Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Christian Damsgaard Jensen : Publications
[go: Go Back, main page]

Publications

J-M. Seigneur, A. Gray, C. Jensen:
"Trust Transfer: Encouraging Self-Recommendations without Sybil Attack". In Proceedings of the 3rd International Conference on Trust Management, Paris, May 2005.      [To appear]

C. Jensen, J. Krogh:
"Security in open Grid systems". In Public Service Review: Nordic States, Winter 2004 Issue, PSCA International Ltd., January 2005.

J-M. Seigneur, C. Jensen:
"The Claim Tool Kit for ad hoc recognition of peer entities". In Science of Computer Programming, Vol. 54, No. 1, pp 49-71, Elsevier, January 2005.

S.J. Engberg, M.B. Harning, C. Jensen:
"Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience". In Proceedings of Second Annual Conference on Privacy, Security and Trust, pp. 47-58, New Brunswick, Canada, October 2004.

J-M. Seigneur, N. Dimmock, C. Bryce, C. Jensen:
"Combating Spam with TEA (Trusted Email Addresses)". In Proceedings of Second Annual Conference on Privacy, Security and Trust, pp. 89-101, New Brunswick, Canada, October 2004.

S. Farrell, J-M. Seigneur, C. Jensen:
"Security in Exotic Wireless Networks". In NATO Computer and Systems Sciences Series III vol 193 "Security and Privacy in Advanced Networking Technologies", ISBN 1 58603 430 8, ISSN, 1 387-6694, IOS Press, 2004.

J-M. Seigneur, C. Jensen:
"The Role of Identity in Computational Trust". In Proceedings of The First Workshop on Security and Privacy at the Conference on Pervasive Computing, Vienna, Austria, April 2004.

C. Jensen, S. Poslad, T. Dimitrakos (Eds.):
"Trust Management, Second International Conference". Lecture Notes in Computer Science 2995, Springer Verlag, 2004.

J-M. Seigneur, C. Jensen:
"Trading Privacy for Trust". In Proceedings of the 2nd International Conference on Trust Management, Oxford, UK, March 2004.

J-M. Seigneur, C. Jensen:
"Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss". In Proceedings of the 19th Annual ACM Symposium on Applied Computing: Track on Ubiquitous Computing Applications, Nicosia, Cyprus, March 2004.

E. Gray, Y. Chen, C. Jensen:
"Initial Investigation into Cross-Context Trust and Risk Assessment". In Proceedings of the International Conference on Communication, Network, and Information Security, New York, U.S.A., December 2003.

J-M. Seigneur, C. Jensen:
"Privacy Recovery with Disposable Email Addresses". In IEEE Security and Privacy, Vol. 1, No. 6, November-December, 2003.

Y. Chen, C. Jensen, E. Gray, V. Cahill and J-M Seigneur:
"A General Risk Assessment of Security in Pervasive Computing". Technical Report TCD-CS-2003-45, Department of Computer Science, Trinity College Dublin, 6 November 2003.

S. Farrell, C. Jensen:
"Scaling an Interplanetary Internet". In Proceedings of the International Conference on Recent Advances in Space Technologies (RAST 2003), Istanbul, Turkey, November 2003.

S. Farrell, C. Jensen:
"Trajectory Based Addressing". In Proceedings of the 8th Cabernet Radicals Workshop, Ajacio, Corsica, October 2003.

J-M. Seigneur, A. Lambert, P. G. Argyroudis and C. Jensen:
"PR3 Email Honeypot". Technical Report TCD-CS-2003-39, Department of Computer Science, Trinity College Dublin, 12 September 2003.

V. Cahill, E. Gray, J-M. Seigneur, C.D. Jensen, Y. Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English, W. Wagealla, S. Terzis, P. Nixon, G. di Marzo Serugendo, C. Bryce, M. Carbone, K. Krukow, M. Nielsen:
"Using trust for secure collaboration in uncertain environments". In IEEE Pervasive computing, Vol. 2(3), pp. 52-61, July-September 2003.

J-M. Seigneur, G. Biegel, C. Jensen:
"P2P with JXTA-Java pipes". In Proceedings of the 2nd International Conference on the Principles and Practice of Programming in Java, Kilkenny City, Ireland, June 2003.

Y. Chen, C. Jensen, E. Gray, J-M. Seigneur:
"Risk Probability Estimating Based on Clustering". In Proceedings of the 4th IEEE Anual Information Assurance Workshop, West Point, New York, U.S.A., June 2003.

A. Harrington, C. Jensen:
"Cryptographic Access Control in a Distributed File System". In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 158-165, Como, Italy, June 2003.

J. Abendroth, C. Jensen:
"Partial Outsourcing: A New Paradigm for Access Control". In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, pp. 134-141, Como, Italy, June 2003.

E. Gray and J.-M. Seigneur and C. Yong and C. Jensen:
"Trust Propagation in Small Worlds". In Proceedings of the First International Conference on Trust Management, pp. 239-254, Heraklion, Crete, Grece, May 2003.

J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"Towards security auto-configuration for smart appliances". In Proceedings of the Smart Objects Conference, Grenoble, France, May 2003.

J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"End-to-end trust in pervasive computing starts with recognition". In Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, March 2003.

