2008 |
8 | EE | Judith E. Y. Rossebø,
Rolv Bræk:
Using Composition Policies to Manage Authentication and Authorization Patterns and Services.
ARES 2008: 597-603 |
7 | EE | Judith E. Y. Rossebø,
Ragnhild Kobro Runde:
Specifying Service Composition Using UML 2.x and Composition Policies.
MoDELS 2008: 520-536 |
2007 |
6 | EE | Judith E. Y. Rossebø,
Scott Cadzow,
Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope.
ARES 2007: 925-933 |
2006 |
5 | EE | Judith E. Y. Rossebø,
Rolv Bræk:
Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition.
ARES 2006: 206-215 |
4 | EE | Gerhard Skagestein,
Are Vegard Haug,
Einar Nødtvedt,
Judith E. Y. Rossebø:
How to Create Trust in Electronic Voting over an Untrusted Platform.
Electronic Voting 2006: 107-116 |
3 | EE | Judith E. Y. Rossebø,
Scott Cadzow,
Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.
iTrust 2006: 467-471 |
2 | EE | Judith E. Y. Rossebø,
Rolv Bræk:
A Policy-driven Approach to Dynamic Composition of Authentication and Authorization Patterns and Services.
JCP 1(8): 13-26 (2006) |
2003 |
1 | EE | Judith E. Y. Rossebø,
John Ronan,
Kristian Walsh:
Authentication Issues in Multi-service Residential Access Networks.
MMNS 2003: 381-395 |