Judith Ellen Yarranton Rossebø

Image of Judith Ellen Yarranton Rossebø
Norwegian version of this page
Username
Visiting address Gunnar Randers vei 19 2007 Kjeller
Postal address Postboks 70 2027 Kjeller

10% position at ITS.

 

Publications

  • Amyot, Daniel; Becca, Hanana; Bræk, Rolv & Rossebø, Judith Ellen Yarranton (2008). Next Generation Service Engineering, Proceedings of the ITU-T NGN Kaleidoscope Conference. IU-T. ISSN 978-92-61-12441-0.
  • Rossebø, Judith Ellen Yarranton & Runde, Ragnhild Kobro (2008). Specifying Service Composition Using UML 2.x and Composition Policies. Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 5301, p. 520–536.
  • Rossebø, Judith Ellen Yarranton; Cadzow, Scott & Sijben, Paul (2007). eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. In Man Tho, Nguyen (Eds.), Proceedings from the Second International Conference on Availability, Reliability and Security (ARES 2007). IEEE. ISSN 0-7695-2775-2. p. 925–933.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2006). Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. In Computer Society, IEEE (Eds.), First International Conference on Availability, Reliability and Security (ARES'06). IEEE conference proceedings. ISSN 0-7695-2567-9. p. 206–215.
  • Rossebø, Judith Ellen Yarranton; Cadzow, Scott & Sijben, Paul (2006). eTVRA, a threat, vulnerability and risk assessment tool for eEurope. In Stølen, Ketil (Eds.), Trust Management - 4th International Conference, iTrust 2006. Springer. ISSN 3-540-34295-8. p. 467–471.
  • Rossebø, Judith Ellen Yarranton; Lund, Mass Soldal; Husa, Knut Eilif & Refsdal, Atle (2006). A conceptual model for service availability. In Gollmann, Dieter (Eds.), Quality Of Protection - Security Measurements and Metrics. Springer Publishing Company. ISSN 0-387-29016-8. p. 107–118.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2006). A Policy-driven Approach to Dynamic Composition of Authentication and Authorization Patterns and Services. Journal of Computers. ISSN 1796-203X. 1(8).
  • Rossebø, Judith Ellen Yarranton; Skagestein, Gerhard; Haug, Vegard & Nødtvedt, Einar (2006). How to create trust in electronic voting over an untrusted platform. Lecture Notes in Informatics. ISSN 1617-5468.
  • Rossebø, Judith Ellen Yarranton & Sibjen, Paul (2006). Security Issues in Voice over IP. Telektronikk. ISSN 0085-7130. 102(1).
  • Rossebø, Judith Ellen Yarranton; Cadzow, Scott & Sijben, Paul (2006). eTVRA, a threat, vulnerability and risk assessment tool for eEurope. Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 3986. doi: 10.1109/ARES.2007.82.

View all works in Cristin

  • Rossebø, Judith Ellen Yarranton (2008). Proceedings of the ITU-T NGN Kaleidoscope Conference. IU-T. ISBN 978-92-61-12441-0. 200 p.
  • Rossebø, Judith Ellen Yarranton (2008). Proceedings of the Third International Conference on Availability, Reliability and Security. IEEE. ISBN 9780769531021. 700 p.

View all works in Cristin

  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2008). Using Composition Policies to Manage Authentication and Authorization Patterns and Services, Proceedings of the Third International Conference on Availability, Reliability and Security. IEEE. ISSN 9780769531021. p. 597–603.
  • Rossebø, Judith Ellen Yarranton (2008). Dynamic Service Composition.
  • Rossebø, Judith Ellen Yarranton (2008). Telenor and TISPAN NGN.
  • Rossebø, Judith Ellen Yarranton (2008). NGN Security Standards for Fixed Mobile Convergence - R2 and Beyond.
  • Pearce, Arlene; Jensen, Terje & Rossebø, Judith Ellen Yarranton (2008). Combining IMS and Web 2.0 -- Assessing the Service Availability.
  • Rossebø, Judith Ellen Yarranton; Pearce, Arlene & Jensen, Terje (2008). On Understanding availability of services based on IP Multimedia Subsystem.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2008). Using Composition Policies to Manage Authentication and Authorization Patterns and Services.
  • Amyot, Daniel; Becca, Hanana; Bræk, Rolv & Rossebø, Judith Ellen Yarranton (2008). Next Generation Service Engineering.
  • Rossebø, Judith Ellen Yarranton & Runde, Ragnhild Kobro (2008). Specifying Service Composition Using UML 2.x and Composition Policies.
  • Rossebø, Judith Ellen Yarranton (2007). NGN Security standards for Fixed-Mobile Convergence.
  • Rossebø, Judith Ellen Yarranton (2007). eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2006). Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition.
  • Rossebø, Judith Ellen Yarranton (2005). Nye standarder for sikkerhet og tillit i Europa.
  • Rossebø, Judith Ellen Yarranton; Lund, Mass Soldal; Husa, Knut-Eilif & Refsdal, Atle (2005). A Conceptual Model for Service Availability.
  • Rossebø, Judith Ellen Yarranton (2004). Patterns to ensure availability in service composition.
  • Rossebø, Judith Ellen Yarranton (2004). An analysis of IPsec deployment performance issues in high and low power devices.
  • Rossebø, Judith Ellen Yarranton (2003). Authentication issues in multi-service residential access networks.
  • Bræk, Rolv & Rossebø, Judith Ellen Yarranton (2009). Methodology for Policy-Enabled Dynamic composition of services. Department of Telematics, NTNU.
  • Rossebø, Judith Ellen Yarranton (2009). Dynamic Composition of Services - a Model-Based Approach. NTNU. ISSN 978-82-471-1719-4.
  • Rossebø, Judith Ellen Yarranton & Bræk, Rolv (2008). Using Composition Policies to Manage Authentication and Authorization Patterns and Services. Department of Telematics, NTNU. ISSN 978-82-993980-5-3.

View all works in Cristin

Published Jan. 11, 2017 3:30 PM - Last modified Jan. 17, 2019 1:54 PM