Christian Damsgaard Jensen
Orcid: 0000-0002-0921-7148Affiliations:
- Technical University of Denmark, Lyngby, Denmark
According to our database1,
Christian Damsgaard Jensen
authored at least 83 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Comput. Secur., May, 2023
Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
2022
Proceedings of the International Conference on Information Networking, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control.
Sensors, 2021
J. Inf. Secur. Appl., 2021
Corrigendum to "CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships" [Future Gener. Comput. Syst. 100 (2019) 736-750].
Future Gener. Comput. Syst., 2021
Comput. Secur., 2021
Proceedings of the Intelligent Computing, 2021
An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
The application of Software Defined Networking on securing computer networks: A survey.
J. Netw. Comput. Appl., 2019
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships.
Future Gener. Comput. Syst., 2019
2018
Proceedings of the Science of Cyber Security - First International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Trust Management XII - 12th IFIP WG 11.11 International Conference, 2018
2016
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 2016 Information Security for South Africa, 2016
2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
2012
Int. J. Crit. Comput. Based Syst., 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
J. Inf. Process., 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
IET Inf. Secur., 2010
2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
2008
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics.
Proceedings of the SECRYPT 2008, 2008
2007
Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises.
Proceedings of the Trust Management, 2007
Proceedings of the Trust Management, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
2006
Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06).
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
2005
Sci. Comput. Program., 2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK).
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Trust Management, Third International Conference, 2005
2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the Second Annual Conference on Privacy, 2004
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience.
Proceedings of the Second Annual Conference on Privacy, 2004
Proceedings of the Trust Management, Second International Conference, 2004
2003
IEEE Pervasive Comput., 2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, 2003
Proceedings of the Trust Management, First International Conference, 2003
Risk Probability Estimating Based on Clustering.
Proceedings of the IEEE Systems, 2003
2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
2001
Capability File Names: Separating Authorisation From User Management in an Internet File System.
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
Proceedings of the 9th ACM SIGOPS European Workshop, 2000
Proceedings of the International Symposium on Distributed Objects and Applications, 2000
1999
Un modèle de contrôle d'accès générique et sa réalisation dans la mémoire virtuelle répartie unique Arias. (A generic access contro model and its implementation in the single address space operating system Arias).
PhD thesis, 1999
1998
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR '98), 1998