关注
Christian Damsgaard Jensen
Christian Damsgaard Jensen
在 dtu.dk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Using trust for secure collaboration in uncertain environments
V Cahill, E Gray, JM Seigneur, CD Jensen, Y Chen, B Shand, N Dimmock, ...
IEEE pervasive computing 2 (3), 52-61, 2003
4962003
Trust propagation in small worlds
E Gray, JM Seigneur, Y Chen, C Jensen
Trust Management: First International Conference, iTrust 2003 Heraklion …, 2003
1662003
Cryptographic access control in a distributed file system
A Harrington, C Jensen
Proceedings of the eighth ACM symposium on Access control models and …, 2003
1452003
Trading privacy for trust
JM Seigneur, CD Jensen
International Conference on Trust Management, 93-107, 2004
1422004
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience.
SJ Engberg, MB Harning, CD Jensen
PST, 89-101, 2004
1272004
The application of software defined networking on securing computer networks: A survey
R Sahay, W Meng, CD Jensen
Journal of Network and Computer Applications 131, 89-108, 2019
952019
Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of
J Vitek, C Jensen
Lecture Notes in Computer Science, 0
70*
Attributes enhanced role-based access control model
QM Rajpoot, CD Jensen, R Krishnan
Trust, Privacy and Security in Digital Business: 12th International …, 2015
672015
End-to-end trust starts with recognition
JM Seigneur, S Farrell, CD Jensen, E Gray, Y Chen
Security in Pervasive Computing: First International Conference, Boppard …, 2004
652004
A systematic review of cyber-resilience assessment frameworks
DAS Estay, R Sahay, MB Barfod, CD Jensen
Computers & security 97, 101996, 2020
592020
Video surveillance: Privacy issues and legal compliance
QM Rajpoot, CD Jensen
Biometrics: Concepts, Methodologies, Tools, and Applications, 1335-1358, 2017
582017
Integrating attributes into role-based access control
QM Rajpoot, CD Jensen, R Krishnan
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
582015
Towards a framework for assessing trust-based admission control in collaborative ad hoc applications
E Gray, P O’Connell, C Jensen, S Weber, JM Seigneur, C Yong
Dept. of Computer Science, Trinity College Dublin, Technical Report 66, 2002
542002
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships
R Sahay, W Meng, DAS Estay, CD Jensen, MB Barfod
Future Generation Computer Systems 100, 736-750, 2019
482019
P2P with JXTA-Java pipes
JM Seigneur, G Biegel, CD Jensen
Proceedings of the 2nd international conference on Principles and practice …, 2003
482003
Security and privacy in video surveillance: requirements and challenges
QM Rajpoot, CD Jensen
IFIP international information security conference, 169-184, 2014
472014
Trust enhanced ubiquitous payment without too much privacy loss
JM Seigneur, CD Jensen
Proceedings of the 2004 ACM symposium on Applied computing, 1593-1599, 2004
472004
Trust-based route selection in dynamic source routing
CD Jensen, PO Connell
International conference on trust management, 150-163, 2006
462006
Privacy recovery with disposable email addresses
JM Seigneur, CD Jensen
IEEE Security & Privacy 1 (6), 35-39, 2003
422003
Trust transfer: Encouraging self-recommendations without sybil attack
JM Seigneur, A Gray, CD Jensen
Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005
382005
系统目前无法执行此操作,请稍后再试。
文章 1–20