default search action
Audun Jøsang
Person information
- affiliation: University of Oslo, Norway
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Zhen Guo, Zelin Wan, Qisheng Zhang, Xujiang Zhao, Qi Zhang, Lance M. Kaplan, Audun Jøsang, Dong Hyun Jeong, Feng Chen, Jin-Hee Cho:
A survey on uncertainty reasoning and quantification in belief theory and its application to deep learning. Inf. Fusion 101: 101987 (2024) - [c123]Robert Andrew Chetwyn, Martin Eian, Audun Jøsang:
Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of Behaviour. CSR 2024: 853-859 - [c122]Robert Andrew Chetwyn, Martin Eian, Audun Jøsang:
Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon. EICC 2024: 95-104 - [c121]Changbin Li, Kangshuo Li, Yuzhe Ou, Lance M. Kaplan, Audun Jøsang, Jin-Hee Cho, Dong Hyun Jeong, Feng Chen:
Hyper Evidential Deep Learning to Quantify Composite Classification Uncertainty. ICLR 2024 - [i16]Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J. Buchanan, Jawad Ahmad, Audun Jøsang, Vasileios Mavroeidis, Mouad Lemoudden:
TIPS: Threat Sharing Information Platform for Enhanced Security. CoRR abs/2403.05210 (2024) - [i15]Changbin Li, Kangshuo Li, Yuzhe Ou, Lance M. Kaplan, Audun Jøsang, Jin-Hee Cho, Dong Hyun Jeong, Feng Chen:
Hyper Evidential Deep Learning to Quantify Composite Classification Uncertainty. CoRR abs/2404.10980 (2024) - [i14]Qi Zhang, Lance M. Kaplan, Audun Jøsang, Dong Hyun Jeong, Feng Chen, Jin-Hee Cho:
Winning the Social Media Influence Battle: Uncertainty-Aware Opinions to Understand and Spread True Information via Competitive Influence Maximization. CoRR abs/2404.18826 (2024) - 2023
- [j19]Dong Hyun Jeong, Jin-Hee Cho, Feng Chen, Lance M. Kaplan, Audun Jøsang, Soo-Yeon Ji:
Interactive Web-Based Visual Analysis on Network Traffic Data. Inf. 14(1): 16 (2023) - [c120]Dinh Uy Tran, Sigrid Haug Selnes, Audun Jøsang, Janne Merete Hagen:
An Opportunity-Based Approach to Information Security Risk. ESORICS Workshops (2) 2023: 7-25 - [c119]Dinh Uy Tran, Audun Jøsang:
Business Language for Information Security. HAISA 2023: 169-180 - [c118]Xujiang Zhao, Xuchao Zhang, Chen Zhao, Jin-Hee Cho, Lance M. Kaplan, Dong Hyun Jeong, Audun Jøsang, Haifeng Chen, Feng Chen:
Multi-Label Temporal Evidential Neural Networks for Early Event Detection. ICASSP 2023: 1-5 - [c117]Zhen Guo, Qi Zhang, Qisheng Zhang, Lance M. Kaplan, Audun Jøsang, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
Detecting Intents of Fake News Using Uncertainty-Aware Deep Reinforcement Learning. ICWS 2023: 722-724 - [i13]Zhen Guo, Qi Zhang, Xinwei An, Qisheng Zhang, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
Uncertainty-Aware Reward-based Deep Reinforcement Learning for Intent Analysis of Social Media Information. CoRR abs/2302.10195 (2023) - [i12]Dong Hyun Jeong, Jin-Hee Cho, Feng Chen, Audun Jøsang, Soo-Yeon Ji:
Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation. CoRR abs/2310.01580 (2023) - 2022
- [c116]Audun Jøsang, Jin-Hee Cho, Feng Chen:
Noninformative Prior Weights for Dirichlet PDFs*. MFI 2022: 1-6 - [i11]Zhen Guo, Zelin Wan, Qisheng Zhang, Xujiang Zhao, Feng Chen, Jin-Hee Cho, Qi Zhang, Lance M. Kaplan, Dong Hyun Jeong, Audun Jøsang:
A Survey on Uncertainty Reasoning and Quantification for Decision Making: Belief Theory Meets Deep Learning. CoRR abs/2206.05675 (2022) - [i10]Qisheng Zhang, Zhen Guo, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
