dblp.uni-trier.dewww.uni-trier.de

Christian Damsgaard Jensen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2007
30EEStephen Farrell, Christian Damsgaard Jensen: "End-by-Hop" Data Integrity. ESAS 2007: 142-155
2006
29EEDan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen: Program Partitioning Using Dynamic Trust Models. Formal Aspects in Security and Trust 2006: 170-184
28EEJean-Marc Seigneur, Christian Damsgaard Jensen: Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06). SAC 2006: 1854
27EEChristian Damsgaard Jensen, Paul O'Connell: Trust-Based Route Selection in Dynamic Source Routing. iTrust 2006: 150-163
26EEElizabeth Gray, Christian Damsgaard Jensen, Paul O'Connell, Stefan Weber, Jean-Marc Seigneur, Yong Chen: Trust Evolution Policies for Security in Collaborative Ad Hoc Applications. Electr. Notes Theor. Comput. Sci. 157(3): 95-111 (2006)
2005
25EEJean-Marc Seigneur, Christian Damsgaard Jensen: Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK). SAC 2005: 1569
24EEJean-Marc Seigneur, Alan Gray, Christian Damsgaard Jensen: Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. iTrust 2005: 321-337
23EEJean-Marc Seigneur, Christian Damsgaard Jensen: The Claim Tool Kit for ad hoc recognition of peer entities. Sci. Comput. Program. 54(1): 49-71 (2005)
2004
22 Christian Damsgaard Jensen, Stefan Poslad, Theodosis Dimitrakos: Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings Springer 2004
21EEJean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen: Combating Spam with TEA. PST 2004: 47-58
20EEStephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen: Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. PST 2004: 89-101
19EEJean-Marc Seigneur, Christian Damsgaard Jensen: Trust enhanced ubiquitous payment without too much privacy loss. SAC 2004: 1593-1599
18EEJean-Marc Seigneur, Christian Damsgaard Jensen: Trading Privacy for Trust. iTrust 2004: 93-107
2003
17 Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray: Risk Probability Estimating Based on Clustering. IAW 2003: 229-233
16EEJean-Marc Seigneur, Gregory Biegel, Christian Damsgaard Jensen: P2P with JXTA-Java pipes. PPPJ 2003: 207-212
15 Joerg Abendroth, Christian Damsgaard Jensen: A Unified Security Framework for Networked Applications. SAC 2003: 351-357
14EEJoerg Abendroth, Christian Damsgaard Jensen: Partial outsourcing: a new paradigm for access control. SACMAT 2003: 134-141
13EEAnthony Harrington, Christian Damsgaard Jensen: Cryptographic access control in a distributed file system. SACMAT 2003: 158-165
12EEJean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen: End-to-End Trust Starts with Recognition. SPC 2003: 130-142
11EEElizabeth Gray, Jean-Marc Seigneur, Yong Chen, Christian Damsgaard Jensen: Trust Propagation in Small Worlds. iTrust 2003: 239-254
10EEJean-Marc Seigneur, Christian Damsgaard Jensen: Privacy Recovery with Disposable Email Addresses. IEEE Security & Privacy 1(6): 35-39 (2003)
2002
9EEJohan Andersson, Stefan Weber, Christian Damsgaard Jensen, Vinny Cahill: PEM3 - The Policy Enhanced Memory Management Model. POLICY 2002: 194-197
2001
8EEChristian Damsgaard Jensen: Fingerprinting Text in Logical Markup Languages. ISC 2001: 433-445
2000
7EEChristian Damsgaard Jensen: CryptoCache: a secure sharable file cache for roaming users. ACM SIGOPS European Workshop 2000: 73-78
6EEBenjamin Aziz, Christian Damsgaard Jensen: Adaptability in CORBA: The Mobile Proxy Approach. DOA 2000: 295-304
1999
5 Jan Vitek, Christian Damsgaard Jensen: Secure Internet Programming, Security Issues for Mobile and Distributed Objects Springer 1999
1998
4EEChristian Damsgaard Jensen, Daniel Hagimont: Protection wrappers: a simple and portable sandbox for untrusted applications. ACM SIGOPS European Workshop 1998: 104-110
3EEChristian Damsgaard Jensen, Daniel Hagimont: Protection Reconfiguration for Reusable Software. CSMR 1998: 74-81
2EEChristian Damsgaard Jensen, George Coulouris, Daniel Hagimont: ECOOP Workshop on Distributed Object Security. ECOOP Workshops 1998: 273-276
1EEChristian Damsgaard Jensen, Daniel Hagimont: Mutual Suspicion in a Generic Object-Support System. ECOOP Workshops 1998: 278

Coauthor Index

1Joerg Abendroth [14] [15]
2Johan Andersson [9]
3Benjamin Aziz [6]
4Gregory Biegel [16]
5Ciarán Bryce [21]
6Vinny Cahill [9]
7Yong Chen [11] [12] [17] [26]
8George Coulouris [2]
9Theodosis Dimitrakos [22]
10Nathan Dimmock [21]
11Stephan J. Engberg [20]
12Stephen Farrell [12] [30]
13Alan Gray [24]
14Elizabeth Gray [11] [12] [17] [26]
15Daniel Hagimont [1] [2] [3] [4]
16René Rydhof Hansen [29]
17Morten Borup Harning [20]
18Anthony Harrington [13]
19Paul O'Connell [26] [27]
20Stefan Poslad [22]
21Christian W. Probst [29]
22Jean-Marc Seigneur [10] [11] [12] [16] [17] [18] [19] [21] [23] [24] [25] [26] [28]
23Dan Søndergaard [29]
24Jan Vitek [5]
25Stefan Weber [9] [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)