Publications by Audun Jøsang


Published 2021

  • Vasileios Mavroeidis, Ryan Hohimer, Tim Casey and Audun Jøsang. Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. proceedings of CYCON 2021, Tallin, Estonia, May 2021. [pdf]

Published 2020

  • Audun Jøsang, Viktoria Stray and Hanne Rygge. Threat Poker: Gamification of Secure Agile. 13th World Conference on Information Security Education (WISE13). Maribor, Slovenia, September 2020. [pdf]
  • Siri Bromander, Lilly Pijnenmburg Muller, Martin Eian and Audun Jøsang. Examining the "Known Truths" in Cyber Threat Intelligence – The Case of STIX. 15th International Conference on Cyber Warfare and Security (ICCWS 2020). 2020. [pdf]
  • Fabio Massimo Zennaro and Audun Jøsang. Using Subjective Logic to Estimate Uncertainty in Multi-Armed Bandit Problems. ECML/PKDD 2020 Tutorial and Workshop on Uncertainty in Machine Learning (WUML 2020). September 2020. [pdf]
  • László Erdödi and Audun Jøsang. Exploitation vs. Prevention: The Ongoing Saga of Software Vulnerabilities. Acta Polytechnica Hungarica. Volume 17, Issue 7, 2020. [pdf]

Published 2019

  • Fabio Massimo Zennaro, Magdalena Ivanovska and Audun Jøsang. An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations. International Journal of Approximate Reasoning. Volume 111, pages 56-77, 2019. [online]
  • Audun Jøsang. Belief Mosaics of Subjective Opinions. 22th International Conference on Information Fusion (FUSION 2019). Ottawa, July 2019. [pdf]

Published 2018

  • Audun Jøsang. Categories of Belief Fusion. Journal of Advances in Information Fusion (JAIF), December 2018, Volume 13, Number 2, ISSN 1557-6418.[pdf]
  • Audun Jøsang (ediitor). Proceedings of the 17th European Conference on Cyber Warfare and Security (ECCWS 2018). Oslo, Norway, 28-29 June 2018. ISBN 978-1-911218-85-2, 644 p., ACPIL. ECCWS 2018
  • Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Pereira, Vítor J. Sá, Eliana Stavrou. Global perspectives on cybersecurity education. Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018), Cyprus, July 2018. [pdf]
  • Vasileios Mavroeidis, Kamer Vishi and Audun Jøsang. A Framework for Data-Driven Physical Security and Insider Threat Detection. 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2018). Barcelona, August 2018. [pdf]
  • Hanne Rygge and Audun Jøsang. Threat Poker: Solving Security and Privacy Threats in Agile Software Development. The 23rd Nordic Conference on Secure IT Systems (NordSec 2018). Oslo, November 2018. [pdf]
  • Audun Jøsang, Jin-Hee Cho and Feng Chen. Uncertainty Characteristics of Subjective Opinions. 21th International Conference on Information Fusion (FUSION 2018). Cambridge July 2018. [pdf]
  • Francesco Santini, Audun Jøsang, and Maria Silvia Pini. Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic. 21th International Conference on Information Fusion (FUSION 2018). Cambridge July 2018.
  • Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych and Audun Jøsang. The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 9, No. 3, 2018. [pdf]
  • Vasileios Mavroeidis and Audun Jøsang. Data-Driven Threat Hunting Using Sysmon. The 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018), March 2018, Guiyang, China. [pdf]
  • Tore Pedersen, Christian Johansen, Audun Jøsang. Behavioural Computer Science: an agenda for combining modelling of human and system behaviours. Human-centric Computing and Information Sciences, Volume 8, Issue 1, 2018.

Published 2017

  • Kamer Vishi and Audun Jøsang. A New Approach for Multi-Biometric Fusion Based on Subjective Logic. International Conference on Internet of Things and Machine Learning (IML 2017). Liverpool, October 2017. [pdf]
  • Christian Johansen, Audun Jøsang and Denis Migdal. Offline Trusted Device and Proxy Architecture based on a new TLS Switching technique. Proceedings of the International Workshop on Secure Internet of Things (SIoT 2017). Oslo, September 2017.
  • Audun Jøsang. A Consistent Definition of Authorization. Proceedings of the 13th International Workshop on Security and Trust Management (STM 2017). Oslo, September 2017. [pdf]
  • Laszlo Erdödi and Audun Jøsang. Exploit Prevention, Quo Vadis?. Proceedings of the 13th International Workshop on Security and Trust Management (STM 2017). Oslo, September 2017.
  • Ijlal Loutfi and Audun Jøsang. X86 Root of Trust: Technical vs. Political Considerations. 16th European Conference on Cyber Warfare and Security (ECCWS 2017). Dublin, June 2017. [pdf]
  • Magdalena Ivanovska, Audun Jøsang, Jie Zhang and Shuo Chen. Joint Subjective Opinions. The 14th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2017). Kitakyushu, Japan, October 2017. [pdf]
  • Audun Jøsang, Dongxia Wang and Jie Zhang. Multi-Source Fusion in Subjective Logic. 20th International Conference on Information Fusion (FUSION 2017). Xi'an, July 2017. [pdf]
  • Audun Jøsang, Jie Zhang and Dongxia Wang. Multi-Source Trust Revision. 20th International Conference on Information Fusion (FUSION 2017). Xi'an, July 2017. [pdf]

