Martin Gilje Jaatun

Orcid: 0000-0001-7127-6694

According to our database1, Martin Gilje Jaatun authored at least 133 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Water-Tight IoT-Just Add Security.
J. Cybersecur. Priv., March, 2023

Cyber-physical Hardening of the Digital Water Infrastructure.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

Software Bill of Materials in Critical Infrastructure.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
Security and Independence of Process Safety and Control Systems in the Petroleum Industry.
J. Cybersecur. Priv., February, 2022

Adopting threat modelling in agile software development projects.
J. Syst. Softw., 2022

OpenIaC: open infrastructure as code - the network is my computer.
J. Cloud Comput., 2022

Influencing the security prioritisation of an agile software development project.
Comput. Secur., 2022

Automating Security in a Continuous Integration Pipeline.
Proceedings of the 7th International Conference on Internet of Things, 2022

Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid.
Proceedings of the 17th International Conference on Software Technologies, 2022

Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs.
Proceedings of the Software Technologies - 17th International Conference, 2022

Exploring the Need for a CERT for the Norwegian Construction Sector.
Proceedings of the International Conference on Cybersecurity, 2022

A Survey on Infrastructure-as-Code Solutions for Cloud Development.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

Blockchain Empowered and Self-sovereign Access Control System.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

Managing Digital Objects with Decentralised Identifiers based on NFT-like schema.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

A Survey on Cybersecurity Barrier Management in Process Control Environments.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

Yet Another Blockchain-based Privacy-friendly Social Network.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

Privacy and security challenges for autonomous agents : A study of two social humanoid service robots.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2021
Secure mobile cloud computing.
Concurr. Comput. Pract. Exp., 2021

Improving smart grid security through 5G enabled IoT and edge computing.
Concurr. Comput. Pract. Exp., 2021

Saving Nine Without Stitching in Time: Integrity Check After-the-fact.
Proceedings of the 2nd International Conference on Societal Automation, 2021

The Quality Triage Method: Quickly Identifying User Stories with Quality Risks.
Proceedings of the 2nd International Conference on Societal Automation, 2021

With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities.
Proceedings of the EASE 2021: Evaluation and Assessment in Software Engineering, 2021

Care and Feeding of Your Security Champion.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

Tool-assisted Threat Modeling for Smart Grid Cyber Security.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

HSE and Cyber Security in Remote Work.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Towards a Conceptual Framework for Security Requirements Work in Agile Software Development.
Int. J. Syst. Softw. Secur. Prot., 2020

Towards a Secure DevOps Approach for Cyber-Physical Systems: An Industrial Perspective.
Int. J. Syst. Softw. Secur. Prot., 2020

Enhancing accountability in the cloud.
Int. J. Inf. Manag., 2020

IT Security Is From Mars, Software Security Is From Venus.
IEEE Secur. Priv., 2020

A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Using Situational and Narrative Analysis for Investigating the Messiness of Software Security.
Proceedings of the ESEM '20: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2020

Achieving "Good Enough" Software Security: The Role of Objectivity.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

An Empirical Study of CERT Capacity in the North Sea.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Collaborative security risk estimation in agile software development.
Inf. Comput. Secur., 2019

Is a Smarter Grid Also Riskier?
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

5G as an Enabler for Secure IoT in the Smart Grid : Invited Paper.
Proceedings of the First International Conference on Societal Automation, 2019

Threat modelling and agile software development: Identified practice in four Norwegian organisations.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

A Cost-efficient Protocol for Open Blockchains.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Tackling the Cloud Forensic Problem While Keeping Your Eye on the GDPR.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

Architectural Risk Analysis in Agile Development of Cloud Software.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

Putting the "Account" into Cloud Accountability.
Proceedings of the 9th International Conference on Cloud Computing and Services Science, 2019

The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Accountability Requirements in the Cloud Provider Chain.
Symmetry, 2018

A Secure MANET Routing Protocol for Crisis Situations.
Int. J. Syst. Softw. Secur. Prot., 2018

Security Incident Information Exchange for Cloud Service Provisioning Chains.
Cryptogr., 2018

Session details: SecSE 2018: International workshop on secure software engineering in DevOps and agile development.
Proceedings of the 19th International Conference on Agile Software Development, 2018

Guiding Lights for Cloud Accountability.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Understanding challenges to adoption of the Microsoft elevation of privilege game.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Challenges and approaches of performing canonical action research in software security: research paper.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Understanding Challenges to Adoption of the Protection Poker Software Security Game.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

OWASP Top 10 - Do Startups Care?
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Cyber Security Considerations for Self-healing Smart Grid Networks.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects.
Proceedings of the 25th Australasian Software Engineering Conference, 2018

Software Security Activities that Support Incident Management in Secure DevOps.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Risk Centric Activities in Secure Software Development in Public Organisations.
Int. J. Secur. Softw. Eng., 2017

A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams.
Int. J. Secur. Softw. Eng., 2017

Accountability Requirements for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

DevOps for Better Software Security in the Cloud Invited Paper.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations.
Int. J. Crit. Infrastructure Prot., 2016

Playing Protection Poker for Practical Software Security.
Proceedings of the Product-Focused Software Process Improvement, 2016

