Jostein Jensen

According to our database1, Jostein Jensen authored at least 17 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Federated Identity Management - We Built It; Why Won't They Come?
IEEE Secur. Priv., 2013

Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance Frameworks.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Federated Identity Management and Usage Control - Obstacles to Industry Adoption.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Federated Identity Management Challenges.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Not Ready for Prime Time: A Survey on Security in Model Driven Development.
Int. J. Secur. Softw. Eng., 2011

Security in Model Driven Development: A Survey.
Proceedings of the Sixth International Conference on Availability, 2011

Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Experimental Threat Model Reuse with Misuse Case Diagrams.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Combining Misuse Cases with Attack Trees and Security Activity Models.
Proceedings of the ARES 2010, 2010

The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development.
Proceedings of the ARES 2010, 2010

2009
Fools Download Where Angels Fear to Tread.
IEEE Secur. Priv., 2009

An Architectural Foundation for Security Model Sharing and Reuse.
Proceedings of the The Forth International Conference on Availability, 2009

Reusable Security Requirements for Healthcare Applications.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Learning from Software Security Testing.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Secure Software Design in Practice.
Proceedings of the The Third International Conference on Availability, 2008

A Novel Testbed for Detection of Malicious Software Functionality.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...