Published 2016

  • Audun Jøsang. Subjective Logic: A Formalism for Reasoning Under Uncertainty, ISBN 978-3-319-42337-1, Springer Verlag, 2016.
  • Siri Bromander, Audun Jøsang and Martin Eian. Semantic Cyberthreat Modelling. 11th International Conference on Semantic Technology for Intelligence, Defence, and Security (STIDS) 2016, Fairfax VA, USA, November 2016. [pdf]
  • Ijlal Loutfi and Audun Jøsang. Privacy Concerns of TPM 2.0. 15th European Conference on Cyber Warfare and Security (ECCWS-2016). Munich, July 2016. [pdf]
  • Audun Jøsang. Generalising Bayes’ Theorem in Subjective Logic. 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI 2016). Baden-Baden, September 2016. [pdf]
  • Audun Jøsang and Lance Kaplan. Principles of Subjective Networks. 19th International Conference on Information Fusion (FUSION 2016). Heidelberg, July 2016. [pdf]
  • Audun Jøsang. Decision Making Under Vagueness and Uncertainty. 19th International Conference on Information Fusion (FUSION 2016). Heidelberg, July 2016. [pdf]
  • Magdalena Ivanovska, Audun Jøsang and Francesco Sambo. Bayesian Deduction with Subjective Opinions. 15th International Conference on Principles of Knowledge Representation and Reasoning (KR 2016). Cape Town, South Africa, April 2016.
  • Christian Johansen, Tore Pedersen and Audun Jøsang. Towards Behavioural Computer Science. Proceedings of the 10th IFIP International Conference on Trust Management (IFIPTM 2016). Darmstadt, July 2016.
  • Ijlal Loutfi and Audun Jøsang. Hey TPM, Sign My Transaction. Norwegian Information Security Conference (NISK) 2016, Bergen, November 2016. [pdf]
  • Magdalena Ivanovska and Audun Jøsang. Predictive Reasoning in Subjective Bayesian Networks. Norsk Informatikkonferanse (NIK) 2016. Bergen, November 2016.

Published 2015

  • Audun Jøsang, Laurent Miralabé and Léonard Dallot. Vulnerability by Design in Mobile Network Security. The Journal of Information Warfare, Volume 14, Issue 4, 2015. ISSN 1445-3312 (Printed Journal), ISSN 1445-3347 (Online Journal). [pdf][web]
  • Audun Jøsang. Assurance Requirements for Mutual User and Service Provider Authentication. 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclav, Poland, September 2014. Published in: J. Garcia-Alfaro et al. (Eds.), DPM/SETOP/QASA 2014, LNCS 8872, pp. 26–44, 2015. ISBN 978-3-319-17016-9. [pdf]
  • Ijlal Loutfi and Audun Jøsang. FIDO Trust Requirements for Mitigating Murphy’s Law. Secure IT Systems, proceedings of the 20th Nordic Conference (NordSec 2015). Stockholm, Sweden, October 2015.
  • Ahmad Abdel-Hafez, Yue Xu and Audun Jøsang. An Accurate Rating Aggregation Method for Generating Item Reputation. 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA 2015). Paris, October 2015. ISBN 978-1-4673-8273-1.
  • Ahmad Abdel-Hafez, Yue Xu, and Audun Jøsang. A normal-distribution based rating aggregation method for generating product reputations. Web Intelligence, Volune 13, Issue 1, 2015, pp. 43--51. ISSN print; 2405-6456, ISSN online: 2405-6464.
  • Tim Muller, Dongxia Wang, and Audun Jøsang. Information Theory for Subjective Logic. The 12th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2015). Skövde, Sweden, September 2015. ISBN 978-3-319-23239-3.
  • Magdalena Ivanovska, Audun Jøsang, Lance Kaplan, and Francesco Sambo. Subjective Networks: Prospectives and Challenges Graph Structures for Knowledge Representation and Reasoning - Third International Workshop (GKR@IJCAI 2015), Buenos Aires. [pdf]
  • Audun Jøsang, Magdalena Ivanovska, and Tim Muller. Trust Revision for Conflicting Sources. 18th International Conference on Information Fusion (FUSION 2015). Washington, July 2015. [pdf]
  • Audun Jøsang, Laurent Miralabé and Léonard Dallot. It’s not a bug, it’s a feature: 25 years of mobile network insecurity. 14th European Conference on Cyber Warfare and Security (ECCWS-2015). Hatfield UK, July 2015.
  • Lance Kaplan, Magdalena Ivanovska, Audun Jøsang, and Francesco Sambo. Towards Subjective Networks: Extending Conditional Reasoning in Subjective Logic. 18th International Conference on Information Fusion (FUSION 2015). Washington, July 2015.
  • Ijlal Loutfi and Audun Jøsang. 1,2, pause: Let's start by meaningfully navigating the current online authentication solutions space. 9th IFIP International Conference on Trust Management (IFIPTM 2015). Hamburg, May 2015. [pdf]
  • Audun Jøsang, Marte Ødegaard and Erlend Oftedal. Cybersecurity through Secure Software Development. 9th World Conference on Information Security Education (WISE9). Hamburg, May 2015. ISBN 978-3-319-18500-2. [pdf]
  • Ijlal Loutfi and Audun Jøsang. Passwords are not always stronger on the other side of the fence. NDSS Workshop on Usable Security (USEC 2015). San Diego, February 2015. [pdf]
  • Audun Jøsang, Christophe Rosenberger, Laurent Miralabé, Henning Klevjer, Kent A. Varmedal, Jérôme Daveau, Knut Eilif Husa and Petter Taugbøl. Local user-centric identity management. Journal of Trust Management, Volume 2, Issue 1, January 2015. ISSN: 2196-064X [pdf]
  • Christian Johansen and Audun Jøsang. Probabilistic Modeling of Humans in Security Ceremonies, 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclav, Poland, September 2014. Published in: J. Garcia-Alfaro et al. (Eds.), DPM/SETOP/QASA 2014, LNCS 8872, pp. 2015. ISBN 978-3-319-17016-9.

