Audun Jøsang

Professor
Image of Audun Jøsang
Norwegian version of this page
Phone +47-22845524
Mobile phone +47-98431433
Room 9164
Username
Visiting address Department of Informatics University of Oslo Ole-Johan Dahls hus Gaustadalléen 23b 0373 Oslo
Postal address IfI University of Oslo PO Box 1080 Blindern 0316 Oslo Norway

Research

  • Information Security.  I am interested in all aspects of information security, and particularly in the following areas:
    • Trust & Reputation Management. There is a need to explore new types of trust and reputation systems that can assist users and organisations in assessing the trustworthiness of resources and remote parties on the Internet.
    • Network security. The technology used to provide security in networks must integrate the human end user and the operational context in order to provide solutions that are practically secure, not just theoretically secure.
    • Identity and Access Management. The problem with current identity management is that the solutions are designed to be practical from the service providers' point of view. More user-centric approaches are needed to make online service provisioning scalable for all.
    • Security Usability. People are often the weakest link in the security chain of systems and applications, which means that research is security usability is needed for reducing this vulnerability.
  • Reasoning with Belief and Uncertainty. In particular I work on the following technologies:
    • Subjective logic is a type of probabilistic logic that is suitable for modelling and analysing situations characterised by certainty, uncertainty, belief, trust, and/or incomplete information.
    • Bayesian Networks are used for modelling real world situations characterised by conditional probability, belief or uncertainty between states and events.

Teaching

INF3510 Information Security
ITLED430 Information Security Management
UNIK4270 Security in operating systems and software

Student projects in information security

Students who are interested in information security are welcome to discuss possible topics for a project. Take a look at Master's project descriptions.

Bio

Audun Jøsang joined Oslo University in 2008. Prior to that he was Associate Professor at QUT, research leader of Security at DSTC in Brisbane, worked in the telecommunications industry for Alcatel in Belgium and for Telenor in Norway. He was also Associate Professor at the Norwegian University of Science and Technology (NTNU). He has a Master's in Information Security from Royal Holloway College, University of London, and a PhD from NTNU in Norway. He is a CISSP and CISM with broad knowledge and experience in information security.

Personal homepage

http://folk.uio.no/josang/

Publications, presentations, demonstrations etc.

