertainty, 2007

Probabilistic Logic under Uncertainty.
Proceedings of the Theory of Computing 2007. Proceedings of the Thirteenth Computing: The Australasian Theory Symposium (CATS2007). January 30, 2007

Usability and Privacy in Identity Management Architectures.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

Security Usability Principles for Vulnerability Analysis and Risk Assessment.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Dirichlet Reputation Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
Simplification and analysis of transitive trust networks.
Web Intelligence and Agent Systems, 2006

The Cumulative Rule for Belief Fusion
CoRR, 2006

Belief Calculus
CoRR, 2006

Exploring Different Types of Trust Propagation.
Proceedings of the Trust Management, 4th International Conference, 2006

A method for access authorisation through delegation networks.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Trust network analysis with subjective logic.
Proceedings of the Computer Science 2006, 2006

2005
Multiplication and comultiplication of beliefs.
Int. J. Approx. Reason., 2005

Can We Manage Trust?
Proceedings of the Trust Management, Third International Conference, 2005

Conditional Deduction Under Uncertainty.
Proceedings of the Symbolic and Quantitative Approaches to Reasoning with Uncertainty, 2005

Semantic Constraints for Trust Transitivity.
Proceedings of the Conceptual Modelling 2005, 2005

Trust Requirements in Identity Management.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
Technologies for Trust in Electronic Commerce.
Electronic Commerce Research, 2004

Private Reputation Schemes for P2P systems.
Proceedings of the Security In Information Systems, 2004

An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
Proceedings of the Security In Information Systems, 2004

Analysing the Relationship between Risk and Trust.
Proceedings of the Trust Management, Second International Conference, 2004

Belief-Based Risk Analysis.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

Mesmerize - an open framework for enterprise security management.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

2003
Simulating the Effect of Reputation Systems on E-markets.
Proceedings of the Trust Management, First International Conference, 2003

Contract Performance Assessment for Secure and Dynamic Virtual Collaborations.
Proceedings of the 7th International Enterprise Distributed Object Computing Conference (EDOC 2003), 2003

A Security Architecture for Reputation Systems.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

User Interface Requirements for Authentication of Communication.
Proceedings of the User Interfaces 2003, 2003

Security in Mobile Communications: Challenges and Opportunities.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
The consensus operator for combining beliefs.
Artif. Intell., 2002

Discretionary Enforcement of Electronic Contracts.
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002

The Beta Reputation System.
Proceedings of the 15th Bled eConference: eReality: Constructing the eEconomy, 2002

2001
A Logic for Uncertain Probabilities.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001

Web Security: The Emperor's New Armour.
Proceedings of the 9th European Conference on Information Systems, 2001

2000
Legal reasoning with subjective logic.
Artif. Intell. Law, 2000

PKI Seeks a Trusting Relationship.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Enabling Factors for IN Service Provider Access.
Proceedings of the Intelligence in Networks, 1999

An Algebra for Assessing Trust in Certification Chains.
Proceedings of the Network and Distributed System Security Symposium, 1999

1998
A Subjective Metric of Authentication.
Proceedings of the Computer Security, 1998

1997
How to trust systems.
Proceedings of the Information Security in Research and Business, 1997

A Trust policy framework.
Proceedings of the Information and Communication Security, First International Conference, 1997

Prospectives for Modelling Trust in Information Security.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
The right type of trust for distributed systems.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996


  Loading...