Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 Christian Damsgaard Jensen : Publications
Publications
J-M. Seigneur, A. Gray, C. Jensen:
"Trust Transfer: Encouraging Self-Recommendations without
Sybil Attack". In Proceedings of the 3rd International
Conference on Trust Management, Paris, May
2005. [To appear]
C. Jensen, J. Krogh:
"Security in open Grid systems". In Public Service
Review: Nordic States, Winter 2004 Issue, PSCA International
Ltd., January 2005.
J-M. Seigneur, C. Jensen:
"The Claim Tool Kit for ad hoc recognition of peer
entities". In Science of Computer Programming, Vol. 54,
No. 1, pp 49-71, Elsevier, January 2005.
S.J. Engberg, M.B. Harning, C. Jensen:
"Zero-knowledge Device Authentication: Privacy & Security
Enhanced RFID preserving Business Value and Consumer
Convenience". In Proceedings of Second Annual Conference
on Privacy, Security and Trust, pp. 47-58, New Brunswick,
Canada, October 2004.
J-M. Seigneur, N. Dimmock, C. Bryce,
C. Jensen: "Combating Spam with TEA (Trusted Email
Addresses)". In Proceedings of Second Annual Conference
on Privacy, Security and Trust, pp. 89-101, New Brunswick,
Canada, October 2004.
S. Farrell, J-M. Seigneur, C. Jensen: "Security
in Exotic Wireless Networks". In NATO Computer and Systems
Sciences Series III vol 193 "Security and Privacy in Advanced
Networking Technologies", ISBN 1 58603 430 8, ISSN, 1 387-6694,
IOS Press, 2004.
J-M. Seigneur, C. Jensen: "The Role of Identity
in Computational Trust". In Proceedings of The First
Workshop on Security and Privacy at the Conference on
Pervasive Computing, Vienna, Austria, April
2004.
C. Jensen, S. Poslad, T. Dimitrakos (Eds.):
"Trust Management, Second International Conference".
Lecture Notes in Computer Science 2995, Springer Verlag, 2004.
J-M. Seigneur, C. Jensen: "Trading Privacy for
Trust". In Proceedings of the 2nd International
Conference on Trust Management, Oxford, UK, March 2004.
J-M. Seigneur, C. Jensen: "Trust Enhanced
Ubiquitous Payment without Too Much Privacy Loss". In
Proceedings of the 19th Annual ACM Symposium on Applied
Computing: Track on Ubiquitous Computing Applications,
Nicosia, Cyprus, March 2004.
E. Gray, Y. Chen, C. Jensen: "Initial
Investigation into Cross-Context Trust and Risk
Assessment". In Proceedings of the International
Conference on Communication, Network, and Information
Security, New York, U.S.A., December 2003.
J-M. Seigneur, C. Jensen: "Privacy Recovery
with Disposable Email Addresses". In IEEE Security and
Privacy, Vol. 1, No. 6, November-December, 2003.
S. Farrell, C. Jensen: "Scaling an
Interplanetary Internet". In Proceedings of the
International Conference on Recent Advances in Space
Technologies (RAST 2003), Istanbul, Turkey, November 2003.
S. Farrell, C. Jensen: "Trajectory Based
Addressing". In Proceedings of the 8th Cabernet Radicals
Workshop, Ajacio, Corsica, October 2003.
J-M. Seigneur, A. Lambert, P. G. Argyroudis and
C. Jensen: "PR3
Email Honeypot". Technical Report TCD-CS-2003-39,
Department of Computer Science, Trinity College Dublin, 12
September 2003.
V. Cahill, E. Gray, J-M. Seigneur, C.D. Jensen,
Y. Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English,
W. Wagealla, S. Terzis, P. Nixon, G. di Marzo Serugendo,
C. Bryce, M. Carbone, K. Krukow, M. Nielsen:
"Using trust for secure collaboration in uncertain
environments". In IEEE Pervasive computing, Vol. 2(3),
pp. 52-61, July-September 2003.
J-M. Seigneur, G. Biegel, C. Jensen:
"P2P with JXTA-Java pipes". In Proceedings of the
2nd International Conference on the Principles and Practice of
Programming in Java, Kilkenny City, Ireland, June 2003.
Y. Chen, C. Jensen, E. Gray, J-M. Seigneur:
"Risk Probability Estimating Based on Clustering".
In Proceedings of the 4th IEEE Anual Information Assurance
Workshop, West Point, New York, U.S.A., June 2003.
A. Harrington, C. Jensen:
"Cryptographic Access Control in a Distributed File
System". In Proceedings of the 8th ACM Symposium on
Access Control Models and Technologies, pp. 158-165, Como,
Italy, June 2003.
J. Abendroth, C. Jensen: "Partial
Outsourcing: A New Paradigm for Access Control". In
Proceedings of the 8th ACM Symposium on Access Control Models
and Technologies, pp. 134-141, Como, Italy, June 2003.
E. Gray and J.-M. Seigneur and C. Yong and C. Jensen:
"Trust Propagation in Small Worlds". In Proceedings
of the First International Conference on Trust Management,
pp. 239-254, Heraklion, Crete, Grece, May 2003.
J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"Towards security auto-configuration for smart
appliances". In Proceedings of the Smart Objects
Conference, Grenoble, France, May 2003.
J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"End-to-end trust in pervasive computing starts with
recognition". In Proceedings of the First International
Conference on Security in Pervasive Computing, Boppard,
Germany, March 2003.