Tags: Security, Cybersecurity, Sikkerhet, Cybersikkerhet

Publications

  • Jøsang, Audun (2017). A consistent definition of authorization. Lecture Notes in Computer Science.  ISSN 0302-9743.  10547 LNCS, s 134- 144 . doi: 10.1007/978-3-319-68063-7_9
  • Bromander, Siri; Jøsang, Audun & Eian, Martin (2016). Semantic Cyberthreat Modelling. CEUR Workshop Proceedings.  ISSN 1613-0073.  1788(STIDS-2016), s 74- 78
  • Ivanovska, Magdalena & Jøsang, Audun (2016). Predictive Reasoning in Subjective Bayesian Networks. NIK: Norsk Informatikkonferanse.  ISSN 1892-0713.  29(1)
  • Ivanovska, Magdalena; Jøsang, Audun & Sambo, Francesco (2016). Bayesian Deduction with Subjective Opinions, In  Principles of Knowledge Representation and Reasoning: Proceedings of the Fifteenth International Conference, KR 2016.  AAAI Press.  ISBN 978-1-57735-755-1.  Paper.
  • Johansen, Christian; Pedersen, Tore & Jøsang, Audun (2016). Towards Behavioural Computer Science. IFIP Advances in Information and Communication Technology.  ISSN 1868-4238.  473, s 154- 163 . doi: 10.1007/978-3-319-41354-9_12
  • Jøsang, Audun (2016). Decision Making Under Vagueness and Uncertainty, In  19th International Conference on Information Fusion (FUSION 2016).  IEEE.  ISBN 978-0-9964527-4-8.  Paper.
  • Jøsang, Audun (2016). Generalising Bayes’ Theorem in Subjective Logic, In  2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI 2016).  IEEE.  ISBN 978-1-4673-9708-7.  Paper.  s 462 - 469
  • Jøsang, Audun & Kaplan, Lance (2016). Principles of Subjective Networks, In  19th International Conference on Information Fusion (FUSION 2016).  IEEE.  ISBN 978-0-9964527-4-8.  Paper.
  • Loutfi, Ijlal & Jøsang, Audun (2016). Hey TPM, Sign My Transaction. Norsk Informasjonssikkerhetskonferanse (NISK).  ISSN 1893-6563.  9(1), s 57- 67
  • Loutfi, Ijlal & Jøsang, Audun (2016). Privacy concerns of TPM 2.0. Proceedings of the ... European conference on information warfare and security.  ISSN 2048-8602.  2016-January, s 205- 211
  • Abdel-Hafez, Ahmad; Xu, Yue & Jøsang, Audun (2015). A normal-distribution based rating aggregation method for generating product reputations. Web Intelligence and Agent Systems.  ISSN 1570-1263.  13(1), s 43- 51 . doi: 10.3233/WEB-150306
  • Abdel-Hafez, Ahmad; Xu, Yue & Jøsang, Audun (2015). An Accurate Rating Aggregation Method for Generating Item Reputation, In Eric Gaussier; Longbing Cao; Patrick Gallinari; James Kwok; Gabriella Pasi & Osmar Zaiane (ed.),  Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics (IEEE DSAA’2015).  IEEE conference proceedings.  ISBN 978-1-4673-8273-1.  Konferanseartikkel.
  • Ferdous, Md. Sadek; Norman, Gethin; Jøsang, Audun & Poet, Ron (2015). Mathematical Modelling of Trust Issues in Federated Identity Management. IFIP Advances in Information and Communication Technology.  ISSN 1868-4238.  454, s 13- 29 . doi: 10.1007/978-3-319-18491-3_2
  • Ivanovska, Magdalena; Jøsang, Audun; Kaplan, Lance & Sambo, Francesco (2015). Subjective Networks: Perspectives and Challenges, In Madalina Croitoru; Pierre Marquis; Sebastian Rudolph & Gem Stapleton (ed.),  4th International Workshop on Graph Structures for Knowledge Representation and Reasoning (GKR 2015).  Springer.  ISBN 978-3-319-28702-7.  Revised Selected Papers.  s 107 - 124
  • Johansen, Christian & Jøsang, Audun (2015). Probabilistic Modeling of Humans in Security Ceremonies, In Joaquín García-Alfaro; Jordi Herrera-Joancomartí; Emil Lupu; Joachim Posegga; Alessandro Aldini; Fabio Martinelli & Neeraj Suri (ed.),  Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers.  Springer Publishing Company.  ISBN 978-3-319-17016-9.  Konferanseartikkel.
  • Johansen, Christian & Jøsang, Audun (2015). Probabilistic modelling of humans in security ceremonies. Lecture Notes in Computer Science.  ISSN 0302-9743.  8872, s 277- 292 . doi: 10.1007/978-3-319-17016-9_18
