Judith Ellen Y Rossebø

Image of Judith Ellen Y Rossebø
Norwegian version of this page
Username
Visiting address Gunnar Randers vei 19 None 2007 KJELLER
Postal address Postboks 70 2027 KJELLER

10% position at ITS.

 

Publications

  • Amyot, Daniel; Becca, Hanana; Bræk, Rolv & Rossebø, Judith Ellen Yarranton (2008). Next Generation Service Engineering, In  Proceedings of the ITU-T NGN Kaleidoscope Conference.  IU-T.  ISBN 978-92-61-12441-0.  KAPITTEL.
  • Rossebø, Judith Ellen Yarranton & Runde, Ragnhild Kobro (2008). Specifying Service Composition Using UML 2.x and Composition Policies. Lecture Notes in Computer Science (LNCS).  ISSN 0302-9743.  5301, s 520- 536
  • Rossebø, Judith Ellen Yarranton; Cadzow, Scott & Sijben, Paul (2007). eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope, In Nguyen Man Tho (ed.),  Proceedings from the Second International Conference on Availability, Reliability and Security (ARES 2007).  IEEE.  ISBN 0-7695-2775-2.  kapittel.  s 925 - 933
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2006). A Policy-driven Approach to Dynamic Composition of Authentication and Authorization Patterns and Services. Journal of Computers.  ISSN 1796-203X.  1(8)
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2006). Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition, In IEEE Computer Society (ed.),  First International Conference on Availability, Reliability and Security (ARES'06).  IEEE conference proceedings.  ISBN 0-7695-2567-9.  Session 7.  s 206 - 215
  • Rossebø, Judith Ellen Yarranton & Sibjen, Paul (2006). Security Issues in Voice over IP. Telektronikk.  ISSN 0085-7130.  102(1)
  • Rossebø, Judith Ellen Yarranton; Skagestein, Gerhard; Haug, Vegard & Nødtvedt, Einar (2006). How to create trust in electronic voting over an untrusted platform. Lecture Notes in Informatics.  ISSN 1617-5468.  s 86
  • Rossebø, Judith Ellen Yarranton; Cadzow, Scott & Sijben, Paul (2006). eTVRA, a threat, vulnerability and risk assessment tool for eEurope. Lecture Notes in Computer Science (LNCS).  ISSN 0302-9743.  3986 . doi: 10.1109/ARES.2007.82
  • Rossebø, Judith Ellen Yarranton; Cadzow, Scott & Sijben, Paul (2006). eTVRA, a threat, vulnerability and risk assessment tool for eEurope, In Ketil Stølen (ed.),  Trust Management - 4th International Conference, iTrust 2006.  Springer.  ISBN 3-540-34295-8.  paper.  s 467 - 471
  • Rossebø, Judith Ellen Yarranton; Lund, Mass Soldal; Husa, Knut Eilif & Refsdal, Atle (2006). A conceptual model for service availability, In Dieter Gollmann (ed.),  Quality Of Protection - Security Measurements and Metrics.  Springer Publishing Company.  ISBN 0-387-29016-8.  paper.  s 107 - 118

View all works in Cristin

  • Rossebø, Judith Ellen Yarranton (2008). Proceedings of the ITU-T NGN Kaleidoscope Conference. IU-T.  ISBN 978-92-61-12441-0.  200 s.
  • Rossebø, Judith Ellen Yarranton (2008). Proceedings of the Third International Conference on Availability, Reliability and Security. IEEE.  ISBN 9780769531021.  700 s.

View all works in Cristin

  • Bræk, Rolv & Rossebø, Judith Ellen Yarranton (2009). Methodology for Policy-Enabled Dynamic composition of services.
  • Rossebø, Judith Ellen Yarranton (2009). Dynamic Composition of Services - a Model-Based Approach. Doktoravhandlinger ved NTNU. 2009:163.
  • Amyot, Daniel; Becca, Hanana; Bræk, Rolv & Rossebø, Judith Ellen Yarranton (2008). Next Generation Service Engineering.
  • Pearce, Arlene; Jensen, Terje & Rossebø, Judith Ellen Yarranton (2008). Combining IMS and Web 2.0 -- Assessing the Service Availability.
  • Rossebø, Judith Ellen Yarranton (2008). Dynamic Service Composition.
  • Rossebø, Judith Ellen Yarranton (2008). NGN Security Standards for Fixed Mobile Convergence - R2 and Beyond.
  • Rossebø, Judith Ellen Yarranton (2008). Telenor and TISPAN NGN.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2008). Using Composition Policies to Manage Authentication and Authorization Patterns and Services. AVANTEL Technical Report. 3/2008.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2008). Using Composition Policies to Manage Authentication and Authorization Patterns and Services.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2008). Using Composition Policies to Manage Authentication and Authorization Patterns and Services, In  Proceedings of the Third International Conference on Availability, Reliability and Security.  IEEE.  ISBN 9780769531021.  KAPITTEL.  s 597 - 603
  • Rossebø, Judith Ellen Yarranton; Pearce, Arlene & Jensen, Terje (2008). On Understanding availability of services based on IP Multimedia Subsystem.
  • Rossebø, Judith Ellen Yarranton & Runde, Ragnhild Kobro (2008). Specifying Service Composition Using UML 2.x and Composition Policies.
  • Rossebø, Judith Ellen Yarranton (2007). NGN Security standards for Fixed-Mobile Convergence.
  • Rossebø, Judith Ellen Yarranton (2007). eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2006). Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition.
  • Rossebø, Judith Ellen Yarranton (2005). Nye standarder for sikkerhet og tillit i Europa.
  • Rossebø, Judith Ellen Yarranton; Lund, Mass Soldal; Husa, Knut-Eilif & Refsdal, Atle (2005). A Conceptual Model for Service Availability.
  • Rossebø, Judith Ellen Yarranton (2004). An analysis of IPsec deployment performance issues in high and low power devices.
  • Rossebø, Judith Ellen Yarranton (2004). Patterns to ensure availability in service composition.
  • Rossebø, Judith Ellen Yarranton (2003). Authentication issues in multi-service residential access networks.

View all works in Cristin

Published Jan. 11, 2017 3:30 PM - Last modified Jan. 17, 2019 1:54 PM