Karin Bernsmed

Orcid: 0000-0001-9109-5401

According to our database1, Karin Bernsmed authored at least 37 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
"Check, Check, Check, We Got Those" - Catalogue Use in Information Security Risk Management.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Adopting threat modelling in agile software development projects.
J. Syst. Softw., 2022

Assessing cyber threats for storyless systems.
J. Inf. Secur. Appl., 2022

2021
Integrating and Validating Maritime Transport Security Services: Initial results from the CS4EU demonstrator.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

2020
On the Certificate Revocation Problem in the Maritime Sector.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

2019
An experimental evaluation of bow-tie analysis for security.
Inf. Comput. Secur., 2019

Is a Smarter Grid Also Riskier?
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

Threat modelling and agile software development: Identified practice in four Norwegian organisations.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Accountability Requirements in the Cloud Provider Chain.
Symmetry, 2018

An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects.
Proceedings of the 25th Australasian Software Engineering Conference, 2018

2017
Visualizing Cyber Security Risks with Bow-Tie Diagrams.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

Accountability Requirements for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

Protecting Future Maritime Communication.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
Software Security Maturity in Public Organisations.
Proceedings of the Information Security - 18th International Conference, 2015

Assurance requirements for networked medical sensor applications.
Proceedings of the IEEE International Conference on Industrial Technology, 2015

2014
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers.
Int. J. Cloud Comput., 2014

Accountable Health Care Service Provisioning in the Cloud.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Information Security Incident Management: Identified Practice in Large Organizations.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014

Abstract Accountability Language.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

A-PPL: An Accountability Policy Language.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

A Cloud Accountability Policy Representation Framework.
Proceedings of the CLOSER 2014, 2014

From Regulatory Obligations to Enforceable Accountability Policies in the Cloud.
Proceedings of the Cloud Computing and Services Sciences, 2014

Deploying Medical Sensor Networks in the Cloud - Accountability Obligations from a European Perspective.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

CloudSurfer - A Cloud Broker Application for Security Concerns.
Proceedings of the CLOSER 2013, 2013

Towards an Ontology for Cloud Security Obligations.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Thunder in the Clouds: Security challenges and solutions for federated Clouds.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Expressing Cloud Security Requirements in Deontic Contract Languages.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Security SLAs - An Idea Whose Time Has Come?
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Design and Implementation of a CBR-based Privacy Agent.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Security in Service Level Agreements for Cloud Computing.
Proceedings of the CLOSER 2011, 2011

Learning Privacy Preferences.
Proceedings of the Sixth International Conference on Availability, 2011

A Server-side Approach to Privacy Policy Matching.
Proceedings of the Sixth International Conference on Availability, 2011

Security SLAs for Federated Cloud Services.
Proceedings of the Sixth International Conference on Availability, 2011


  Loading...