  • Jøsang, Audun (2015). Assurance Requirements for Mutual User and Service Provider Authentication, In Joaquín García-Alfaro; Jordi Herrera-Joancomartí; Emil Lupu; Joachim Posegga; Alessandro Aldini; Fabio Martinelli & Neeraj Suri (ed.),  Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers.  Springer Publishing Company.  ISBN 978-3-319-17016-9.  Konferanseartikkel.  s 26 - 44
  • Jøsang, Audun (2015). Assurance requirements for mutual user and service provider authentication. Lecture Notes in Computer Science.  ISSN 0302-9743.  8872, s 26- 44 . doi: 10.1007/978-3-319-17016-9_3
  • Jøsang, Audun; Ivanovska, Magdalena & Muller, Tim (2015). Trust Revision for Conflicting Sources, In Paulo C.G. Costa & Kathryn Laskey (ed.),  18th International Conference on Information Fusion (Fusion 2015).  IEEE conference proceedings.  ISBN 978-0-9824-4386-6.  Konferanseartikkel.  s 550 - 557
  • Jøsang, Audun; Miralabé, Laurent & Dallot, Leonard (2015). It's not a bug, it's a feature: 25 years of mobile network insecurity. Proceedings of the ... European conference on information warfare and security.  ISSN 2048-8602.  2015-January, s 129- 136
  • Jøsang, Audun; Rosenberger, Christophe; Miralabé, Laurent; Klevjer, Henning; Varmedal, Kent Are; Daveau, Jérôme; Husa, Knut Eilif & Taugbøl, Petter (2015). Local user-centric identity management. Journal of Trust Management.  ISSN 2196-064X.  2(1)
  • Jøsang, Audun; Ødegaard, Marte & Oftedal, Erlend (2015). Cybersecurity through secure software development. IFIP Advances in Information and Communication Technology.  ISSN 1868-4238.  453, s 53- 63 . doi: 10.1007/978-3-319-18500-2_5
  • Kaplan, Lance; Jøsang, Audun & Ivanovska, Magdalena (2015). Towards Subjective Networks: Extending Conditional Reasoning in Subjective Logic, In Paulo C.G. Costa & Kathryn Laskey (ed.),  18th International Conference on Information Fusion (Fusion 2015).  IEEE conference proceedings.  ISBN 978-0-9824-4386-6.  Konferanseartikkel.
  • Loutfi, Ijlal & Jøsang, Audun (2015). 1,2, Pause: Lets start by meaningfully navigating the current online authentication solutions space. IFIP Advances in Information and Communication Technology.  ISSN 1868-4238.  454, s 165- 176 . doi: 10.1007/978-3-319-18491-3_12
  • Loutfi, Ijlal & Jøsang, Audun (2015). FIDO Trust Requirements, In Sonja Buchegger & Mads Dam (ed.),  Secure IT Systems: 20th Nordic Conference on Secure IT Systems (NordSec 2015).  Springer Publishing Company.  ISBN 978-3-319-26501-8.  Konferanseartikkel.  s 139 - 155
  • Muller, Tim; Wang, Dongxia & Jøsang, Audun (2015). Information Theory for Subjective Logic, In Vicenç Torra & Yasuo Narukawa (ed.),  12th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2015).  Springer.  ISBN 978-3-319-23239-3.  Konferanseartikkel.
  • Muller, Tim; Wang, Dongxia & Jøsang, Audun (2015). Information theory for subjective logic. Lecture Notes in Computer Science.  ISSN 0302-9743.  9321, s 230- 242 . doi: 10.1007/978-3-319-23240-9_19
  • Tian, Nan; Xu, Yue; Li, Yuefeng; Abdel-Hafez, Ahmad & Jøsang, Audun (2015). Generating product feature hierarchy from product reviews. Lecture Notes in Business Information Processing.  ISSN 1865-1348.  226, s 264- 278 . doi: 10.1007/978-3-319-27030-2_17
  • Abdel-Hafez, Ahmad; Xu, Yue & Jøsang, Audun (2014). A Normal-Distribution Based Reputation Model, In Claudia Eckert; Sokratis K. Katsikas & Gunther Pernul (ed.),  Trust, Privacy, and Security in Digital Business, 11th International Conference (TrustBus 2014).  Springer.  ISBN 978-3-319-09769-5.  Konferanseartikkel.  s 144 - 155
  • Blasch, Erik; Jøsang, Audun; Dezert, Jean; Costa, Paulo C.G. & Jousselme, Anne-Laure (2014). URREF Self-Confidence in Information Fusion Trust, In Juan M. Corchado (ed.),  17th International Conference on Information Fusion (FUSION 2014).  IEEE.  ISBN 978-84-9012-355-3.  Konferanseartikkel.
  • Djuana, Endang; Xu, Yue; Li, Yuefeng & Jøsang, Audun (2014). A Combined Method for Mitigating Sparsity Problem in Tag Recommendation, In Ralph H. Sprague (ed.),  Proceedings of the 47th Annual Hawaii International Conference on System Sciences 6–9 January 2014, Waikoloa, Hawaii.  IEEE.  ISBN 978-1-4799-2504-9.  Konferanseartikkel.  s 906 - 915