J. Abendroth, C. Jensen:
"A Unified Security Framework for Networked
Applications". In Proceedings of the Eighteenth ACM
Symposium on Applied Computing, Melbourne, Florida, U.S.A.,
March 2003.
J-M. Seigneur, J. Abendroth, C. Jensen:
"Bank Accounting and Ubiquitous Brokering of
Trustos". In proceedings of the 7th Cabernet Radicals
Workshop, Bertinoro, Italy, October 2002.
J-M. Seigneur, S. Farrell, C. Jensen:
"Secure Ubiquitous Computing based on Entity Recognition".
In UBICOMP2002 - Workshop on Security in Ubiquitous Computing,
Göteborg, Sweden, September 2002.
C. Jensen:
"Secure Environments for Collaboration among Ubiquitous
Roaming Entities". In Proceedings of the First Internal
iTrust Workshop on Trust Management in Dynamic Open Systems,
Glasgow, Scotland, September 2002.
J. Andersson, C. Jensen, S. Weber:
"PEM3 - the Policy Enhanced Memory Management Model".
In Proceedings of the IEEE 3rd International Workshop on
Policies for Distributed Systems and Networks, Monterey,
California, U.S.A., June 2002.
C. Jensen:
"Secure Collaboration in Global Computing Systems".
In ERCIM NEWS, No. 49, April 2002.
C. Jensen:
"Fingerprinting Text in Logical Markup Languages". In
Proceedings of the 2001 Information Security Conference,
Malaga, Spain, October 2001.
J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM on a single address space
architecture". In proceedings of the 4th International
Conference on SCI-based Technology and Research, Dublin, Ireland,
October 2001.
J. Regan, C. Jensen:
"Capability File Names: Separating Authorisation from
User Management in an Internet File System". In
Proceedings of the 2001 USENIX Security Symposium,
pp. 221-234, Washington D.C., U.S.A., August 2001.
J. Andersson, S. Weber, E. Cecchet, C. Jensen, V. Cahill:
"Kaffemik - A distributed JVM featuring a single address
space architecture". In Proceedings of the USENIX Java
Virtual Machine Research and Technology Symposium, Monterey,
California, U.S.A., April 2001.
B. Aziz, C. Jensen:
"Adaptability in CORBA: the Mobile Proxy
Approach". In Proceedings of the 2nd Symposium on
Distributed Objects & Applications, pp. 295-305, Antwerp,
Belgium, September 2000.
C. Jensen:
"CryptoCache: A Secure Sharable File Cache for Roaming
Users". In Proceedings of the Ninth ACM SIGOPS European
Workshop, Kolding, Denmark, September 2000.
C. Jensen, M. Haahr:
"Towards a Security Framework for Ad-hoc
Applications".; In Proceedings of the 2nd Workshop on
Distributed Object Security, In association with OOPSLA'99,
Denver, USA, November 1999.
J. Vitek and C.D. Jensen (Eds.):
"Secure Internet Programming". Lecture Notes in
Computer Science 1603, Springer Verlag, 1999.
C. Jensen, G. Coulouris and D. Hagimont:
"Distributed Object Security". Chapter in Serge
Demeyer and Jan Bosch (Eds.): "Object-Oriented Technology:
ECOOP'98 Workshop Reader", Lecture Notes in Computer Science
1543, pp. 273-287, Springer Verlag, 1998.
C. Jensen, D. Hagimont:
"Protection Wrappers".; In Proceedings of the Eighth
ACM SIGOPS European Workshop, Sintra, Portugal, September 1998.
C. Jensen:
"Secure Software Architectures". In Proceedings of
the Eighth Nordic Workshop on Programming Environment
Research, pp. 239-246, Ronneby, August 1998.
C. Jensen (Editor):
Joint Proceedings of the ECOOP Workshop on Distributed Object
Security and the 4th Workshop on Mobile Object Systems (Secure
Internet Mobile Computations), In association with ECOOP'98,
Brussels, Belgium, July 1998.
C. Jensen and D. Hagimont:
"Mutual Suspicion in a Generic Object-Support System".
In Proceedings of the ECOOP Workshop on Distributed Object
Security, pp. 15-20, Brussels, Belgium, July 1998.
C. Jensen and D. Hagimont:
"Protection Reconfiguration for Reusable Software".
In Proceedings of the 2nd Euromicro Conference on Software
Maintenance and Reengineering, pp. 74-80, Florence, Italy,
March 1998.
C. Jensen:
"Reducing Complexity of Distributed Application
Protection". 4th Cabernet Radicals Workshop, Rithymnon,
Crete, September 1997.
C. Jensen and L. Ismail:
"Capability Based Protection for Hosting Mobile
Code". In Proceedings of the 2nd European Research
Seminar on Advances in Distributed Systems, pp. 234-240,
Zinal, Switzerland, March 1997.
C. Jensen:
"Fine-grained load distribution in object based
systems. An experiment with grain sizes in Guide2". In
Calculateurs Parallèles, pp. 31-48, Vol. 8, No. 1,
1996.
C. Jensen:
"An Investigation of Grain Sizes of Load Distribution in
an Object Based System". In Proceedings of
Journées de Recherche sur Le Placement Dynamique et la
Répartition de Charge : Application aux Systèmes
Répartis et Parallès, Paris, May 1995.
C. Jensen:
"Load Distribution in the Guide-2 operating
system". System Implementors Workshop at ECOOP'94,
Bologna, Italy, July 1994.