Publications by UiO Digital Security

Published 2024

  • Malte Hansen and Andre Büttner. "Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement". In Privacy and Identity Management. Sharing in a Digital World. April 2024. DOI: 10.1007/978-3-031-57978-3_12.
  • Andre Büttner and Nils Gruschka. “Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts”. In Proceedings of the 10th International Conference on Information Systems Security and Privacy. ISBN 978-989-758-683-5. ISSN 2184-4356. pages 691-700. February 2024. DOI: 10.5220/0012319000003648.

Published 2023

  • Daniela Pöhn, Nils Gruschka, Leonhard Ziegler and Andre Büttner. "A framework for analyzing authentication risks in account networks". Computers & Security, Volume 135. December 2023. DOI: 10.1016/j.cose.2023.103515.
  • Jaber, A., Fritsch, L. (2023). Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators. In: Barolli, L. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2022. Lecture Notes in Networks and Systems, vol 571. Springer, Cham. https://doi.org/10.1007/978-3-031-19945-5_25
  • Vincent Unsel, Stephan Wiefling, Nils Gruschka, and Luigi Lo Iacono, “Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example,” in Proceedings of the 13. ACM Conference on Data and Application Security and Privacy, 2023, pp. 237–243.
  • Hansen, Malte, Nils Gruschka, and Meiko Jensen. "Introducing the Concept of Data Subject Rights as a Service Under the GDPR." Privacy Symposium: Data Protection Law International Convergence and Compliance with Innovative Technologies. Cham: Springer International Publishing, 2023.
  • Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono: “Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication”, UbiSec 2023. DOI: 10.1007/978-981-97-1274-8_26.
  • Dinh Uy Tran, Audun Jøsang, Janne Hagen and Sigrid Haug Selnes. An Opportunity-Based Approach to Information Security Risk. The 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2023). The Hague, The Netherlands, September 2023.
  • Dinh Uy Tran and Audun Jøsang. Business Language for Information Security. International Symposium on Human Aspects of Information Security and Assurance, Canterbury, UK, July 2023.
  • Dinh Uy Tran. Informasjonssikkerhetsledelse: En holistisk tilnærming. Cappelen-Damm, 2023. 236 sider. ISBN: 9788202754648. [web]
  • Audun Jøsang. Informasjonssikkerhet: Teori og praksis (utgave 2). Universitetsforlaget, 2023. 368 sider. ISBN: 9788215068176. [web]
  • Zhen Guo, Zelin Wan, Qisheng Zhang, Xujiang Zhao, Qi Zhang, Lance M Kaplan, Audun Jøsang, Dong H Jeong, Feng Chen, Jin-Hee Cho. A survey on uncertainty reasoning and quantification in belief theory and its application to deep learning. 26th International Conference on Information Fusion (FUSION 2023). Charleston, USA, June 2023.
  • Zhen Guo, Qi Zhang, Qisheng Zhang, Lance M Kaplan, Audun Jøsang, Feng Chen, Dong H Jeong, Jin-Hee Cho. Detecting intents of fake news using uncertainty-aware deep reinforcement learning. 2023 IEEE International Conference on Web Services (ICWS), pp. 722-724, Chicago, USA, July 2023.
  • Xujiang Zhao, Xuchao Zhang, Chen Zhao, Jin-Hee Cho, Lance Kaplan, Dong Hyun Jeong, Audun Jøsang, Haifeng Chen, Feng Chen. Multi-Label Temporal Evidential Neural Networks for Early Event Detection. 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2023), Rhodos, Greece, June 2023.
  • Dimosthenis Masouros, Dimitrios Soudris, Georgios Gardikis, Victoria Katsarou, Maria Christopoulou, George Xilouris, Hugo Ramón, Antonio Pastor Fabrizio Scaglione, Cristian Petrollini, António Pinto, João P. Vilela, Antonia Karamatskou, Nikolaos Papadakis, Anna Angelogianni, Thanassis Giannetsos, Luis Javier García Villalba, Jesús A. Alonso-López, Martin Strand, Gudmund Grov, Anastasios N. Bikos, Kostas Ramantas, Ricardo Santos, Fábio Silva, and Nikolaos Tsampieris. Towards privacy-first security enablers for 6G networks: the PRIVATEER approach, In Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2023. Lecture Notes in Computer Science, vol 14385. Springer, Cham, pp 379–391, https://doi.org/10.1007/978-3-031-46077-7_25.

Published 2022

  • Daniela Pöhn, Nils Gruschka, and Leonard Ziegler, “Multi-Account Dashboard for Authentication Dependency Analysis,” in Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, pp. 1–13.
  • Andre Büttner and Nils Gruschka. "Protecting FIDO Extensions Against Man-in-the-Middle Attacks". International Workshop on Emerging Technologies for Authorization and Authentication. September 2022. DOI: 10.1007/978-3-031-25467-3_5.
  • Samuel Wairimu and Lothar Fritsch. 2022. Modelling privacy harms of compromised personal medical data - beyond data breach. In Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22). Association for Computing Machinery, New York, NY, USA, Article 133, 1–9. https://doi.org/10.1145/3538969.3544462

  • Fritsch, L., Jaber, A., Yazidi, A. (2022). An Overview of Artificial Intelligence Used in Malware. In: Zouganeli, E., Yazidi, A., Mello, G., Lind, P. (eds) Nordic Artificial Intelligence Research and Development. NAIS 2022. Communications in Computer and Information Science, vol 1650. Springer, Cham. https://doi.org/10.1007/978-3-031-17030-0_4

  • Sina Rebekka Moen, Sigrid Haug Selnes, Janne Merete Hagen, Ove Njå. Digital Security in the Norwegian Power Systems’ Supply Chains. The 32nd European Safety and Reliability Conference (ESREL 2022), Dublin, Ireland, August 2022.
  • Jon-Martin Storm, Janne Hagen, Sigrid Haug Selnes. How has cybersecurity regulation altered the electric power industry's use of intrusion detection systems?. The 32nd European Safety and Reliability Conference (ESREL 2022), Dublin, Ireland, August 2022. [pdf]
  • Audun Jøsang, Jin-Hee Cho, and Feng Chen. Noninformative Prior Weights for Dirichlet PDFs. 2022 IEEE International Conference on Multisensor Fusion and Integration (MFI 2022). Cranfield, UK, September 2022. [pdf]
  • A. N. Jaber, L. Fritsch and H. Haugerud, "Improving Phishing Detection with the Grey Wolf Optimizer," 2022 International Conference on Electronics, Information, and Communication (ICEIC), Jeju, Korea, Republic of, 2022, pp. 1-6, doi: 10.1109/ICEIC54506.2022.9748592.
  • A. N. Jaber and L. Fritsch, "COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks," 2021 25th International Computer Science and Engineering Conference (ICSEC), Chiang Rai, Thailand, 2021, pp. 434-442, doi: 10.1109/ICSEC53205.2021.9684603.
  • Dinh Uy Tran and Audun Jøsang. Information Security Posture to Organize and Communicate the Information Security Governance Program. Proceedings of the 18th European Conference on Management Leadership and Governance (ECMLG 2022). Lisbon, November 2022. [pdf]
  • Hansen, Malte, and Meiko Jensen. "A generic data model for implementing right of access requests." Annual Privacy Forum. Cham: Springer International Publishing, 2022.
  • Johan Ivar Sæbø, Andre Büttner, Nils Gruschka, Bob Jolliffe and Austin McGee. "Where There is No CISO". International Conference on Social Implications of Computers in Developing Countries. May 2022. DOI: 10.1007/978-3-031-19429-0_12.
  • Chinmayi Prabhu Baramashetru, Silvia Lizeth Tapia Tarifa, Olaf Owe and Nils Gruschka, “A policy language to capture compliance of data protection requirements,” in International Conference on Integrated Formal Methods, Springer International Publishing Cham, 2022, pp. 289–309
  • Håkon Svee Eriksson and Gudmund Grov. Towards XAI in the SOC - a user centric study of explainable alerts with SHAP and LIME. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 2022, pp. 2595-2600, doi: 10.1109/BigData55660.2022.10020248.

