Publication profile
Publication profile
Habtamu Abie
Name:
Habtamu Abie
Title:
Sjefsforsker / Chief Research Scientist
Phone:
(+47) +47 22 85 25 95
Email:
abie [at] nr [dot] no
Scientific areas:
Adaptive Security, Trust, Privacy, Risk Management, Distributed Object Computing

Add to contacts (vCard) Show publications
Academic anthology/Conference proceedings
2023
Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience. Steinbeis-Edition. (ISBN 978-3-95663-285-3). pp 142. 2023. Prosjekt Omtale Fulltekst
(eds). 2022
Computer Security. ESORICS 2021 International Workshops. Springer. (ISBN 9783030954833). 2022.
(eds). Computer Security. ESORICS 2021 International Workshops CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Springer. (ISBN 978-3-030-95483-3). pp 578. 2022.
(eds). 2021
Cyber-Physical Security for Critical Infrastructures Protection. Springer Nature. (ISBN 978-3-030-69781-5). pp 225. 2021. Omtale
(eds). Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection, Virtual Workshop, June 24–25, 2020. Steinbeis-Edition. (ISBN 978-3-95663-087-3). pp 55. 2021. Omtale
(eds). 2020
ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC. Springer. (ISBN 978-3-030-42051-2). pp 277. 2020.
(eds). Non-fiction book
2009
Distributed Digital Rights Management: Frameworks, Processes, Procedures and Algorithms. : 2009 pp 200.
. 2005
A Distributed Digital Rights Management Model for Secure Information-Distribution Systems. : 2005 pp 182.
. Academic article
2022
Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications. IEEE Vehicular Technology Conference (VTC) (ISSN 1090-3038). doi: 10.1109/VTC2022-Spring54318.2022.9860581. 2022. Arkiv
. Adaptive Security and Trust Management for Autonomous Messaging Systems. arXiv.org (ISSN 2331-8422). 2022. Prosjekt Omtale Fulltekst
. Quantifying data volatility for IoT forensics with examples from Contiki OS. Forensic Science International: Digital Investigation (ISSN 2666-2825). 40 doi: 10.1016/j.fsidi.2022.301343. 2022. Arkiv
. Adaptive Safety for Internet of Things in e-Health. arXiv.org (ISSN 2331-8422). 2022. Prosjekt Omtale Fulltekst
. 2021
Coffee forensics — Reconstructing data in IoT devices running Contiki OS. Forensic Science International: Digital Investigation (ISSN 2666-2825). 37 doi: 10.1016/j.fsidi.2021.301188. 2021. Arkiv Fulltekst
. Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions. Lecture Notes in Electrical Engineering (ISSN 1876-1100). 739 pp 71-81. doi: 10.1007/978-981-33-6385-4_7. 2021.
. 2020
Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids. Information (ISSN 2078-2489). 11(12) doi: 10.3390/info11120582. 2020. Omtale Fulltekst
. Risk-driven security metrics for an Android smartphone application. International Journal of Electronic Business (ISSN 1470-6067). 15(4) pp 297-324. doi: 10.1504/IJEB.2020.111059. 2020.
. 2019
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems. International Symposium on Medical Information and Communication Technology (ISSN 2326-828X). 2019-May doi: 10.1109/ISMICT.2019.8743670. 2019. Omtale Fulltekst
. Adaptive Cybersecurity Framework for Healthcare Internet of Things. International Symposium on Medical Information and Communication Technology (ISSN 2326-828X). 2019-May doi: 10.1109/ISMICT.2019.8743905. 2019. Omtale Fulltekst
. 2015
Measurable Security, Privacy and Dependability in Smart Grids. Journal of Cyber Security and Mobility (ISSN 2245-1439). 3(4) pp 371-398. doi: 10.13052/jcsm2245-1439.342. 2015. Fulltekst
. 2014
An Evaluation Framework for Adaptive Security for the IoT in eHealth. International journal on advances in security (ISSN 1942-2636). 7(3&4) pp 93-109. 2014. Fulltekst Omtale
. 2013
Development and Validation of Requirements for Evidential Value for Assessing Trustworthiness of Digital Records over Time. Journal of Information (ISSN 1343-4500). 16(3(A)) pp 1945-1980. doi: 10.1109/mobhoc.2009.5336917. 2013. Omtale
. 2011
Assessment of the Trustworthiness of Digital Records. IFIP Advances in Information and Communication Technology (ISSN 1868-4238). (358) pp 300-311. doi: 10.1007/978-3-642-22200-9_24. 2011.
. 2010
Self-Healing and Secure Adaptive Messaging Middleware for Business Critical Systems. International journal on advances in security (ISSN 1942-2636). 3(1/2) pp 34-51. 2010.
. Advances in Adaptive Secure Message Oriented Middleware for Distributed Business Critical Systems. Ukjent AIP Conference Proceedings Volume 1281 pp 291-294. 2010.
. Advanced Framework for Digital Forensic Technologies and Procedures. Journal of Forensic Sciences (ISSN 0022-1198). 55(6) pp 1471-1480. doi: 10.1111/j.1556-4029.2010.01528.x. 2010.
. Advances in Adaptive Secure Message-Oriented Middleware for Distributed Business-Critical Systems. AIP Conference Proceedings (ISSN 0094-243X). 1281 pp 291-294. doi: 10.1063/1.3498454. 2010.
. 2009
Development of Measurable Security for a Distributed Messaging System. International journal on advances in security (ISSN 1942-2636). 2(4) pp 358-380. 2009. Fulltekst
. On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks. Journal of Networks (ISSN 1796-2056). 07.04.2012 pp 15. 2009.
. 2007
Frontiers of DRM Knowledge and Technology. International Journal of Computer Science and Network Security (ISSN 1738-7906). 7(1) pp 216-231. 2007. Fulltekst
. 2005
A Conceptual Formal Framework for Developing and Maintaining Security-Critical Systems. International Journal of Computer Science and Network Security (ISSN 1738-7906). Vol. 5, No. 12 pp 10. 2005. Fulltekst
. 2004
Integrating a security requirement language with UML. Lecture Notes in Computer Science (LNCS) (ISSN 0302-9743). 3273 pp 350-364. doi: 10.1007/978-3-540-30187-5_25. 2004. Fulltekst
. A Distributed Digital Rights Management Model for Information Systems. International Journal of Information Security (ISSN 1615-5262). 2004 pp 22. 2004.
. 2003
Authentication and Authorization for Digital Rights Management for Information Distribution Systems. Ukjent 2003 pp 8. 2003.
. The Need for a Digital Rights Management Framework for the Next Generation of E-Government Services. Electronic Government, an International Journal (ISSN 1740-7494). 2003 pp 13. 2003.
. DigiRight: Relevance to and Potential Impact on Europe's Need to Strengthen the Science and Technology Excellence on DRM. Ukjent 2003 pp 8. 2003.
. DigiRight: Network of Excellence for a Framework for Policy, Privacy, Trust and Risk Management for Digital Rights Management. Ukjent 2003 pp 10. 2003.
. 2000
An overview of firewall technologies. Telektronikk (ISSN 0085-7130). 96(3/2000) pp 47-52. 2000. Fulltekst
. CORBA firewall security: increasing the security of CORBA applications. Telektronikk (ISSN 0085-7130). 96(3/2000) pp 53-64. 2000. Fulltekst
. Academic chapter/article/Conference paper
2022
A Lightweight Security Scheme for Failure Detection in Microservices IoT-Edge Networks. In: Sensing Technology. Proceedings of ICST 2022. (ISBN 978-3-030-98885-2). doi: 10.1007/978-3-030-98886-9_31. 2022.
. 2021
Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids. In: Proceedings of the 18th International Conference on Wireless Networks and Mobile Systems. (ISBN 978-989-758-529-6). pp 83-90. doi: 10.5220/0010580700830090. 2021.
. A Cloud-Based Anomaly Detection for IoT Big Data. In: Cyber-Physical Security for Critical Infrastructures Protection. (ISBN 978-3-030-69781-5). pp 87-104. doi: 10.1007/978-3-030-69781-5_7. 2021.
. Anomaly Detection for Critical Financial Infrastructure Protection. In: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: Securing Critical Infrastructures in Air Transport, Finance, Gas, Healthcare, and Industry. (ISBN 978-1-68083-822-0). pp 495-514. doi: 10.1561/9781680838237.ch22. 2021.
. 2020
Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure. In: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures. (ISBN 978-1-68083-687-5). pp 104-142. doi: 10.1561/9781680836875.ch7. 2020.
. 2018
An evolutionary game for integrity attacks and defences for advanced metering infrastructure. In: ECSA '18 Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, Madrid, Spain — September 24 - 28, 2018. (ISBN 978-1-4503-6483-6). doi: 10.1145/3241403.3241463. 2018. Omtale
. 2017
Risk-based adaptive authentication for internet of things in smart home eHealth. In: Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings. (ISBN 978-1-4503-5217-8). pp 102-108. doi: 10.1145/3129790.3129801. 2017. Fulltekst Omtale
. 2015
Risk-Driven Security Metrics Development for an e-Health IoT Application. In: Proceedings of the 2015 Information Security for South Africa (ISSA 2015). (ISBN 978-1-4799-7754-3). doi: 10.1109/issa.2015.7335061. 2015.