  • Jøsang, Audun (2014). Identity Management and Trusted Interaction in Internet and Mobile Computing. IET Information Security.  ISSN 1751-8717.  8(2), s 67- 79 . doi: 10.1049/iet-ifs.2012.0133
  • Jøsang, Audun (2014). Potential Cyber Warfare Capabilities of Major Technology Vendors, In Andrew Liaropoulos & George A. Tsihrintzis (ed.),  Proceedings of the 13th European Conference on Cyber Warfare and Security (ECCWS 2014).  Academic Conferences Publishing.  ISBN 978‐1‐910309-25-4.  Konferanseartikkel.  s 110 - 115
  • Jøsang, Audun & Munch-Møller, Thorvald H G (2014). Biometric Data Fusion Based on Subjective Logic, In Juan M. Corchado (ed.),  17th International Conference on Information Fusion (FUSION 2014).  IEEE.  ISBN 978-84-9012-355-3.  Konferanseartikkel.
  • Jøsang, Audun & Sambo, Francesco (2014). Inverting Conditional Opinions in Subjective Logic, In Matoušek Radek (ed.),  MENDEL 2014 : Proceedings of 20th International Conference on Soft Computing.  Brno University of Technology.  ISBN 978-80-214-4984-8.  Konferanseartikkel.
  • Plateaux, Aude; Lacharme, Patrick; Jøsang, Audun & Rosenberger, Christophe (2014). One-time biometrics for Online Banking and Electronic Payment Authentication, In Stephanie Teufel (ed.),  Availability, Reliability, and Security in Information Systems.  IEEE.  ISBN 978-3-319-10974-9.  Konferanseartikkel.  s 179 - 193
  • Plateaux, Aude; Lacharme, Patrick; Jøsang, Audun & Rosenberger, Christophe (2014). One-time biometrics for online banking and electronic payment authentication. Lecture Notes in Computer Science.  ISSN 0302-9743.  8708, s 179- 193
  • Alfayyadh, Bander; Alzomai, Mohammed & Jøsang, Audun (2013). An Experiment Investigating the Usability of Personal Firewalls, In Hans-Joachim Hof & Carla Westphall (ed.),  SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies.  International Academy, Research and Industry Association (IARIA).  ISBN 978-1-61208-298-1.  Konferansebidrag.  s 54 - 60
  • Alzaid, Hani; Alfaraj, Manal; Ries, Sebastian; Jøsang, Audun; Albabtain, Muneera & Abuhaimed, Alhanof (2013). Reputation-based Trust Systems for Wireless Sensor Networks: A Comprehensive Review, In Carmen Fernandez-Gago; Fabio Martinelli; Siani Pearson & Isaac Agudo (ed.),  Trust Management VII,7th IFIP WG 11.11 International Conference (IFIPTM 2013),.  Springer.  ISBN 978-3-642-38322-9.  Konferansebidrag.  s 66 - 82
  • Djuana, Endang; Xu, Yue; Li, Yuefeng; Jøsang, Audun & Cox, Clive (2013). An Ontology-based Method for Sparsity Problem in Tag Recommendation, In Slimane Hammoudi; Leszek A. Maciaszek; José Cordeiro & Jan L. G. Dietz (ed.),  ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information Systems, Volume 3.  SciTePress.  ISBN 978-989-8565-61-7.  Konferansebidrag.  s 467 - 474
  • Ferdous, Md. Sadek & Jøsang, Audun (2013). Entity Authentication & Trust Validation in PKI using Petname Systems, In Atilla Elçi; Josef Pieprzyk; Alexander G. Chefranov; Mehmet A. Orgun; Huaxiong Wang & Rajan Shankaran (ed.),  Theory and Practice of Cryptography Solutions for Secure Information Systems.  IGI Global.  ISBN 9781466640306.  Section 4: Cryptographic Trust Solutions.  s 302 - 333
  • Jøsang, Audun (2013). PKI Trust Models, In Atilla Elçi; Josef Pieprzyk; Alexander G. Chefranov; Mehmet A. Orgun; Huaxiong Wang & Rajan Shankaran (ed.),  Theory and Practice of Cryptography Solutions for Secure Information Systems.  IGI Global.  ISBN 9781466640306.  Section 4: Cryptographic Trust Solutions.  s 279 - 301
  • Jøsang, Audun; Costa, Paulo C.G. & Blasch, Erik (2013). Determining Model Correctness for Situations of Belief Fusion, In Murat Efe (ed.),  16th International Conference on Information Fusion (FUSION 2013); 09 Jul-12 Jul 2013, Istanbul, Turkey.  IEEE conference proceedings.  ISBN 978-605-86311-1-3.  Konferansebidrag.  s 1886 - 1993