  • Julie Gjerstad, Fikret Kadiric, Gudmund Grov, Espen Hammer Kjellstadli and Markus Leira Asprusten. LADEMU: a modular & continuous approach for generating labelled APT datasets from emulations. 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 2022, pp. 2610-2619, doi: 10.1109/BigData55660.2022.10020549.

  • Andreas Dybvik Kaasen, Gudmund Grov, Federico Mancini and Magnus Baksaas. Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities - Threats & Attacks. MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA, 2022, pp. 861-866, doi: 10.1109/MILCOM55135.2022.10017692.


Published 2021

  • Melanie Windrich, Andreas Speck, and Nils Gruschka, “Representing Data Protection Aspects in Process Models by Coloring,” in Annual Privacy Forum, Springer International Publishing Cham, 2021, pp. 143–155.
  • Lothar Fritsch and Nils Gruschka, “Extraction and Accumulation of Identity Attributes from the Internet of Things,” Open Identity Summit 2021 Proceedings, 2021
  • Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, and Fredrik Borg. 2021. Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange. Digital Threats: Research and Practice (DTRAP). Volume 3, Issue 1, Article 6 (October 2021), 22 pages, ACM, ISSN: 2692-1626. [pdf]
  • Vasileios Mavroeidis, Ryan Hohimer, Tim Casey and Audun Jøsang. Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. Proceedings of CYCON 2021, Tallin, Estonia, May 2021. [pdf]
  • Åvald Sommervoll and Audun Jøsang. Machine Learning for Offensive Cyber Operations. Norsk IKT-konferanse for forskning og utdanning, No.3 (2021): NISK 2021 (Norsk informasjonssikkerhetskonferanse), ISSN: 1892-0713. [pdf]
  • Andre Büttner and Nils Gruschka. "Enhancing FIDO Transaction Confirmation with
    Structured Data Formats". Norsk IKT-konferanse for forskning og utdanning, No.3 (2021): NISK 2021 (Norsk informasjonssikkerhetskonferanse), ISSN: 1892-0713. December 2021. [pdf]
  • Audun Jøsang. Informasjonssikkerhet: Teori og praksis (utgave 1). Universitetsforlaget, 2021. 312 sider. ISBN: 9788215055893.
  • Andre Büttner, Hoai Viet Nguyen, Nils Gruschka and Luigi Lo Iacono. "Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems". IFIP International Conference on ICT Systems Security and Privacy Protection. DOI: 10.1007/978-3-030-78120-0_22.
  • Audun Jøsang, Lynn Futcher and Janne Hagen. ICT Systems Security and Privacy Protection: Proceedings of the 36th IFIP TC 11 International Conference (SEC 2021), Oslo, Norway, June 22–24, Springer 2021. ISBN: 978-3-030-78119-4.
  • Tamas Bisztray, Nils Gruschka, Thirimachos Bourlai, and Lothar Fritsch, “Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks,” in International Conference of the Biometrics Special Interest Group (BIOSIG), IEEE, 2021, pp. 1–5.
  • Markus Asprusten, Julie Gjerstad, Gudmund Grov, Espen Kjellstadli, Robert Flood, Henry Clausen and David Aspinall. A containerised approach to labelled C&C traffic. In  No. 3 (2021): NISK Norsk informasjonssikkerhetskonferanse

  • Henry Clausen, Gudmund Grov and David Aspinall. CBAM: A Contextual Model for Network Anomaly Detection. Computers 2021, 10(6):79. https://doi.org/10.3390/computers10060079 


Published 2020

  • Audun Jøsang, Viktoria Stray and Hanne Rygge. Threat Poker: Gamification of Secure Agile. 13th World Conference on Information Security Education (WISE13). Maribor, Slovenia, September 2020. [pdf]
  • Siri Bromander, Lilly Pijnenmburg Muller, Martin Eian and Audun Jøsang. Examining the "Known Truths" in Cyber Threat Intelligence – The Case of STIX. 15th International Conference on Cyber Warfare and Security (ICCWS 2020). 2020. [pdf]
  • Fabio Massimo Zennaro and Audun Jøsang. Using Subjective Logic to Estimate Uncertainty in Multi-Armed Bandit Problems. ECML/PKDD 2020 Tutorial and Workshop on Uncertainty in Machine Learning (WUML 2020). September 2020. [pdf]
  • László Erdödi and Audun Jøsang. Exploitation vs. Prevention: The Ongoing Saga of Software Vulnerabilities. Acta Polytechnica Hungarica. Volume 17, Issue 7, 2020. [pdf]
  • Tamas Bisztray, Nils Gruschka, Vasileios Mavroeidis, and Lothar Fritsch, “Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics,” in Open Identity Summit 2020, Gesellschaft für Informatik eV, 2020, pp. 185–192.
  • Henry Clausen, Gudmund Grov, Marc Sabate and David Aspinall. Better anomaly detection for access attacks using deep bidirectional LSTMs. In Proceedings of 3rd International Conference on Machine Learning for Networking (MLN 2020), LNCS, volume 12629, pages 1-18, 2021.
  • Fritsch, Lothar (2020): Identification collapse - contingency in Identity Management. Open Identity Summit 2020. DOI: 10.18420/ois2020_01. Bonn: Gesellschaft für Informatik e.V.. PISSN: 1617-5468. ISBN: 978-3-88579-699-2. pp. 15-26. Regular Research Papers. Copenhagen, Denmark. 26.-27. May 2020

Published 2019

  • Fabio Massimo Zennaro, Magdalena Ivanovska and Audun Jøsang. An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations. International Journal of Approximate Reasoning. Volume 111, pages 56-77, 2019. [online]
  • Audun Jøsang. Belief Mosaics of Subjective Opinions. 22th International Conference on Information Fusion (FUSION 2019). Ottawa, July 2019. [pdf]
  • Stephan Wiefling, Nils Gruschka, and Luigi Lo Iacono, “Even Turing Should Sometimes Not Be Able To Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services,” in Nordic Conference on Secure IT Systems, Springer International Publishing Cham, 2019, pp. 188–203.
  • Gudmund Grov, Federico Mancini and Elsie Margrethe Staff Mestl. Challenges for Risk and Security Modelling in Enterprise Architecture. In Proceedings of  the12th IFIP Working Conference on the Practice of Enterprise Modeling PoEM 2019), Lecture Notes in Business Information Processing (LNBIP), volume 369, pages 215-225, 2019 