Published 2014

  • Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, and Audun Jøsang. Biométrie à usage unique pour la monétique. The 9th Conference on Network and Information Systems Security (Sécurité des Architectures Réseaux et des Systèmes d'Information) (SARSSI 2014), Lyon, May 2014. [pdf]
  • Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, and Audun Jøsang. One-time biometrics for Online Banking and Electronic Payment Authentication. 4th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014), Fribourg, Switzerland, September 2014. LNCS 8708, ISBN 978-3-319-10974-9. [pdf]
  • Audun Jøsang and Francesco Sambo. Inverting Conditional Opinions in Subjective Logic. 20th International Conference on Soft Computing (MENDEL'14). Brno, Czech Republic, June 2014. [pdf]
  • Audun Jøsang and Thorvald H. Munch-Møller. Biometric Data Fusion Based on Subjective Logic. 17th International Conference on Information Fusion (FUSION 2014). Salamanca, Spain, July 2014. ISBN 978-84-9012-355-3. [pdf]
  • Erik Blasch, Audun Jøsang, Jean Dezert and Paulo C.G. Costa. URREF Self-Confidence in Information Fusion Trust. 17th International Conference on Information Fusion (FUSION 2014). Salamanca, Spain, July 2014. ISBN 978-84-9012-355-3.
  • Audun Jøsang. Potential Cyber Warfare Capabilities of Major Technology Vendors. Proceedings of the 13th European Conference on Cyber Warfare and Security (ECCWS-2014). Piraeus, Greece, July 2014. ISBN 978‐1‐910309-25-4 . [pdf]
  • Audun Jøsang. Identity Management and Trusted Interaction in Internet and Mobile Computing. IET Information Security, ISSN: 1751-8709, Volume 8, Issue 2, March 2014, pp.67-79. [pdf]
  • Endang Djuana, Yue Xu, Yuefeng Li and Audun Jøsang. A Combined Method for Mitigating Sparsity Problem in Tag Recommendation. 2014 Hawaii International Conference on System Sciences (HICSS-47). Hawaii, January 2014.
  • Ahmad Abdel-Hafez, Yue Xu, and Audun Jøsang. A Normal-Distribution Based Reputation Model. 11th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2014). Munich, September 2014. ISBN 978-3-319-09769-5 [pdf]
  • Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro (editors). Twelfth Annual Conference on Privacy, Security and Trust (PST2014). Ryerson University, Toronto, Canada; July 23-24, 2014. IEEE-explore. ISBN 978-1-4799-3503-1.
  • Audun Jøsang (editor). Norsk informasjonssikkerhetskonferanse (NISK 2014). ISSN 1894-7735. BIBSYS, November 2014.
  • Ahmad Abdel-Hafez, Yue Xu, and Audun Jøsang. A rating aggregation method for generating product reputations. Proceedings of the 25th ACM Conference on Hypertext and Social Media. Santiago, Chile, 2014. pp.291--293.
  • Nan Tian, Yue Xu, Yuefeng Li, Ahmad Abdel-Hafez, and Audun Jøsang. Product feature taxonomy learning based on user reviews. WEBIST 2014 10th International Conference on Web Information Systems and Technologies. Barcelona, April 2014.

Published 2013

  • Audun Jøsang, Guibing Guo, Maria Silvia Pini, Francesco Santini, and Yue Xu. Combining Recommender and Reputation Systems to Produce Better Online Advice. The 10th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2013). Barcelona, November 2013. ISBN 978-3-642-41549-4. [pdf]
  • Bander Alfayyadh, Mohammed Alzomai and Audun Jøsang. Firewalls Usability: An Experiment Investigating the Usability of Personal Firewalls. The Seventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013). Barcelona, August 2013. 978-1-61208-298-1.
  • Audun Jøsang, Paulo C.G. Costa and Erik Blasch. Determining Model Correctness for Situations of Belief Fusion. 16th International Conference on Information Fusion (FUSION 2013). Istanbul, July 2013. [pdf]
  • Endang Djuana, Yue Xu, Yuefeng Li, Audun Jøsang, and Clive Cox. An Ontology-based Method for Sparsity Problem in Tag Recommendation. The 15th International Conference on Enterprise Information Systems (ICEIS 2013). Angers, 4-7 July 2013.
  • Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain and Alhanof Abuhaimed. Reputation-based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. Proceedings of the 7th IFIP International Conference on Trust Management (IFIPTM 2013). Malaga, 3-7 June 2013. ISBN 978-3-642-38322-9.
  • Kent A. Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent and Laurent Miralabé. The OffPAD: Requirements and Usage. The 7th International Conference on Network and System Security (NSS 2013). Madrid, 3-4 June 2013. ISBN 978-3-642-38630-5. Springer LNCS 7873. [pdf]
  • Henning Klevjer, Audun Jøsang and Kent A. Varmedal. Extended HTTP Digest Access Authentication. Proceedings of the 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IFIP IDMAN 2013). London, 8-9 April 2013. ISBN 978-3-642-37281-0.[pdf]
  • Audun Jøsang. PKI Trust Models. In Atilla Elçi et al. (editors), Theory and Practice of Cryptography Solutions for Secure Information Systems (CRYPSIS). Published by IGI Global, May 2013. ISBN13: 9781466640306. [pdf]
  • Md. Sadek Ferdous and Audun Jøsang. Entity Authentication & Trust Validation in PKI using Petname Systems. In Atilla Elçi et al. (editors), Theory and Practice of Cryptography Solutions for Secure Information Systems (CRYPSIS). Published by IGI Global, May 2013. ISBN13: 9781466640306. [pdf]
  • Audun Jøsang and Pierangela Samarati (editors). Security and Trust Management, revised selected papers of the 8th International Workshop (STM 2012). Pisa, Italy, 13-14 September 2012. Series: LNCS 7783, Springer, 2013. ISBN 978-3-642-38003-7.

