Christian Damsgaard Jensen

According to our database1, Christian Damsgaard Jensen authored at least 65 papers between 1998 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
The application of Software Defined Networking on securing computer networks: A survey.
J. Network and Computer Applications, 2019

2018
CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems.
Proceedings of the Science of Cyber Security - First International Conference, 2018

Analyzing the Communication Security Between Smartphones and IoT Based on CORAS.
Proceedings of the Network and System Security - 12th International Conference, 2018

CodeTrust - Trusting Software Systems.
Proceedings of the Trust Management XII - 12th IFIP WG 11.11 International Conference, 2018

2016
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Identity management for e-government Libya as a case study.
Proceedings of the 2016 Information Security for South Africa, 2016

2015
Attributes Enhanced Role-Based Access Control Model.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Continuous Context-Aware Device Comfort Evaluation Method.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Integrating Attributes into Role-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Security and Privacy in Video Surveillance: Requirements and Challenges.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

The Importance of Trust in Computer Security.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

2013
Error-rate-based fusion of biometric experts.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Remote Biometrics for Robust Persistent Authentication.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Structured intuition: a new methodology to analyse authentication protocols.
IJCCBS, 2012

Collaborative trust evaluation for wiki security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

The role of trust in computer security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Document and Author Promotion Strategies in the Secure Wiki Model.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Post-Session Authentication.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Towards Symbolic Encryption Schemes.
Proceedings of the Computer Security - ESORICS 2012, 2012

A Collaborative Approach to Botnet Protection.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Frontiers in Trust Management.
J. Internet Serv. Inf. Secur., 2011

Classification of Recommender Expertise in the Wikipedia Recommender System.
JIP, 2011

Private-key Symbolic Encryption.
IACR Cryptology ePrint Archive, 2011

Adaptable Authentication Model: Exploring Security with Weaker Attacker Models.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Demarcation of Security in Authentication Protocols.
Proceedings of the First SysSec Workshop 2011, 2011

2010
A Generic Role Based Access Control Model for Wind Power Systems.
JoWUA, 2010

Supporting multi-agent reputation calculation in the Wikipedia Recommender System.
IET Information Security, 2010

2009
Reengineering the Wikipedia for Reputation.
Electr. Notes Theor. Comput. Sci., 2009

A Mechanism for Identity Delegation at Authentication Level.
Proceedings of the Identity and Privacy in the Internet Age, 2009

WRS: The Wikipedia Recommender System.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Security in Wiki-Style Authoring Systems.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

2008
Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics.
Proceedings of the SECRYPT 2008, 2008

2007
Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises.
Proceedings of the Trust Management, 2007

Integrity in Open Collaborative Authoring Systems.
Proceedings of the Trust Management, 2007

"End-by-Hop" Data Integrity.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

2006
Trust Evolution Policies for Security in Collaborative Ad Hoc Applications.
Electr. Notes Theor. Comput. Sci., 2006

Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06).
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Trust-Based Route Selection in Dynamic Source Routing.
Proceedings of the Trust Management, 4th International Conference, 2006

Program Partitioning Using Dynamic Trust Models.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
The Claim Tool Kit for ad hoc recognition of peer entities.
Sci. Comput. Program., 2005

Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK).
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Trust Transfer: Encouraging Self-recommendations Without Sybil Attack.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Trust enhanced ubiquitous payment without too much privacy loss.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Combating Spam with TEA.
Proceedings of the Second Annual Conference on Privacy, 2004

Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience.
Proceedings of the Second Annual Conference on Privacy, 2004

Trading Privacy for Trust.
Proceedings of the Trust Management, Second International Conference, 2004

2003
Using Trust for Secure Collaboration in Uncertain Environments.
IEEE Pervasive Computing, 2003

Privacy Recovery with Disposable Email Addresses.
IEEE Security & Privacy, 2003

End-to-End Trust Starts with Recognition.
Proceedings of the Security in Pervasive Computing, 2003

Cryptographic access control in a distributed file system.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Partial outsourcing: a new paradigm for access control.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Unified Security Framework for Networked Applications.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

P2P with JXTA-Java pipes.
Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, 2003

Trust Propagation in Small Worlds.
Proceedings of the Trust Management, First International Conference, 2003

Risk Probability Estimating Based on Clustering.
Proceedings of the IEEE Systems, 2003

2002
PEM3 - The Policy Enhanced Memory Management Model.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2001
Fingerprinting Text in Logical Markup Languages.
Proceedings of the Information Security, 4th International Conference, 2001

2000
CryptoCache: a secure sharable file cache for roaming users.
Proceedings of the ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20, 2000, 2000

Adaptability in CORBA: The Mobile Proxy Approach.
Proceedings of the International Symposium on Distributed Objects and Applications, 2000

1999
Un modèle de contrôle d'accès générique et sa réalisation dans la mémoire virtuelle répartie unique Arias. (A generic access contro model and its implementation in the single address space operating system Arias).
PhD thesis, 1999

1998
Protection wrappers: a simple and portable sandbox for untrusted applications.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

Mutual Suspicion in a Generic Object-Support System.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

ECOOP Workshop on Distributed Object Security.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Protection Reconfiguration for Reusable Software.
Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR '98), 1998


  Loading...