  • Gudmund Grov, Marc Sabate, Wei Chen and David Aspinall. Towards Intelligible Robust Anomaly Detection by Learning Interpretable Behavioural Models. In Proceedings of the 12th Norwegian Information Security Conference (NISK 2019), Volume 12 of the NISK Journal


Published 2018

  • Audun Jøsang. Categories of Belief Fusion. Journal of Advances in Information Fusion (JAIF), December 2018, Volume 13, Number 2, ISSN 1557-6418.[pdf]
  • Audun Jøsang (ediitor). Proceedings of the 17th European Conference on Cyber Warfare and Security (ECCWS 2018). Oslo, Norway, 28-29 June 2018. ISBN 978-1-911218-85-2, 644 p., ACPIL. ECCWS 2018
  • Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Pereira, Vítor J. Sá, Eliana Stavrou. Global perspectives on cybersecurity education: A Case for a Meta-discipline. Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018), Cyprus, July 2018. [pdf]
  • Vasileios Mavroeidis, Kamer Vishi and Audun Jøsang. A Framework for Data-Driven Physical Security and Insider Threat Detection. 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2018). Barcelona, August 2018. [pdf]
  • Hanne Rygge and Audun Jøsang. Threat Poker: Solving Security and Privacy Threats in Agile Software Development. The 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Oslo, November 2018. [pdf]
  • Audun Jøsang, Jin-Hee Cho and Feng Chen. Uncertainty Characteristics of Subjective Opinions. 21th International Conference on Information Fusion (FUSION 2018). Cambridge July 2018. [pdf]
  • Francesco Santini, Audun Jøsang, and Maria Silvia Pini. Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic. 21th International Conference on Information Fusion (FUSION 2018). Cambridge July 2018.
  • Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych and Audun Jøsang. The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 9, No. 3, 2018. [pdf]
  • Vasileios Mavroeidis and Audun Jøsang. Data-Driven Threat Hunting Using Sysmon. The 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018), March 2018, Guiyang, China. [pdf]
  • Tore Pedersen, Christian Johansen, Audun Jøsang. Behavioural Computer Science: an agenda for combining modelling of human and system behaviours. Human-centric Computing and Information Sciences, Volume 8, Issue 1, 2018.
  • Meiko Jensen, Sahil Kapila, and Nils Gruschka, “Towards Aligning GDPR Compliance with Software Development: A Research Agenda.,” ICISSP, pp. 389–396, 2019.

Published 2017

  • Kamer Vishi and Audun Jøsang. A New Approach for Multi-Biometric Fusion Based on Subjective Logic. International Conference on Internet of Things and Machine Learning (IML 2017). Liverpool, October 2017. [pdf]
  • Christian Johansen, Audun Jøsang and Denis Migdal. Offline Trusted Device and Proxy Architecture based on a new TLS Switching technique. Proceedings of the International Workshop on Secure Internet of Things (SIoT 2017). Oslo, September 2017.
  • Audun Jøsang. A Consistent Definition of Authorization. Proceedings of the 13th International Workshop on Security and Trust Management (STM 2017). Oslo, September 2017. [pdf]
  • Laszlo Erdödi and Audun Jøsang. Exploit Prevention, Quo Vadis?. Proceedings of the 13th International Workshop on Security and Trust Management (STM 2017). Oslo, September 2017.
  • Ijlal Loutfi and Audun Jøsang. X86 Root of Trust: Technical vs. Political Considerations. 16th European Conference on Cyber Warfare and Security (ECCWS 2017). Dublin, June 2017. [pdf]
  • Magdalena Ivanovska, Audun Jøsang, Jie Zhang and Shuo Chen. Joint Subjective Opinions. The 14th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2017). Kitakyushu, Japan, October 2017. [pdf]
  • Audun Jøsang, Dongxia Wang and Jie Zhang. Multi-Source Fusion in Subjective Logic. 20th International Conference on Information Fusion (FUSION 2017). Xi'an, July 2017. [pdf]
  • Audun Jøsang, Jie Zhang and Dongxia Wang. Multi-Source Trust Revision. 20th International Conference on Information Fusion (FUSION 2017). Xi'an, July 2017. [pdf]

Published 2016

  • Audun Jøsang. Subjective Logic: A Formalism for Reasoning Under Uncertainty, ISBN 978-3-319-42337-1, Springer Verlag, 2016.
  • Siri Bromander, Audun Jøsang and Martin Eian. Semantic Cyberthreat Modelling. 11th International Conference on Semantic Technology for Intelligence, Defence, and Security (STIDS) 2016, Fairfax VA, USA, November 2016. [pdf]
  • Ijlal Loutfi and Audun Jøsang. Privacy Concerns of TPM 2.0. 15th European Conference on Cyber Warfare and Security (ECCWS-2016). Munich, July 2016. [pdf]
  • Audun Jøsang. Generalising Bayes’ Theorem in Subjective Logic. 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI 2016). Baden-Baden, September 2016. [pdf]
  • Audun Jøsang and Lance Kaplan. Principles of Subjective Networks. 19th International Conference on Information Fusion (FUSION 2016). Heidelberg, July 2016. [pdf]
  • Audun Jøsang. Decision Making Under Vagueness and Uncertainty. 19th International Conference on Information Fusion (FUSION 2016). Heidelberg, July 2016. [pdf]
  • Magdalena Ivanovska, Audun Jøsang and Francesco Sambo. Bayesian Deduction with Subjective Opinions. 15th International Conference on Principles of Knowledge Representation and Reasoning (KR 2016). Cape Town, South Africa, April 2016.
  • Christian Johansen, Tore Pedersen and Audun Jøsang. Towards Behavioural Computer Science. Proceedings of the 10th IFIP International Conference on Trust Management (IFIPTM 2016). Darmstadt, July 2016.
  • Ijlal Loutfi and Audun Jøsang. Hey TPM, Sign My Transaction. Norwegian Information Security Conference (NISK) 2016, Bergen, November 2016. [pdf]
  • Magdalena Ivanovska and Audun Jøsang. Predictive Reasoning in Subjective Bayesian Networks. Norsk Informatikkonferanse (NIK) 2016. Bergen, November 2016.