  • Jøsang, Audun; Guo, Guibing; Pini, Maria Silvia; Santini, Francesco & Xu, Yue (2013). Combining Recommender and Reputation Systems to Produce Better Online Advice, In Vicenç Torra; Yasuo Narukawa; Guillermo Navarro-Arribas & David Megías (ed.),  Modeling Decisions for Artificial Intelligence, 10th International Conference, MDAI 2013.  Springer.  ISBN 978-3-642-41549-4.  Konferansebidrag.  s 126 - 138
  • Jøsang, Audun; Varmedal, Kent Are & Klevjer, Henning (2013). Extended HTTP Digest Access Authentication, In Simone Fischer-Hubner; Elisabeth de Leeuw & Chris J. Mitchell (ed.),  Third IFIP WG 11.6 Working Conference, IDMAN 2013, Policies and Research in Identity Management, Vol. 396.  Springer.  ISBN 978-3-642-37281-0.  Konferansebidrag.  s 73 - 96
  • Varmedal, Kent Are; Hovlandsvåg, Joakim; Jøsang, Audun; Vincent, Johann; Miralabé, Laurent & Klevjer, Henning (2013). The OffPAD: Requirements and Usage, In Javier Lopez; Xinyi Huang & Ravi Sandhu (ed.),  Network and System Security,7th International Conference (NSS 2013),LNCS 7873.  Springer.  ISBN 978-3-642-38630-5.  Konferansebidrag.  s 80 - 93
  • Alfayyadh, Bander; Thorsheim, Per O.H.; Jøsang, Audun & Klevjer, Henning (2012). Improving Usability of Password Management with Standardized Password Policies, In Christophe Rosenberger (ed.),  The Seventh Conference on Network and Information Systems Security (Sécurité des Architectures Réseaux et Systèmes d'Information) (SAR-SSI 2012).  GREYC.  ISBN 978-2-9542630-0-7.  Vitenskapelig artikkel.
  • Jøsang, Audun (2012). Robustness of Trust and Reputation Systems: Does it Matter?, In Theo Dimitrakos; Rajat Moona; Dhiren Patel & D. Harrison McKnight (ed.),  6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012.  Springer Publishing Company.  ISBN 978-3-642-29852-3.  Kapittel 21.  s 253 - 262
  • Jøsang, Audun (2012). Trust Extortion on the Internet, In Catherine Meadows & Carmen Fernandez-Gago (ed.),  Security and Trust Management 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011.  Springer Publishing Company.  ISBN 978-3-642-29963-6.  Vitenskapelig artikkel.  s 6 - 21
  • Jøsang, Audun; Azderska, Tanja & Marsh, Stephen (2012). Trust Transitivity and Conditional Belief Reasoning, In Theo Dimitrakos; Rajat Moona; Dhiren Patel & D. Harrison McKnight (ed.),  6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012.  Springer Publishing Company.  ISBN 978-3-642-29852-3.  Kapittel 5.  s 68 - 83
  • Jøsang, Audun & Hankin, Robin (2012). Interpretation and Fusion of Hyper Opinions in Subjective Logic, In Chee-Yee Chong & Lee Onn Mak (ed.),  Proceedings of the 15th International Conference on Information Fusion.  IEEE Press.  ISBN 978-0-9824438-4-2.  Vitenskapelig artikkel.  s 1225 - 1232
  • Jøsang, Audun & Pope, Simon (2012). Dempster's rule as seen by little colored balls. Computational intelligence.  ISSN 0824-7935.  28(4), s 453- 474 . doi: 10.1111/j.1467-8640.2012.00421.x
  • Jøsang, Audun; Varmedal, Kent Are; Rosenberger, Christophe & Kumar, Rajendra (2012). Service Provider Authentication Assurance, In Nora Cuppens-Boulahia; Philip Fong; Joaquín García-Alfaro; Stephen Marsh & Jan-Philipp Steghöfer (ed.),  Tenth Annual International Conference on Privacy, Security and Trust (PST 2012).  IEEE Press.  ISBN 978-1-4673-2326-0.  Vitenskapelig artikkel.  s 203 - 210
  • Zhou, Xujan; Xu, Yue; Li, Yuefeng; Jøsang, Audun & Cox, Clive (2012). The state-of-the-art in personalized recommender systems for social networking. Artificial Intelligence Review.  ISSN 0269-2821.  37(2), s 119- 132 . doi: 10.1007/s10462-011-9222-1
  • Alzomai, Mohammed; Jøsang, Audun & Alfayyadh, Bander (2011). Display Integrity Assurance for SMS Transaction Authorization. International Journal for Information Security Research.  ISSN 2042-4639.  1(4), s 219- 228
  • Jøsang, Audun (2011). Trust Management in Online Communities, In Volker Wittke & Heidemarie Hanekop (ed.),  New forms of collaborative production and innovation on the Internet - interdisciplinary perspectives.  University Press Göttingen.  ISBN 978-3-86395-020-0.  Interdisciplinary Perspectives on Collaborative Innovation and Production.
  • Jøsang, Audun & Elouedi, Zied (2011). Redefining Material Implication with Subjective Logic, In Lance Kaplan & Neil Gordon (ed.),  Proceedings of the 14th International Conference on Information Fusion (FUSION 2011).  IEEE conference proceedings.  ISBN 978-1-4577-0267-9.  Belief Functions - Theory.
  • Jøsang, Audun; Quattrociocchi, Walter & Karabeg, Dino (2011). Taste and Trust, In Ian Wakeman (ed.),  Trust Management V.  Springer.  ISBN 978-3-642-22199-6.  20.  s 312 - 322
  • Alfayyadh, Bander; Ponting, James; Jøsang, Audun & Alzomai, Mohammed (2010). Vulnerabilities in Personal Firewalls Caused by Poor Security Usability, In Mengqi Zhou (ed.),  2010 IEEE International Conference on Information Theory and Information Security (ICITIS).  IEEE conference proceedings.  ISBN 978-1-4244-6942-0.  Conference paper.
  • Alzomai, Mohammed; Alfayyadh, Bander & Jøsang, Audun (2010). Display Security for Online Transactions: SMS-Based Authentication Scheme, In Charles A. Shoniregun (ed.),  Internet Technology and Secured Transactions, International Conference, 2010 (ICITST 2010).  IEEE conference proceedings.  ISBN 978-1-4244-8862-9.  Conference paper.
  • Alzomai, Mohammed & Jøsang, Audun (2010). The Mobile Phone as a Multi OTP Device Using Trusted Computing, In Yang Xiang; Pierangela Samarati; Jiankun Hu; Wanlei Zhou & Ahmad-Reza Sadeghi (ed.),  Network and System Security (NSS), 2010 4th International Conference on.  IEEE.  ISBN 978-1-4244-8484-3.  Conference paper.  s 75 - 82
  • Bhuiyan, Touhid; Jøsang, Audun & Xu, Yue (2010). Managing Trust in Online Social Networks, In Borko Furht (ed.),  Handbook of Social Network Technologies and Applications.  Springer.  ISBN 978-1-4419-7141-8.  Book chapter.  s 471 - 496
  • Bhuiyan, Touhid; Jøsang, Audun & Xu, Yue (2010). Trust and Reputation Management in Web-based Social Network, In Zeeshan Usmani (ed.),  Web Intelligence and Intelligent Agents.  IN-TECH.  ISBN 978-953-7619-85-5.  Book chapter.
  • Bhuiyan, Touhid; Xu, Yue & Jøsang, Audun (2010). A Review of Trust in Online Social Networks to Explore New Research Agenda, In Hamid R. Arabnia; Victor A. Clincy; Joan Lu; Andy Marsh & Ashu M. G. Solo (ed.),  Proceedings of the 2010 International Conference on Internet Computing, ICOMP 2010.  CSREA Press.  ISBN 1-60132-149-X.  Conference paper.  s 123 - 128
  • Bhuiyan, Touhid; Xu, Yue & Jøsang, Audun (2010). SimTrust: A New Method of Trust Network Generation, In Helen Y. Tang & Xinwen Fu (ed.),  The 6th International Symposium on Trusted Computing and Communications.  IEEE.  ISBN 978-0-7695-4322-2.  Conference paper.  s 718 - 722
  • Bhuiyan, Touhid; Xu, Yue & Jøsang, Audun (2010). The Potential Relationship between Trust and Interest Similarity, In Hamid R. Arabnia; Victor A. Clincy; Joan Lu; Andy Marsh & Ashu M. G. Solo (ed.),  Proceedings of the 2010 International Conference on Internet Computing, ICOMP 2010.  CSREA Press.  ISBN 1-60132-149-X.  Conference paper.  s 203 - 208
  • Bhuiyan, Touhid; Xu, Yue; Jøsang, Audun; Liang, Huizhi & Cox, Clive (2010). Developing Trust Networks Based on User Tagging Information for Recommendation Making, In Lei Chen; Peter Triantafillou & Torsten Suel (ed.),  Web Information Systems Engineering - WISE 2010.  Springer.  ISBN 978-3-642-17615-9.  Conference paper.  s 357 - 364
  • Jøsang, Audun; Diaz, Javier & Rifqi, Maria (2010). Cumulative and averaging fusion of beliefs. Information Fusion.  ISSN 1566-2535.  11(2), s 192- 200 . doi: 10.1016/j.inffus.2009.05.005
  • Jøsang, Audun; Fritsch, Lothar & Mahler, Tobias (2010). Privacy Policy Referencing. Lecture Notes in Computer Science.  ISSN 0302-9743.  6264, s 129- 140 Show summary