J. Abendroth, C. Jensen:
"A Unified Security Framework for Networked Applications". In Proceedings of the Eighteenth ACM Symposium on Applied Computing, Melbourne, Florida, U.S.A., March 2003.

E. Gray, P. O'Connell, C. Jensen, S. Weber, J-M. Seigneur, C. Yong:
"Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications". Technical Report TCD-CS-2002-66, Department of Computer Science, Trinity College Dublin, December 2002.

J-M. Seigneur, J. Abendroth, C. Jensen:
"Bank Accounting and Ubiquitous Brokering of Trustos". In proceedings of the 7th Cabernet Radicals Workshop, Bertinoro, Italy, October 2002.

J-M. Seigneur, S. Farrell, C. Jensen:
"Secure Ubiquitous Computing based on Entity Recognition". In UBICOMP2002 - Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, September 2002.

C. Jensen:
"Secure Environments for Collaboration among Ubiquitous Roaming Entities". In Proceedings of the First Internal iTrust Workshop on Trust Management in Dynamic Open Systems, Glasgow, Scotland, September 2002.

J. Andersson, C. Jensen, S. Weber:
"PEM3 - the Policy Enhanced Memory Management Model". In Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, California, U.S.A., June 2002.

C. Jensen:
"Secure Collaboration in Global Computing Systems". In ERCIM NEWS, No. 49, April 2002.

C. Jensen:
"Fingerprinting Text in Logical Markup Languages". In Proceedings of the 2001 Information Security Conference, Malaga, Spain, October 2001.

J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM on a single address space architecture". In proceedings of the 4th International Conference on SCI-based Technology and Research, Dublin, Ireland, October 2001.

J. Regan, C. Jensen:
"Capability File Names: Separating Authorisation from User Management in an Internet File System". In Proceedings of the 2001 USENIX Security Symposium, pp. 221-234, Washington D.C., U.S.A., August 2001.

J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM featuring a single address space architecture". In Proceedings of the USENIX Java Virtual Machine Research and Technology Symposium, Monterey, California, U.S.A., April 2001.

B. Aziz, C. Jensen:
"Adaptability in CORBA: the Mobile Proxy Approach". In Proceedings of the 2nd Symposium on Distributed Objects & Applications, pp. 295-305, Antwerp, Belgium, September 2000.

C. Jensen:
"CryptoCache: A Secure Sharable File Cache for Roaming Users". In Proceedings of the Ninth ACM SIGOPS European Workshop, Kolding, Denmark, September 2000.

C. Jensen, M. Haahr:
"Towards a Security Framework for Ad-hoc Applications".; In Proceedings of the 2nd Workshop on Distributed Object Security, In association with OOPSLA'99, Denver, USA, November 1999.

C. Jensen:
"Un modèle de contrôle générique et sa réalisation dans la mémoire virtuelle répartie unique Arias". Ph.D. Thesis, Université Joseph Fourier (Grenoble I), October 1999.

J. Vitek and C.D. Jensen (Eds.):
"Secure Internet Programming". Lecture Notes in Computer Science 1603, Springer Verlag, 1999.

C. Jensen, G. Coulouris and D. Hagimont:
"Distributed Object Security". Chapter in Serge Demeyer and Jan Bosch (Eds.): "Object-Oriented Technology: ECOOP'98 Workshop Reader", Lecture Notes in Computer Science 1543, pp. 273-287, Springer Verlag, 1998.

C. Jensen, D. Hagimont:
"Protection Wrappers".; In Proceedings of the Eighth ACM SIGOPS European Workshop, Sintra, Portugal, September 1998.

C. Jensen:
"Secure Software Architectures". In Proceedings of the Eighth Nordic Workshop on Programming Environment Research, pp. 239-246, Ronneby, August 1998.

C. Jensen (Editor):
Joint Proceedings of the ECOOP Workshop on Distributed Object Security and the 4th Workshop on Mobile Object Systems (Secure Internet Mobile Computations), In association with ECOOP'98, Brussels, Belgium, July 1998.

C. Jensen and D. Hagimont:
"Mutual Suspicion in a Generic Object-Support System". In Proceedings of the ECOOP Workshop on Distributed Object Security, pp. 15-20, Brussels, Belgium, July 1998.

C. Jensen and D. Hagimont:
"Protection Reconfiguration for Reusable Software". In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering, pp. 74-80, Florence, Italy, March 1998.

C. Jensen:
"Reducing Complexity of Distributed Application Protection". 4th Cabernet Radicals Workshop, Rithymnon, Crete, September 1997.

C. Jensen and L. Ismail:
"Capability Based Protection for Hosting Mobile Code". In Proceedings of the 2nd European Research Seminar on Advances in Distributed Systems, pp. 234-240, Zinal, Switzerland, March 1997.

C. Jensen:
"Fine-grained load distribution in object based systems. An experiment with grain sizes in Guide2". In Calculateurs Parallèles, pp. 31-48, Vol. 8, No. 1, 1996.

C. Jensen:
"An Investigation of Grain Sizes of Load Distribution in an Object Based System". In Proceedings of Journées de Recherche sur Le Placement Dynamique et la Répartition de Charge : Application aux Systèmes Répartis et Parallès, Paris, May 1995.

C. Jensen:
"Load Distribution in the Guide-2 operating system". System Implementors Workshop at ECOOP'94, Bologna, Italy, July 1994.