Published 2015

  • Audun Jøsang, Laurent Miralabé and Léonard Dallot. Vulnerability by Design in Mobile Network Security. The Journal of Information Warfare, Volume 14, Issue 4, 2015. ISSN 1445-3312 (Printed Journal), ISSN 1445-3347 (Online Journal). [pdf][web]
  • Audun Jøsang. Assurance Requirements for Mutual User and Service Provider Authentication. 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclav, Poland, September 2014. Published in: J. Garcia-Alfaro et al. (Eds.), DPM/SETOP/QASA 2014, LNCS 8872, pp. 26–44, 2015. ISBN 978-3-319-17016-9. [pdf]
  • Ijlal Loutfi and Audun Jøsang. FIDO Trust Requirements for Mitigating Murphy’s Law. Secure IT Systems, proceedings of the 20th Nordic Conference (NordSec 2015). Stockholm, Sweden, October 2015.
  • Ahmad Abdel-Hafez, Yue Xu and Audun Jøsang. An Accurate Rating Aggregation Method for Generating Item Reputation. 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA 2015). Paris, October 2015. ISBN 978-1-4673-8273-1.
  • Ahmad Abdel-Hafez, Yue Xu, and Audun Jøsang. A normal-distribution based rating aggregation method for generating product reputations. Web Intelligence, Volune 13, Issue 1, 2015, pp. 43--51. ISSN print; 2405-6456, ISSN online: 2405-6464.
  • Tim Muller, Dongxia Wang, and Audun Jøsang. Information Theory for Subjective Logic. The 12th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2015). Skövde, Sweden, September 2015. ISBN 978-3-319-23239-3.
  • Magdalena Ivanovska, Audun Jøsang, Lance Kaplan, and Francesco Sambo. Subjective Networks: Prospectives and Challenges Graph Structures for Knowledge Representation and Reasoning - Third International Workshop (GKR@IJCAI 2015), Buenos Aires. [pdf]
  • Audun Jøsang, Magdalena Ivanovska, and Tim Muller. Trust Revision for Conflicting Sources. 18th International Conference on Information Fusion (FUSION 2015). Washington, July 2015. [pdf]
  • Audun Jøsang, Laurent Miralabé and Léonard Dallot. It’s not a bug, it’s a feature: 25 years of mobile network insecurity. 14th European Conference on Cyber Warfare and Security (ECCWS-2015). Hatfield UK, July 2015.
  • Lance Kaplan, Magdalena Ivanovska, Audun Jøsang, and Francesco Sambo. Towards Subjective Networks: Extending Conditional Reasoning in Subjective Logic. 18th International Conference on Information Fusion (FUSION 2015). Washington, July 2015.
  • Ijlal Loutfi and Audun Jøsang. 1,2, pause: Let's start by meaningfully navigating the current online authentication solutions space. 9th IFIP International Conference on Trust Management (IFIPTM 2015). Hamburg, May 2015. [pdf]
  • Audun Jøsang, Marte Ødegaard and Erlend Oftedal. Cybersecurity through Secure Software Development. 9th World Conference on Information Security Education (WISE9). Hamburg, May 2015. ISBN 978-3-319-18500-2. [pdf]
  • Ijlal Loutfi and Audun Jøsang. Passwords are not always stronger on the other side of the fence. NDSS Workshop on Usable Security (USEC 2015). San Diego, February 2015. [pdf]
  • Audun Jøsang, Christophe Rosenberger, Laurent Miralabé, Henning Klevjer, Kent A. Varmedal, Jérôme Daveau, Knut Eilif Husa and Petter Taugbøl. Local user-centric identity management. Journal of Trust Management, Volume 2, Issue 1, January 2015. ISSN: 2196-064X [pdf]
  • Christian Johansen and Audun Jøsang. Probabilistic Modeling of Humans in Security Ceremonies, 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclav, Poland, September 2014. Published in: J. Garcia-Alfaro et al. (Eds.), DPM/SETOP/QASA 2014, LNCS 8872, pp. 2015. ISBN 978-3-319-17016-9.
  • Md Ferdous, G. Norman, A. Jøsang and R. Poet. Mathematical Modelling of Trust Issues in Federated Identity Management. In Proceedings of Trust Management IX, Volume 454 of IFIP Advances in Information and Communication Technology, pages 13-29, Springer. April 2015. [pdf]

Published 2014

  • Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, and Audun Jøsang. Biométrie à usage unique pour la monétique. The 9th Conference on Network and Information Systems Security (Sécurité des Architectures Réseaux et des Systèmes d'Information) (SARSSI 2014), Lyon, May 2014. [pdf]
  • Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, and Audun Jøsang. One-time biometrics for Online Banking and Electronic Payment Authentication. 4th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014), Fribourg, Switzerland, September 2014. LNCS 8708, ISBN 978-3-319-10974-9. [pdf]
  • Audun Jøsang and Francesco Sambo. Inverting Conditional Opinions in Subjective Logic. 20th International Conference on Soft Computing (MENDEL'14). Brno, Czech Republic, June 2014. [pdf]
  • Audun Jøsang and Thorvald H. Munch-Møller. Biometric Data Fusion Based on Subjective Logic. 17th International Conference on Information Fusion (FUSION 2014). Salamanca, Spain, July 2014. ISBN 978-84-9012-355-3. [pdf]
  • Erik Blasch, Audun Jøsang, Jean Dezert and Paulo C.G. Costa. URREF Self-Confidence in Information Fusion Trust. 17th International Conference on Information Fusion (FUSION 2014). Salamanca, Spain, July 2014. ISBN 978-84-9012-355-3.
  • Audun Jøsang. Potential Cyber Warfare Capabilities of Major Technology Vendors. Proceedings of the 13th European Conference on Cyber Warfare and Security (ECCWS-2014). Piraeus, Greece, July 2014. ISBN 978‐1‐910309-25-4 . [pdf]
  • Audun Jøsang. Identity Management and Trusted Interaction in Internet and Mobile Computing. IET Information Security, ISSN: 1751-8709, Volume 8, Issue 2, March 2014, pp.67-79. [pdf]
  • Endang Djuana, Yue Xu, Yuefeng Li and Audun Jøsang. A Combined Method for Mitigating Sparsity Problem in Tag Recommendation. 2014 Hawaii International Conference on System Sciences (HICSS-47). Hawaii, January 2014.
  • Ahmad Abdel-Hafez, Yue Xu, and Audun Jøsang. A Normal-Distribution Based Reputation Model. 11th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2014). Munich, September 2014. ISBN 978-3-319-09769-5 [pdf]
  • Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro (editors). Twelfth Annual Conference on Privacy, Security and Trust (PST2014). Ryerson University, Toronto, Canada; July 23-24, 2014. IEEE-explore. ISBN 978-1-4799-3503-1.
  • Audun Jøsang (editor). Norsk informasjonssikkerhetskonferanse (NISK 2014). ISSN 1894-7735. BIBSYS, November 2014.
  • Ahmad Abdel-Hafez, Yue Xu, and Audun Jøsang. A rating aggregation method for generating product reputations. Proceedings of the 25th ACM Conference on Hypertext and Social Media. Santiago, Chile, 2014. pp.291--293.
  • Nan Tian, Yue Xu, Yuefeng Li, Ahmad Abdel-Hafez, and Audun Jøsang. Product feature taxonomy learning based on user reviews. WEBIST 2014 10th International Conference on Web Information Systems and Technologies. Barcelona, April 2014.

