The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jon Ølnes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jon Ølnes, Leif Buene
    Use of a Validation Authority to Provide Risk Management for the PKI Relying Party. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:1-15 [Conf]
  2. Jon Ølnes
    A Taxonomy for Trusted Services. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:31-44 [Conf]
  3. Jon Ølnes, Annikken Bonnevie Seip
    On Long-Term Storage of Digitally Signed Documents. [Citation Graph (0, 0)][DBLP]
    I3E, 2002, pp:115-130 [Conf]
  4. François Gagnon, Dominique Maillot, Jon Ølnes, Lars Hofseth, Lionel Sacks
    A Security Architecture for TMN Inter-Domain Management. [Citation Graph (0, 0)][DBLP]
    IS&N, 1997, pp:417-426 [Conf]
  5. Dominique Maillot, Jon Ølnes, Pål Spilling
    IN Service Security and Service Management Security and their Relationships - Using UPT as a Case Study. [Citation Graph (0, 0)][DBLP]
    IS&N, 1994, pp:513-524 [Conf]
  6. Dominique Maillot, Jon Ølnes, Pål Spilling
    A TTP-based Architecture for TMN Security and Privacy. [Citation Graph (0, 0)][DBLP]
    IS&N, 1995, pp:52-63 [Conf]
  7. Kristian Schelderup, Jon Ølnes
    Mobile Agent Security - Issues and Directions. [Citation Graph (0, 0)][DBLP]
    IS&N, 1999, pp:155-167 [Conf]
  8. Jon Ølnes, Pål Spilling, Andrew Berquist
    Security in Use and Management of VPN - a Banking Scenario. [Citation Graph (0, 0)][DBLP]
    IS&N, 1994, pp:493-502 [Conf]
  9. Jon Ølnes, Matthieu Verdier, Nicolas Ganivet, Dominique Maillot, Jonn Skretting
    Public Key Infrastructure and Certification Policy for Inter - domain Management. [Citation Graph (0, 0)][DBLP]
    IS&N, 1998, pp:521-534 [Conf]
  10. Nils Harald Berge, Jon Ølnes
    Firewalls in an OSI-environment. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:12, pp:982-989 [Journal]
  11. Jon Ølnes
    EDIFACT security made simple - the EDIMED approach. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:8, pp:765-774 [Journal]
  12. Jon Ølnes
    Development of security policies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:8, pp:628-636 [Journal]

  13. Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. [Citation Graph (, )][DBLP]


  14. Electronic Signatures for Public Procurement across Europe. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002