Published 2012

  • Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, and Rajendra Kumar. Service Provider Authentication Assurance. 10th Annual Conference on Privacy, Security and Trust (PST 2012). Paris, July 2012. ISBN 978-1-4673-2323-9. [pdf]
  • Audun Jøsang and Robin Hankin. Interpretation and Fusion of Hyper Opinions in Subjective Logic. 15th International Conference on Information Fusion (FUSION 2012). Singapore, July 2012. ISBN 978-0-9824438-4-2. [pdf]
  • Bander AlFayyadh, Per Thorsheim, Audun Jøsang and Henning Klevjer. Improving Usability of Password Management with Standardized Password Policies. The Seventh Conference on Network and Information Systems Security (Sécurité des Architectures Réseaux et des Systèmes d'Information) (SARSSI 2012). Cabourg, May 2012. ISBN 978-2-9542630-0-7. [pdf]
  • Audun Jøsang, and Simon Pope. Dempster's Rule as Seen by Little Colored Balls. Computational Intelligence, ISSN: 1467-8640, Volume 28, Number 4, November 2012, pp. 453-474, Wiley Periodicals Inc. [pdf]
  • Audun Jøsang, Tanja Azderska and Stephen Marsh. Trust Transitivity and Conditional Belief Reasoning. Proceedings of the 6th IFIP International Conference on Trust Management (IFIPTM 2012). Surat, India May 2012. [pdf]
  • Audun Jøsang. Robustness of Trust and Reputation Systems: Does it Matter ?. Proceedings of IFIPTM International Conference on Trust Management (IFIPTM 2012). Surat, India May 2012. Springer IFIP AICT 374. ISBN . [pdf]
  • Audun Jøsang and Bengt Carlsson (editors). Secure IT Systems, proceedings of the 17th Nordic Conference (NordSec 2012). Karlskrona, Sweden, 31 October - 2 November 2012. Series: Lecture Notes in Computer Science, Vol. 7617. ISBN 978-3-642-34210-3. Springer Verlag 2012.
  • Audun Jøsang and Bengt Carlsson (editors). Short paper proceedings of the 17th Nordic Conference on Secure IT Systems (NordSec 2012). Karlskrona, Sweden, 31 October - 2 November 2012. ISBN 978-91-7295-973-6. Published by Blekinge Institute of Technology, Sweden, October 2012.
  • Xujuan Zhou, Yue Xu, , Yuefeng Li, Audun Jøsang, and Clive Cox. The state-of-the-art in personalized recommender systems for social networking. Artificial Intelligence Review, ISSN: 0269-2821, Volume 37 Issue 2, February 2012, Pages 119-132.
  • Audun Jøsang. Trust Extortion on the Internet. Proceedings of the 7th International Workshop on Security and Trust Management (STM 2011), Copenhagen, June 2011. ISBN 978-3-642-29963-6. LNCS 7170, Springer, 2012. [pdf]

Published 2011

  • Audun Jøsang and Kashif Sana Dar. Server Certificates based on DNSSEC. Proceedings of NordSec 2011, Tallinn, October 2011. [pdf]
  • Audun Jøsang. Multi-Agent Preference Combination using Subjective Logic. 11th Workshop on Preferences and Soft Constraints (SofT'11), Perugia, September 2011. [pdf]
  • Audun Jøsang and Zied Elouedi. Redefining Material Implication with Subjective Logic. 14th International Conference on Information Fusion (FUSION 2011), Chicago, July 2011. [pdf]
  • Audun Jøsang, Walter Quattrochicchi and Dino Karabeg. Taste and Trust. Proceedings of IFIPTM 2011. Copenhagen, June/July 2011. [pdf]
  • Audun Jøsang. Trust Management in Online Communities. In Volker Wittke and Heidemarie Hanekop (editors): New forms of collaborative production and innovation on the Internet - interdisciplinary perspectives. SOFI Göttingen, University Press Göttingen, 2011. ISBN 978-3-86395-020-0. [pdf]
  • Mohammed Alzomai, Audun Jøsang, and Bander Alfayyadh. Display Integrity Assurance for SMS Transaction Authorization. International Journal for Information Security Research (IJISR), ISSN 2042-4639, Volume 1, Issue 4, December 2011, The Infonomics Society. [pdf]
  • Endang Djuana, Yue Xu, Yuefeng Li, and Audun Jøsang. Ontology learning from user tagging for recommendation making. In Pierre Maret, Laurent Vercouter, and Christo El Morr (Eds.). Proceedings of 3rd International Workshop on Web Intelligence & Communities, Lyon, France. IEEE 2011.