Published 2013

  • Audun Jøsang, Guibing Guo, Maria Silvia Pini, Francesco Santini, and Yue Xu. Combining Recommender and Reputation Systems to Produce Better Online Advice. The 10th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2013). Barcelona, November 2013. ISBN 978-3-642-41549-4. [pdf]
  • Bander Alfayyadh, Mohammed Alzomai and Audun Jøsang. Firewalls Usability: An Experiment Investigating the Usability of Personal Firewalls. The Seventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013). Barcelona, August 2013. 978-1-61208-298-1.
  • Audun Jøsang, Paulo C.G. Costa and Erik Blasch. Determining Model Correctness for Situations of Belief Fusion. 16th International Conference on Information Fusion (FUSION 2013). Istanbul, July 2013. [pdf]
  • Endang Djuana, Yue Xu, Yuefeng Li, Audun Jøsang, and Clive Cox. An Ontology-based Method for Sparsity Problem in Tag Recommendation. The 15th International Conference on Enterprise Information Systems (ICEIS 2013). Angers, 4-7 July 2013.
  • Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain and Alhanof Abuhaimed. Reputation-based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. Proceedings of the 7th IFIP International Conference on Trust Management (IFIPTM 2013). Malaga, 3-7 June 2013. ISBN 978-3-642-38322-9.
  • Kent A. Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent and Laurent Miralabé. The OffPAD: Requirements and Usage. The 7th International Conference on Network and System Security (NSS 2013). Madrid, 3-4 June 2013. ISBN 978-3-642-38630-5. Springer LNCS 7873. [pdf]
  • Henning Klevjer, Audun Jøsang and Kent A. Varmedal. Extended HTTP Digest Access Authentication. Proceedings of the 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IFIP IDMAN 2013). London, 8-9 April 2013. ISBN 978-3-642-37281-0.[pdf]
  • Audun Jøsang. PKI Trust Models. In Atilla Elçi et al. (editors), Theory and Practice of Cryptography Solutions for Secure Information Systems (CRYPSIS). Published by IGI Global, May 2013. ISBN13: 9781466640306. [pdf]
  • Md. Sadek Ferdous and Audun Jøsang. Entity Authentication & Trust Validation in PKI using Petname Systems. In Atilla Elçi et al. (editors), Theory and Practice of Cryptography Solutions for Secure Information Systems (CRYPSIS). Published by IGI Global, May 2013. ISBN13: 9781466640306. [pdf]
  • Audun Jøsang and Pierangela Samarati (editors). Security and Trust Management, revised selected papers of the 8th International Workshop (STM 2012). Pisa, Italy, 13-14 September 2012. Series: LNCS 7783, Springer, 2013. ISBN 978-3-642-38003-7.

Published 2012

  • Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, and Rajendra Kumar. Service Provider Authentication Assurance. 10th Annual Conference on Privacy, Security and Trust (PST 2012). Paris, July 2012. ISBN 978-1-4673-2323-9. [pdf]
  • Audun Jøsang and Robin Hankin. Interpretation and Fusion of Hyper Opinions in Subjective Logic. 15th International Conference on Information Fusion (FUSION 2012). Singapore, July 2012. ISBN 978-0-9824438-4-2. [pdf]
  • Bander AlFayyadh, Per Thorsheim, Audun Jøsang and Henning Klevjer. Improving Usability of Password Management with Standardized Password Policies. The Seventh Conference on Network and Information Systems Security (Sécurité des Architectures Réseaux et des Systèmes d'Information) (SARSSI 2012). Cabourg, May 2012. ISBN 978-2-9542630-0-7. [pdf]
  • Audun Jøsang, and Simon Pope. Dempster's Rule as Seen by Little Colored Balls. Computational Intelligence, ISSN: 1467-8640, Volume 28, Number 4, November 2012, pp. 453-474, Wiley Periodicals Inc. [pdf]
  • Audun Jøsang, Tanja Azderska and Stephen Marsh. Trust Transitivity and Conditional Belief Reasoning. Proceedings of the 6th IFIP International Conference on Trust Management (IFIPTM 2012). Surat, India May 2012. [pdf]
  • Audun Jøsang. Robustness of Trust and Reputation Systems: Does it Matter ?. Proceedings of IFIPTM International Conference on Trust Management (IFIPTM 2012). Surat, India May 2012. Springer IFIP AICT 374. ISBN . [pdf]
  • Audun Jøsang and Bengt Carlsson (editors). Secure IT Systems, proceedings of the 17th Nordic Conference (NordSec 2012). Karlskrona, Sweden, 31 October - 2 November 2012. Series: Lecture Notes in Computer Science, Vol. 7617. ISBN 978-3-642-34210-3. Springer Verlag 2012.
  • Audun Jøsang and Bengt Carlsson (editors). Short paper proceedings of the 17th Nordic Conference on Secure IT Systems (NordSec 2012). Karlskrona, Sweden, 31 October - 2 November 2012. ISBN 978-91-7295-973-6. Published by Blekinge Institute of Technology, Sweden, October 2012.
  • Xujuan Zhou, Yue Xu, , Yuefeng Li, Audun Jøsang, and Clive Cox. The state-of-the-art in personalized recommender systems for social networking. Artificial Intelligence Review, ISSN: 0269-2821, Volume 37 Issue 2, February 2012, Pages 119-132.
  • Audun Jøsang. Trust Extortion on the Internet. Proceedings of the 7th International Workshop on Security and Trust Management (STM 2011), Copenhagen, June 2011. ISBN 978-3-642-29963-6. LNCS 7170, Springer, 2012. [pdf]

Published 2011

  • Audun Jøsang and Kashif Sana Dar. Server Certificates based on DNSSEC. Proceedings of NordSec 2011, Tallinn, October 2011. [pdf]
  • Audun Jøsang. Multi-Agent Preference Combination using Subjective Logic. 11th Workshop on Preferences and Soft Constraints (SofT'11), Perugia, September 2011. [pdf]
  • Audun Jøsang and Zied Elouedi. Redefining Material Implication with Subjective Logic. 14th International Conference on Information Fusion (FUSION 2011), Chicago, July 2011. [pdf]
  • Audun Jøsang, Walter Quattrochicchi and Dino Karabeg. Taste and Trust. Proceedings of IFIPTM 2011. Copenhagen, June/July 2011. [pdf]
  • Audun Jøsang. Trust Management in Online Communities. In Volker Wittke and Heidemarie Hanekop (editors): New forms of collaborative production and innovation on the Internet - interdisciplinary perspectives. SOFI Göttingen, University Press Göttingen, 2011. ISBN 978-3-86395-020-0. [pdf]
  • Mohammed Alzomai, Audun Jøsang, and Bander Alfayyadh. Display Integrity Assurance for SMS Transaction Authorization. International Journal for Information Security Research (IJISR), ISSN 2042-4639, Volume 1, Issue 4, December 2011, The Infonomics Society. [pdf]
  • Endang Djuana, Yue Xu, Yuefeng Li, and Audun Jøsang. Ontology learning from user tagging for recommendation making. In Pierre Maret, Laurent Vercouter, and Christo El Morr (Eds.). Proceedings of 3rd International Workshop on Web Intelligence & Communities, Lyon, France. IEEE 2011.

