Christian D. Jensen

  1. Research › Book chapter
  2. Published

    Video Surveillance: Privacy Issues and Legal Compliance. / Mahmood Rajpoot, Qasim; Jensen, Christian D.

    Promoting Social Change and Democracy through Information Technology. ed. / Vikas Kumar; Jakob Svensson. IGI global, 2015.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2015

  3. Published

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). / Ahmed, Naveed (Editor); Quercia, D. (Editor); Jensen, Christian D. (Editor).

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). 2011.

    Publication: ResearchBook chapter – Annual report year: 2011

  4. Research › Article in proceedings
  5. Published

    Adaptability in CORBA: The Mobile Proxy Approach. / Aziz, B.; Jensen, Christian D.

    2nd Symposium on Distributed Objects & Applications. 2000. p. 295-305.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2000

  6. Published

    A Generic Access Control Model for Wind Power Systems. / Nagarajan, Anand; Jensen, Christian D.

    Workshop Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010): Proceedings of the International Workshop on Infrastructure Assurance (iWiA 2010). 2010. p. 1-14.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  7. Published

    A Mechanism for Identity Delegation at Authentication Level. / Ahmed, Naveed; Jensen, Christian D.

    Identity and Privacy in the Internet Age, Proceedings: Lecture Notes in Computer Science. Vol. 5838 Springer, 2009. p. 148-162.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  8. Published

    Assessment of Privacy in Government IT-Systems. / Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    First International Workshop on Sustaining Privacy in Autonomous Collaborative Environments (SPACE 2007) July 30, 2007. 2007.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2007

  9. Accepted/In press

    Attributes Enhanced Role-Based Access Control Model. / Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram .

    Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15). ed. / Simone Fischer-Huebner; Costas Lambrinoudakis. Springer, 2015. (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  10. Published

    A Unified Security Framework for Networked Applications. / Abendroth, Joerg; Jensen, Christian D.

    Eighteenth ACM Symposium on Applied Computing. 2003.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2003

  11. Published

    Capability File Names: Separating authorisation from User Management in an Internet File System. / Regan, Jude; Jensen, Christian D.

    2001USENIX Security Symposium. 2001. p. 221-234.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2001

  12. Published

    Classifying Areas of Expertise in the wikipedia Recommender System. / Jensen, Christian D.; Lefévre, Thomas.

    Short Paper Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

Previous 1 2 3 4 5 6 7 8 ...10 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word