PPO-UE: Proximal Policy Optimization via Uncertainty-Aware Exploration. CoRR abs/2212.06343 (2022) - 2021
- [c115]Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang:
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. CyCon 2021: 327-352 - [e6]Audun Jøsang, Lynn Futcher, Janne Merete Hagen:
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings. IFIP Advances in Information and Communication Technology 625, Springer 2021, ISBN 978-3-030-78119-4 [contents] - [i9]Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang:
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. CoRR abs/2103.02301 (2021) - [i8]Vasileios Mavroeidis, Audun Jøsang:
Data-Driven Threat Hunting Using Sysmon. CoRR abs/2103.15194 (2021) - 2020
- [c114]Audun Jøsang, Viktoria Stray, Hanne Rygge:
Threat Poker: Gamification of Secure Agile. WISE 2020: 142-155 - [i7]Fabio Massimo Zennaro, Audun Jøsang:
Using Subjective Logic to Estimate Uncertainty in Multi-Armed Bandit Problems. CoRR abs/2008.07386 (2020)
2010 – 2019
- 2019
- [j18]Fabio Massimo Zennaro, Magdalena Ivanovska, Audun Jøsang:
An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations. Int. J. Approx. Reason. 111: 56-77 (2019) - [c113]Audun Jøsang:
Belief Mosaics of Subjective Opinions. FUSION 2019: 1-8 - 2018
- [j17]Tore Pedersen, Christian Johansen, Audun Jøsang:
Behavioural Computer Science: an agenda for combining modelling of human and system behaviours. Hum. centric Comput. Inf. Sci. 8: 7 (2018) - [c112]Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang:
A Framework for Data-Driven Physical Security and Insider Threat Detection. ASONAM 2018: 1108-1115 - [c111]Francesco Santini, Audun Jøsang, Maria Silvia Pini:
Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic. FUSION 2018: 1982-1989 - [c110]Audun Jøsang, Jin-Hee Cho, Feng Chen:
Uncertainty Characteristics of Subjective Opinions. FUSION 2018: 1998-2005 - [c109]Vasileios Mavroeidis, Audun Jøsang:
Data-Driven Threat Hunting Using Sysmon. ICCSP 2018: 82-88 - [c108]Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique M. Dinis Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Susana Mendes Pereira, Eliana Stavrou:
Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. ITiCSE (Companion) 2018: 36-54 - [c107]Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique M. Dinis Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Susana Mendes Pereira, Vítor J. Sá, Eliana Stavrou:
Global perspectives on cybersecurity education. ITiCSE 2018: 340-341 - [c106]Hanne Rygge, Audun Jøsang:
Threat Poker: Solving Security and Privacy Threats in Agile Software Development. NordSec 2018: 468-483 - [i6]Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych, Audun Jøsang:
The Impact of Quantum Computing on Present Cryptography. CoRR abs/1804.00200 (2018) - [i5]Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang:
A Framework for Data-Driven Physical Security and Insider Threat Detection. CoRR abs/1809.09434 (2018) - 2017
- [c105]Audun Jøsang, Dongxia Wang, Jie Zhang:
Multi-source fusion in subjective logic. FUSION 2017: 1-8 - [c104]Audun Jøsang, Jie Zhang, Dongxia Wang:
Multi-source trust revision. FUSION 2017: 1-8 - [c103]Kamer Vishi, Audun Jøsang:
A new approach for multi-biometric fusion based on subjective logic. IML 2017: 68:1-68:9 - [c102]Magdalena Ivanovska, Audun Jøsang, Jie Zhang, Shuo Chen:
Joint Subjective Opinions. MDAI 2017: 220-233 - [c101]Denis Migdal, Christian Johansen, Audun Jøsang:
Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique. SIoT 2017: 10-19 - [c100]Audun Jøsang:
A Consistent Definition of Authorization. STM 2017: 134-144 - [c99]László Erdödi, Audun Jøsang:
Exploit Prevention, Quo Vadis? STM 2017: 180-190 - 2016
- [b1]Audun Jøsang:
Subjective Logic - A Formalism for Reasoning Under Uncertainty. Artificial Intelligence: Foundations, Theory, and Algorithms, Springer 2016, ISBN 978-3-319-42335-7, pp. 1-326 - [c98]Denis Migdal, Christian Johansen, Audun Jøsang:
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking. CCS 2016: 1847-1849 - [c97]Audun Jøsang:
Decision making under vagueness and uncertainty. FUSION 2016: 496-503 - [c96]Audun Jøsang, Lance M. Kaplan:
Principles of subjective networks. FUSION 2016: 1292-1299 - [c95]Christian Johansen, Tore Pedersen, Audun Jøsang:
Towards Behavioural Computer Science. IFIPTM 2016: 154-163 - [c94]Magdalena Ivanovska, Audun Jøsang, Francesco Sambo:
Bayesian Deduction with Subjective Opinions. KR 2016: 484-493 - [c93]Audun Jøsang:
Generalising Bayes' theorem in subjective logic. MFI 2016: 462-469 - [c92]Magdalena Ivanovska, Audun Jøsang:
Predictive Reasoning in Subjective Bayesian Networks. NIP 2016 - [c91]Siri Bromander, Audun Jøsang, Martin Eian:
Semantic Cyberthreat Modelling. STIDS 2016: 74-78 - [i4]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Audun Jøsang, Ali Dehghan Tanha:
A Formal Calculus for International Relations Computation and Evaluation. CoRR abs/1606.02239 (2016) - 2015
- [j16]Ahmad Abdel-Hafez, Yue Xu, Audun Jøsang:
A normal-distribution based rating aggregation method for generating product reputations. Web Intell. 13(1): 43-51 (2015) - [c90]Ahmad Abdel-Hafez, Yue Xu, Audun Jøsang:
An accurate rating aggregation method for generating item reputation. DSAA 2015: 1-8 - [c89]Lance M. Kaplan, Magdalena Ivanovska, Audun Jøsang, Francesco Sambo:
Towards subjective networks: Extending conditional reasoning in subjective logic. FUSION 2015: 319-326 - [c88]Audun Jøsang, Magdalena Ivanovska, Tim Muller:
Trust revision for conflicting sources. FUSION 2015: 550-557 - [c87]Magdalena Ivanovska, Audun Jøsang, Lance M. Kaplan, Francesco Sambo:
Subjective Networks: Perspectives and Challenges. GKR 2015: 107-124 - [c86]Audun Jøsang, Marte Ødegaard, Erlend Oftedal:
Cybersecurity Through Secure Software Development. World Conference on Information Security Education 2015: 53-63 - [c85]Md. Sadek Ferdous, Gethin Norman, Audun Jøsang, Ron Poet:
Mathematical Modelling of Trust Issues in Federated Identity Management. IFIPTM 2015: 13-29 - [c84]Ijlal Loutfi, Audun Jøsang:
1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space. IFIPTM 2015: 165-176 - [c83]Tim Muller, Dongxia Wang, Audun Jøsang:
Information Theory for Subjective Logic. MDAI 2015: 230-242 - [c82]Ijlal Loutfi, Audun Jøsang:
FIDO Trust Requirements. NordSec 2015: 139-155 - 2014
- [j15]Audun Jøsang:
Identity management and trusted interaction in internet and mobile computing. IET Inf. Secur. 8(2): 67-79 (2014) - [c81]Aude Plateaux, Patrick Lacharme, Audun Jøsang, Christophe Rosenberger:
One-Time Biometrics for Online Banking and Electronic Payment Authentication. CD-ARES 2014: 179-193 - [c80]Audun Jøsang:
Assurance Requirements for Mutual User and Service Provider Authentication. DPM/SETOP/QASA 2014: 26-44 - [c79]Christian Johansen, Audun Jøsang:
Probabilistic Modelling of Humans in Security Ceremonies. DPM/SETOP/QASA 2014: 277-292 - [c78]Erik Blasch, Audun Jøsang, Jean Dezert, Paulo C. G. Costa, Anne-Laure Jousselme:
URREF self-confidence in information fusion trust. FUSION 2014: 1-8 - [c77]Audun Jøsang, Thorvald H. Munch-Moller:
Biometric data fusion based on subjective logic. FUSION 2014: 1-8 - [c76]Endang Djuana, Yue Xu, Yuefeng Li, Audun Jøsang:
A Combined Method for Mitigating Sparsity Problem in Tag Recommendation. HICSS 2014: 906-915 - [c75]Ahmad Abdel-Hafez, Yue Xu, Audun Jøsang:
A rating aggregation method for generating product reputations. HT 2014: 291-293 - [c74]Ahmad Abdel-Hafez, Yue Xu, Audun Jøsang:
A Normal-Distribution Based Reputation Model. TrustBus 2014: 144-155 - [c73]Nan Tian, Yue Xu, Yuefeng Li, Ahmad Abdel-Hafez, Audun Jøsang:
Product Feature Taxonomy Learning based on User Reviews. WEBIST (2) 2014: 184-192 - [c72]Nan Tian, Yue Xu, Yuefeng Li, Ahmad Abdel-Hafez, Audun Jøsang:
Generating Product Feature Hierarchy from Product Reviews. WEBIST (Revised Selected Papers) 2014: 264-278 - [e5]Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro:
2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3502-4 [contents] - 2013
- [c71]Audun Jøsang, Paulo Cesar G. da Costa, Erik Blasch:
Determining model correctness for situations of belief fusion. FUSION 2013: 1886-1893 - [c70]Endang Djuana, Yue Xu, Yuefeng Li, Audun Jøsang, Clive Cox:
An Ontology-based Method for Sparsity Problem in Tag Recommendation. ICEIS (2) 2013: 467-474 - [c69]Henning Klevjer, Kent A. Varmedal, Audun Jøsang:
Extended HTTP Digest Access Authentication. IDMAN 2013: 83-96 - [c68]Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed:
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. IFIPTM 2013: 66-82 - [c67]Audun Jøsang, Guibing Guo, Maria Silvia Pini, Francesco Santini, Yue Xu:
Combining Recommender and Reputation Systems to Produce Better Online Advice. MDAI 2013: 126-138 - [c66]Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé:
The OffPAD: Requirements and Usage. NSS 2013: 80-93 - [e4]Audun Jøsang, Pierangela Samarati, Marinella Petrocchi:
Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7783, Springer 2013, ISBN 978-3-642-38003-7 [contents] - 2012
- [j14]Xujuan Zhou, Yue Xu, Yuefeng Li, Audun Jøsang, Clive Cox:
The state-of-the-art in personalized recommender systems for social networking. Artif. Intell. Rev. 37(2): 119-132 (2012) - [j13]Audun Jøsang, Simon Pope:
Dempster's Rule as Seen by Little Colored Balls. Comput. Intell. 28(4): 453-474 (2012) - [c65]Audun Jøsang, Robin Hankin:
Interpretation and fusion of hyper opinions in subjective logic. FUSION 2012: 1225-1232 - [c64]Audun Jøsang, Tanja Azderska, Stephen Marsh:
Trust Transitivity and Conditional Belief Reasoning. IFIPTM 2012: 68-83 - [c63]Audun Jøsang:
Robustness of Trust and Reputation Systems: Does It Matter? IFIPTM 2012: 253-262 - [c62]Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, Rajendra Kumar:
Service provider authentication assurance. PST 2012: 203-210 - [e3]Audun Jøsang, Bengt Carlsson:
Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings. Lecture Notes in Computer Science 7617, Springer 2012, ISBN 978-3-642-34209-7 [contents] - 2011
- [c61]Audun Jøsang, Zied Elouedi:
Redefining material implication with subjective logic. FUSION 2011: 1-6 - [c60]Endang Djuana, Yue Xu, Yuefeng Li, Audun Jøsang:
Ontology Learning from User Tagging for Tag Recommendation Making. Web Intelligence/IAT Workshops 2011: 310-313 - [c59]Audun Jøsang, Walter Quattrociocchi, Dino Karabeg:
Taste and Trust. IFIPTM 2011: 312-322 - [c58]Christian Müller-Schloer, Wolfgang Reif, Audun Jøsang, Jan-Philipp Steghöfer:
Workshop Message. SASO Workshops 2011: 17 - [c57]Audun Jøsang:
Trust Extortion on the Internet. STM 2011: 6-21 - 2010
- [j12]Audun Jøsang, Javier Díaz, Maria Rifqi:
Cumulative and averaging fusion of beliefs. Inf. Fusion 11(2): 192-200 (2010) - [j11]Audun Jøsang, Glenn Bewsell:
Guest Editors' Introduction: Trust and Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2) (2010) - [c56]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
SimTrust: A New Method of Trust Network Generation. EUC 2010: 718-722 - [c55]Audun Jøsang, Stephen O'Hara:
The base rate fallacy in belief reasoning. FUSION 2010: 1-8 - [c54]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
A Review of Trust in Online Social Networks to Explore New Research Agenda. International Conference on Internet Computing 2010: 123-128 - [c53]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
The Potential Relationship Between Trust and Interest Similarity. International Conference on Internet Computing 2010: 203-208 - [c52]Mohammed Alzomai, Bander AlFayyadh, Audun Jøsang:
Display security for online transactions: SMS-based authentication scheme. ICITST 2010: 1-7 - [c51]Jonathan Scudder, Audun Jøsang:
Personal Federation Control with the Identity Dashboard. IDMAN 2010: 85-99 - [c50]Audun Jøsang, Stephen O'Hara:
Multiplication of Multinomial Subjective Opinions. IPMU (1) 2010: 248-257 - [c49]Mohammed Al Zomai, Audun Jøsang:
The Mobile Phone as a Multi OTP Device Using Trusted Computing. NSS 2010: 75-82 - [c48]Audun Jøsang:
Robustness of Trust and Reputation Systems. SASO Workshops 2010: 159 - [c47]Audun Jøsang, Lothar Fritsch, Tobias Mahler:
Privacy Policy Referencing. TrustBus 2010: 129-140 - [c46]Touhid Bhuiyan, Yue Xu, Audun Jøsang, Huizhi Liang, Clive Cox:
Developing Trust Networks Based on User Tagging Information for Recommendation Making. WISE 2010: 357-364 - [p1]Touhid Bhuiyan, Audun Jøsang, Yue Xu:
Managing Trust in Online Social Networks. Handbook of Social Network Technologies 2010: 471-496 - [e2]Masakatsu Nishigaki, Audun Jøsang, Yuko Murayama, Stephen Marsh:
Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings. IFIP Advances in Information and Communication Technology 321, Springer 2010, ISBN 978-3-642-13445-6 [contents]
2000 – 2009
- 2009
- [j10]Suriadi Suriadi, Ernest Foo, Audun Jøsang:
A user-centric federated single sign-on system. J. Netw. Comput. Appl. 32(2): 388-401 (2009) - [j9]Bandar Alhaqbani, Audun Jøsang, Colin J. Fidge:
A Medical Data Reliability Assessment Model. J. Theor. Appl. Electron. Commer. Res. 4(2): 64-63 (2009) - [j8]Audun Jøsang:
Conditional Reasoning with Subjective Logic. J. Multiple Valued Log. Soft Comput. 15(1): 5-38 (2009) - [c45]Audun Jøsang:
Fission of opinions in subjective logic. FUSION 2009: 1911-1918 - [c44]Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar:
Security Usability of Petname Systems. NordSec 2009: 44-59 - [c43]Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous, Ravishankar Borgaonkar:
Spam filter optimality based on signal detection theory. SIN 2009: 219-224 - [c42]Audun Jøsang, Walter Quattrociocchi:
Advanced Features in Bayesian Reputation Systems. TrustBus 2009: 105-114 - [e1]Audun Jøsang, Torleiv Maseng, Svein J. Knapskog:
Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings. Lecture Notes in Computer Science 5838, Springer 2009, ISBN 978-3-642-04765-7 [contents] - 2008
- [c41]Audun Jøsang, Bander AlFayyadh:
Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign. AISC 2008: 53-58 - [c40]Mohammed Al Zomai, Bander AlFayyadh, Audun Jøsang, Adrian McCullagh:
An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. AISC 2008: 65-73 - [c39]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making. Web Intelligence/IAT Workshops 2008: 107-110 - [c38]Audun Jøsang, Xixi Luo, Xiaowu Chen:
Continuous Ratings in Discrete Bayesian Reputation Systems. IFIPTM 2008: 151-166 - [c37]Mohammed Alzomai, Audun Jøsang, Adrian McCullagh, Ernest Foo:
Strengthening SMS-Based Authentication through Usability. ISPA 2008: 683-688 - [c36]Audun Jøsang, Touhid Bhuiyan:
Optimal Trust Network Analysis with Subjective Logic. SECURWARE 2008: 179-184 - [c35]Audun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox:
Combining Trust and Reputation Management for Web-Based Services. TrustBus 2008: 90-99 - 2007
- [j7]Audun Jøsang, Roslan Ismail, Colin Boyd:
A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2): 618-644 (2007) - [c34]Audun Jøsang, Jochen Haller:
Dirichlet Reputation Systems. ARES 2007: 112-119 - [c33]Audun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara:
Security Usability Principles for Vulnerability Analysis and Risk Assessment. ACSAC 2007: 269-278 - [c32]Audun Jøsang, Mohammed Al Zomai, Suriadi Suriadi:
Usability and Privacy in Identity Management Architectures. ACSW 2007: 143-152 - [c31]Audun Jøsang:
Probabilistic Logic under Uncertainty. CATS 2007: 101-110 - [c30]Audun Jøsang, Zied Elouedi:
Interpreting Belief Functions as Dirichlet Distributions. ECSQARU 2007: 393-404 - [c29]Audun Jøsang:
Trust and Reputation Systems. FOSAD 2007: 209-245 - [i3]Audun Jøsang:
Cumulative and Averaging Fission of Beliefs. CoRR abs/0712.1182 (2007) - 2006
- [j6]Audun Jøsang, Elizabeth Gray, Michael Kinateder:
Simplification and analysis of transitive trust networks. Web Intell. Agent Syst. 4(2): 139-161 (2006) - [c28]Audun Jøsang, Ross Hayward, Simon Pope:
Trust network analysis with subjective logic. ACSC 2006: 85-94 - [c27]Audun Jøsang, Dieter Gollmann, Richard Au:
A method for access authorisation through delegation networks. ACSW 2006: 165-174 - [c26]Audun Jøsang, Stephen Marsh, Simon Pope:
Exploring Different Types of Trust Propagation. iTrust 2006: 179-192 - [i2]Audun Jøsang:
Belief Calculus. CoRR abs/cs/0606029 (2006) - [i1]Audun Jøsang:
The Cumulative Rule for Belief Fusion. CoRR abs/cs/0606066 (2006) - 2005
- [j5]Audun Jøsang, David McAnally:
Multiplication and comultiplication of beliefs. Int. J. Approx. Reason. 38(1): 19-51 (2005) - [c25]Audun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope:
