Christian D. Jensen

  1. 2015
  2. Accepted/In press

    Attributes Enhanced Role-Based Access Control Model. / Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram .

    Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15). ed. / Simone Fischer-Huebner; Costas Lambrinoudakis. Springer, 2015. (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  3. Accepted/In press

    Integrating Attributes into Role-Based Access Control. / Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram .

    Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (2015). ed. / Sushil Jajodia; Pierangela Samarati. Springer, 2015. (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  4. Published

    Video Surveillance: Privacy Issues and Legal Compliance. / Mahmood Rajpoot, Qasim; Jensen, Christian D.

    Promoting Social Change and Democracy through Information Technology. ed. / Vikas Kumar; Jakob Svensson. IGI global, 2015.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2015

  5. 2014
  6. Published

    Editorial: Thematic series on best articles from IFIPTM and PST. / Fernandez-Gago, Carmen; Jensen, Christian D.

    In: Journal of Trust Management, Vol. 1, No. 2, 2014.

    Publication: ResearchEditorial – Annual report year: 2014

  7. Published

    Improving Usability of Passphrase Authentication. / Nielsen, Glen ; Vedel, Michael ; Jensen, Christian D.

    Proceedings of the 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST). IEEE, 2014. p. 189-198.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  8. Published

    Remote Biometrics for Robust Persistent Authentication. / Ingwar, Mads Ingerslew; Jensen, Christian D.

    Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013. Revised Selected Papers. ed. / Joaquin Garcia-Alfaro; Georgios Lioudakis; Nora Cuppens-Boulahia; Simon Foley; William M. Fitzgerald. Springer, 2014. p. 250-267 (Lecture Notes in Computer Science; No. 8247).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  9. Submitted

    Resilient Infrastructure and Building Security. / Ingwar, Mads Ingerslew; Jensen, Christian D. (Main supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2014. 152 p. (DTU Compute PHD-2014; No. 322).

    Publication: ResearchPh.D. thesis – Annual report year: 2014

  10. Published

    Security and Privacy in Video Surveillance: Requirements and Challenges. / Mahmood Rajpoot, Qasim; Jensen, Christian D.

    ICT Systems Security and Privacy Protection: Proceedings of the 29th International Information Security and Privacy Conference (IFIP SEC) 2014. ed. / Nora Cuppens-Boulahia; Sushil Jajodia; Anas Abou El Kalam; Thierry Sans. Springer, 2014. p. 169-184 (IFIP AICT - Advances in Information and Communication technology, Vol. 428).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  11. Published

    Security and Trust Management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. / Mauw, Sjouke (Editor); Jensen, Christian D. (Editor).

    Springer, 2014. 208 p. (Lecture Notes in Computer Science, Vol. 8743).

    Publication: Research - peer-reviewBook – Annual report year: 2014

  12. Published

    The importance of trust in computer security. / Jensen, Christian D.

    Proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2014). ed. / Jianying Zhou; Nurit Gal-Oz; Jie Zhang; Ehud Gudes. Springer, 2014. p. 1-12 (IFIP AICT - Advances in Information and Communication technology, Vol. 430).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2015

  13. 2012
  14. Published

    A collaborative approach to botnet protection. / Stevanovic, Matija; Revsbech, Kasper; Pedersen, Jens Myrup; Sharp, Robin; Jensen, Christian D.

    In: Lecture Notes in Computer Science, Vol. 7465, 2012, p. 624-638.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  15. Published

    Attacker Modelling in Ubiquitous Computing Systems. / Papini, Davide; Sharp, Robin (Main supervisor); Jensen, Christian D. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 182 p. (IMM-PHD-2012; No. 295).

    Publication: ResearchPh.D. thesis – Annual report year: 2014

  16. Published

    Collaborative trust evaluation for wiki security. / Lindberg, Kasper; Jensen, Christian D.

    2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. p. 176-184.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  17. Published

    Document and author promotion strategies in the secure wiki model. / Lindberg, Kasper; Jensen, Christian D.

    In: IFIP AICT - Advances in Information and Communication technology, Vol. 374, 2012, p. 247-252.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  18. Published

    First Workshop on Incentives and Trust in E-Commerce (WIT-EC’12). / Marsh, Stephen (Editor); Zhang, Jie (Editor); Jensen, Christian D. (Editor).

    2012. 102 p.