Published 2010

  • Audun Jøsang, Lothar Fritsch and Tobias Mahler. Privacy Policy Referencing. The 7th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'10), Bilbao, September 2010. [pdf]
  • Mohammed Alzomai and Audun Jøsang. The Mobile Phone as a Multi OTP Device Using Trusted Computing. The 4th International Conference on Network and System Security (NSS 2010). Melbourne. September 2010.
  • Mohammed Alzomai, Bander Alfayyadh and Audun Jøsang. Display Security for Online Transactions. The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), London, November 2010. [pdf]
  • Bander AlFayyadh, James Ponting, Mohamed Alzomai and Audun Jøsang. Vulnerabilities in Personal Firewalls Caused by Poor Security Usability. IEEE International Conference on Information Theory and Information Security (ICITIS 2010). Beijing, 17-19 December 2010. [pdf]
  • Jonathan Scudder and Audun Jøsang. Personal Federation Control with the Identity Dashboard. In the proceedings of IFIP IDMAN 2010 - 2nd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN'10). Oslo, November 2010. [pdf]
  • Audun Jøsang and Stephen O'Hara. The Base-Rate Fallacy in Belief Reasoning. In the proceedings of the 13th International Conference on Information Fusion (FUSION 2010), Edinburg, July 2010. [pdf]
  • Audun Jøsang and Stephen O'Hara. Multiplication of Multinomial Subjective Opinions. International Conference on Information Processing and Management of Uncertainty (IPMU 2010), Dortmund, July 2010. [pdf]
  • Audun Jøsang, Stephen O'Hara and Kristi O'Grady. Base Rates for Belief Functions. Workshop on the Theory on Belief Functions (Belief 2010), Brest, April 2010. [pdf]
  • Audun Jøsang, Javier Diaz and Maria Rifqi. Cumulative and Averaging Fusion of Beliefs. Information Fusion, ISSN: 1566-2535, 11(2), April 2010, p.192-200. [pdf]
  • Touhid Bhuiyan, Yue Xu, Audun Jøsang, Huizhi Liang and Clive Cox. Developing Trust Networks Based on User Tagging Information for Recommendation Making. The 11th International Conference on Web Information Systems Engineering (WISE 2010), Springer, ISBN: 978-3-642-17615-9. 12-14 December, 2010, Hong Kong, China.
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. SimTrust: A New Method of Trust Network Generation. The 6th International Symposium on Trusted Computing and Communications, IEEE, ISBN: 978-0-7695-4322-2. 11-13 Dec, 2010, Hong Kong, China.
  • Touhd Bhuiyan, Audun Jøsang and Yue Xu. Managing Trust in Online Social Networks. B. Furht, (editor) Handbook of Social Network Technologies and Applications. Springer Publishing, ISBN: 978-1-4419-7141-8, USA, 2010.
  • Touhid Bhuiyan, Audun Jøsang and Yue Xu. Trust and Reputation Management in Web-based Social Network. Z. Usmani (editor), Web Intelligence and Intelligent Agents. In-Tech, Croatia, ISBN: 978-953-7619-85-5. ISBN 978-953-7619-85-5, pp. 207-232.
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. The Potential Relationship between Trust and Interest Similarity. The 11th International Conference on Internet Computing. 12-15 July, 2010, Nevada, USA. CSREA Press 2010, ISBN: 1-60132-149-X
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. A Review of Trust in Online Social Networks to Explore New Research Agenda. The 11th International Conference on Internet Computing. 12-15 July, 2010, Nevada, USA. CSREA Press 2010, ISBN: 1-60132-149-X.

Published 2009

  • Audun Jøsang and Jennifer Golbeck. Challenges for Robust of Trust and Reputation Systems. Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009). Saint Malo, France, September 2009. [pdf]
  • Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar. Security Usability of Petname Systems. Proceedings of the 14th Nordic Workshop on Secure IT systems (NordSec 2009) Oslo, Norway, October 2009. [pdf]
  • Anne Ruste Flø and Audun Jøsang. Consequences of Botnets Spreading to Mobile Devices. Short-Paper Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009). Oslo, October 2009 [pdf]
  • Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous and Ravishankar Borgaonkar. Spam Filter Optimality Based on Signal Detection Theory. In the Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009). Cyprus, October 2009. [pdf]
  • Bandar Alhaqbani, Audun Jøsang, and Colin Fidge. A Medical Data Reliability Assessment Model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), August 2009, pp.64-78.
  • Audun Jøsang and Walter Quattrociocchi. Advanced Features in Bayesian Reputation Systems. Proceedings of the 6th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'09), Linz, Austria, August-September, 2009. [pdf]
  • Audun Jøsang. Fission of Opinions in Subjective Logic. In the proceedings of the 12th International Conference on Information Fusion (FUSION 2009), Seattle, July 2009. [pdf]
  • Suriadi Suriadi, Ernest Foo and Audun Jøsang. A User-Centric Federated Single Sign-on System. Journal of Network and Computer Applications. 32(2), 2009, pp.388-401.
  • Audun Jøsang, Torleiv Maseng and Svein J. Knapskog (Eds.) (editors). Identity and Privacy in the Internet Age. 14th Nordic Conference on Secure IT Systems (NordSec 2009). Oslo, Norway, 14-16 October 2009. Lecture Notes in Computer Science, Vol. 5838. ISBN: 978-3-642-04765-7. Springer Verlag 2009.
  • Audun Jøsang, Torleiv Maseng and Svein J. Knapskog (Eds.). Short paper proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009). Oslo, Norway, 14-16 October 2009. Published by UNIK, October 2012. [pdf]