  • Jøsang, Audun; Fritsch, Lothar & Mahler, Tobias (2010). Privacy Policy Referencing, In Sokratis K. Katsikas; Javier Lopez & Miguel Soriano (ed.),  TrustBus, Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings, Lecture Notes in Computer Science 6264.  Springer.  ISBN 978-3-642-15151-4.  Conference Paper. Full text in Research Archive.
  • Jøsang, Audun & O'Hara, Stephen (2010). Multiplication of Multinomial Subjective Opinions, In Eyke Hüllermeier; Rudolf Kruse & Frank Hoffmann (ed.),  13th International Conference on Information Processing and Management of Uncertainty (IPMU 2010).  Springer.  ISBN 978-3-642-14054-9.  Conference paper.
  • Jøsang, Audun & O'Hara, Stephen (2010). Multiplication of Multinomial Subjective Opinions. Communications in Computer and Information Science.  ISSN 1865-0929.  80, s 248- 257
  • Jøsang, Audun & O'Hara, Stephen (2010). The Base-Rate Fallacy in Belief Reasoning, In Simon Godsill & David Salmond (ed.),  13th International Conference on Information Fusion, (FUSION2010).  Institute of Engineering and Technology (IET).  ISBN 978-0-9824-4380-4.  Conference paper.
  • Scudder, Jonathan & Jøsang, Audun (2010). Personal Federation Control with the Identity Dashboard, In Elisabeth de Leeuw; Simone Fischer-Hübner & Lothar Fritsch (ed.),  Second IFIP WG 11.6 Working Conference, IDMAN 2010.  Springer.  ISBN 978-3-642-17302-8.  Conference paper.
  • Alhaqbani, Bandar; Jøsang, Audun & Fidge, Colin (2009). A Medical Data Reliability Assessment Model. Journal of Theoretical and Applied Electronic Commerce Research.  ISSN 0718-1876.  4(2), s 64- 78
  • Ferdous, Md. Sadek; Jøsang, Audun; Singh, Kuldeep & Borgaonkar, Ravishankar (2009). Security usability of petname systems, In Audun Jøsang; Torleiv Maseng & Svein Johan Knapskog (ed.),  Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems.  Springer Publishing Company.  ISBN 978-3-642-04765-7.  Kapittel.  s 44 - 59
  • Flø, Anne Ruste & Jøsang, Audun (2009). Consequences of Botnets Spreading to Mobile Devices, In  Short-Paper Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009).  UNIK.  Paper.
  • Jøsang, Audun (2009). Conditional Reasoning with Subjective Logic. Journal of Multiple-Valued Logic and Soft Computing.  ISSN 1542-3980.  15(1), s 5- 38
  • Jøsang, Audun (2009). Fission of Opinions in Subjective Logic, In Wayne Blanding (ed.),  Proceedings of the 12th International Conference on Information Fusion (FUSION 2009).  IEEE Press.  ISBN 9780982443804.  Paper.
  • Jøsang, Audun & Quattrociocchi, Walter (2009). Advanced Features in Bayesian Reputation Systems, In Simone Fischer-Hübner (ed.),  Proceedings of the 6th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'09).  Springer.  ISBN 978-3-642-03747-4.  Paper.
  • Singh, Kuldeep; Jøsang, Audun; Ferdous, Md. Sadek & Borgaonkar, Ravishankar (2009). Spam Filter Optimality Based on Signal Detection Theory, In Atilla Elçi (ed.),  Proceedings of the 2nd international conference on Security of information and networks.  ACM Press.  ISBN 978-1-60558-412-6.  Paper.  s 219 - 224
  • Suriadi, Suriadi; Foo, Ernest & Jøsang, Audun (2009). A User-Centric Federated Single Sign-on System. Journal of Network and Computer Applications.  ISSN 1084-8045.  32(2), s 388- 401
  • Jøsang, Audun (2008). Conditional Reasoning with Subjective Logic. Journal of Multiple-Valued Logic and Soft Computing.  ISSN 1542-3980.  15(1), s 5- 38 Full text in Research Archive.
  • Jøsang, Audun (2008). Online Reputation Systems for the Health Sector. Electronic Journal of Health Informatics.  ISSN 1446-4381.  3(1) Full text in Research Archive.
  • Jøsang, Audun & Knapskog, Svein Johan (1998). A Metric for Trusted Systems, In G Papp & Reinhard Posch (ed.),  Global IT Security.  Austrian Computer Society (OCG).  ISBN 3-85403-116-5.  Kapittel 53.  s 541 - 545
  • Jøsang, Audun; Laenen, Filip van; Knapskog, Svein Johan & Vandewalle, Joos (1997). How to trust systems, In Louise Yngstrøm & Jan Carlsen (ed.),  Information Security in Research and Business.  International Federation for Information processing (IFIP).  ISBN 0-412-81780-2.  Kapittel 19.  s 241 - 252