Published 2010

  • Audun Jøsang, Lothar Fritsch and Tobias Mahler. Privacy Policy Referencing. The 7th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'10), Bilbao, September 2010. [pdf]
  • Mohammed Alzomai and Audun Jøsang. The Mobile Phone as a Multi OTP Device Using Trusted Computing. The 4th International Conference on Network and System Security (NSS 2010). Melbourne. September 2010.
  • Mohammed Alzomai, Bander Alfayyadh and Audun Jøsang. Display Security for Online Transactions. The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), London, November 2010. [pdf]
  • Bander AlFayyadh, James Ponting, Mohamed Alzomai and Audun Jøsang. Vulnerabilities in Personal Firewalls Caused by Poor Security Usability. IEEE International Conference on Information Theory and Information Security (ICITIS 2010). Beijing, 17-19 December 2010. [pdf]
  • Jonathan Scudder and Audun Jøsang. Personal Federation Control with the Identity Dashboard. In the proceedings of IFIP IDMAN 2010 - 2nd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN'10). Oslo, November 2010. [pdf]
  • Audun Jøsang and Stephen O'Hara. The Base-Rate Fallacy in Belief Reasoning. In the proceedings of the 13th International Conference on Information Fusion (FUSION 2010), Edinburg, July 2010. [pdf]
  • Audun Jøsang and Stephen O'Hara. Multiplication of Multinomial Subjective Opinions. International Conference on Information Processing and Management of Uncertainty (IPMU 2010), Dortmund, July 2010. [pdf]
  • Audun Jøsang, Stephen O'Hara and Kristi O'Grady. Base Rates for Belief Functions. Workshop on the Theory on Belief Functions (Belief 2010), Brest, April 2010. [pdf]
  • Audun Jøsang, Javier Diaz and Maria Rifqi. Cumulative and Averaging Fusion of Beliefs. Information Fusion, ISSN: 1566-2535, 11(2), April 2010, p.192-200. [pdf]
  • Touhid Bhuiyan, Yue Xu, Audun Jøsang, Huizhi Liang and Clive Cox. Developing Trust Networks Based on User Tagging Information for Recommendation Making. The 11th International Conference on Web Information Systems Engineering (WISE 2010), Springer, ISBN: 978-3-642-17615-9. 12-14 December, 2010, Hong Kong, China.
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. SimTrust: A New Method of Trust Network Generation. The 6th International Symposium on Trusted Computing and Communications, IEEE, ISBN: 978-0-7695-4322-2. 11-13 Dec, 2010, Hong Kong, China.
  • Touhd Bhuiyan, Audun Jøsang and Yue Xu. Managing Trust in Online Social Networks. B. Furht, (editor) Handbook of Social Network Technologies and Applications. Springer Publishing, ISBN: 978-1-4419-7141-8, USA, 2010.
  • Touhid Bhuiyan, Audun Jøsang and Yue Xu. Trust and Reputation Management in Web-based Social Network. Z. Usmani (editor), Web Intelligence and Intelligent Agents. In-Tech, Croatia, ISBN: 978-953-7619-85-5. ISBN 978-953-7619-85-5, pp. 207-232.
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. The Potential Relationship between Trust and Interest Similarity. The 11th International Conference on Internet Computing. 12-15 July, 2010, Nevada, USA. CSREA Press 2010, ISBN: 1-60132-149-X
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. A Review of Trust in Online Social Networks to Explore New Research Agenda. The 11th International Conference on Internet Computing. 12-15 July, 2010, Nevada, USA. CSREA Press 2010, ISBN: 1-60132-149-X.

Published 2009

  • Audun Jøsang and Jennifer Golbeck. Challenges for Robust of Trust and Reputation Systems. Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009). Saint Malo, France, September 2009. [pdf]
  • Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar. Security Usability of Petname Systems. Proceedings of the 14th Nordic Workshop on Secure IT systems (NordSec 2009) Oslo, Norway, October 2009. [pdf]
  • Anne Ruste Flø and Audun Jøsang. Consequences of Botnets Spreading to Mobile Devices. Short-Paper Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009). Oslo, October 2009 [pdf]
  • Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous and Ravishankar Borgaonkar. Spam Filter Optimality Based on Signal Detection Theory. In the Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009). Cyprus, October 2009. [pdf]
  • Bandar Alhaqbani, Audun Jøsang, and Colin Fidge. A Medical Data Reliability Assessment Model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), August 2009, pp.64-78.
  • Audun Jøsang and Walter Quattrociocchi. Advanced Features in Bayesian Reputation Systems. Proceedings of the 6th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'09), Linz, Austria, August-September, 2009. [pdf]
  • Audun Jøsang. Fission of Opinions in Subjective Logic. In the proceedings of the 12th International Conference on Information Fusion (FUSION 2009), Seattle, July 2009. [pdf]
  • Suriadi Suriadi, Ernest Foo and Audun Jøsang. A User-Centric Federated Single Sign-on System. Journal of Network and Computer Applications. 32(2), 2009, pp.388-401.
  • Audun Jøsang, Torleiv Maseng and Svein J. Knapskog (Eds.) (editors). Identity and Privacy in the Internet Age. 14th Nordic Conference on Secure IT Systems (NordSec 2009). Oslo, Norway, 14-16 October 2009. Lecture Notes in Computer Science, Vol. 5838. ISBN: 978-3-642-04765-7. Springer Verlag 2009.
  • Audun Jøsang, Torleiv Maseng and Svein J. Knapskog (Eds.). Short paper proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009). Oslo, Norway, 14-16 October 2009. Published by UNIK, October 2012. [pdf]

Published 2008

  • Audun Jøsang, Xixi Luo and Xiaowu Chen. Continuous Ratings in Discrete Bayesian Reputation Systems. Proceedings of IFIPTM 2008. Trondheim, June 2008. [pdf]
  • Audun Jøsang, Touhid Bhuiyan, Yue Xu and Clive Cox. Combining Trust and Reputation Management for Web-Based Services. Proceedings of the 5th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'08). Turin, September 2008. [pdf(preprint)]
  • Audun Jøsang and Touhid Bhuiyan. Optimal Trust Network Analysis with Subjective Logic. Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), Cap Esterel, France, August 2008. [pdf]
  • Audun Jøsan. Cumulative and Averaging Unfusion of Beliefs. Proceedings of IPMU 2008. Malaga, June 2008. [pdf]
  • Audun Jøsang. Abductive Reasoning with Uncertainty. Proceedings of the International Conference on Information Processing and Management of Uncertainty (IPMU 2008). Malaga, June 2008. [pdf]
  • Audun Jøsang. Online Reputation Systems for the Health Sector. Electronic Journal of Health Informatics (http://www.ejhi.net/), 3(1), e8, 2008. [pdf]
  • Audun Jøsang. Conditional Reasoning with Subjective Logic. Journal of Multiple-Valued Logic and Soft Computing, 15(1), pp.5-38, 2008. [pdf(preprint)]
  • Audun Jøsang and Bander AlFayyadh. Robust WYSIWYS: A Method For Ensuring that What You See Is What You Sign. Proceedings of the Australasian Information Security Conference (AISC'08), Wollongong, Australia, January 2008. [pdf]
  • Mohammed AlZomai, Bander AlFayyadh, Audun Jøsang and Adrian McCullagh. An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. Proceedings of the Australasian Information Security Conference (AISC'08), Wollongong, Australia, January 2008. [pdf]
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. Integrating trust with public reputation in location-based social networks for recommendation making. Proceedings of IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2008), 2008 Volume 3, p.107-110

Published 2007

  • Audun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Alzomai and Judith McNamara. Security Usability Principles for Vulnerability Analysis and Risk Assessment. Proceedings of the Annual Computer Security Applications Conference (ACSAC'07) Miami Beach, December 2007. [pdf]
  • Audun Jøsang. Trust and Reputation Systems. In A. Aldini and R. Gorrieri (Eds.), Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures. Springer LNCS 4677. ISBN 978-3-540-74809-0. Bertinoro, Italy, September 2007. [pdf]
  • Audun Jøsang and Zied Elouedi. Interpreting Belief Functions as Dirichlet Distributions. Proceedings of the 9th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU 2007). Hammamet, Tunisia. November, 2007. [pdf]
  • Suriadi Suriadi, Ernest Foo and Audun Jøsang. A User-centered Federated Single Sign-on System. Proceedings of IFIP International Workshop on Network and System Security (IFIP-NSS 2007). Dalian, China, Septembr 2007.
  • Suriadi Suriadi, Paul Ashley and Audun Jøsang. Future standardization areas in identity management systems. In Proceedings 2nd PRIME Standardization Workshop, Zurich, Switzerland, 2007.
  • Audun Jøsang and Jochen Haller. Dirichlet Reputation Systems. Proceedings of the Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, April 2007. [pdf]
  • Audun Jøsang, Mohammed AlZomai and Suriadi Suriadi. Usability and Privacy in Identity Management Architectures. Proceedings of the Australasian Information Security Workshop (AISW'07), Ballarat, January 2007. [pdf]
  • Audun Jøsang. Probabilistic Logic Under Uncertainty. Proceedings of Computing: The Australian Theory Symposium (CATS'07), Ballarat, January 2007. [pdf]
  • Audun Jøsang, Roslan Ismail, and Colin Boyd. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2), pages 618-644, March 2007. [pdf]