. 2014
An Evaluation Scenario for Adaptive Security in eHealth. In: PESARO 2014 - The Fourth International Conference on Performance, Safety and Robustness in Complex Systems and Applications. (ISBN 978-1-61208-321-6). pp 6-11. 2014. Fulltekst
. Towards Run-Time Verification of Adaptive Security for IoT in eHealth. In: ECSAW '14 Proceedings of the 2014 European Conference on Software Architecture Workshops. (ISBN 978-1-4503-2778-7). doi: 10.1145/2642803.2642807. 2014.
. Security Measuring for Self-adaptive Security. In: ECSAW '14 Proceedings of the 2014 European Conference on Software Architecture Workshops. (ISBN 978-1-4503-2778-7). doi: 10.1145/2642803.2642808. 2014.
. Game-based adaptive security in the Internet of Things for eHealth. In: ICC 2014 - Proceedings of 2014 IEEE International Conference on Communications. (ISBN 978-1-4799-2003-7). pp 920-925. doi: 10.1109/ICC.2014.6883437. 2014.
. 2013
Metrics-driven security objective decomposition for an e-health application with adaptive security management. In: Proceedings of the International Workshop on Adaptive Security, UbiComp'13. (ISBN 978-1-4503-2543-1). doi: 10.1145/2523501.2523507. 2013.
. A testbed for adaptive security for IoT in eHealth. In: Proceedings of the International Workshop on Adaptive Security, UbiComp'13. (ISBN 978-1-4503-2543-1). doi: 10.1145/2523501.2523506. 2013.
. Adaptive security and privacy management for the internet of things (ASPI 2013). In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. (ISBN 978-1-4503-2215-7). doi: 10.1145/2494091.2499770. 2013.
. 2012
Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. (ISBN 978-1-4503-1997-3). pp 276-281. doi: 10.4108/icst.bodynets.2012.250241. 2012. Fulltekst
. Risk-Based Adaptive Security for Smart IoT in eHealth. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. (ISBN 978-1-4503-1997-3). pp 269-275. doi: 10.4108/icst.bodynets.2012.250235. 2012. Fulltekst
. 2011
On Time, Conflict, Weighting and Dependency Aspects of Assessing the Trustworthiness of Digital Records. In: The Fourth International Conference on Dependability. (ISBN 978-1-61208-149-6). pp 7-13. 2011.
. A framework for the assessment of the trustworthiness of digital records over time. In: Proceeding of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. (ISBN 978-0-7695-4600-1). pp 738-744. doi: 10.1109/trustcom.2011.96. 2011. Fulltekst
. 2010
Advances in Adaptive Secure Message Oriented Middleware for Distributed Business Critical Systems. In: AIP Conference Proceedings. (ISBN 978-0-7354-0831-9). pp 291-294. 2010.
. Innovations and Advances in Adaptive Secure Message-Oriented Middleware - the GEMOM Project. In: Proceedings of the 2010 International Conference on Distributed Computing Systems Workshops (IDCSW 2010). (ISBN 978-0-7695-4079-5). pp 288-289. 2010.
. Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments. In: Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, DCNET 2010, OPTICS 2010. (ISBN 978-989-8425-25-6). pp 85-92. 2010.
. Applicability of security metrics for adaptive security management in a universal banking hub system. In: ECSA '10 Proceedings of the Fourth European Conference on Software Architecture. (ISBN 978-1-4503-0179-4). pp 197-204. 2010.
. 2009
Identification of Basic Measurable Security Components for a Distributed Messaging System. In: 2009 Third International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2009). (ISBN 9780769536682). pp 121-128. 2009. Fulltekst
. Development of security metrics for a distributed messaging system. In: 2009 International Conference on Application of Information and Communication Technologies (AICT 2009). (ISBN 9781424447398). pp 1-6. 2009. Fulltekst
. Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems. In: ComputationWorld 2009: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns. (ISBN 978-0-7695-3862-4). pp 153-160. 2009. Fulltekst
. Adaptive security and trust management for autonomic message-oriented middleware. In: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. (ISBN 978-1-4244-5113-5). pp 810-817. 2009. Fulltekst
. Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time. In: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. (ISBN 978-1-4244-5113-5). pp 796-803. 2009.
. 2008
Towards a Research Road Map for the Management of Privacy Risks in Information Systems. In: Lecture Notes in Informatics. (ISBN 978-3-88579-222-2). 2008.
. Information Use-Control in E-Government Applications. In: Electronic Government: Concepts, Methodologies, Tools, and Applications. (ISBN 978-1-59904-947-2). pp 1926-1934. 2008. Fulltekst
. GEMOM - Significant and Measurable Progress beyond the State of the Art. In: The Third International Conference on Systems and Networks Communications (ICSNC 2008). (ISBN 9781424432172). pp 191-196. 2008. Fulltekst
. Threat Assessment of Wireless Patient Monitoring Systems. In: Proc. International Conference on Information Communication Technologies: From Theory to Applications - ICTTA'08. (ISBN 978-1-4244-1752-0). 2008.
. 2004
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. In: Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings. (ISBN 3-540-23563-9). pp 293-296. 2004. Fulltekst
. 2002
A rights management model for distributed object-oriented information distribution systems. In: EUNICE'2002. (ISBN 82-993980-5-3). pp 185-194. 2002.
. Academic lecture
2023
SFI-NORCICS Norwegian Ecosystem for Secure IT-OT Integration (NESIOT) Kick-off. NESIOT Kick-off; Norsk Regnesentral, Gaustadalléen 23A, 0373 Oslo, 1/24/2023.
. 2022
A Lightweight Security Scheme for Failure Detection in Microservices IoT-Edge Networks. Conference, 1/17/2022 - 1/19/2022.
. 5G-Enabled IoT for IT-OT Integration. SFI NORCICS Partner Workshop; Gaustadalleen 23a, 0373 Oslo, 10/19/2022.
. Focus Area 1-IT and OT Integration. SFI NORCICS Research Workshop; Teknologiveien 22, 2815 Gjøvik, 6/10/2022.
. A Cognitive Digital Twin Architecture for Cybersecurity in IoT-based Smart Homes. Fifteenth International Conference on Sensing Technology (ICST’15); Sydney, 12/5/2022 - 12/7/2022.
. 2020
Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions. 11th International Conference on Information Science and Applications 2020; Virtual Conference, 12/16/2020 - 12/18/2020.
. 2018
Cyber-physical critical infrastructure protection: the FINSEC integrated, predictive and collaborative approach. MeSSa 2018 - 5th International Workshop on Measurability of Security in Software Architectures, in conjunction with The 12th European Conference on Software Architecture (ECSA 2018); Madrid, 9/24/2018 - 9/28/2018.
. 2017
Measurable Adaptive Cyber-Physical Security for IoT Smart Grids. 4th international workshop on measurability of security in software architectures (MeSSa 2017); Canterbury, United Kingdom, 9/11/2017 - 9/15/2017.
. 2014
ASSET Project Progress: ideas, theories, and methods. ASSET National Technical Meeting; Oslo, 6/17/2014.
. Results Integration and Utilization in ASSET III. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Results integrating and utilizing by the ASSET project II. ASSET National Technical Meeting; Oslo, 1/8/2014.
. Design of security measurement and metrics. ASSET Project 213131 VTT-NR Technical Meeting; Oslo, 6/4/2014.
. Framework for integrating ASSET methods II. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Framework for integrating ASSET methods I. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Case Study, validation of results in the eHealth (ASSET WP4). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Design of security measurement and metrics (ASSET WP3). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Development of risk-based adaptive security models for IoT systems (ASSET WP2). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Analysis of risk-based adaptive security models (ASSET WP1). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. ASSET Project Management (ASSET WP0). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Key Challenges to Knowledge and Objectives. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Project status and progress report. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Adaptive feedback Control loops as first class entities. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. 2013
Results integrating and utilizing by the ASSET project I. ASSET National Technical Meeting; Oslo, 10/8/2013.
. 2012
Conducting a Systematic Literature Review of Information Systems Research. Joint ASSET/PETweb II 2nd PhD Workshop; Oslo, 12/18/2012.
. 2009
Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware. IEEE 6th International Conference on Mobile Adhoc and Sensor Systems; Macau, 10/12/2009.
. 2008
Threat assessment of wireless patient monitoring systems. 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA ; Damascus, 4/7/2008 - 4/11/2008. Sammendrag
. Genetic Message Oriented Secure Middleware (GEMOM): Significant and Measureable Progress beyond the State of the Art. Third International Conference on Systems and Networks Communications (ICSNC) 2008, Sliema, Mal, 10/30/2008.
. 2006
Risikoanalyse og risikostyring i et helhetlig perspektiv. Tekna; Risiko og sikkerhet i IKT-systemer-2006; Ingeniørenes hus, Oslo, Norway, 3/15/2006.
. Risikoanalyse og risikostyringi et helhetlig perspektiv. Tekna; Risiko og sikkerhet i IKT-systemer-2006; Ingeniørenes hus, Oslo, Norway, 3/15/2006. Fulltekst
. 2005
State of the Art in DRM. Smart University, Sophia Antipolis, France, 9/20/2005.
. The Pros and Cons of Different Ways to Authenticate Users. Trial Lecture, Dept. of Informatics, University of Oslo, 5/12/2005.
. 2004
Digital Rights Management (DRM) for Establishing and Increasing Trust and Privacy. Workshop on Methods and Tools for Analyzing and Securing Trust and Privacy, SINTEF, Oslo, 6/4/2004. Fulltekst
. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. DBSEM - Seminar in Computer Science with Special Focus on Formal Methods and Computer Security, Dept, 1/5/2004. Fulltekst
. A Distributed Digital Rights Management Model for Information Distribution Systems. DBSEM - Seminar in Computer Science with Special Focus on Formal Methods and Computer Security, Dept, 1/5/2004.
. 2003
Network of Excellence (NoE) for a Framework for Digital Rights Management. EICTA, 11/03-2003, Brussels, 3/1/2003.
. Digital Rights Management (DRM). IKT Sikkerhet og Sårbarhet Workshop 16. september 2003. Foredrag, 9/16/2003.
. DigiRight: Workpackages. 2nd Preparatory Meeting for DigiRight, March 27-28, 2003, 3/27/2003.
. DigiRight: NoE Proposal for a Framework for Policy, Privacy, Security, Trust and Risk Management for DRM. First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Int, 8/27/2003.
. DRM-Net: Network of Excellence for a Framework for Digital Rights Management. Preparatory Meeting for a DRM NoE, UPF, Barcelona, Spain, February 13, 2003, 2/1/2003.
. NoE on Digital Rights Management. InfoDay, 12/03-2003, Brussels, 3/1/2003.
. DigiRight: Joint Programme of Activities (JPAs). 2nd Preparatory Meeting for DigiRight,, March 27-28, 2003, 3/27/2003.
. 2002
NoE on digital rights management. DRM Workshop, Brussels, 1/12/2002.
. EU FP6 Proposals for NoEs and IPs in DRM, Security, Privacy and Trust. NFR; MANGLER, 3/4/2002.
. 2000
Security in Middleware. Telenor Konsern IT-sikkerhetsforum, 1/10/2000.
. Security Requirements for Middleware. Telenor Konsernfelles sikkerhetsløsning, workshop med HP, 1/9/2000.
. The Role of Middleware in Telemedicine, HARP, Haifa Israel. , .
. Lecture
2023
Norwegian Ecosystem Secure IT-OT Integration at CSG kickoff. CSG Project Kickoff; ABB, Pitäjänmäki, Helsinki, 2/6/2023.
. NESIOT (Norwegian Ecosystem for Secure IT-OT Integration). Roundtable Discussion on Security and Secure Information Exchange in the Healthcare Sector; NR, Oslo, 1/26/2023.
. European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection (EU-CIP). Roundtable Discussion on Security and Secure Information Exchange in the Healthcare Sector; NR, Oslo, 1/26/2023.
. European Cluster for Securing Critical Infrastructures – ECSCI. Roundtable Discussion on Security and Secure Information Exchange in the Healthcare Sector; NR, Oslo, 1/26/2023.
. Norwegian Ecosystem for Secure IT-OT Integration (NESIOT). NESIOT Kickoff meeting; NR, Oslo, 1/24/2023.
. 2022
Norwegian Ecosystem for Secure IT-OT Integration (NESIOT). NGINO Final Meeting; Forskningsveien 1, Oslo, 11/29/2022.
. European Cluster for Securing Critical Infrastructures (ECSCI) at The 2nd ECSCI Virtual Workshop. The 2nd ECSCI Virtual Workshop; Online-Google Meet, 4/27/2022 - 4/29/2022.
. European Cluster for Securing Critical Infrastructures (ECSCI) at ENSURESEC Final Conference. ENSURESEC Final Conference; Online-Webex, 5/20/2022.
. 2021
Machine Learning as an Enabler for Cyber-Physical Security. Financial Services: Digital Transformation and the Cyber Imperative; Zoom, 4/22/2021 - 4/23/2021.
. Predictive Analytics for Cyber-Physical Threat Intelligence in Financial Sector Infrastructures. Recent Security Advances in the Finance Sector: Cost-Effective Resilience for the Connected Digital Finance Ecosystem; Virtual, 1/14/2021.
. 2020
The European Cluster for Securing Critical Infrastructures (ECSCI): Objectives, Success Stories, and Takeaways. The first ECSCI Workshop on Critical Infrastructure Protection; Virtual workshop, on Google Meet conference room, 6/24/2020 - 6/25/2021. Fulltekst Omtale Prosjekt
. 2019
The FINSEC (Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures) Approach. IoTSec Consortium Meeting; Halden, 4/23/2019 - 4/24/2019.
. Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures (FINSEC). SAFECARE Awareness Event; Leuven, 9/18/2019.
. Preliminary Results of the FINSEC (Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures) project. FINSEC 2019 (1st International Workshop on Security for Financial Critical Infrastructures and Services) in ESORICS 2019; Luxembourg, 9/26/2019 - 9/27/2019.
. 2018
Applying Evolutionary Game Theory for Integrity Attacks and Defences for Advanced Metering Infrastructure. UIO, IFI, Networks and Distributed Systems; Oslo, 9/13/2018.
. An Evolutionary Game for Integrity Attacks and Defences for Advanced Metering Infrastructure. MeSSa 2018 – 5th International Workshop on Measurability of Security in Software Architectures; Madrid, 9/24/2018.
. 2015
IoTSec - Security in IoT for Smart Grids. AFSecurity Seminar, Secure October - Security R&D @ UiO and Partners; Oslo, 10/9/2015.
. Towards Run-Time Verification of Adaptive Security for IoT in eHealth. ASSET Project 213131 2014 Final General Meeting; NR/Oslo, 3/5/2015.
. ASSET Results Integration and Utilization Final. ASSET Project 213131 2014 Final General Meeting; NR/Oslo, 3/5/2015.
. ASSET Project Management Final. ASSET Project 213131 2014 Final General Meeting; NR/Oslo, 3/5/2015.
. ASSET Project Progress: ideas and concepts II. ASSET Project Technical Meeting; Oslo, 3/5/2015.
. Poster
2008
Preservation of Trust and Security in Long-Term Record Management. PST2008 Sixth Annual Conference on Privacy, Security and Trust, Graduate Student Symposium, 10/1/2008 - 10/3/2008.
. 2007
Threat Assessment of Wireless Patient Monitoring Systems. VERDIKT Conference 2007, Hell, 10/30/2007. Fulltekst
. Masters thesis
2017
Semantic Description of IoT Security for Smart Grid.. 2017.
. Risk based Adaptive Authentication for IoT in Smart Home eHealth.. 2017.
. 2013
The effect of sensor nodes antenna orientation on energy consumption in IEEE 802.15.4 networks.. 2013.
. Development of a Lab Experiment for Intrusion Detection System in Wireless Body Area Networks.. 2013.
. Report
2022
NORCICS D3.6.2.22: Requirements and specification for dynamic risk assessment in 5G-enabled IoT. Norsk Regnesentral. pp 18. 2022.
. NORCICS D3.6.1.22: Report on strategies and specification for cybersecurity scenarios for 5G-enabled IoT. Norsk Regnesentral. NR-notat DART/17/22. pp 30. 2022.
. AI/ML for 5G and Beyond Cybersecurity. Norsk Regnesentral. NR-notat DART/15/22. pp 25. 2022.
. 2021
Digital Twins for Enhancing Cybersecurity in Smart Homes. Norsk Regnesentral. NR-notat DART/03/21. pp 23. 2021.
. 2020
Optimized Anticipatory Adaptive Security Models for IoT-enabled Smart Grids. Norsk Regnesentral. NR-notat DART/10/20. pp 11. 2020. Arkiv
. Anticipatory adaptive security models for IoT-enabled Smart Grids. NR. NR-notat DART/08/20. pp 26. 2020.
. Security in Android smartphone, Confidentiality in IoT-enabled Smart Grids, and Fault-tolerant privacy-preserving in AMS. Norsk Regnesentral. NR-notat DART/07/20. pp 9. 2020. Arkiv
. Anticipatory Adaptive Security for IoT-based Smart Grids Infrastructure and Value-added Services. NR. NR-notat DART/09/20. pp 13. 2020. Arkiv
. 2015
Case Study Validation: Deliverable D6.3. Norsk Regnesentral. NR-notat DART/18/2015. pp 20. 2015.
. Case Study Simulation and Evaluation: Deliverable 6.2. Norsk Regnesentral. NR-notat DART/17/2015. pp 15. 2015.
. Optimizing and Combining Algorithms: Deliverable D4.3. Norsk Regnesentral. NR-notat DART/13/2015. pp 24. 2015.
. Prototyping of Methods: Deliverable D4.2. Norsk Regnesentral. NR-notat DART/12/2015. pp 19. 2015.
. Game Theory and Risk Models: Deliverable D4.1. Norsk Regnesentral. NR-notat DART/11/2015. pp 16. 2015.
. Evaluation and Validation Using Metrics: Deliverable D5.2. Norsk Regnesentral. NR-notat DART/15/2015. pp 22. 2015.
. Development of Metrics: Deliverable D5.1. Norsk Regnesentral. NR-notat DART/14/2015. pp 26. 2015.
. Case Study Gap Analysis: Deliverable D6.1. Norsk Regnesentral. NR-notat DART/16/2015. pp 24. 2015.
. ASSET Project 213131 2015 Final Annual Meeting, 05-06 March: Meeting Minutes & Documentation. Norsk Regnesentral. NR-notat DART/07/2015. pp 25. 2015.
. ASSET Project 213131 Progress Report 2015: Reporting Period 01/10/2014-30/09/2015. Norsk Regnesentral. NR-notat DART/08/2015. pp 17. 2015.
. Trust based Adaptive Safety for Sensor Networks in e-Health. Norsk Regnesentral. NR-notat DART/06/2015. pp 16. 2015.
. A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things. Norsk Regnesentral. NR-notat DART/05/2015. pp 17. 2015.
. 2014
ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation. Norsk Regnesentral. NR-notat DART/01/2014. pp 28. 2014.
. ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014, September 30,2014. NR. NR-notat DART/07/2014. pp 22. 2014.
. 2013
Analysis of Reasoning Methods: Deliverable D3.1 V1. Norsk Regnesentral. NR-notat DART/10/2013. pp 20. 2013.
. Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth: Deliverable D3.2 V1. Norsk Regnesentral. NR-notat DART/09/2013. pp 26. 2013.
. ASSET Project 213131 Progress Report 2013: Reporting Period 01/10/2012-30/09/2013. Norsk Regnesentral. NR-notat DART/11/2013. pp 22. 2013.
. 2nd PETweb II & ASSET joint PhD Seminar. Norsk Regnesentral. NR-notat DART/01/2013. pp 99. 2013.
. Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth. Norsk Regnesentral. NR-notat DART/07/2013. pp 25. 2013. Prosjekt
. 2012
.
. Risk Analysis Methods and Practices: Privacy Risk Analysis Methodology. Norsk Regnesentral. NR-notat DART/05/2012. pp 37. 2012.
. 2010
State of the Art Privacy Risk Analysis: Survey and Classification. Norsk Regnesentral. NR-notat DART/05/10. 2010.
. 2009
D5.3 - Description and analysis document for optimisation algorithms. GEMOM/QMUL/1. pp 57. 2009.
. D6.4 – Security and QoS Monitoring Implementation. GEMOM/VTT/WP6/D6.4/1.0/. pp 57. 2009.
. D.4.4 – Integration with JMS, Tibco’s, Reuters, and IBM’s MQ Series. GEMOM/NR/WP4//4.4/0.01/. pp 17. 2009.
. D6.3 - Security Implementation. GEMOM/NR/WP6/D6.3/1.0. pp 50. 2009.
. 2008
Preservation of Trust in Long-Term Records Management Systems. 1017. (ISBN 978-82-539-0527-3) pp 55. 2008. Arkiv
. D2.2 – System Specification Document. GEMOM/DIGINUS/D2.2/1.0. pp 31. 2008.
. D5.1 – Design Document for Broker Managing Agent. GEMOM/Q-S/WP5/D5.1/v1.0. pp 40. 2008.
. D6.1 - QoS and Security Requirements Specification. GEMOM/NR/WP6/D6.1/4.0. pp 79. 2008.
. D6.2 – Trust Model and Security Architecture. GEMOM/NR/WP6//6.2/1.0/. pp 82. 2008.
. D2.1 - Requirements Analysis Document. GEMOM/DIGINUS/D2.1/1.1. pp 72. 2008.
. 2007
Utvikling av prototyp for sikker epost. Norsk Regnesentral. NR-notat DART/03/07. pp 27. 2007.
. 2006
Towards a Holistic, Adaptive, and Multidisciplinary Risk Management- State of Art and Future Directions. Norsk Regnesentral. NR-notat DART/06/06. 2006.
. 2002
National Center of Excellence for Supporting a High Level of IT Security. Norsk Regnesentral. NR-notat GEM /04/02. pp 10. 2002.
. 2001
Specifications of the Cross-Security Harmonising Platform with all its components and features focused on telemedicine scenarios. pp 157. 2001.
. 2000
Surveying the Requirements for Middleware Security. pp 130. 2000.
. State of the Art Review of security technologies in the telemedicine sector. pp 247. 2000.
. List and description of criteria for evaluating WWW-tools, technologies and. pp 104. 2000.
. Firewall technologies: CORBA firewall security. ISSN 0809-1021. pp 27. 2000.
. Popular scientific lecture
2011
On Long-Term Archiving, Forensics, Security and Privacy Challenges. MultiTeam User Conference; IBM MultiTeam, Soria Moria Conference Center, Oslo, 4/5/2011 - 4/6/2011.
. A Frame for Security Metrics. DART Security-Sig, 5/2/2011.
. Adaptive Policy for Monitoring of Distributed Business-Critical Systems. NORMAN, Lysaker, 4/28/2011.
. 2010
Adaptive Security Scenarios for Case Studies. GEMOM Plenary Meeting London, 3/31/2010.
. MinID – Id Portal in Brief: Based on Information on IdPortal page. PETweb II Project Meeting Oslo, 11/17/2010.
. Adaptive Identity Management. PhD Workshop, Oslo, 10/8/2010.
. Quality of Service and Security: Adaptive Security. Final Project Review, Brussels, 8/27/2010.
. WP6 Quality of Service and Security: Status. GEMOM Plenary Meeting, London, 3/31/2010.
. Adaptive Policy Manager. GEMOM Plenary Meeting, London, 3/29/2010.
. Development of Security Metrics for a Distributed Messaging System. DART/S-SIG, 10/4/2010.
. Survey of State-of-the-Art Privacy Risk Analysis: Classification and Integration. PETweb II Project Meeting Oslo, 11/17/2010.
. Adaptive Monitoring of Distributed Business-Critical Systems. Finanstilsynet, Oslo,, 12/9/2010.
. QoS and Security: Common Stories/Scenarios. GEMOM Plenary Meeting, London, 3/31/2010.
. 2009
GEMOM - IBM WebSphereMQ Bridging Demo. , .
. WP 6 – QoS and Security: Deliverables Status, Remaining Actions, and Requirements for Review. GEMOM Helsinki Meeting, 5/14/2009.
. WP6 - D6.3 – Security Implementation: Authentication, Authorization and Key Management Demo. GEMOM Helsinki Meeting, 5/14/2009.
. WP4 - D4.4 - Integrating with IBM’s MQSeries: IBM WebSphereMQ Bridging Demo. GEMOM Helsinki Meeting, 5/14/2009.
. Quality of Service and Security: Adaptive Security Demo. , .
. WP6 – QoS and Security Deliverables. GEMOM Plenary Meeting Berlin, 3/2/2009.
. Adaptive and Evolving Security for Autonomic Messaging Middleware. RISKnet Open Workshop on RFID Risks and Adaptive Computer Security, 4/2/2009.
. WP6 – QoS and Security: Adaptive Security in Brief. GEMOM Plenary Meeting Berlin, 3/2/2009.
. 2008
GEMOM: Qualities of Service and Security. GEMOM Kick-Off Meeting, CNIT/Florence, 24-25/01-2008, 1/24/2008.
. LongRec – Self-protecting object, metrics, evidential value. LongRec Trust Workshop National Archive, Oslo, 23/09- 2008, 9/23/2008.
. GEMOM - Quality of Service and Security: Requirement Specification. GEMOM First Technical Meeting, Oslo, 03-05/03-2008, 3/3/2008.
. LongRec – Trust and Security: Preservation of Evidential Value. LongRec Trust Workshop, National Archive, Oslo, 9/23/2008.
. GEMOM - D6.1 Requirement Specification for Quality of Service and Security. GEMOM First Review Brussels 15/09-2008, 9/15/2008.
. GEMOM - Requirement Specification for Quality of Service and Security. GEMOM 2nd Technical Meeting London 26-27/06-2008, 6/26/2008.
. LongRec – Preservation of Trust & Security over Decades – State of the art. Reference Group Meeting Oslo, Hotel Opera,, 1/15/2008.
. LongRec – TRUST Preservation of Trust and Security. Riksarkivet – Joint Meeting Oslo,, 2/28/2008.
. 2007
LongRec – Preservation of Trust & Security: State of the Art. LongRec Project Meeting, 2/1/2007.
.
. LongRec–Records Management over Decades: Preservation of Trust and Security. LongRec kickoff, 1/31/2007.
. LongRec - Preservation of Evidential Value. LongRec Project Meeting Oslo, 10/18/2007.
. Preservation of Trust & Security: Concept and utilization of provenance. LongRec Project Meeting Trondheim, 5/9/2007.
. Preservation of Trust & Security: Persistent security services. LongRec Project Meeting, 2/1/2007.
. Preservation of Trust & Security – Best Practices. LongRec Project Meeting Oslo, 10/18/2007.
. Privacy Threat Ontology: Privacy Threat Impact Calculation. PETweb Workshop, 6/6/2007.
. An Ontological Analysis of Privacy Threat Impact in Large Scale Web-based Services. PETweb Reference Group Meeting, 12/12/2007.
. Privacy Threat Analysis:Risks to Privacy in Large-Scale Web-Based Services. , .
. Increasing Awareness and Understanding of Privacy: A Taxonomy of Privacy. , .
. Privacy Threat Ontology. PETweb Workshop, 6/6/2007.
. 2006
. Formal framework for an adaptive risk management for the protection of critical infrastructures. , .
. An ICT system for efficient environmental monitoring and risk management. , .
. Adaptive Risk Management for Resilient Networked Organizations. , .
. DART's Interests, ideas, and possible contributions to projects under the various FP7 challenges and objectives. , .
. LongRec – Records Management over Decades: Preservation of Trust and Security. , .
. Article in business/trade/industry journal
2022
A Homomorphic Digital Signature Scheme for the Internet of Things. MDPI IoT (ISSN 2624-831X). doi: 10.20944/preprints202202.0238.v1. 2022. Fulltekst Prosjekt Omtale
. Popular scientific article
2007
Riskohåndtering er nøkkelen til sikkerhet og tillit. ComputerWorld Norge (ISSN 1501-6595). pp 1. 6/15/2007. Fulltekst
. Editorial
2020
Finsec 2019 preface. Lecture Notes in Computer Science (LNCS) (ISSN 0302-9743). 11981 LNCS pp xiii-xiv. 2020.
. Reader opinion piece
2008
.

Name: | Habtamu Abie |
Title: | Sjefsforsker / Chief Research Scientist |
Phone: | (+47) +47 22 85 25 95 |
Email: | abie [at] nr [dot] no |
Scientific areas: | Adaptive Security, Trust, Privacy, Risk Management, Distributed Object Computing |
![]() | Add to contacts (vCard) |
Show publications |
Academic anthology/Conference proceedings
2023
Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience. Steinbeis-Edition. (ISBN 978-3-95663-285-3). pp 142. 2023. Prosjekt Omtale Fulltekst
(eds). 2022
Computer Security. ESORICS 2021 International Workshops. Springer. (ISBN 9783030954833). 2022.
(eds). Computer Security. ESORICS 2021 International Workshops CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Springer. (ISBN 978-3-030-95483-3). pp 578. 2022.
(eds). 2021
Cyber-Physical Security for Critical Infrastructures Protection. Springer Nature. (ISBN 978-3-030-69781-5). pp 225. 2021. Omtale
(eds). Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection, Virtual Workshop, June 24–25, 2020. Steinbeis-Edition. (ISBN 978-3-95663-087-3). pp 55. 2021. Omtale
(eds). 2020
ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC. Springer. (ISBN 978-3-030-42051-2). pp 277. 2020.
(eds). Non-fiction book
2009
Distributed Digital Rights Management: Frameworks, Processes, Procedures and Algorithms. : 2009 pp 200.
. 2005
A Distributed Digital Rights Management Model for Secure Information-Distribution Systems. : 2005 pp 182.
. Academic article
2022
Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications. IEEE Vehicular Technology Conference (VTC) (ISSN 1090-3038). doi: 10.1109/VTC2022-Spring54318.2022.9860581. 2022. Arkiv
. Adaptive Security and Trust Management for Autonomous Messaging Systems. arXiv.org (ISSN 2331-8422). 2022. Prosjekt Omtale Fulltekst
. Quantifying data volatility for IoT forensics with examples from Contiki OS. Forensic Science International: Digital Investigation (ISSN 2666-2825). 40 doi: 10.1016/j.fsidi.2022.301343. 2022. Arkiv
. Adaptive Safety for Internet of Things in e-Health. arXiv.org (ISSN 2331-8422). 2022. Prosjekt Omtale Fulltekst
. 2021
Coffee forensics — Reconstructing data in IoT devices running Contiki OS. Forensic Science International: Digital Investigation (ISSN 2666-2825). 37 doi: 10.1016/j.fsidi.2021.301188. 2021. Arkiv Fulltekst
. Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions. Lecture Notes in Electrical Engineering (ISSN 1876-1100). 739 pp 71-81. doi: 10.1007/978-981-33-6385-4_7. 2021.
. 2020
Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids. Information (ISSN 2078-2489). 11(12) doi: 10.3390/info11120582. 2020. Omtale Fulltekst
. Risk-driven security metrics for an Android smartphone application. International Journal of Electronic Business (ISSN 1470-6067). 15(4) pp 297-324. doi: 10.1504/IJEB.2020.111059. 2020.
. 2019
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems. International Symposium on Medical Information and Communication Technology (ISSN 2326-828X). 2019-May doi: 10.1109/ISMICT.2019.8743670. 2019. Omtale Fulltekst
. Adaptive Cybersecurity Framework for Healthcare Internet of Things. International Symposium on Medical Information and Communication Technology (ISSN 2326-828X). 2019-May doi: 10.1109/ISMICT.2019.8743905. 2019. Omtale Fulltekst
. 2015
Measurable Security, Privacy and Dependability in Smart Grids. Journal of Cyber Security and Mobility (ISSN 2245-1439). 3(4) pp 371-398. doi: 10.13052/jcsm2245-1439.342. 2015. Fulltekst
. 2014
An Evaluation Framework for Adaptive Security for the IoT in eHealth. International journal on advances in security (ISSN 1942-2636). 7(3&4) pp 93-109. 2014. Fulltekst Omtale
. 2013
Development and Validation of Requirements for Evidential Value for Assessing Trustworthiness of Digital Records over Time. Journal of Information (ISSN 1343-4500). 16(3(A)) pp 1945-1980. doi: 10.1109/mobhoc.2009.5336917. 2013. Omtale
. 2011
Assessment of the Trustworthiness of Digital Records. IFIP Advances in Information and Communication Technology (ISSN 1868-4238). (358) pp 300-311. doi: 10.1007/978-3-642-22200-9_24. 2011.
. 2010
Self-Healing and Secure Adaptive Messaging Middleware for Business Critical Systems. International journal on advances in security (ISSN 1942-2636). 3(1/2) pp 34-51. 2010.
. Advances in Adaptive Secure Message Oriented Middleware for Distributed Business Critical Systems. Ukjent AIP Conference Proceedings Volume 1281 pp 291-294. 2010.
. Advanced Framework for Digital Forensic Technologies and Procedures. Journal of Forensic Sciences (ISSN 0022-1198). 55(6) pp 1471-1480. doi: 10.1111/j.1556-4029.2010.01528.x. 2010.
. Advances in Adaptive Secure Message-Oriented Middleware for Distributed Business-Critical Systems. AIP Conference Proceedings (ISSN 0094-243X). 1281 pp 291-294. doi: 10.1063/1.3498454. 2010.
. 2009
Development of Measurable Security for a Distributed Messaging System. International journal on advances in security (ISSN 1942-2636). 2(4) pp 358-380. 2009. Fulltekst
. On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks. Journal of Networks (ISSN 1796-2056). 07.04.2012 pp 15. 2009.
. 2007
Frontiers of DRM Knowledge and Technology. International Journal of Computer Science and Network Security (ISSN 1738-7906). 7(1) pp 216-231. 2007. Fulltekst
. 2005
A Conceptual Formal Framework for Developing and Maintaining Security-Critical Systems. International Journal of Computer Science and Network Security (ISSN 1738-7906). Vol. 5, No. 12 pp 10. 2005. Fulltekst
. 2004
Integrating a security requirement language with UML. Lecture Notes in Computer Science (LNCS) (ISSN 0302-9743). 3273 pp 350-364. doi: 10.1007/978-3-540-30187-5_25. 2004. Fulltekst
. A Distributed Digital Rights Management Model for Information Systems. International Journal of Information Security (ISSN 1615-5262). 2004 pp 22. 2004.
. 2003
Authentication and Authorization for Digital Rights Management for Information Distribution Systems. Ukjent 2003 pp 8. 2003.
. The Need for a Digital Rights Management Framework for the Next Generation of E-Government Services. Electronic Government, an International Journal (ISSN 1740-7494). 2003 pp 13. 2003.
. DigiRight: Relevance to and Potential Impact on Europe's Need to Strengthen the Science and Technology Excellence on DRM. Ukjent 2003 pp 8. 2003.
. DigiRight: Network of Excellence for a Framework for Policy, Privacy, Trust and Risk Management for Digital Rights Management. Ukjent 2003 pp 10. 2003.
. 2000
An overview of firewall technologies. Telektronikk (ISSN 0085-7130). 96(3/2000) pp 47-52. 2000. Fulltekst
. CORBA firewall security: increasing the security of CORBA applications. Telektronikk (ISSN 0085-7130). 96(3/2000) pp 53-64. 2000. Fulltekst
. Academic chapter/article/Conference paper
2022
A Lightweight Security Scheme for Failure Detection in Microservices IoT-Edge Networks. In: Sensing Technology. Proceedings of ICST 2022. (ISBN 978-3-030-98885-2). doi: 10.1007/978-3-030-98886-9_31. 2022.
. 2021
Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids. In: Proceedings of the 18th International Conference on Wireless Networks and Mobile Systems. (ISBN 978-989-758-529-6). pp 83-90. doi: 10.5220/0010580700830090. 2021.
. A Cloud-Based Anomaly Detection for IoT Big Data. In: Cyber-Physical Security for Critical Infrastructures Protection. (ISBN 978-3-030-69781-5). pp 87-104. doi: 10.1007/978-3-030-69781-5_7. 2021.
. Anomaly Detection for Critical Financial Infrastructure Protection. In: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: Securing Critical Infrastructures in Air Transport, Finance, Gas, Healthcare, and Industry. (ISBN 978-1-68083-822-0). pp 495-514. doi: 10.1561/9781680838237.ch22. 2021.
. 2020
Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure. In: Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures. (ISBN 978-1-68083-687-5). pp 104-142. doi: 10.1561/9781680836875.ch7. 2020.
. 2018
An evolutionary game for integrity attacks and defences for advanced metering infrastructure. In: ECSA '18 Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, Madrid, Spain — September 24 - 28, 2018. (ISBN 978-1-4503-6483-6). doi: 10.1145/3241403.3241463. 2018. Omtale
. 2017
Risk-based adaptive authentication for internet of things in smart home eHealth. In: Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings. (ISBN 978-1-4503-5217-8). pp 102-108. doi: 10.1145/3129790.3129801. 2017. Fulltekst Omtale
. 2015
Risk-Driven Security Metrics Development for an e-Health IoT Application. In: Proceedings of the 2015 Information Security for South Africa (ISSA 2015). (ISBN 978-1-4799-7754-3). doi: 10.1109/issa.2015.7335061. 2015.
. 2014
An Evaluation Scenario for Adaptive Security in eHealth. In: PESARO 2014 - The Fourth International Conference on Performance, Safety and Robustness in Complex Systems and Applications. (ISBN 978-1-61208-321-6). pp 6-11. 2014. Fulltekst
. Towards Run-Time Verification of Adaptive Security for IoT in eHealth. In: ECSAW '14 Proceedings of the 2014 European Conference on Software Architecture Workshops. (ISBN 978-1-4503-2778-7). doi: 10.1145/2642803.2642807. 2014.
. Security Measuring for Self-adaptive Security. In: ECSAW '14 Proceedings of the 2014 European Conference on Software Architecture Workshops. (ISBN 978-1-4503-2778-7). doi: 10.1145/2642803.2642808. 2014.
. Game-based adaptive security in the Internet of Things for eHealth. In: ICC 2014 - Proceedings of 2014 IEEE International Conference on Communications. (ISBN 978-1-4799-2003-7). pp 920-925. doi: 10.1109/ICC.2014.6883437. 2014.
. 2013
Metrics-driven security objective decomposition for an e-health application with adaptive security management. In: Proceedings of the International Workshop on Adaptive Security, UbiComp'13. (ISBN 978-1-4503-2543-1). doi: 10.1145/2523501.2523507. 2013.
. A testbed for adaptive security for IoT in eHealth. In: Proceedings of the International Workshop on Adaptive Security, UbiComp'13. (ISBN 978-1-4503-2543-1). doi: 10.1145/2523501.2523506. 2013.
. Adaptive security and privacy management for the internet of things (ASPI 2013). In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. (ISBN 978-1-4503-2215-7). doi: 10.1145/2494091.2499770. 2013.
. 2012
Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. (ISBN 978-1-4503-1997-3). pp 276-281. doi: 10.4108/icst.bodynets.2012.250241. 2012. Fulltekst
. Risk-Based Adaptive Security for Smart IoT in eHealth. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. (ISBN 978-1-4503-1997-3). pp 269-275. doi: 10.4108/icst.bodynets.2012.250235. 2012. Fulltekst
. 2011
On Time, Conflict, Weighting and Dependency Aspects of Assessing the Trustworthiness of Digital Records. In: The Fourth International Conference on Dependability. (ISBN 978-1-61208-149-6). pp 7-13. 2011.
. A framework for the assessment of the trustworthiness of digital records over time. In: Proceeding of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. (ISBN 978-0-7695-4600-1). pp 738-744. doi: 10.1109/trustcom.2011.96. 2011. Fulltekst
. 2010
Advances in Adaptive Secure Message Oriented Middleware for Distributed Business Critical Systems. In: AIP Conference Proceedings. (ISBN 978-0-7354-0831-9). pp 291-294. 2010.
. Innovations and Advances in Adaptive Secure Message-Oriented Middleware - the GEMOM Project. In: Proceedings of the 2010 International Conference on Distributed Computing Systems Workshops (IDCSW 2010). (ISBN 978-0-7695-4079-5). pp 288-289. 2010.
. Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments. In: Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, DCNET 2010, OPTICS 2010. (ISBN 978-989-8425-25-6). pp 85-92. 2010.
. Applicability of security metrics for adaptive security management in a universal banking hub system. In: ECSA '10 Proceedings of the Fourth European Conference on Software Architecture. (ISBN 978-1-4503-0179-4). pp 197-204. 2010.
. 2009
Identification of Basic Measurable Security Components for a Distributed Messaging System. In: 2009 Third International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2009). (ISBN 9780769536682). pp 121-128. 2009. Fulltekst
. Development of security metrics for a distributed messaging system. In: 2009 International Conference on Application of Information and Communication Technologies (AICT 2009). (ISBN 9781424447398). pp 1-6. 2009. Fulltekst
. Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems. In: ComputationWorld 2009: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns. (ISBN 978-0-7695-3862-4). pp 153-160. 2009. Fulltekst
. Adaptive security and trust management for autonomic message-oriented middleware. In: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. (ISBN 978-1-4244-5113-5). pp 810-817. 2009. Fulltekst
. Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time. In: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. (ISBN 978-1-4244-5113-5). pp 796-803. 2009.
. 2008
Towards a Research Road Map for the Management of Privacy Risks in Information Systems. In: Lecture Notes in Informatics. (ISBN 978-3-88579-222-2). 2008.
. Information Use-Control in E-Government Applications. In: Electronic Government: Concepts, Methodologies, Tools, and Applications. (ISBN 978-1-59904-947-2). pp 1926-1934. 2008. Fulltekst
. GEMOM - Significant and Measurable Progress beyond the State of the Art. In: The Third International Conference on Systems and Networks Communications (ICSNC 2008). (ISBN 9781424432172). pp 191-196. 2008. Fulltekst
. Threat Assessment of Wireless Patient Monitoring Systems. In: Proc. International Conference on Information Communication Technologies: From Theory to Applications - ICTTA'08. (ISBN 978-1-4244-1752-0). 2008.
. 2004
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. In: Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings. (ISBN 3-540-23563-9). pp 293-296. 2004. Fulltekst
. 2002
A rights management model for distributed object-oriented information distribution systems. In: EUNICE'2002. (ISBN 82-993980-5-3). pp 185-194. 2002.
. Academic lecture
2023
SFI-NORCICS Norwegian Ecosystem for Secure IT-OT Integration (NESIOT) Kick-off. NESIOT Kick-off; Norsk Regnesentral, Gaustadalléen 23A, 0373 Oslo, 1/24/2023.
. 2022
A Lightweight Security Scheme for Failure Detection in Microservices IoT-Edge Networks. Conference, 1/17/2022 - 1/19/2022.
. 5G-Enabled IoT for IT-OT Integration. SFI NORCICS Partner Workshop; Gaustadalleen 23a, 0373 Oslo, 10/19/2022.
. Focus Area 1-IT and OT Integration. SFI NORCICS Research Workshop; Teknologiveien 22, 2815 Gjøvik, 6/10/2022.
. A Cognitive Digital Twin Architecture for Cybersecurity in IoT-based Smart Homes. Fifteenth International Conference on Sensing Technology (ICST’15); Sydney, 12/5/2022 - 12/7/2022.
. 2020
Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions. 11th International Conference on Information Science and Applications 2020; Virtual Conference, 12/16/2020 - 12/18/2020.
. 2018
Cyber-physical critical infrastructure protection: the FINSEC integrated, predictive and collaborative approach. MeSSa 2018 - 5th International Workshop on Measurability of Security in Software Architectures, in conjunction with The 12th European Conference on Software Architecture (ECSA 2018); Madrid, 9/24/2018 - 9/28/2018.
. 2017
Measurable Adaptive Cyber-Physical Security for IoT Smart Grids. 4th international workshop on measurability of security in software architectures (MeSSa 2017); Canterbury, United Kingdom, 9/11/2017 - 9/15/2017.
. 2014
ASSET Project Progress: ideas, theories, and methods. ASSET National Technical Meeting; Oslo, 6/17/2014.
. Results Integration and Utilization in ASSET III. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Results integrating and utilizing by the ASSET project II. ASSET National Technical Meeting; Oslo, 1/8/2014.
. Design of security measurement and metrics. ASSET Project 213131 VTT-NR Technical Meeting; Oslo, 6/4/2014.
. Framework for integrating ASSET methods II. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Framework for integrating ASSET methods I. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Case Study, validation of results in the eHealth (ASSET WP4). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Design of security measurement and metrics (ASSET WP3). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Development of risk-based adaptive security models for IoT systems (ASSET WP2). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Analysis of risk-based adaptive security models (ASSET WP1). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. ASSET Project Management (ASSET WP0). 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Key Challenges to Knowledge and Objectives. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Project status and progress report. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. Adaptive feedback Control loops as first class entities. 3rd ASSET project-workshop; Finse, 2/27/2014 - 2/28/2014.
. 2013
Results integrating and utilizing by the ASSET project I. ASSET National Technical Meeting; Oslo, 10/8/2013.
. 2012
Conducting a Systematic Literature Review of Information Systems Research. Joint ASSET/PETweb II 2nd PhD Workshop; Oslo, 12/18/2012.
. 2009
Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware. IEEE 6th International Conference on Mobile Adhoc and Sensor Systems; Macau, 10/12/2009.
. 2008
Threat assessment of wireless patient monitoring systems. 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA ; Damascus, 4/7/2008 - 4/11/2008. Sammendrag
. Genetic Message Oriented Secure Middleware (GEMOM): Significant and Measureable Progress beyond the State of the Art. Third International Conference on Systems and Networks Communications (ICSNC) 2008, Sliema, Mal, 10/30/2008.
. 2006
Risikoanalyse og risikostyring i et helhetlig perspektiv. Tekna; Risiko og sikkerhet i IKT-systemer-2006; Ingeniørenes hus, Oslo, Norway, 3/15/2006.
. Risikoanalyse og risikostyringi et helhetlig perspektiv. Tekna; Risiko og sikkerhet i IKT-systemer-2006; Ingeniørenes hus, Oslo, Norway, 3/15/2006. Fulltekst
. 2005
State of the Art in DRM. Smart University, Sophia Antipolis, France, 9/20/2005.
. The Pros and Cons of Different Ways to Authenticate Users. Trial Lecture, Dept. of Informatics, University of Oslo, 5/12/2005.
. 2004
Digital Rights Management (DRM) for Establishing and Increasing Trust and Privacy. Workshop on Methods and Tools for Analyzing and Securing Trust and Privacy, SINTEF, Oslo, 6/4/2004. Fulltekst
. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. DBSEM - Seminar in Computer Science with Special Focus on Formal Methods and Computer Security, Dept, 1/5/2004. Fulltekst
. A Distributed Digital Rights Management Model for Information Distribution Systems. DBSEM - Seminar in Computer Science with Special Focus on Formal Methods and Computer Security, Dept, 1/5/2004.