    Publication: ResearchBook – Annual report year: 2012

  19. Published

    Post-Session Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings. Springer, 2012. (IFIP AICT - Advances in Information and Communication technology, Vol. 374).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  20. Published

    Structured Intuition: A Methodology to Analyse Entity Authentication. / Ahmed, Naveed; Jensen, Christian D. (Supervisor).

    Kgs. Lyngby : Technical University of Denmark, 2012. 191 p. (IMM-PHD-2012; No. 276).

    Publication: ResearchPh.D. thesis – Annual report year: 2012

  21. Published

    The Role of Trust in Computer Security. / Jensen, Christian D.

    2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. p. 236.

    Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2012

  22. Published

    Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

  23. 2011
  24. Published

    Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. / Ahmed, Naveed; Jensen, Christian D.

    In: Lecture Notes in Computer Science, Vol. 6542, 2011, p. 234-247.

    Publication: Research - peer-reviewConference article – Annual report year: 2012

  25. Published

    Building a Reputation System for Wikipedia. / Jensen, Christian D.

    New Forms of Collaborative Innovation and Production on the Internet: An Interdisciplinary Perspective. ed. / Volker Wittke; Heidemarie Hanekop. Universitätsverlag Göttingen, 2011. p. 89-112.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  26. Published

    Classification of Recommender Expertise in the Wikipedia Recommender System. / Jensen, Christian D.; Pilkauskas, Povilas; Lefevre, Thomas.

    In: Information and Media Technologies, Vol. 6, No. 3, 2011, p. 884-902.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  27. Published

    Classification of Recommender Expertise in the Wikipedia Recommender System. / Jensen, Christian D.; Pilkauskas, Povilas; Lefévre, Thomas.

    In: Journal of Information Processing, Vol. 19, 2011, p. 345-363.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

  28. Published

    Demarcation of Security in Authentication Protocols. / Ahmed, Naveed; Jensen, Christian D.

    2011 First SysSec Workshop (SysSec). IEEE, 2011. p. 43-50.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  29. Published

    Guest Editorial: Special Issue on Frontiers in Trust Management. / Jensen, Christian D.; Dragoni, Nicola; Basu, Anirban; Mancini, Clara.

    In: Journal of Internet Services and Information Security, Vol. 1, No. 4, 2011, p. 1-4.

    Publication: Research - peer-reviewEditorial – Annual report year: 2011

  30. Published

    Security of Dependable Systems. / Ahmed, Naveed; Jensen, Christian D.

    Dependability and Computer Engineering: Concepts for Software Intensive Systems. ed. / Luigia Petre. 1. ed. IGI global, 2011. p. 230-264.

    Publication: Education - peer-reviewBook chapter – Annual report year: 2011

  31. Published

    Towards Secure Intelligent Buildings. / Ingwar, Mads Ingerslew; Jensen, Christian D.

    Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11). 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  32. Published

    Trust Management V : 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29 - July 1, 2011, Proceedings. / Wakeman, I. (Editor); Gudes, E. (Editor); Jensen, Christian D. (Editor); Crampton, J. (Editor).

    Trust Management V. Springer, 2011.

    Publication: ResearchBook chapter – Annual report year: 2011

  33. Published

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). / Ahmed, Naveed (Editor); Quercia, D. (Editor); Jensen, Christian D. (Editor).

    Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011). 2011.

    Publication: ResearchBook chapter – Annual report year: 2011

  34. 2010
  35. Published

    Adaptable Authentication Model - for Exploring the Weaker Notions of Security. / Ahmed, Naveed; Jensen, Christian D.

    Kgs. Lyngby, Denmark : Technical University of Denmark, DTU Informatics, Building 321, 2010. (IMM-Technical Report-2010-17).

    Publication: ResearchReport – Annual report year: 2010

  36. Published

    A Generic Access Control Model for Wind Power Systems. / Nagarajan, Anand; Jensen, Christian D.

    Workshop Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010): Proceedings of the International Workshop on Infrastructure Assurance (iWiA 2010). 2010. p. 1-14.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  37. Published

    A Generic Role Based Access Control Model for Wind Power Systems. / Nagarajan, Anand; Jensen, Christian D.

    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 1, No. 4, 2010, p. 35-49.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  38. Published

    Building a reputation system for the Wikipedia. / Jensen, Christian D. (Invited author).

    2010. New Forms of Collaborative Production and Innovation : Economic, Social, Legal and Technical Characteristics and Conditions, Lichtenberg Kolleg, Georg-August-Universität, Göttingen, 01/01/2010.

    Publication: ResearchSound/Visual production (digital) – Annual report year: 2010

  39. Published

    Classifying Areas of Expertise in the wikipedia Recommender System. / Jensen, Christian D.; Lefévre, Thomas.

    Short Paper Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  40. Published

    Definition of Entity Authentication. / Ahmed, Naveed; Jensen, Christian D.

    Proceedings of 2nd International Workshop on Security and Communication Networks (IWSCN), 2010. IEEE Xplore, 2010.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  41. Published

    Entity Authentication:Analysis using Structured Intuition. / Ahmed, Naveed; Jensen, Christian D.

    Technical Report on NODES10 Proceedings. 2010.

    Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2010

  42. Published

    Et visionært teknologidesign. / Jensen, Christian D. (Invited author).

    2010. PrivatTek 2010, Landstingssalen, Christiansborg, 01/01/2010.

    Publication: ResearchSound/Visual production (digital) – Annual report year: 2010

  43. Published

    Keynote Address: The Joint International Workshop on Trust in Location and Communications in Decentralised Computing : The Role of Trust in Computer Security. / Jensen, Christian D. (Invited author).

    2010. The Joint International Workshop on Trust in Location and Communications in Decentralised Computing, Morioka, Iwate, Japan, 01/01/2010.

    Publication: ResearchSound/Visual production (digital) – Annual report year: 2010

  44. Published
  45. Published

    Supporting Multi-Agent Reputation Calculation in the Wikipedia Recommender System. / Jensen, Christian D.

    In: I E T Information Security, Vol. 4, No. 4, 2010, p. 273-282.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  46. Published

    The Role of Trust in Persistent Authentication. / Jensen, Christian D.

    Workshop Proceedings of the Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010): Proceedings of the Joint International Workshop on Trust in Location and Communications in Decentralized Computing (TruLoCo 2010). 2010. p. 41-52.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  47. 2009
  48. Published

    A Mechanism for Identity Delegation at Authentication Level. / Ahmed, Naveed; Jensen, Christian D.

    Identity and Privacy in the Internet Age, Proceedings: Lecture Notes in Computer Science. Vol. 5838 Springer, 2009. p. 148-162.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  49. Published

    An Authentication Framework for Nomadic Users. / Ahmed, Naveed; Jensen, Christian D.

    2009. Abstract from Nordic Workshop and Doctoral Symposium on Dependability and Security, Linköping, Sweden.

    Publication: ResearchConference abstract for conference – Annual report year: 2009

  50. Published

    Context-Aware Identity Delegation. / Ahmed, Naveed; Jensen, Christian D.

    Euro CAT 2009. Vol. CEUR-WS volume (CEUR-WS.org - ISSN 1613-0073) 2009.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  51. Published

    Security in Wiki-Style Authoring Systems. / Jensen, Christian D.

    Trust Management III: Third IFIP WG 11.11 International Conference. Springer, 2009. p. 81-98 (IFIP Advances in Information and Communication Technology; No. 300).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2009

  52. Published

    Why Security is Bad for Trust. / Jensen, Christian D. (Invited author).

    2009. 3rd IFIP International Conference on Trust Management (TM'09), West Lafayette, IN, United States, 16/06/2009.

    Publication: ResearchSound/Visual production (digital) – Annual report year: 2009

  53. Published

    WRS Demonstration Posters. / Jensen, Christian D.

    2009. Poster session presented at 3rd IFIP International Conference on Trust Management (TM'09), West Lafayette, IN, United States.

    Publication: Research - peer-reviewPoster – Annual report year: 2009

  54. Published

    WRS: The Wikipedia Recommender System. / Lefévre, Thomas; Jensen, Christian D.; Thomas Rune, Korsgaard.

    Trust Management III: Third IFIP WG 11.11 International Conference. Springer, 2009. p. 298-301 (IFIP Advances in Information and Communication Technology; No. 300).

    Publication: Research - peer-reviewConference abstract in proceedings – Annual report year: 2009

  55. 2008
  56. Published

    Dynamics of Trust Evolution : Auto-configuration of dispositional trust dynamics. / Jensen, Christian D. (Invited author); Korsgaard, Thomas Rune (Invited author).

    Proceedings of International Conference on Security and Cryptography. Portugal : Institute for Systems and Technologies of Information, Control and Communication, 2008. p. 509-518.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

  57. Published

    On the Need for Relaxed Security Models. / Jensen, Christian D. (Author).

    2008. International Conference on E-business and Telecommunication networks, Porto, Portugal, 01/01/2008.

    Publication: ResearchSound/Visual production (digital) – Annual report year: 2008

Previous 1 2 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word