I'll Trust You - for Now.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Security Incident Information Exchange for Cloud Services.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Zebras and Lions: Better Incident Handling Through Improved Cooperation.
Proceedings of the Innovations for Community Services - 16th International Conference, 2016

Advanced Healthcare Services Enabled by a Computerized Pain Body Map.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

Securing big data in the Cloud by protected mapping over multiple providers.
Proceedings of the Digital Media Industry & Academic Forum, 2016

An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Cyber Security Incident Management in the Aviation Domain.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Software Security Maturity in Public Organisations.
Proceedings of the Information Security - 18th International Conference, 2015

Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
Proceedings of the Enterprise Security - Second International Workshop, 2015

Passing the Buck: Outsourcing Incident Response Management.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Accountability Through Transparency for Cloud Customers.
Proceedings of the Cloud Computing and Services Science - 5th International Conference, 2015

Cloud Provider Transparency - A View from Cloud Customers.
Proceedings of the CLOSER 2015, 2015

How Much Cloud Can You Handle?
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers.
Int. J. Cloud Comput., 2014

Information security incident management: Current practice as reported in the literature.
Comput. Secur., 2014

Security Considerations for Tablet-based eHealth Applications.
Proceedings of the 2nd European Workshop on Practical Aspects of Health Informatics, 2014

Information Security Incident Management: Planning for Failure.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014

Towards Strong Accountability for Cloud Service Providers.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Learn to SWIM.
Proceedings of the Ninth International Conference on Availability, 2014

Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward.
Proceedings of the Ninth International Conference on Availability, 2014

2013
"Security-Aware and Data Intensive Low-Cost Mobile Systems" Editorial.
Mob. Networks Appl., 2013

Federated Identity Management - We Built It; Why Won't They Come?
IEEE Secur. Priv., 2013

Beyond lightning: A survey on security challenges in cloud computing.
Comput. Electr. Eng., 2013

Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

Seeking Risks: Towards a Quantitative Risk Perception Measure.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

GPRS Security for Smart Meters.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

Sink or SWIM: Information Security Requirements in the Sky.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Towards an Ontology for Cloud Security Obligations.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Reference deployment models for eliminating user concerns on cloud security.
J. Supercomput., 2012

Handling compromised components in an IaaS cloud installation.
J. Cloud Comput., 2012

The design of a redundant array of independent net-storages for improved confidentiality in cloud computing.
J. Cloud Comput., 2012

Special issue on security in cloud computing.
J. Cloud Comput., 2012

On the Adoption of Usage Control Technology in Collaborative Environments.
Proceedings of the 12th International Conference on Innovative Internet Community Systems (I<sup>2</sup>CS 2012), 2012

Drizzle: The RAIN Prototype.
Proceedings of the 12th International Conference on Innovative Internet Community Systems (I<sup>2</sup>CS 2012), 2012

Threat Modeling of AMI.
Proceedings of the Critical Information Infrastructures Security, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Thunder in the Clouds: Security challenges and solutions for federated Clouds.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Expressing Cloud Security Requirements in Deontic Contract Languages.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry Perspective.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Security SLAs - An Idea Whose Time Has Come?
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Hunting for Aardvarks: Can Software Security Be Measured?
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Not Ready for Prime Time: A Survey on Security in Model Driven Development.
Int. J. Secur. Softw. Eng., 2011

Cyber security challenges in Smart Grids.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

BatCave: Adding security to the BATMAN protocol.
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011

Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

As Strong as the Weakest Link: Handling Compromised Components in OpenStack.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Security in Service Level Agreements for Cloud Computing.
Proceedings of the CLOSER 2011, 2011

Security in Model Driven Development: A Survey.
Proceedings of the Sixth International Conference on Availability, 2011

Security SLAs for Federated Cloud Services.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Agile Software Development: The Straight and Narrow Path to Secure Software?
Int. J. Secur. Softw. Eng., 2010

Deployment models: Towards eliminating security concerns from cloud computing.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Managing Emerging Information Security Risks during Transitions to Integrated Operations.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development.
Proceedings of the ARES 2010, 2010

2009
A framework for incident response management in the petroleum industry.
Int. J. Crit. Infrastructure Prot., 2009

Secure remote access to autonomous safety systems: A good practice approach.
Int. J. Auton. Adapt. Commun. Syst., 2009

Fools Download Where Angels Fear to Tread.
IEEE Secur. Priv., 2009

Privacy in a Semantic Cloud: What's Trust Got to Do with It?
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Reusable Security Requirements for Healthcare Applications.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Security Requirements for the Rest of Us: A Survey.
IEEE Softw., 2008

An Analysis of the Manufacturing Messaging Specification Protocol.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Penetration Testing of OPC as Part of Process Control Systems.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Learning from Software Security Testing.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

A Structured Approach to Incident Response Management in the Oil and Gas Industry.
Proceedings of the Critical Information Infrastructure Security, 2008

Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

A Study of Information Security Practice in a Critical Infrastructure Application.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Covering Your Assets in Software Engineering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Extending 3G/WiMAX Networks and Services through Residential Access Capacity[Wireless Broadband Access].
IEEE Commun. Mag., 2007

Survival by Deception.
Proceedings of the Computer Safety, 2007

2006
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets.
Proceedings of the Security and Privacy in Dynamic Environments, 2006


  Loading...