Selected Publications - ICT Security
Selected Publications - ICT Security
Noll, Josef; Garitano, Iñaki; Fayyad, Seraj; Åsberg, Erik; Abie, Habtamu. Measurable Security, Privacy and Dependability in Smart Grids. Journal of Cyber Security and Mobility (ISSN 2245-1439). 3(4) pp 371-398. doi: 10.13052/jcsm2245-1439.342. 2015.
Leister, Wolfgang; Hamdi, Mohamed; Abie, Habtamu; Poslad, Stefan; Torjusen, Arild Braathen. An Evaluation Framework for Adaptive Security for the IoT in eHealth. International journal on advances in security (ISSN 1942-2636). 7(3&4) pp 93-109. 2014. Review Full-text
Ma, Jianqiang; Abie, Habtamu; Skramstad, Torbjørn; Nygård, Mads. Development and Validation of Requirements for Evidential Value for Assessing Trustworthiness of Digital Records over Time. Journal of Information (ISSN 1343-4500). 16(3(A)) pp 1945-1980. 2013. Review
Ma, Jianqiang; Abie, Habtamu; Skramstad, Torbjørn; Nygård, Mads. Assessment of the Trustworthiness of Digital Records. IFIP Advances in Information and Communication Technology (ISSN 1868-4238). (358) pp 300-311. 2011.
Ma, Jianqiang; Abie, Habtamu; Skramstad, Torbjørn; Nygård, Mads. A framework for the assessment of the trustworthiness of digital records over time. In: Proceeding of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. (ISBN 978-0-7695-4600-1). pp 738-744. 2011.
Ma, Jianqiang; Abie, Habtamu; Skramstad, Torbjørn; Nygård, Mads. On Time, Conflict, Weighting and Dependency Aspects of Assessing the Trustworthiness of Digital Records. In: The Fourth International Conference on Dependability. (ISBN 978-1-61208-149-6). pp 7-13. 2011.
Ma, Jianqiang; Abie, Habtamu; Skramstad, Torbjørn; Nygård, Mads. Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time. In: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. (ISBN 978-1-4244-5113-5). pp 796-803. 2009.
Savola, Reijo M.; Savolainen, Antti Evesti; Abie, Habtamu; Sihvonen, Markus. Risk-Driven Security Metrics Development for an e-Health IoT Application. In: Proceedings of the 2015 Information Security for South Africa (ISSA 2015). (ISBN 978-1-4799-7754-3). 2015.
Evesti, Antti; Abie, Habtamu; Savola, Reijo M.. Security Measuring for Self-adaptive Security. In: ECSAW '14 Proceedings of the 2014 European Conference on Software Architecture Workshops. (ISBN 978-1-4503-2778-7). doi: 10.1145/2642803.2642808. 2014.
Hamdi, Mohamed; Abie, Habtamu. Game-based adaptive security in the Internet of Things for eHealth. In: ICC 2014 - Proceedings of 2014 IEEE International Conference on Communications. (ISBN 978-1-4799-2003-7). pp 920-925. doi: 10.1109/ICC.2014.6883437. 2014.
Leister, Wolfgang; Hamdi, Mohamed; Abie, Habtamu; Poslad, Stefan. An Evaluation Scenario for Adaptive Security in eHealth. In: PESARO 2014 - The Fourth International Conference on Performance, Safety and Robustness in Complex Systems and Applications. (ISBN 978-1-61208-321-6). pp 6-11. 2014.
Torjusen, Arild Braathen; Abie, Habtamu; Paintsil, Ebenezer; Trcek, Denis; Skomedal, Åsmund. Towards Run-Time Verification of Adaptive Security for IoT in eHealth. In: ECSAW '14 Proceedings of the 2014 European Conference on Software Architecture Workshops. (ISBN 978-1-4503-2778-7). doi: 10.1145/2642803.2642807. 2014.
Poslad, Stefan; Hamdi, Mohamed; Abie, Habtamu. Adaptive security and privacy management for the internet of things (ASPI 2013). In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. (ISBN 978-1-4503-2215-7). doi: 10.1145/2494091.2499770. 2013.
Savola, Reijo M.; Abie, Habtamu. Metrics-driven security objective decomposition for an e-health application with adaptive security management. In: Proceedings of the International Workshop on Adaptive Security, UbiComp'13. (ISBN 978-1-4503-2543-1). doi: 10.1145/2523501.2523507. 2013.
