Christian Damsgaard Jensen

Orcid: 0000-0002-0921-7148

Affiliations:
  • Technical University of Denmark, Lyngby, Denmark


According to our database1, Christian Damsgaard Jensen authored at least 83 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS.
Comput. Secur., May, 2023

Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023

2022
Information and Future Internet Security, Trust and Privacy.
Future Internet, 2022

Detecting Ambiguous Phishing Certificates using Machine Learning.
Proceedings of the International Conference on Information Networking, 2022

2021

Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control.
Sensors, 2021

My data, my control: A secure data sharing and access scheme over blockchain.
J. Inf. Secur. Appl., 2021

Corrigendum to "CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships" [Future Gener. Comput. Syst. 100 (2019) 736-750].
Future Gener. Comput. Syst., 2021

Metadata based need-to-know view in large-scale video surveillance systems.
Comput. Secur., 2021

Secondary Use Prevention in Large-Scale Data Lakes.
Proceedings of the Intelligent Computing, 2021

An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence.
Proceedings of the Network and System Security - 15th International Conference, 2021

ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
A systematic review of cyber-resilience assessment frameworks.
Comput. Secur., 2020

Privacy-preserving Measures in Smart City Video Surveillance Systems.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
The application of Software Defined Networking on securing computer networks: A survey.
J. Netw. Comput. Appl., 2019

CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships.
Future Gener. Comput. Syst., 2019

2018
CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems.
Proceedings of the Science of Cyber Security - First International Conference, 2018

Analyzing the Communication Security Between Smartphones and IoT Based on CORAS.
Proceedings of the Network and System Security - 12th International Conference, 2018

CodeTrust - Trusting Software Systems.
Proceedings of the Trust Management XII - 12th IFIP WG 11.11 International Conference, 2018

2016
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Identity management for e-government Libya as a case study.
Proceedings of the 2016 Information Security for South Africa, 2016

2015
Attributes Enhanced Role-Based Access Control Model.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Physical trust-based persistent authentication.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Continuous Context-Aware Device Comfort Evaluation Method.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Integrating Attributes into Role-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Security and Privacy in Video Surveillance: Requirements and Challenges.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Improving usability of passphrase authentication.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

The Importance of Trust in Computer Security.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

2013
Error-rate-based fusion of biometric experts.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Remote Biometrics for Robust Persistent Authentication.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Structured intuition: a new methodology to analyse authentication protocols.
Int. J. Crit. Comput. Based Syst., 2012

Collaborative trust evaluation for wiki security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Document and Author Promotion Strategies in the Secure Wiki Model.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Post-Session Authentication.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Towards Symbolic Encryption Schemes.
Proceedings of the Computer Security - ESORICS 2012, 2012

A Collaborative Approach to Botnet Protection.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Frontiers in Trust Management.
J. Internet Serv. Inf. Secur., 2011

Classification of Recommender Expertise in the Wikipedia Recommender System.
J. Inf. Process., 2011

Private-key Symbolic Encryption.
IACR Cryptol. ePrint Arch., 2011

Adaptable Authentication Model: Exploring Security with Weaker Attacker Models.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Demarcation of Security in Authentication Protocols.
Proceedings of the First SysSec Workshop 2011, 2011

2010
A Generic Role Based Access Control Model for Wind Power Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Supporting multi-agent reputation calculation in the Wikipedia Recommender System.
IET Inf. Secur., 2010

2009
A Mechanism for Identity Delegation at Authentication Level.
Proceedings of the Identity and Privacy in the Internet Age, 2009

WRS: The Wikipedia Recommender System.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Security in Wiki-Style Authoring Systems.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

2008
Reengineering the Wikipedia for Reputation.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics.
Proceedings of the SECRYPT 2008, 2008

2007
Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises.
Proceedings of the Trust Management, 2007

Integrity in Open Collaborative Authoring Systems.
Proceedings of the Trust Management, 2007

"End-by-Hop" Data Integrity.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

2006
Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06).
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Trust-Based Route Selection in Dynamic Source Routing.
Proceedings of the Trust Management, 4th International Conference, 2006

Program Partitioning Using Dynamic Trust Models.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
The Claim Tool Kit for ad hoc recognition of peer entities.
Sci. Comput. Program., 2005

Trust Evolution Policies for Security in Collaborative Ad Hoc Applications.
Proceedings of the First International Workshop on Security and Trust Management, 2005

Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK).
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Trust Transfer: Encouraging Self-recommendations Without Sybil Attack.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Trust enhanced ubiquitous payment without too much privacy loss.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Combating Spam with TEA.
Proceedings of the Second Annual Conference on Privacy, 2004

Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience.
Proceedings of the Second Annual Conference on Privacy, 2004

Trading Privacy for Trust.
Proceedings of the Trust Management, Second International Conference, 2004

2003
Using Trust for Secure Collaboration in Uncertain Environments.
IEEE Pervasive Comput., 2003

Privacy Recovery with Disposable Email Addresses.
IEEE Secur. Priv., 2003

End-to-End Trust Starts with Recognition.
Proceedings of the Security in Pervasive Computing, 2003

Cryptographic access control in a distributed file system.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Partial outsourcing: a new paradigm for access control.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

A Unified Security Framework for Networked Applications.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

P2P with JXTA-Java pipes.
Proceedings of the 2nd International Symposium on Principles and Practice of Programming in Java, 2003

Trust Propagation in Small Worlds.
Proceedings of the Trust Management, First International Conference, 2003

Risk Probability Estimating Based on Clustering.
Proceedings of the IEEE Systems, 2003

2002
PEM3 - The Policy Enhanced Memory Management Model.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2001
Capability File Names: Separating Authorisation From User Management in an Internet File System.
Proceedings of the 10th USENIX Security Symposium, 2001

Fingerprinting Text in Logical Markup Languages.
Proceedings of the Information Security, 4th International Conference, 2001

2000
CryptoCache: a secure sharable file cache for roaming users.
Proceedings of the 9th ACM SIGOPS European Workshop, 2000

Adaptability in CORBA: The Mobile Proxy Approach.
Proceedings of the International Symposium on Distributed Objects and Applications, 2000

1999
Un modèle de contrôle d'accès générique et sa réalisation dans la mémoire virtuelle répartie unique Arias. (A generic access contro model and its implementation in the single address space operating system Arias).
PhD thesis, 1999

1998
Protection wrappers: a simple and portable sandbox for untrusted applications.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

Mutual Suspicion in a Generic Object-Support System.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

ECOOP Workshop on Distributed Object Security.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Protection Reconfiguration for Reusable Software.
Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR '98), 1998


  Loading...