Jon Ølnes

According to our database1, Jon Ølnes authored at least 20 papers between 1993 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A Practical Signature Policy Framework.
Proceedings of the ISSE 2013, 2013

2012
PEPPOL - Experience from Four Years Work on eSignature Interoperability.
Proceedings of the ISSE 2012, 2012

2010
Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement.
Electron. Commer. Res., 2010

Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2009
Time Challenges - Challenging Times for Future Information Search.
D Lib Mag., 2009

A General Quality Classification System for eIDs and e-Signatures.
Proceedings of the ISSE 2009, 2009

2008
Electronic Signatures for Public Procurement across Europe.
Proceedings of the ISSE 2008, 2008

2007
Making Digital Signatures Work across National Borders.
Proceedings of the ISSE/SECURE 2007, 2007

2006
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party.
Proceedings of the Public Key Infrastructure, 2006

2002
On Long-Term Storage of Digitally Signed Documents.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

2001
A Taxonomy for Trusted Services.
Proceedings of the Towards The E-Society: E-Commerce, 2001

1999
Mobile Agent Security - Issues and Directions.
Proceedings of the Intelligence in Services and Networks, 1999

1998
Public Key Infrastructure and Certification Policy for Inter - domain Management.
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998

1997
A Security Architecture for TMN Inter-Domain Management.
Proceedings of the Intelligence in Services and Networks: Technology for Cooperative Competition, 1997

1996
Firewalls in an OSI-environment.
Comput. Commun., 1996

1995
A TTP-based Architecture for TMN Security and Privacy.
Proceedings of the Bringing Telecommunication Services to the People, 1995

1994
Development of security policies.
Comput. Secur., 1994

Security in Use and Management of VPN - a Banking Scenario.
Proceedings of the Towards a Pan-European Telecommunication Service Infrastructure, 1994

IN Service Security and Service Management Security and their Relationships - Using UPT as a Case Study.
Proceedings of the Towards a Pan-European Telecommunication Service Infrastructure, 1994

1993
EDIFACT security made simple - the EDIMED approach.
Comput. Secur., 1993


  Loading...