View all works in Cristin

View all works in Cristin

  • Pedersen, Tore; Johansen, Christian & Jøsang, Audun (2017). Intelligence Analysis: Reflections on the Future Human - Machine Analytic Enterprise from a Behavioral Computer Science Perspective.
  • Johansen, Christian; Jøsang, Audun & Migdal, Denis (2016). Offpad: Offline personal authenticating device: implementations and applications.
  • Johansen, Christian; Jøsang, Audun & Migdal, Denis (2016). Usable Authentication with an Offline Trusted Device Proxy Architecture (long version). Full text in Research Archive.
  • Johansen, Christian; Pedersen, Tore & Jøsang, Audun (2016). Reflections on Behavioural Computer Science. Full text in Research Archive.
  • Migdal, Denis; Johansen, Christian & Jøsang, Audun (2016). DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking, In Christopher Kruegel; Andrew Myers; Shai Halevi (ed.),  Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.  Association for Computing Machinery (ACM).  ISBN 978-1-4503-4139-4.  chapter.  s 1847 - 1849
  • Jøsang, Audun (2014). Cybersikkerhet starter med it-utdanningen. ComputerWorld Norge.  ISSN 1501-6595.
  • Jøsang, Audun (2014). Utdatert mobilnettsikkerhet. Aftenposten (morgenutg. : trykt utg.).  ISSN 0804-3116.
  • Yan, Zheng; Wang, Guojun; Deng, Robert H. & Jøsang, Audun (2013). Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications. IET Information Security.  ISSN 1751-8717.  7(1), s 1- 2 . doi: 10.1049/iet-ifs.2013.0043
  • Jøsang, Audun (2012). Weak and strong passwords: When to use them, and how to protect them.
  • Jøsang, Audun (2009). Short-Paper Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009).
  • Alzomai, Mohammed; Alfayyadh, Bander; Jøsang, Audun & Mccullagh, Adrian (2008). An Exprimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. Full text in Research Archive.
  • Jøsang, Audun (2008). Abductive Reasoning with Uncertainty. Full text in Research Archive.
  • Jøsang, Audun (2008). Cumulative and Averaging Unfusion of Beliefs. Full text in Research Archive.
  • Jøsang, Audun (2008). Identity Management.
  • Jøsang, Audun (2008). Security Usability.
  • Jøsang, Audun & Alfayyadh, Bander (2008). Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign. Full text in Research Archive.
  • Jøsang, Audun & Bhuiyan, Touhid (2008). Optimal Trust Network Analysis with Subjective Logic. Full text in Research Archive.
  • Jøsang, Audun; Bhuiyan, Touhid; Xu, Yue & Cox, Clive (2008). Combining Trust and Reputation Management for Web-Based Services. Full text in Research Archive.
  • Jøsang, Audun; Luo, Xixi & Xiaowu, Chen (2008). Continuous Ratings in Discrete Bayesian Reputation Systems. Full text in Research Archive.

View all works in Cristin

Published Mar. 10, 2011 8:02 AM - Last modified Nov. 17, 2017 11:49 AM