Published 2008

  • Audun Jøsang, Xixi Luo and Xiaowu Chen. Continuous Ratings in Discrete Bayesian Reputation Systems. Proceedings of IFIPTM 2008. Trondheim, June 2008. [pdf]
  • Audun Jøsang, Touhid Bhuiyan, Yue Xu and Clive Cox. Combining Trust and Reputation Management for Web-Based Services. Proceedings of the 5th International Conference on Trust, Privacy & Security in Digital Business (TrustBus'08). Turin, September 2008. [pdf(preprint)]
  • Audun Jøsang and Touhid Bhuiyan. Optimal Trust Network Analysis with Subjective Logic. Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), Cap Esterel, France, August 2008. [pdf]
  • Audun Jøsan. Cumulative and Averaging Unfusion of Beliefs. Proceedings of IPMU 2008. Malaga, June 2008. [pdf]
  • Audun Jøsang. Abductive Reasoning with Uncertainty. Proceedings of the International Conference on Information Processing and Management of Uncertainty (IPMU 2008). Malaga, June 2008. [pdf]
  • Audun Jøsang. Online Reputation Systems for the Health Sector. Electronic Journal of Health Informatics (http://www.ejhi.net/), 3(1), e8, 2008. [pdf]
  • Audun Jøsang. Conditional Reasoning with Subjective Logic. Journal of Multiple-Valued Logic and Soft Computing, 15(1), pp.5-38, 2008. [pdf(preprint)]
  • Audun Jøsang and Bander AlFayyadh. Robust WYSIWYS: A Method For Ensuring that What You See Is What You Sign. Proceedings of the Australasian Information Security Conference (AISC'08), Wollongong, Australia, January 2008. [pdf]
  • Mohammed AlZomai, Bander AlFayyadh, Audun Jøsang and Adrian McCullagh. An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. Proceedings of the Australasian Information Security Conference (AISC'08), Wollongong, Australia, January 2008. [pdf]
  • Touhid Bhuiyan, Yue Xu and Audun Jøsang. Integrating trust with public reputation in location-based social networks for recommendation making. Proceedings of IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2008), 2008 Volume 3, p.107-110

Published 2007

  • Audun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Alzomai and Judith McNamara. Security Usability Principles for Vulnerability Analysis and Risk Assessment. Proceedings of the Annual Computer Security Applications Conference (ACSAC'07) Miami Beach, December 2007. [pdf]
  • Audun Jøsang. Trust and Reputation Systems. In A. Aldini and R. Gorrieri (Eds.), Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures. Springer LNCS 4677. ISBN 978-3-540-74809-0. Bertinoro, Italy, September 2007. [pdf]
  • Audun Jøsang and Zied Elouedi. Interpreting Belief Functions as Dirichlet Distributions. Proceedings of the 9th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU 2007). Hammamet, Tunisia. November, 2007. [pdf]
  • Suriadi Suriadi, Ernest Foo and Audun Jøsang. A User-centered Federated Single Sign-on System. Proceedings of IFIP International Workshop on Network and System Security (IFIP-NSS 2007). Dalian, China, Septembr 2007.
  • Suriadi Suriadi, Paul Ashley and Audun Jøsang. Future standardization areas in identity management systems. In Proceedings 2nd PRIME Standardization Workshop, Zurich, Switzerland, 2007.
  • Audun Jøsang and Jochen Haller. Dirichlet Reputation Systems. Proceedings of the Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, April 2007. [pdf]
  • Audun Jøsang, Mohammed AlZomai and Suriadi Suriadi. Usability and Privacy in Identity Management Architectures. Proceedings of the Australasian Information Security Workshop (AISW'07), Ballarat, January 2007. [pdf]
  • Audun Jøsang. Probabilistic Logic Under Uncertainty. Proceedings of Computing: The Australian Theory Symposium (CATS'07), Ballarat, January 2007. [pdf]
  • Audun Jøsang, Roslan Ismail, and Colin Boyd. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2), pages 618-644, March 2007. [pdf]

Published 2006

  • Audun Jøsang, Dieter Gollmann, Richard Au. A Method for Access Authorisation Through Delegation Networks. Proceedings of the Australasian Information Security Workshop (AISW'06), Hobart, January 2006. [pdf]
  • Audun Jøsang, Ross Hayward, Simon Pope. Trust Network Analysis with Subjective Logic. Proceedings of the Australasian Computer Science Conference (ACSC'06), Hobart, January 2006. [pdf]
  • Audun Jøsang, Elizabeth Gray and Michael Kinateder. Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems Journal. 4(2) 2006, pp.139-161. (preprint)[pdf]
  • Audun Jøsang, Simon Pope, and Stephen Marsh. Exploring Different Types of Trust Propagation. Proceedings of the 4th International Conference on Trust Management (iTrust'06), 2006. [pdf]
  • Audun Jøsang, Simon Pope, and David McAnally. Normalising the Consensus Operator for Belief Fusion. Proceedings of the International Conference on Information Processing and Management of Uncertainty (IPMU2006), 2006.
  • Audun Jøsang. Online Reputation Systems for the Health Sector. Proceedings of ehPASS, The National e-Health Privacy and Security Symposium, Brisbane, Australia, October, 2006.
  • Simon Pope, Audun Jøsang. and David McAnally. Formal Methods of Countering Deception and Misperception in Intelligence Analysis. Proceedings of the 11th International Command and Control Research Technology Symposium (ICCRTS'06), Cambridge, UK, 2006. [pdf]

Published 2005

  • Simon Pope and Audun Jøsang. Anlysis of Competing Hypothesis using Subjective Logic. Proceedings of the 10th International Command and Control Research Technology Symposium (ICCRTS'05), McLean Virginia, USA, 2005. [pdf]
  • Audun Jøsang and Simon Pope. User Centric Identity Management. Proceedings of AusCERT, Gold Coast, May 2005. [pdf]
  • Audun Jøsang, Claudia Keser, and Theo Dimitrakos. Can We Manage Trust?. Proceedings of the Third International Conference on Trust Management (iTrust'05), 2005. [pdf]
  • Audun Jøsang, Simon Pope and Milan Daniel. Conditional Deduction Under Uncertainty. Proceedings of the 8th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU 2005). Barcelona, Spain, July 2005.[pdf]
  • Audun Jøsang, John Fabre, Brian Hay, James Dalziel and Simon Pope. Trust Requirements in Identity Management. Proceedings of the Australasian Information Security Workshop (AISW'05), Newcastle, Australia, January-February 2005.[pdf]
  • Audun Jøsang and Simon Pope. Semantic Constraints for Trust Transitivity. Proceedings of the Second Asia-Pacific Conference on Conceptual Modelling (APCCM2005), Newcastle, Australia, January-February 2005.[pdf]
  • Ryan Wishart, Ricky Robinson, Jadwiga Indulska and Audun Jøsang. SuperstringRep: Reputation-enhanced Service Discovery. Proceedings of the Australasian Computer Science Conference (ACSC'05), Newcastle, Australia, January-February 2005.

Published 2004

  • Audun Jøsang, and David McAnally. Multiplication and Comultiplication of Beliefs. International Journal of Approximate Reasoning, 38(1), pp.19-51, 2004. [pdf]
  • Andrew Whitby, Audun Jøsang and Jadwiga Indulska. Filtering Out Unfair Ratings in Bayesian Reputation Systems. Proceedings of the Workshop on Trust in Agent Societies, at the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS2004), New York, July 2004. [pdf]
  • David McAnally and Audun Jøsang. Addition and Subtraction of Beliefs. Proceedings of the conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU2004), Perugia, July, 2004
  • Audun Jøsang and Stephane Lo Presti. Analysing the Relationship between Risk and Trust. In T. Dimitrakos (editor), Proceedings of the Second International Conference on Trust Management (iTrust'04), Oxford, April 2004. [pdf]
  • R. Ismail, C. Boyd, A. Jøsang, and S. Russell. Private Reputation Schemes for P2P Systems. Proceedings of the Second International Workshop on Security in Information Systems (WOSIS-2004), Porto, April, 2004.
  • R. Ismail, C. Boyd, A. Jøsang, and S. Russell. An Efficient Off-Line Reputation Scheme Using Articulated Certificates. Proceedings of the Second International Workshop on Security in Information Systems (WOSIS-2004), Porto, April, 2004.
  • A. Jøsang, D. Bradley and S.J. Knapskog. Belief-Based Risk Analysis. Proceedings of the Australasian Information Security Workshop (AISW'04), Dunedin, New Zealand, January 2004.[pdf]
  • D. Bradley and A. Jøsang. Mesmerize - an open framework for enterprise security management. Proceedings of the Australasian Information Security Workshop (AISW'04), Dunedin, New Zealand, January 2004.[pdf]
  • M.A. Patton and A. Jøsang. Technologies for Trust in Electronic Commerce. Electronic Commerce Research Journal, 4 (1&2), January 2004, pp. 9-21. [pdf]

Published 2003

  • A. Jøsang, E. Gray and M. Kinateder. Analysing Topologies of Transitive Trust. Proceedings of the Workshop of Formal Aspects of Security and Trust (FAST), Pisa, September 2003.
  • A. Jøsang and T. Grandison. Conditional Inference in Subjective Logic. Proceedings of the 6th International Conference on Information Fusion, Cairns 8-11 July 2003.
  • A. Jøsang, M. Daniel and P. Vannoorenberghe. Strategies for Combining Conflicting Dogmatic Beliefs. Proceedings of the 6th International Conference on Information Fusion, Cairns 8-11 July 2003.
  • R. Ismail, C. Boyd, A. Jøsang and S. Russell. Strong Privacy in Reputation Systems. Proceedings of the 4th International Workshop on Information Security Applications (WISA), Jeju Island, Korea, August, 2003. [pdf]
  • R. Ismail, C. Boyd, A. Jøsang and S. Russell. A Security Architecture for Reputation Systems. Proceedings of the 4th International Conference on E-Commerce and Web Technologies (EC-Web), Prague, September 2003.
  • T. Dimitrakos, I. Djordjevic, Z. Milosevic, A. Jøsang and C.I. Phillips. Contract Performance Assessment for Secure and Dynamic Virtual Collaborations. Proceedings of EDOC'03, Brisbane, September 2003.
  • A. Jøsang, S. Hird and E. Faccer. Simulating the Effect of Reputation Systems on e-Markets. Proceedings of the First International Conference on Trust Management (iTrust'03), Crete, May 2003.[pdf]
  • M.A. Patton and A. Jøsang. Technologien und Strategien zum Aufbau von Vertrauen im Electronic Commerce (in German). Appears in Petrovic, O. et al. (editors): Trust in the Network Economy, Evolaris Vol.2, ISBN 3-211-06853-8 Springer-Verlag, 2003.[pdf]
  • A. Jøsang and G. Sanderud. Security in Mobile Communications: Challenges and Opportunities. Proceedings of the Australasian Information Security Workshop (AISW'03), Adelaide, Australia, February 2003.[pdf]
  • A. Jøsang and M.A. Patton. User Interface Requirements for Authentication of Communicatinon. Proceedings of the Australasian User Interface Conference, Adelaide, Australia, February 2003.[pdf]

Published 2002

  • A. Jøsang. The Consensus Operator for Combining Beliefs. Artificial Intelligence Journal, 142(1-2), Oct. 2002, p.157-170 [pdf]
  • Z. Milosevic, A. Jøsang, T. Dimitrakos and M.A.Patton. Discretionary Enforcement of Electronic Contracts. Proceedings of the 6th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2002). Lausanne, Switzerland, 17-20 September, 2002.[pdf]
  • A. Jøsang, D. Povey and A. Ho. What You See is Not Always What You Sign. Proceedings of the Australian Unix User Group Symposium (AUUG2002), Melbourne, 4-6 September, 2002. [pdf]
  • A. Jøsang. Subjective Evidential Reasoning. Proceedings of the 9th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2002), Annecy, France, 1-5 July, 2002. [pdf]
  • A. Jøsang and R. Ismail. The Beta Reputation System. Proceedings of the 15th Bled Conference on Electronic Commerce, Bled, Slovenia, 17-19 June 2002. [pdf]