Published 2006

  • Audun Jøsang, Dieter Gollmann, Richard Au. A Method for Access Authorisation Through Delegation Networks. Proceedings of the Australasian Information Security Workshop (AISW'06), Hobart, January 2006. [pdf]
  • Audun Jøsang, Ross Hayward, Simon Pope. Trust Network Analysis with Subjective Logic. Proceedings of the Australasian Computer Science Conference (ACSC'06), Hobart, January 2006. [pdf]
  • Audun Jøsang, Elizabeth Gray and Michael Kinateder. Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems Journal. 4(2) 2006, pp.139-161. (preprint)[pdf]
  • Audun Jøsang, Simon Pope, and Stephen Marsh. Exploring Different Types of Trust Propagation. Proceedings of the 4th International Conference on Trust Management (iTrust'06), 2006. [pdf]
  • Audun Jøsang, Simon Pope, and David McAnally. Normalising the Consensus Operator for Belief Fusion. Proceedings of the International Conference on Information Processing and Management of Uncertainty (IPMU2006), 2006.
  • Audun Jøsang. Online Reputation Systems for the Health Sector. Proceedings of ehPASS, The National e-Health Privacy and Security Symposium, Brisbane, Australia, October, 2006.
  • Simon Pope, Audun Jøsang. and David McAnally. Formal Methods of Countering Deception and Misperception in Intelligence Analysis. Proceedings of the 11th International Command and Control Research Technology Symposium (ICCRTS'06), Cambridge, UK, 2006. [pdf]

Published 2005

  • Simon Pope and Audun Jøsang. Anlysis of Competing Hypothesis using Subjective Logic. Proceedings of the 10th International Command and Control Research Technology Symposium (ICCRTS'05), McLean Virginia, USA, 2005. [pdf]
  • Audun Jøsang and Simon Pope. User Centric Identity Management. Proceedings of AusCERT, Gold Coast, May 2005. [pdf]
  • Audun Jøsang, Claudia Keser, and Theo Dimitrakos. Can We Manage Trust?. Proceedings of the Third International Conference on Trust Management (iTrust'05), 2005. [pdf]
  • Audun Jøsang, Simon Pope and Milan Daniel. Conditional Deduction Under Uncertainty. Proceedings of the 8th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU 2005). Barcelona, Spain, July 2005.[pdf]
  • Audun Jøsang, John Fabre, Brian Hay, James Dalziel and Simon Pope. Trust Requirements in Identity Management. Proceedings of the Australasian Information Security Workshop (AISW'05), Newcastle, Australia, January-February 2005.[pdf]
  • Audun Jøsang and Simon Pope. Semantic Constraints for Trust Transitivity. Proceedings of the Second Asia-Pacific Conference on Conceptual Modelling (APCCM2005), Newcastle, Australia, January-February 2005.[pdf]
  • Ryan Wishart, Ricky Robinson, Jadwiga Indulska and Audun Jøsang. SuperstringRep: Reputation-enhanced Service Discovery. Proceedings of the Australasian Computer Science Conference (ACSC'05), Newcastle, Australia, January-February 2005.

Published 2004

  • Audun Jøsang, and David McAnally. Multiplication and Comultiplication of Beliefs. International Journal of Approximate Reasoning, 38(1), pp.19-51, 2004. [pdf]
  • Andrew Whitby, Audun Jøsang and Jadwiga Indulska. Filtering Out Unfair Ratings in Bayesian Reputation Systems. Proceedings of the Workshop on Trust in Agent Societies, at the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS2004), New York, July 2004. [pdf]
  • David McAnally and Audun Jøsang. Addition and Subtraction of Beliefs. Proceedings of the conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU2004), Perugia, July, 2004
  • Audun Jøsang and Stephane Lo Presti. Analysing the Relationship between Risk and Trust. In T. Dimitrakos (editor), Proceedings of the Second International Conference on Trust Management (iTrust'04), Oxford, April 2004. [pdf]
  • R. Ismail, C. Boyd, A. Jøsang, and S. Russell. Private Reputation Schemes for P2P Systems. Proceedings of the Second International Workshop on Security in Information Systems (WOSIS-2004), Porto, April, 2004.
  • R. Ismail, C. Boyd, A. Jøsang, and S. Russell. An Efficient Off-Line Reputation Scheme Using Articulated Certificates. Proceedings of the Second International Workshop on Security in Information Systems (WOSIS-2004), Porto, April, 2004.
  • A. Jøsang, D. Bradley and S.J. Knapskog. Belief-Based Risk Analysis. Proceedings of the Australasian Information Security Workshop (AISW'04), Dunedin, New Zealand, January 2004.[pdf]
  • D. Bradley and A. Jøsang. Mesmerize - an open framework for enterprise security management. Proceedings of the Australasian Information Security Workshop (AISW'04), Dunedin, New Zealand, January 2004.[pdf]
  • M.A. Patton and A. Jøsang. Technologies for Trust in Electronic Commerce. Electronic Commerce Research Journal, 4 (1&2), January 2004, pp. 9-21. [pdf]

Published 2003

  • A. Jøsang, E. Gray and M. Kinateder. Analysing Topologies of Transitive Trust. Proceedings of the Workshop of Formal Aspects of Security and Trust (FAST), Pisa, September 2003.
  • A. Jøsang and T. Grandison. Conditional Inference in Subjective Logic. Proceedings of the 6th International Conference on Information Fusion, Cairns 8-11 July 2003.
  • A. Jøsang, M. Daniel and P. Vannoorenberghe. Strategies for Combining Conflicting Dogmatic Beliefs. Proceedings of the 6th International Conference on Information Fusion, Cairns 8-11 July 2003.
  • R. Ismail, C. Boyd, A. Jøsang and S. Russell. Strong Privacy in Reputation Systems. Proceedings of the 4th International Workshop on Information Security Applications (WISA), Jeju Island, Korea, August, 2003. [pdf]
  • R. Ismail, C. Boyd, A. Jøsang and S. Russell. A Security Architecture for Reputation Systems. Proceedings of the 4th International Conference on E-Commerce and Web Technologies (EC-Web), Prague, September 2003.
  • T. Dimitrakos, I. Djordjevic, Z. Milosevic, A. Jøsang and C.I. Phillips. Contract Performance Assessment for Secure and Dynamic Virtual Collaborations. Proceedings of EDOC'03, Brisbane, September 2003.
  • A. Jøsang, S. Hird and E. Faccer. Simulating the Effect of Reputation Systems on e-Markets. Proceedings of the First International Conference on Trust Management (iTrust'03), Crete, May 2003.[pdf]
  • M.A. Patton and A. Jøsang. Technologien und Strategien zum Aufbau von Vertrauen im Electronic Commerce (in German). Appears in Petrovic, O. et al. (editors): Trust in the Network Economy, Evolaris Vol.2, ISBN 3-211-06853-8 Springer-Verlag, 2003.[pdf]
  • A. Jøsang and G. Sanderud. Security in Mobile Communications: Challenges and Opportunities. Proceedings of the Australasian Information Security Workshop (AISW'03), Adelaide, Australia, February 2003.[pdf]
  • A. Jøsang and M.A. Patton. User Interface Requirements for Authentication of Communicatinon. Proceedings of the Australasian User Interface Conference, Adelaide, Australia, February 2003.[pdf]