Woldegiorgis, Yared Berhanu; Abie, Habtamu; Hamdi, Mohamed. A testbed for adaptive security for IoT in eHealth. In: Proceedings of the International Workshop on Adaptive Security, UbiComp'13. (ISBN 978-1-4503-2543-1). doi: 10.1145/2523501.2523506. 2013.
Abie, Habtamu; Balasingham, Ilangko. Risk-Based Adaptive Security for Smart IoT in eHealth. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. (ISBN 978-1-4503-1997-3). pp 269-275. 2012. Full-text
Savola, Reijo; Abie, Habtamu; Sihvonen, Markus. Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. (ISBN 978-1-4503-1997-3). pp 276-281. 2012. Full-text
Leister, Wolfgang; Schulz, Trenton. Ideas for a Trust Indicator in the Internet of Things. In: SMART 2012 - The First International Conference on Smart Systems, Devices and Technologies. (ISBN 978-1-61208-225-7). pp 31-34. 2012. Full-text Review
Schulz, Trenton. Creating Universal Designed and Trustworthy Objects for the Internet of Things. In: Learning and Collaboration Technologies. Technology-Rich Environments for Learning and Collaboration. (ISBN 978-3-319-07484-9). pp 206-214. doi: 10.1007/978-3-319-07485-6_21. 2014. Full-text Project
Schulz, Trenton; Fritsch, Lothar. Accessibility and Inclusion Requirements for Future e-Identity Solutions. In: Computers Helping People with Special Needs - Proceedings of the 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014; Bind 2. Springer Lecture Notes on Computer Science (LNCS) 8648. (ISBN 978-3-319-08598-2). pp 316-323. doi: 10.1007/978-3-319-08596-8_50. 2014.
Røssvoll, Till Halbach. Trust Implications for Universal Design of Social-Networking Applications. In: Proceedings of the User-Centered Trust in Interactive Systems Workshop: a Workshop from NordiCHI 2012. Norwegian Computing Center. (ISBN 978-82-539-0538-9). 2013.
Paintsil, Ebenezer; Fritsch, Lothar (2011). A Taxonomy of Privacy and Security Risks Contributing Factors. IFIP Advances in Information and Communication Technology. ISSN 1868-4238.
Josang, Audun; Fritsch, Lothar; Mahler, Tobias (2010). Privacy Policy Referencing. Lecture Notes in Computer Science = Lecture notes in artificial intelligence. ISSN 0302-9743.
Fritsch, Lothar; Fuglerud, Kristin Skeide; Solheim, Ivar (2010). Towards Inclusive Identity Management. Identity in the Information Society. ISSN 1876-0678. 3(3). doi: 10.1007/s12394-010-0075-6
Strand, Lars Kristoffer; Leister, Wolfgang (2012). Advancement Towards Secure Authentication in the Session Initiation Protocol. International journal on advances in security. ISSN 1942-2636. 4(3&4). Review . Full-text
Strand, Lars Kristoffer; Noll, Josef; Leister, Wolfgang (2011). Generic Security Services API authentication support for the Session Initiation Protocol. The Seventh Advanced International Conference on Telecommunications (AICT2011).
Hagalisletto, Moen Anders; Strand, Lars Kristoffer (2010). Designing attacks on SIP call set-up. International Journal of Applied Cryptography. ISSN 1753-0563. . doi: 10.1504/IJACT.2010.033795
Hagalisletto, Moen Anders; Kristoffersen, Steinar (2010). Pervasive Integration of Autonomous Agents. Proceedings of the Annual Hawaii International Conference on System Sciences. ISSN 1530-1605.
Hagalisletto, Moen Anders; Strand, Lars Kristoffer (2010). Designing attacks on SIP call set-up. International Journal of Applied Cryptography. ISSN 1753-0563. . doi: 10.1504/IJACT.2010.033795
Hagalisletto, Moen Anders; Kristoffersen, Steinar (2010). Pervasive Integration of Autonomous Agents. Proceedings of the Annual Hawaii International Conference on System Sciences. ISSN 1530-1605.