Published 2001

  • H. Svensson and A. Jøsang. Correlation of Intrusion Alarms with Subjective Logic. Proceedings of the sixth Nordic Workshop on Secure IT systems (NordSec 2001), Copenhagen, Denmark, 1-2 November, 2001.[pdf]
  • M.A. Patton and A. Jøsang. Technologies for Trust in E-Commerce. Proceedings of the IFIP working conference on E-Commerce, Salzburg, Austria, June 2001.
  • A. Jøsang, P.M. Møllerud and E. Cheung. Web Security: The Emperor's New Armour. Proceedings of the European Conference on Information Systems (ECIS2001), Bled, Slovenia, June 2001. [pdf]
  • A. Jøsang, M.A. Patton and A. Ho. Authentication for Humans. Proceedings of the 9th International Conference on Telecommunication Systems. Dallas, March 2001. [pdf]
  • A. Jøsang. A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 9(3), pp.279-311, June 2001. [pdf]

Published 2000

  • A. Jøsang, I.G. Pedersen and D. Povey. PKI seeks a trusting relationship. Proceedings of the Fifth Australasian Conference on Information Security and Privacy (ACISP 2000), Brisbane, July 2000. Springer. [pdf]
  • A. Jøsang and V.A. Bondi. Legal Reasoning with Subjective Logic. Artificial Intelligence and Law, 8(4), pp.289-315, Kluwer 2000.

Published 1999

  • A. Jøsang, M.G.L. Bijnagte and G. Kleinhuis. Enabling Factors for IN Service Provider Access. In T.Yongchareon, F.A. Aagesen and V. Wuwongse, editors, Proceedings of IFIP/SmartNet99, Bangkok, Thailand, Kluwer,1999. [pdf]
  • A. Jøsang, H. Meling and M. Lu. The developmnet of public-key infrastructures; Are we on the right path?. In S. Storøy et al., editors, Proceedings of the Norwegian Informatics Conference (NIK'99), Trondheim, Norway, NTNU, 1999. [pdf]
  • A. Jøsang. Trust-based decision making for electronic transactions. In L.Yngström and T.Svensson, editors, Proceedings of the Fourth Nordic Workshop on Secure IT Systems (NordSec 1999), Stockholm, Sweden, Stockholm University Report 99-005, 1999. [pdf]
  • A. Jøsang. Open IN Service Provider Access. In V.Leonardo, editor, Proceedings of the Conference on Integrating Intelligent Networks and Computer Telephony, IBC Global Conferences, 1999. [pdf]
  • A. Jøsang. An Algebra for Assessing Trust in Certification Chains. In J.Kochmar, editor, Proceedings of the Network and Distributed Systems Security (NDSS'99) Symposium, The Internet Society, 1999. [pdf]

Published 1998

  • A. Jøsang. A hard problem: Disclosing how to break public key cryptosystems. In S.J.Knapskog and T.Brekne, editors, Proceedings of the Third Nordic Workshop on Secure IT Systems (NordSec 1998), 1998. [pdf]
  • A. Jøsang. A subjective metric of authentication. In D.Gollmann, editor, Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS'98), Springer-Verlag, 1998. [pdf]
  • A. Jøsang. Reliability Analysis with Uncertain Probabilities. In S.Mosleh and R.A.Bari, editors, Proceedings of the 4th International Conference on Probabilistic Safety Assessment and Management (PSAM), Springer, New York, 1998.
  • A. Jøsang and S.J. Knapskog, A metric for trusted systems (full paper). Proceedings of the 21st National Security Conference, NSA 1998. [pdf]
  • A. Jøsang and S.J. Knapskog, A metric for trusted systems (short paper). In Reinhard Posch, editor, Proceedings of the 1998 IFIP/SEC International Information Security Conference, Kluwer, 1998.

Published 1997

  • A. Jøsang. A Model for Trust in Security Systems. Proceedings of the Second Nordic Workshop on Secure Computer Systems (NordSec 1997), 1997.
  • A. Jøsang. Artificial Reasoning with Subjective Logic. Proceedings of the Second Australian Workshop on Commonsense Reasoning, Perth 1997. [pdf]
  • A. Jøsang. A Trust Policy Framework. Proceedings of the 1997 International Conference on Information and Communication Security (ICICS), Springer-Verlag, 1997.
  • A. Jøsang. Prospectives for Modelling Trust in Information Security. Proceedings of the 1997 Australasian Conference on Information Security and Privacy (ACISP), Springer, 1997. [pdf]
  • A. Jøsang. F. Van Laenen, S.J. Knapskog, J. Vandewalle, How to trust systems. Proceedings of the 1997 IFIP-SEC International Information Security Conference, IFIP, 1997. [pdf]

Published 1996

  • A. Jøsang. The right type of trust for distributed systems. Proceedings of the 1996 New Security Paradigms Workshop (NSPW), ACM, 1996. [pdf]
  • A. Jøsang and K. Johannessen, Authentication in analogue telephone access networks. Proceedings of PRAGOCRYPT '96, pp.324-336, CTU Publishing House, Prague, 1996. [pdf]

Published 1995

  • A. Jøsang. Security protocol verification using SPIN, in J-Ch. Gregoire, editor, Proceedings of the First SPIN Workshop, INRS-Telecommunications, Montreal, Canada, 1995. [pdf]
  • A. Jøsang. The difficulty of standardizing smart card security evaluation. Computer Standards and Interfaces Journal, 17, September 1995, pp.333-341. [pdf]

Published Mar. 4, 2021 10:53 AM - Last modified Mar. 29, 2021 9:09 AM