Published 2002

  • A. Jøsang. The Consensus Operator for Combining Beliefs. Artificial Intelligence Journal, 142(1-2), Oct. 2002, p.157-170 [pdf]
  • Z. Milosevic, A. Jøsang, T. Dimitrakos and M.A.Patton. Discretionary Enforcement of Electronic Contracts. Proceedings of the 6th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2002). Lausanne, Switzerland, 17-20 September, 2002.[pdf]
  • A. Jøsang, D. Povey and A. Ho. What You See is Not Always What You Sign. Proceedings of the Australian Unix User Group Symposium (AUUG2002), Melbourne, 4-6 September, 2002. [pdf]
  • A. Jøsang. Subjective Evidential Reasoning. Proceedings of the 9th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2002), Annecy, France, 1-5 July, 2002. [pdf]
  • A. Jøsang and R. Ismail. The Beta Reputation System. Proceedings of the 15th Bled Conference on Electronic Commerce, Bled, Slovenia, 17-19 June 2002. [pdf]

Published 2001

  • H. Svensson and A. Jøsang. Correlation of Intrusion Alarms with Subjective Logic. Proceedings of the sixth Nordic Workshop on Secure IT systems (NordSec 2001), Copenhagen, Denmark, 1-2 November, 2001.[pdf]
  • M.A. Patton and A. Jøsang. Technologies for Trust in E-Commerce. Proceedings of the IFIP working conference on E-Commerce, Salzburg, Austria, June 2001.
  • A. Jøsang, P.M. Møllerud and E. Cheung. Web Security: The Emperor's New Armour. Proceedings of the European Conference on Information Systems (ECIS2001), Bled, Slovenia, June 2001. [pdf]
  • A. Jøsang, M.A. Patton and A. Ho. Authentication for Humans. Proceedings of the 9th International Conference on Telecommunication Systems. Dallas, March 2001. [pdf]
  • A. Jøsang. A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 9(3), pp.279-311, June 2001. [pdf]

Published 2000

  • A. Jøsang, I.G. Pedersen and D. Povey. PKI seeks a trusting relationship. Proceedings of the Fifth Australasian Conference on Information Security and Privacy (ACISP 2000), Brisbane, July 2000. Springer. [pdf]
  • A. Jøsang and V.A. Bondi. Legal Reasoning with Subjective Logic. Artificial Intelligence and Law, 8(4), pp.289-315, Kluwer 2000.

Published 1999

  • A. Jøsang, M.G.L. Bijnagte and G. Kleinhuis. Enabling Factors for IN Service Provider Access. In T.Yongchareon, F.A. Aagesen and V. Wuwongse, editors, Proceedings of IFIP/SmartNet99, Bangkok, Thailand, Kluwer,1999. [pdf]
  • A. Jøsang, H. Meling and M. Lu. The developmnet of public-key infrastructures; Are we on the right path?. In S. Storøy et al., editors, Proceedings of the Norwegian Informatics Conference (NIK'99), Trondheim, Norway, NTNU, 1999. [pdf]
  • A. Jøsang. Trust-based decision making for electronic transactions. In L.Yngström and T.Svensson, editors, Proceedings of the Fourth Nordic Workshop on Secure IT Systems (NordSec 1999), Stockholm, Sweden, Stockholm University Report 99-005, 1999. [pdf]
  • A. Jøsang. Open IN Service Provider Access. In V.Leonardo, editor, Proceedings of the Conference on Integrating Intelligent Networks and Computer Telephony, IBC Global Conferences, 1999. [pdf]
  • A. Jøsang. An Algebra for Assessing Trust in Certification Chains. In J.Kochmar, editor, Proceedings of the Network and Distributed Systems Security (NDSS'99) Symposium, The Internet Society, 1999. [pdf]

Published 1998

  • A. Jøsang. A hard problem: Disclosing how to break public key cryptosystems. In S.J.Knapskog and T.Brekne, editors, Proceedings of the Third Nordic Workshop on Secure IT Systems (NordSec 1998), 1998. [pdf]
  • A. Jøsang. A subjective metric of authentication. In D.Gollmann, editor, Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS'98), Springer-Verlag, 1998. [pdf]
  • A. Jøsang. Reliability Analysis with Uncertain Probabilities. In S.Mosleh and R.A.Bari, editors, Proceedings of the 4th International Conference on Probabilistic Safety Assessment and Management (PSAM), Springer, New York, 1998.
  • A. Jøsang and S.J. Knapskog, A metric for trusted systems (full paper). Proceedings of the 21st National Security Conference, NSA 1998. [pdf]
  • A. Jøsang and S.J. Knapskog, A metric for trusted systems (short paper). In Reinhard Posch, editor, Proceedings of the 1998 IFIP/SEC International Information Security Conference, Kluwer, 1998.

Published 1997

  • A. Jøsang. A Model for Trust in Security Systems. Proceedings of the Second Nordic Workshop on Secure Computer Systems (NordSec 1997), 1997.
  • A. Jøsang. Artificial Reasoning with Subjective Logic. Proceedings of the Second Australian Workshop on Commonsense Reasoning, Perth 1997. [pdf]
  • A. Jøsang. A Trust Policy Framework. Proceedings of the 1997 International Conference on Information and Communication Security (ICICS), Springer-Verlag, 1997.
  • A. Jøsang. Prospectives for Modelling Trust in Information Security. Proceedings of the 1997 Australasian Conference on Information Security and Privacy (ACISP), Springer, 1997. [pdf]
  • A. Jøsang. F. Van Laenen, S.J. Knapskog, J. Vandewalle, How to trust systems. Proceedings of the 1997 IFIP-SEC International Information Security Conference, IFIP, 1997. [pdf]

Published 1996

  • A. Jøsang. The right type of trust for distributed systems. Proceedings of the 1996 New Security Paradigms Workshop (NSPW), ACM, 1996. [pdf]
  • A. Jøsang and K. Johannessen, Authentication in analogue telephone access networks. Proceedings of PRAGOCRYPT '96, pp.324-336, CTU Publishing House, Prague, 1996. [pdf]

Published 1995

  • A. Jøsang. Security protocol verification using SPIN, in J-Ch. Gregoire, editor, Proceedings of the First SPIN Workshop, INRS-Telecommunications, Montreal, Canada, 1995. [pdf]
  • A. Jøsang. The difficulty of standardizing smart card security evaluation. Computer Standards and Interfaces Journal, 17, September 1995, pp.333-341. [pdf]
Published Dec. 4, 2023 7:55 AM - Last modified Apr. 22, 2024 10:17 AM