Trust Requirements in Identity Management. ACSW 2005: 99-108 - [c24]Audun Jøsang, Simon Pope:
Semantic Constraints for Trust Transitivity. APCCM 2005: 59-68 - [c23]Audun Jøsang, Simon Pope, Milan Daniel:
Conditional Deduction Under Uncertainty. ECSQARU 2005: 824-835 - [c22]Audun Jøsang, Claudia Keser, Theodosis Dimitrakos:
Can We Manage Trust? iTrust 2005: 93-107 - 2004
- [j4]Mary Anne Patton, Audun Jøsang:
Technologies for Trust in Electronic Commerce. Electron. Commer. Res. 4(1-2): 9-21 (2004) - [c21]Daniel Bradley, Audun Jøsang:
Mesmerize - an open framework for enterprise security management. ACSW 2004: 37-42 - [c20]Audun Jøsang, Daniel Bradley, Svein J. Knapskog:
Belief-Based Risk Analysis. ACSW 2004: 63-68 - [c19]Audun Jøsang, Stéphane Lo Presti:
Analysing the Relationship between Risk and Trust. iTrust 2004: 135-145 - [c18]Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates. WOSIS 2004: 53-62 - [c17]Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
Private Reputation Schemes for P2P systems. WOSIS 2004: 196-206 - 2003
- [c16]Audun Jøsang, Gunnar Sanderud:
Security in Mobile Communications: Challenges and Opportunities. ACSW 2003: 43-48 - [c15]Audun Jøsang, Mary Anne Patton:
User Interface Requirements for Authentication of Communication. AUIC 2003: 75-80 - [c14]Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
A Security Architecture for Reputation Systems. EC-Web 2003: 176-185 - [c13]Theodosis Dimitrakos, Ivan Djordjevic, Zoran Milosevic, Audun Jøsang, Chris I. Phillips:
Contract Performance Assessment for Secure and Dynamic Virtual Collaborations. EDOC 2003: 62-75 - [c12]Audun Jøsang, Shane Hird, Eric Faccer:
Simulating the Effect of Reputation Systems on E-markets. iTrust 2003: 179-194 - 2002
- [j3]Audun Jøsang:
The consensus operator for combining beliefs. Artif. Intell. 141(1/2): 157-170 (2002) - [c11]Roslan Ismail, Audun Jøsang:
The Beta Reputation System. Bled eConference 2002: 41 - [c10]Zoran Milosevic, Audun Jøsang, Theodosis Dimitrakos, Mary Anne Patton:
Discretionary Enforcement of Electronic Contracts. EDOC 2002: 39-50 - 2001
- [j2]Audun Jøsang:
A Logic for Uncertain Probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 9(3): 279-212 (2001) - [c9]Audun Jøsang, Peter M. Møllerud, Eddy Cheung:
Web Security: The Emperor's New Armour. ECIS 2001: 166-176 - 2000
- [j1]Audun Jøsang, Viggo A. Bondi:
Legal reasoning with subjective logic. Artif. Intell. Law 8(4): 289-315 (2000) - [c8]Audun Jøsang, Ingar Glenn Pedersen, Dean Povey:
PKI Seeks a Trusting Relationship. ACISP 2000: 191-205
1990 – 1999
- 1999
- [c7]Audun Jøsang:
An Algebra for Assessing Trust in Certification Chains. NDSS 1999 - [c6]Audun Jøsang, M. G. L. Bijnagte, Geert Kleinhuis:
Enabling Factors for IN Service Provider Access. SMARTNET 1999: 375-388 - 1998
- [c5]Audun Jøsang:
A Subjective Metric of Authentication. ESORICS 1998: 329-344 - 1997
- [c4]Audun Jøsang:
Prospectives for Modelling Trust in Information Security. ACISP 1997: 2-13 - [c3]Audun Jøsang:
A Trust policy framework. ICICS 1997: 192-202 - [c2]Audun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle:
How to trust systems. SEC 1997: 241-252 - 1996
- [c1]Audun Jøsang:
The right type of trust for distributed systems. NSPW 1996: 119-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint