The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Audun Jøsang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Audun Jøsang
    Prospectives for Modelling Trust in Information Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:2-13 [Conf]
  2. Audun Jøsang, Ingar Glenn Pedersen, Dean Povey
    PKI Seeks a Trusting Relationship. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:191-205 [Conf]
  3. Audun Jøsang, Ross Hayward, Simon Pope
    Trust network analysis with subjective logic. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:85-94 [Conf]
  4. Daniel Bradley, Audun Jøsang
    Mesmerize - an open framework for enterprise security management. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:37-42 [Conf]
  5. Audun Jøsang, Dieter Gollmann, Richard Au
    A method for access authorisation through delegation networks. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:165-174 [Conf]
  6. Audun Jøsang, Daniel Bradley, Svein J. Knapskog
    Belief-Based Risk Analysis. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:63-68 [Conf]
  7. Audun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope
    Trust Requirements in Identity Management. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:99-108 [Conf]
  8. Audun Jøsang, Gunnar Sanderud
    Security in Mobile Communications: Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:43-48 [Conf]
  9. Audun Jøsang, Simon Pope
    Semantic Constraints for Trust Transitivity. [Citation Graph (0, 0)][DBLP]
    APCCM, 2005, pp:59-68 [Conf]
  10. Audun Jøsang, Mary Anne Patton
    User Interface Requirements for Authentication of Communication. [Citation Graph (0, 0)][DBLP]
    AUIC, 2003, pp:75-80 [Conf]
  11. Audun Jøsang, Peter M. Møllerud, Eddy Cheung
    Web Security: The Emperor's New Armour. [Citation Graph (0, 0)][DBLP]
    ECIS, 2001, pp:- [Conf]
  12. Audun Jøsang, Simon Pope, Milan Daniel
    Conditional Deduction Under Uncertainty. [Citation Graph (0, 0)][DBLP]
    ECSQARU, 2005, pp:824-835 [Conf]
  13. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    A Security Architecture for Reputation Systems. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:176-185 [Conf]
  14. Theodosis Dimitrakos, Ivan Djordjevic, Zoran Milosevic, Audun Jøsang, Chris I. Phillips
    Contract Performance Assessment for Secure and Dynamic Virtual Collaborations. [Citation Graph (0, 0)][DBLP]
    EDOC, 2003, pp:62-75 [Conf]
  15. Zoran Milosevic, Audun Jøsang, Theodosis Dimitrakos, Mary Anne Patton
    Discretionary Enforcement of Electronic Contracts. [Citation Graph (0, 0)][DBLP]
    EDOC, 2002, pp:39-50 [Conf]
  16. Audun Jøsang
    A Subjective Metric of Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:329-344 [Conf]
  17. Audun Jøsang
    A Trust policy framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:192-202 [Conf]
  18. Audun Jøsang, Shane Hird, Eric Faccer
    Simulating the Effect of Reputation Systems on E-markets. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:179-194 [Conf]
  19. Audun Jøsang, Claudia Keser, Theodosis Dimitrakos
    Can We Manage Trust? [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:93-107 [Conf]
  20. Audun Jøsang, Stephen Marsh, Simon Pope
    Exploring Different Types of Trust Propagation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:179-192 [Conf]
  21. Audun Jøsang, Stéphane Lo Presti
    Analysing the Relationship between Risk and Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:135-145 [Conf]
  22. Audun Jøsang
    An Algebra for Assessing Trust in Certification Chains. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  23. Audun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle
    How to trust systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:241-252 [Conf]
  24. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    An Efficient Off-Line Reputation Scheme Using Articulated Certificates. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:53-62 [Conf]
  25. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    Private Reputation Schemes for P2P systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:196-206 [Conf]
  26. Audun Jøsang, M. G. L. Bijnagte, Geert Kleinhuis
    Enabling Factors for IN Service Provider Access. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 1999, pp:375-388 [Conf]
  27. Audun Jøsang
    The consensus operator for combining beliefs. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2002, v:141, n:1/2, pp:157-170 [Journal]
  28. Audun Jøsang, Viggo A. Bondi
    Legal reasoning with subjective logic. [Citation Graph (0, 0)][DBLP]
    Artif. Intell. Law, 2001, v:8, n:4, pp:289-315 [Journal]
  29. Audun Jøsang, Roslan Ismail, Colin Boyd
    A survey of trust and reputation systems for online service provision. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:43, n:2, pp:618-644 [Journal]
  30. Mary Anne Patton, Audun Jøsang
    Technologies for Trust in Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:9-21 [Journal]
  31. Audun Jøsang, David McAnally
    Multiplication and comultiplication of beliefs. [Citation Graph (0, 0)][DBLP]
    Int. J. Approx. Reasoning, 2005, v:38, n:1, pp:19-51 [Journal]
  32. Audun Jøsang
    A Logic for Uncertain Probabilities. [Citation Graph (0, 0)][DBLP]
    International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, v:9, n:3, pp:279-212 [Journal]
  33. Audun Jøsang, Elizabeth Gray, Michael Kinateder
    Simplification and analysis of transitive trust networks. [Citation Graph (0, 0)][DBLP]
    Web Intelligence and Agent Systems, 2006, v:4, n:2, pp:139-161 [Journal]
  34. Audun Jøsang, Zied Elouedi
    Interpreting Belief Functions as Dirichlet Distributions. [Citation Graph (0, 0)][DBLP]
    ECSQARU, 2007, pp:393-404 [Conf]
  35. Audun Jøsang
    Trust and Reputation Systems. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:209-245 [Conf]
  36. Audun Jøsang
    Belief Calculus [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  37. Audun Jøsang
    The Cumulative Rule for Belief Fusion [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  38. Dirichlet Reputation Systems. [Citation Graph (, )][DBLP]


  39. Security Usability Principles for Vulnerability Analysis and Risk Assessment. [Citation Graph (, )][DBLP]


  40. Usability and Privacy in Identity Management Architectures. [Citation Graph (, )][DBLP]


  41. Probabilistic Logic under Uncertainty. [Citation Graph (, )][DBLP]


  42. Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making. [Citation Graph (, )][DBLP]


  43. Multiplication of Multinomial Subjective Opinions. [Citation Graph (, )][DBLP]


  44. Strengthening SMS-Based Authentication through Usability. [Citation Graph (, )][DBLP]


  45. Combining Trust and Reputation Management for Web-Based Services. [Citation Graph (, )][DBLP]


  46. Advanced Features in Bayesian Reputation Systems. [Citation Graph (, )][DBLP]


  47. Privacy Policy Referencing. [Citation Graph (, )][DBLP]


  48. Optimal Trust Network Analysis with Subjective Logic. [Citation Graph (, )][DBLP]


  49. Security Usability of Petname Systems. [Citation Graph (, )][DBLP]


  50. Spam filter optimality based on signal detection theory. [Citation Graph (, )][DBLP]


  51. Cumulative and Averaging Fission of Beliefs [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002