Leister, Wolfgang; Fretland, Truls; Balasingham, Ilangko (2009). Security and Authentication Architecture Using MPEG-21 for Wireless Patient Monitoring Systems. International Journal on Advances in Security 2(1), 16-29. www.iariajournals.org
Trcek, Denis; Abie, Habtamu; Skomedal, Åsmund; Starc, Iztok (2010). Advanced Framework for Digital Forensic Technologies and Procedures. Journal of Forensic Sciences. ISSN 0022-1198. 55(6). doi: 10.1111/j.1556-4029.2010.01528.x
Abie, Habtamu; Savoia, Reijo; Wang, Jinfu; Rotondi, Domenico (2010). Advances in Adaptive Secure Message-Oriented Middleware for Distributed Business-Critical Systems. AIP Conference Proceedings. ISSN 0094-243X. . doi: 10.1063/1.3498454
Abie, Habtamu; Savoia, Reijo; Bigham, John; Dattani, Ilesh; Rotondi, Domenico; Da Bormida, Giorgio (2010). Self-Healing and Secure Adaptive Messaging Middleware for Business Critical Systems. International journal on advances in security. ISSN 1942-2636. 3(1/2)
Savoia, Reijo; Abie, Habtamu (2009). Development of Measurable Security for a Distributed Messaging System. International journal on advances in security. ISSN 1942-2636. 2(4)
Blasi, Lorenzo; Savoia, Reijo; Abie, Habtamu; Rotondi, Domenico. Applicability of security metrics for adaptive security management in a universal banking hub system. In: ECSA '10 Proceedings of the Fourth European Conference on Software Architecture. (ISBN 978-1-4503-0179-4). pp 197-204. 2010.
Abie, Habtamu. Adaptive security and trust management for autonomic message-oriented middleware. In: Proceeding of IEEE Symposium on Trust, Security, and Privacy for Pervasive Applications (TSP) 2009, in conjunction with the 6th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2009. (ISBN 978-1-4244-5113-5). pp 810-817. 2009. Full-text
Savola, Reijo M.; Abie, Habtamu. Identification of Basic Measurable Security Components for a Distributed Messaging System. In: 2009 Third International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2009). (ISBN 9780769536682). pp 121-128. 2009. Full-text
Abie, Habtamu; Savola, Reijo M.. On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks. Journal of Networks (ISSN 1796-2056). 07.04.2012 pp 15. 2009.
Abie, Habtamu; Savola, Reijo; Bigham, John; Dattani, Ilesh; Rotondi, Domenico; Da Bormida, Giorgio. Self-Healing and Secure Adaptive Messaging Middleware for Business Critical Systems. International journal on advances in security (ISSN 1942-2636). 3(1/2) pp 34-51. 2010.
Abie, Habtamu; Savola, Reijo M.; Dattani, Ilesh. Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems. In: ComputationWorld 2009: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns. (ISBN 978-0-7695-3862-4). pp 153-160. 2009. Full-text
Savola, Reijo M.; Abie, Habtamu. Identification of Basic Measurable Security Components for a Distributed Messaging System. In: 2009 Third International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2009). (ISBN 9780769536682). pp 121-128. 2009. Full-text
Hamdi, Mohamed; Boudriga, Noureddine; Abie, Habtamu; Denko, Mieso K.. Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments. In: Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, DCNET 2010, OPTICS 2010. (ISBN 978-989-8425-25-6). pp 85-92. 2010.
Scherner, Tobias; Fritsch, Lothar (2011). Technology Assurance.
Paintsil, Ebenezer; Fritsch, Lothar (2011). Towards Legal Privacy Risk Assessment Automation in Social Media.
Fritsch, Lothar (2011). Security and privacy engineering for corporate use of social community platforms.
Jøsang, Audun; Fritsch, Lothar; Mahler, Tobias (2010). Privacy Policy Referencing.
Sigurd Eskeland. Non-Interactive Secure Multiparty Key Establishment. Tatra Mountains Mathematical Publications. Volume 60, No 1, Sep 2014, Special Cryptology Issue, pp. 47-56.
Sigurd Eskeland, Vladimir Oleshchuk. Secure Group Communication Using Fractional Public Keys. Proceedings of International Conference on Availability, Reliability and Security (ARES 2010), February 2010, Krakow, Poland, pp.254-257, IEEE Computer Society.
Sigurd Eskeland. Efficient Group-Oriented Key Establishment Using Fractional Public Keys. Short-Paper Proceedings of The 14th Nordic Conference on Secure IT Systems (NordSec 2009), October 2009, Oslo, Norway, pp. 6-14.
Sigurd Eskeland, Vladimir Oleshchuk. Collusion-Resistant Threshold Cryptosystems. Proceedings of International Workshop on Coding and Cryptography (WCC 09), May 2009, Ullensvang, Norway, pp. 256-266.