Lillian Røstad

Associate Professor - Digital infrastructure and security
Norwegian version of this page
Visiting address Gaustadalléen 23B 0373 Oslo
Postal address Postboks 1080 0316 Oslo


  • Jaatun, Martin Gilje; Cruzes, Daniela Soares; Bernsmed, Karin; Tøndel, Inger Anne & Røstad, Lillian (2015). Software Security Maturity in Public Organisations. Lecture Notes in Computer Science (LNCS).  ISSN 0302-9743.  9290, s 120- 138 . doi: 10.1007/978-3-319-23318-5_7 Show summary
  • Balon-Perin, Alexandre; Gambäck, Björn & Røstad, Lillian (2012). Intrusion Detection Using Ensembles, In Herwig Mannaert (ed.),  Seventh International Conference on Software Engineering Advances 2012 (ICSEA 2012).  Xpert Publishing Services.  ISBN 9781622765843.  article.  s 656 - 663
  • Røstad, Lillian & Alsos, Ole Andreas (2009). Patient-Administered Access Control: a Usability Study, In Takizawa Makoto (ed.),  Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009.  IEEE.  ISBN 9780769535647.  SecUSAB 2009 - Session 2.  s 877 - 882
  • Røstad, Lillian & Nerbråten, Øyvind (2009). hAcmeGame: A Tool for Teaching Software Security, In Takizawa Makoto (ed.),  Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009.  IEEE.  ISBN 9780769535647.  SecSE 2009 - Education and Other Vulnerabilities.  s 811 - 817
  • Røstad, Lillian; Meland, Per Håkon; Tøndel, Inger Anne & Øie, Gunnar Rene (2008). Learning by Failing (and Fixing). IEEE Security and Privacy.  ISSN 1540-7993.  6(4), s 54- 56 Show summary
  • Røstad, Lillian (2008). An Initial Model and a Discussion of Access Control in Patient Controlled Health Records, In Bob Werner (ed.),  Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008.  IEEE.  ISBN 0769531024.  WPA.  s 935 - 942
  • Røstad, Lillian & Nytrø, Øystein (2008). Personalized Access Control for a Personally Controlled Health Record, In Trent Jaeger (ed.),  Proceedings of the 2nd ACM workshop on Computer security architectures.  Association for Computing Machinery (ACM).  ISBN 978-1-60558-300-6.  SESSION: Trust and privacy.  s 9 - 16 Show summary
  • Røstad, Lillian & Nytrø, Øystein (2008). Towards Dynamic Access Control for Healthcare Information Systems, In Stig Kjær Andersen; Gunnar O. Klein; Stefan Schulz; Jos Aarts & M. Cristina Mazzoleni (ed.),  eHealth Beyond the Horizon – Get IT There - Proceedings of MIE2008 – The XXIst International Congress of the European Federation for Medical Informatics.  IOS Press.  ISBN 978-1-58603-864-9.  9. Privacy and Security.  s 703 - 708
  • Røstad, Lillian; Meland, Per Håkon; Tøndel, Inger Anne & Nytrø, Øystein (2007). Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges, In Nguyen Man Tho (ed.),  Proceedings from the Second International Conference on Availability, Reliability and Security (ARES 2007).  IEEE.  ISBN 0-7695-2775-2.  DAWAM.
  • Røstad, Lillian (2006). An extended misuse case notation: Including vulnerabilities and the insider threat, In Sawyer Peter (ed.),  Proceedings of The Twelfth Working Conference on Requirements Engineering: Foundation for Software Quality.  Essener Informatik Beitrage.  ISBN 3-922602-26-6.  Session 1 "Quality requirements". Show summary
  • Røstad, Lillian & Edsberg, Ole (2006). A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs, In Bob Werner (ed.),  Proceedings of the 22nd Annual Computer Security Applications Conference.  IEEE.  ISBN 0-7695-2716-7.  Session: Security in Systems.  s 175 - 183 Show summary
  • Stav, Erlend; Walderhaug, Ståle; Tomassen, Stein Løkke; Røstad, Lillian & Moe, Nils Brede (2006). MAFIIA - an Architectural Description Framework: Experience from the Health Care Domain, In D Konstantas; J.-P. Bourrières; M. Léonard & N. Boudjlida (ed.),  Interoperability of Enterprise Software and Applications.  Springer Publishing Company.  ISBN 1-84628-151-2.  None.  s 43 - 54 Show summary

View all works in Cristin

  • Bartnes, Maria & Røstad, Lillian (2019). Hva er egentlig rett og galt for roboter?. Dagens næringsliv.  ISSN 0803-9372.
  • Jaatun, Martin Gilje; Scandariato, Riccardo & Røstad, Lillian (2014). Guest Editorial Preface - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013). International Journal of Secure Software Engineering (IJSSE).  ISSN 1947-3036.  5(2), s iv- vi
  • Faxvaag, Arild; Røstad, Lillian; Tøndel, Inger Anne; Seim, Andreas Røsland & Toussaint, Pieter Jelle (2009). Visualizing patient trajectories on wall-mounted boards — information security challenges. Show summary
  • Røstad, Lillian (2009). Access Control in Healthcare Information Systems. Doktoravhandlinger ved NTNU. 24.
  • Røstad, Lillian (2005). Access Control in Healthcare Applications.
  • Røstad, Lillian (2004). Access Control for Distributed Health Care Applications.
  • Røstad, Lilian; Nytrø, Øystein; Moe, Nils Brede & Stav, Erlend (2003). Sikkerhetsarkitektur for PlanBasert Samarbeidsjournal SPBS v.1. SINTEF Rapport. SIF40 A03033. Show summary

View all works in Cristin

Published June 12, 2019 2:56 PM - Last modified June 12, 2019 2:56 PM

Research groups