2008 |
46 | EE | Mohammed Aizomai,
Audun Jøsang,
Adrian McCullagh,
Ernest Foo:
Strengthening SMS-Based Authentication through Usability.
ISPA 2008: 683-688 |
45 | EE | Audun Jøsang,
Touhid Bhuiyan:
Optimal Trust Network Analysis with Subjective Logic.
SECURWARE 2008: 179-184 |
44 | EE | Audun Jøsang,
Touhid Bhuiyan,
Yue Xu,
Clive Cox:
Combining Trust and Reputation Management for Web-Based Services.
TrustBus 2008: 90-99 |
43 | EE | Touhid Bhuiyan,
Yue Xu,
Audun Jøsang:
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making.
Web Intelligence/IAT Workshops 2008: 107-110 |
2007 |
42 | EE | Audun Jøsang,
Bander AlFayyadh,
Tyrone Grandison,
Mohammed AlZomai,
Judith McNamara:
Security Usability Principles for Vulnerability Analysis and Risk Assessment.
ACSAC 2007: 269-278 |
41 | EE | Audun Jøsang,
Muhammed Al Zomai,
Suriadi Suriadi:
Usability and Privacy in Identity Management Architectures.
ACSW Frontiers 2007: 143-152 |
40 | EE | Audun Jøsang,
Jochen Haller:
Dirichlet Reputation Systems.
ARES 2007: 112-119 |
39 | EE | Audun Jøsang:
Probabilistic Logic under Uncertainty.
CATS 2007: 101-110 |
38 | EE | Audun Jøsang,
Zied Elouedi:
Interpreting Belief Functions as Dirichlet Distributions.
ECSQARU 2007: 393-404 |
37 | EE | Audun Jøsang:
Trust and Reputation Systems.
FOSAD 2007: 209-245 |
36 | EE | Audun Jøsang:
Cumulative and Averaging Fission of Beliefs
CoRR abs/0712.1182: (2007) |
35 | EE | Audun Jøsang,
Roslan Ismail,
Colin Boyd:
A survey of trust and reputation systems for online service provision.
Decision Support Systems 43(2): 618-644 (2007) |
2006 |
34 | EE | Audun Jøsang,
Ross Hayward,
Simon Pope:
Trust network analysis with subjective logic.
ACSC 2006: 85-94 |
33 | EE | Audun Jøsang,
Dieter Gollmann,
Richard Au:
A method for access authorisation through delegation networks.
ACSW Frontiers 2006: 165-174 |
32 | EE | Audun Jøsang,
Stephen Marsh,
Simon Pope:
Exploring Different Types of Trust Propagation.
iTrust 2006: 179-192 |
31 | EE | Audun Jøsang:
Belief Calculus
CoRR abs/cs/0606029: (2006) |
30 | EE | Audun Jøsang:
The Cumulative Rule for Belief Fusion
CoRR abs/cs/0606066: (2006) |
29 | EE | Audun Jøsang,
Elizabeth Gray,
Michael Kinateder:
Simplification and analysis of transitive trust networks.
Web Intelligence and Agent Systems 4(2): 139-161 (2006) |
2005 |
28 | EE | Audun Jøsang,
John Fabre,
Brian Hay,
James Dalziel,
Simon Pope:
Trust Requirements in Identity Management.
ACSW Frontiers 2005: 99-108 |
27 | EE | Audun Jøsang,
Simon Pope:
Semantic Constraints for Trust Transitivity.
APCCM 2005: 59-68 |
26 | EE | Audun Jøsang,
Simon Pope,
Milan Daniel:
Conditional Deduction Under Uncertainty.
ECSQARU 2005: 824-835 |
25 | EE | Audun Jøsang,
Claudia Keser,
Theodosis Dimitrakos:
Can We Manage Trust?
iTrust 2005: 93-107 |
24 | EE | Audun Jøsang,
David McAnally:
Multiplication and comultiplication of beliefs.
Int. J. Approx. Reasoning 38(1): 19-51 (2005) |
2004 |
23 | EE | Daniel Bradley,
Audun Jøsang:
Mesmerize - an open framework for enterprise security management.
ACSW Frontiers 2004: 37-42 |
22 | EE | Audun Jøsang,
Daniel Bradley,
Svein J. Knapskog:
Belief-Based Risk Analysis.
ACSW Frontiers 2004: 63-68 |
21 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
Private Reputation Schemes for P2P systems.
WOSIS 2004: 196-206 |
20 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
WOSIS 2004: 53-62 |
19 | EE | Audun Jøsang,
Stéphane Lo Presti:
Analysing the Relationship between Risk and Trust.
iTrust 2004: 135-145 |
18 | EE | Mary Anne Patton,
Audun Jøsang:
Technologies for Trust in Electronic Commerce.
Electronic Commerce Research 4(1-2): 9-21 (2004) |
2003 |
17 | EE | Audun Jøsang,
Gunnar Sanderud:
Security in Mobile Communications: Challenges and Opportunities.
ACSW Frontiers 2003: 43-48 |
16 | EE | Audun Jøsang,
Mary Anne Patton:
User Interface Requirements for Authentication of Communication.
AUIC 2003: 75-80 |
15 | EE | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
A Security Architecture for Reputation Systems.
EC-Web 2003: 176-185 |
14 | EE | Theodosis Dimitrakos,
Ivan Djordjevic,
Zoran Milosevic,
Audun Jøsang,
Chris I. Phillips:
Contract Performance Assessment for Secure and Dynamic Virtual Collaborations.
EDOC 2003: 62-75 |
13 | EE | Audun Jøsang,
Shane Hird,
Eric Faccer:
Simulating the Effect of Reputation Systems on E-markets.
iTrust 2003: 179-194 |
2002 |
12 | EE | Zoran Milosevic,
Audun Jøsang,
Theodosis Dimitrakos,
Mary Anne Patton:
Discretionary Enforcement of Electronic Contracts.
EDOC 2002: 39-50 |
11 | EE | Audun Jøsang:
The consensus operator for combining beliefs.
Artif. Intell. 141(1/2): 157-170 (2002) |
2001 |
10 | EE | Audun Jøsang,
Peter M. Møllerud,
Eddy Cheung:
Web Security: The Emperor's New Armour.
ECIS 2001 |
9 | EE | Audun Jøsang:
A Logic for Uncertain Probabilities.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3): 279-212 (2001) |
2000 |
8 | | Audun Jøsang,
Ingar Glenn Pedersen,
Dean Povey:
PKI Seeks a Trusting Relationship.
ACISP 2000: 191-205 |
7 | EE | Audun Jøsang,
Viggo A. Bondi:
Legal reasoning with subjective logic.
Artif. Intell. Law 8(4): 289-315 (2000) |
1999 |
6 | EE | Audun Jøsang:
An Algebra for Assessing Trust in Certification Chains.
NDSS 1999 |
5 | | Audun Jøsang,
M. G. L. Bijnagte,
Geert Kleinhuis:
Enabling Factors for IN Service Provider Access.
SMARTNET 1999: 375-388 |
1998 |
4 | EE | Audun Jøsang:
A Subjective Metric of Authentication.
ESORICS 1998: 329-344 |
1997 |
3 | | Audun Jøsang:
Prospectives for Modelling Trust in Information Security.
ACISP 1997: 2-13 |
2 | | Audun Jøsang:
A Trust policy framework.
ICICS 1997: 192-202 |
1 | | Audun Jøsang,
F. Van Laenen,
Svein J. Knapskog,
Joos Vandewalle:
How to trust systems.
SEC 1997: 241-252 |