. 2003
Network of Excellence (NoE) for a Framework for Digital Rights Management. EICTA, 11/03-2003, Brussels, 3/1/2003.
. Digital Rights Management (DRM). IKT Sikkerhet og Sårbarhet Workshop 16. september 2003. Foredrag, 9/16/2003.
. DigiRight: Workpackages. 2nd Preparatory Meeting for DigiRight, March 27-28, 2003, 3/27/2003.
. DigiRight: NoE Proposal for a Framework for Policy, Privacy, Security, Trust and Risk Management for DRM. First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Int, 8/27/2003.
. DRM-Net: Network of Excellence for a Framework for Digital Rights Management. Preparatory Meeting for a DRM NoE, UPF, Barcelona, Spain, February 13, 2003, 2/1/2003.
. NoE on Digital Rights Management. InfoDay, 12/03-2003, Brussels, 3/1/2003.
. DigiRight: Joint Programme of Activities (JPAs). 2nd Preparatory Meeting for DigiRight,, March 27-28, 2003, 3/27/2003.
. 2002
NoE on digital rights management. DRM Workshop, Brussels, 1/12/2002.
. EU FP6 Proposals for NoEs and IPs in DRM, Security, Privacy and Trust. NFR; MANGLER, 3/4/2002.
. 2000
Security in Middleware. Telenor Konsern IT-sikkerhetsforum, 1/10/2000.
. Security Requirements for Middleware. Telenor Konsernfelles sikkerhetsløsning, workshop med HP, 1/9/2000.
. The Role of Middleware in Telemedicine, HARP, Haifa Israel. , .
. Lecture
2023
Norwegian Ecosystem Secure IT-OT Integration at CSG kickoff. CSG Project Kickoff; ABB, Pitäjänmäki, Helsinki, 2/6/2023.
. NESIOT (Norwegian Ecosystem for Secure IT-OT Integration). Roundtable Discussion on Security and Secure Information Exchange in the Healthcare Sector; NR, Oslo, 1/26/2023.
. European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection (EU-CIP). Roundtable Discussion on Security and Secure Information Exchange in the Healthcare Sector; NR, Oslo, 1/26/2023.
. European Cluster for Securing Critical Infrastructures – ECSCI. Roundtable Discussion on Security and Secure Information Exchange in the Healthcare Sector; NR, Oslo, 1/26/2023.
. Norwegian Ecosystem for Secure IT-OT Integration (NESIOT). NESIOT Kickoff meeting; NR, Oslo, 1/24/2023.
. 2022
Norwegian Ecosystem for Secure IT-OT Integration (NESIOT). NGINO Final Meeting; Forskningsveien 1, Oslo, 11/29/2022.
. European Cluster for Securing Critical Infrastructures (ECSCI) at The 2nd ECSCI Virtual Workshop. The 2nd ECSCI Virtual Workshop; Online-Google Meet, 4/27/2022 - 4/29/2022.
. European Cluster for Securing Critical Infrastructures (ECSCI) at ENSURESEC Final Conference. ENSURESEC Final Conference; Online-Webex, 5/20/2022.
. 2021
Machine Learning as an Enabler for Cyber-Physical Security. Financial Services: Digital Transformation and the Cyber Imperative; Zoom, 4/22/2021 - 4/23/2021.
. Predictive Analytics for Cyber-Physical Threat Intelligence in Financial Sector Infrastructures. Recent Security Advances in the Finance Sector: Cost-Effective Resilience for the Connected Digital Finance Ecosystem; Virtual, 1/14/2021.
. 2020
The European Cluster for Securing Critical Infrastructures (ECSCI): Objectives, Success Stories, and Takeaways. The first ECSCI Workshop on Critical Infrastructure Protection; Virtual workshop, on Google Meet conference room, 6/24/2020 - 6/25/2021. Fulltekst Omtale Prosjekt
. 2019
The FINSEC (Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures) Approach. IoTSec Consortium Meeting; Halden, 4/23/2019 - 4/24/2019.
. Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures (FINSEC). SAFECARE Awareness Event; Leuven, 9/18/2019.
. Preliminary Results of the FINSEC (Integrated Framework for Predictive and Collaborative Security of Financial Infrastructures) project. FINSEC 2019 (1st International Workshop on Security for Financial Critical Infrastructures and Services) in ESORICS 2019; Luxembourg, 9/26/2019 - 9/27/2019.
. 2018
Applying Evolutionary Game Theory for Integrity Attacks and Defences for Advanced Metering Infrastructure. UIO, IFI, Networks and Distributed Systems; Oslo, 9/13/2018.
. An Evolutionary Game for Integrity Attacks and Defences for Advanced Metering Infrastructure. MeSSa 2018 – 5th International Workshop on Measurability of Security in Software Architectures; Madrid, 9/24/2018.
. 2015
IoTSec - Security in IoT for Smart Grids. AFSecurity Seminar, Secure October - Security R&D @ UiO and Partners; Oslo, 10/9/2015.
. Towards Run-Time Verification of Adaptive Security for IoT in eHealth. ASSET Project 213131 2014 Final General Meeting; NR/Oslo, 3/5/2015.
. ASSET Results Integration and Utilization Final. ASSET Project 213131 2014 Final General Meeting; NR/Oslo, 3/5/2015.
. ASSET Project Management Final. ASSET Project 213131 2014 Final General Meeting; NR/Oslo, 3/5/2015.
. ASSET Project Progress: ideas and concepts II. ASSET Project Technical Meeting; Oslo, 3/5/2015.
. Poster
2008
Preservation of Trust and Security in Long-Term Record Management. PST2008 Sixth Annual Conference on Privacy, Security and Trust, Graduate Student Symposium, 10/1/2008 - 10/3/2008.
. 2007
Threat Assessment of Wireless Patient Monitoring Systems. VERDIKT Conference 2007, Hell, 10/30/2007. Fulltekst
. Masters thesis
2017
Semantic Description of IoT Security for Smart Grid.. 2017.
. Risk based Adaptive Authentication for IoT in Smart Home eHealth.. 2017.
. 2013
The effect of sensor nodes antenna orientation on energy consumption in IEEE 802.15.4 networks.. 2013.
. Development of a Lab Experiment for Intrusion Detection System in Wireless Body Area Networks.. 2013.
. Report
2022
NORCICS D3.6.2.22: Requirements and specification for dynamic risk assessment in 5G-enabled IoT. Norsk Regnesentral. pp 18. 2022.
. NORCICS D3.6.1.22: Report on strategies and specification for cybersecurity scenarios for 5G-enabled IoT. Norsk Regnesentral. NR-notat DART/17/22. pp 30. 2022.
. AI/ML for 5G and Beyond Cybersecurity. Norsk Regnesentral. NR-notat DART/15/22. pp 25. 2022.
. 2021
Digital Twins for Enhancing Cybersecurity in Smart Homes. Norsk Regnesentral. NR-notat DART/03/21. pp 23. 2021.
. 2020
Optimized Anticipatory Adaptive Security Models for IoT-enabled Smart Grids. Norsk Regnesentral. NR-notat DART/10/20. pp 11. 2020. Arkiv
. Anticipatory adaptive security models for IoT-enabled Smart Grids. NR. NR-notat DART/08/20. pp 26. 2020.
. Security in Android smartphone, Confidentiality in IoT-enabled Smart Grids, and Fault-tolerant privacy-preserving in AMS. Norsk Regnesentral. NR-notat DART/07/20. pp 9. 2020. Arkiv
. Anticipatory Adaptive Security for IoT-based Smart Grids Infrastructure and Value-added Services. NR. NR-notat DART/09/20. pp 13. 2020. Arkiv
. 2015
Case Study Validation: Deliverable D6.3. Norsk Regnesentral. NR-notat DART/18/2015. pp 20. 2015.
. Case Study Simulation and Evaluation: Deliverable 6.2. Norsk Regnesentral. NR-notat DART/17/2015. pp 15. 2015.
. Optimizing and Combining Algorithms: Deliverable D4.3. Norsk Regnesentral. NR-notat DART/13/2015. pp 24. 2015.
. Prototyping of Methods: Deliverable D4.2. Norsk Regnesentral. NR-notat DART/12/2015. pp 19. 2015.
. Game Theory and Risk Models: Deliverable D4.1. Norsk Regnesentral. NR-notat DART/11/2015. pp 16. 2015.
. Evaluation and Validation Using Metrics: Deliverable D5.2. Norsk Regnesentral. NR-notat DART/15/2015. pp 22. 2015.
. Development of Metrics: Deliverable D5.1. Norsk Regnesentral. NR-notat DART/14/2015. pp 26. 2015.
. Case Study Gap Analysis: Deliverable D6.1. Norsk Regnesentral. NR-notat DART/16/2015. pp 24. 2015.
. ASSET Project 213131 2015 Final Annual Meeting, 05-06 March: Meeting Minutes & Documentation. Norsk Regnesentral. NR-notat DART/07/2015. pp 25. 2015.
. ASSET Project 213131 Progress Report 2015: Reporting Period 01/10/2014-30/09/2015. Norsk Regnesentral. NR-notat DART/08/2015. pp 17. 2015.
. Trust based Adaptive Safety for Sensor Networks in e-Health. Norsk Regnesentral. NR-notat DART/06/2015. pp 16. 2015.
. A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things. Norsk Regnesentral. NR-notat DART/05/2015. pp 17. 2015.
. 2014
ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation. Norsk Regnesentral. NR-notat DART/01/2014. pp 28. 2014.
. ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014, September 30,2014. NR. NR-notat DART/07/2014. pp 22. 2014.
. 2013
Analysis of Reasoning Methods: Deliverable D3.1 V1. Norsk Regnesentral. NR-notat DART/10/2013. pp 20. 2013.
. Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth: Deliverable D3.2 V1. Norsk Regnesentral. NR-notat DART/09/2013. pp 26. 2013.
. ASSET Project 213131 Progress Report 2013: Reporting Period 01/10/2012-30/09/2013. Norsk Regnesentral. NR-notat DART/11/2013. pp 22. 2013.
. 2nd PETweb II & ASSET joint PhD Seminar. Norsk Regnesentral. NR-notat DART/01/2013. pp 99. 2013.
. Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth. Norsk Regnesentral. NR-notat DART/07/2013. pp 25. 2013. Prosjekt
. 2012
.
. Risk Analysis Methods and Practices: Privacy Risk Analysis Methodology. Norsk Regnesentral. NR-notat DART/05/2012. pp 37. 2012.
. 2010
State of the Art Privacy Risk Analysis: Survey and Classification. Norsk Regnesentral. NR-notat DART/05/10. 2010.
. 2009
D5.3 - Description and analysis document for optimisation algorithms. GEMOM/QMUL/1. pp 57. 2009.
. D6.4 – Security and QoS Monitoring Implementation. GEMOM/VTT/WP6/D6.4/1.0/. pp 57. 2009.
. D.4.4 – Integration with JMS, Tibco’s, Reuters, and IBM’s MQ Series. GEMOM/NR/WP4//4.4/0.01/. pp 17. 2009.
. D6.3 - Security Implementation. GEMOM/NR/WP6/D6.3/1.0. pp 50. 2009.
. 2008
Preservation of Trust in Long-Term Records Management Systems. 1017. (ISBN 978-82-539-0527-3) pp 55. 2008. Arkiv
. D2.2 – System Specification Document. GEMOM/DIGINUS/D2.2/1.0. pp 31. 2008.
. D5.1 – Design Document for Broker Managing Agent. GEMOM/Q-S/WP5/D5.1/v1.0. pp 40. 2008.
. D6.1 - QoS and Security Requirements Specification. GEMOM/NR/WP6/D6.1/4.0. pp 79. 2008.
. D6.2 – Trust Model and Security Architecture. GEMOM/NR/WP6//6.2/1.0/. pp 82. 2008.
. D2.1 - Requirements Analysis Document. GEMOM/DIGINUS/D2.1/1.1. pp 72. 2008.
. 2007
Utvikling av prototyp for sikker epost. Norsk Regnesentral. NR-notat DART/03/07. pp 27. 2007.
. 2006
Towards a Holistic, Adaptive, and Multidisciplinary Risk Management- State of Art and Future Directions. Norsk Regnesentral. NR-notat DART/06/06. 2006.
. 2002
National Center of Excellence for Supporting a High Level of IT Security. Norsk Regnesentral. NR-notat GEM /04/02. pp 10. 2002.
. 2001
Specifications of the Cross-Security Harmonising Platform with all its components and features focused on telemedicine scenarios. pp 157. 2001.
. 2000
Surveying the Requirements for Middleware Security. pp 130. 2000.
. State of the Art Review of security technologies in the telemedicine sector. pp 247. 2000.
. List and description of criteria for evaluating WWW-tools, technologies and. pp 104. 2000.
. Firewall technologies: CORBA firewall security. ISSN 0809-1021. pp 27. 2000.
. Popular scientific lecture
2011
On Long-Term Archiving, Forensics, Security and Privacy Challenges. MultiTeam User Conference; IBM MultiTeam, Soria Moria Conference Center, Oslo, 4/5/2011 - 4/6/2011.
. A Frame for Security Metrics. DART Security-Sig, 5/2/2011.
. Adaptive Policy for Monitoring of Distributed Business-Critical Systems. NORMAN, Lysaker, 4/28/2011.
. 2010
Adaptive Security Scenarios for Case Studies. GEMOM Plenary Meeting London, 3/31/2010.
. MinID – Id Portal in Brief: Based on Information on IdPortal page. PETweb II Project Meeting Oslo, 11/17/2010.
. Adaptive Identity Management. PhD Workshop, Oslo, 10/8/2010.
. Quality of Service and Security: Adaptive Security. Final Project Review, Brussels, 8/27/2010.
. WP6 Quality of Service and Security: Status. GEMOM Plenary Meeting, London, 3/31/2010.
. Adaptive Policy Manager. GEMOM Plenary Meeting, London, 3/29/2010.
. Development of Security Metrics for a Distributed Messaging System. DART/S-SIG, 10/4/2010.
. Survey of State-of-the-Art Privacy Risk Analysis: Classification and Integration. PETweb II Project Meeting Oslo, 11/17/2010.
. Adaptive Monitoring of Distributed Business-Critical Systems. Finanstilsynet, Oslo,, 12/9/2010.
. QoS and Security: Common Stories/Scenarios. GEMOM Plenary Meeting, London, 3/31/2010.
. 2009
GEMOM - IBM WebSphereMQ Bridging Demo. , .
. WP 6 – QoS and Security: Deliverables Status, Remaining Actions, and Requirements for Review. GEMOM Helsinki Meeting, 5/14/2009.
. WP6 - D6.3 – Security Implementation: Authentication, Authorization and Key Management Demo. GEMOM Helsinki Meeting, 5/14/2009.
. WP4 - D4.4 - Integrating with IBM’s MQSeries: IBM WebSphereMQ Bridging Demo. GEMOM Helsinki Meeting, 5/14/2009.
. Quality of Service and Security: Adaptive Security Demo. , .
. WP6 – QoS and Security Deliverables. GEMOM Plenary Meeting Berlin, 3/2/2009.
. Adaptive and Evolving Security for Autonomic Messaging Middleware. RISKnet Open Workshop on RFID Risks and Adaptive Computer Security, 4/2/2009.
. WP6 – QoS and Security: Adaptive Security in Brief. GEMOM Plenary Meeting Berlin, 3/2/2009.
. 2008
GEMOM: Qualities of Service and Security. GEMOM Kick-Off Meeting, CNIT/Florence, 24-25/01-2008, 1/24/2008.
. LongRec – Self-protecting object, metrics, evidential value. LongRec Trust Workshop National Archive, Oslo, 23/09- 2008, 9/23/2008.
. GEMOM - Quality of Service and Security: Requirement Specification. GEMOM First Technical Meeting, Oslo, 03-05/03-2008, 3/3/2008.
. LongRec – Trust and Security: Preservation of Evidential Value. LongRec Trust Workshop, National Archive, Oslo, 9/23/2008.
. GEMOM - D6.1 Requirement Specification for Quality of Service and Security. GEMOM First Review Brussels 15/09-2008, 9/15/2008.
. GEMOM - Requirement Specification for Quality of Service and Security. GEMOM 2nd Technical Meeting London 26-27/06-2008, 6/26/2008.
. LongRec – Preservation of Trust & Security over Decades – State of the art. Reference Group Meeting Oslo, Hotel Opera,, 1/15/2008.
. LongRec – TRUST Preservation of Trust and Security. Riksarkivet – Joint Meeting Oslo,, 2/28/2008.
. 2007
LongRec – Preservation of Trust & Security: State of the Art. LongRec Project Meeting, 2/1/2007.
.
. LongRec–Records Management over Decades: Preservation of Trust and Security. LongRec kickoff, 1/31/2007.
. LongRec - Preservation of Evidential Value. LongRec Project Meeting Oslo, 10/18/2007.
. Preservation of Trust & Security: Concept and utilization of provenance. LongRec Project Meeting Trondheim, 5/9/2007.
. Preservation of Trust & Security: Persistent security services. LongRec Project Meeting, 2/1/2007.
. Preservation of Trust & Security – Best Practices. LongRec Project Meeting Oslo, 10/18/2007.
. Privacy Threat Ontology: Privacy Threat Impact Calculation. PETweb Workshop, 6/6/2007.
. An Ontological Analysis of Privacy Threat Impact in Large Scale Web-based Services. PETweb Reference Group Meeting, 12/12/2007.
. Privacy Threat Analysis:Risks to Privacy in Large-Scale Web-Based Services. , .
. Increasing Awareness and Understanding of Privacy: A Taxonomy of Privacy. , .
. Privacy Threat Ontology. PETweb Workshop, 6/6/2007.
. 2006
. Formal framework for an adaptive risk management for the protection of critical infrastructures. , .
. An ICT system for efficient environmental monitoring and risk management. , .
. Adaptive Risk Management for Resilient Networked Organizations. , .
. DART's Interests, ideas, and possible contributions to projects under the various FP7 challenges and objectives. , .
. LongRec – Records Management over Decades: Preservation of Trust and Security. , .
. Article in business/trade/industry journal
2022
A Homomorphic Digital Signature Scheme for the Internet of Things. MDPI IoT (ISSN 2624-831X). doi: 10.20944/preprints202202.0238.v1. 2022. Fulltekst Prosjekt Omtale
. Popular scientific article
2007
Riskohåndtering er nøkkelen til sikkerhet og tillit. ComputerWorld Norge (ISSN 1501-6595). pp 1. 6/15/2007. Fulltekst
. Editorial
2020
Finsec 2019 preface. Lecture Notes in Computer Science (LNCS) (ISSN 0302-9743). 11981 LNCS pp xiii-xiv. 2020.
. Reader opinion piece
2008
.