Federated identity management challenges J Jensen 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 72 | 2012 |
Combining misuse cases with attack trees and security activity models IA Tøndel, J Jensen, L Røstad 2010 International Conference on Availability, Reliability and Security, 438-445, 2010 | 71 | 2010 |
Secure software design in practice PH Meland, J Jensen 2008 Third International Conference on Availability, Reliability and …, 2008 | 53 | 2008 |
Reusable security requirements for healthcare applications J Jensen, IA Tøndel, MG Jaatun, PH Meland, H Andresen 2009 International conference on availability, Reliability and Security, 380-385, 2009 | 35 | 2009 |
Security in model driven development: A survey J Jensen, MG Jaatun 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 33 | 2011 |
Benefits of federated identity management-A survey from an integrated operations viewpoint J Jensen International Conference on Availability, Reliability, and Security, 1-12, 2011 | 31 | 2011 |
An architectural foundation for security model sharing and reuse PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tøndel 2009 International Conference on Availability, Reliability and Security, 823-828, 2009 | 25 | 2009 |
Federated Identity Management - We Built it; Why Won't They Come? J Jensen, M Jaatun IEEE Security & Privacy 11 (2), 34 - 41, 2013 | 24 | 2013 |
Idea: reusability of threat models–two approaches with an experimental evaluation PH Meland, IA Tøndel, J Jensen International Symposium on Engineering Secure Software and Systems, 114-122, 2010 | 21 | 2010 |
Where only fools dare to tread: An empirical study on the prevalence of zero-day malware H Vegge, FM Halvorsen, RW Nergård, MG Jaatun, J Jensen 2009 Fourth International Conference on Internet Monitoring and Protection …, 2009 | 17 | 2009 |
Learning from software security testing IA Tøndel, MG Jaatun, J Jensen 2008 IEEE International Conference on Software Testing Verification and …, 2008 | 17 | 2008 |
Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks J Jensen Information and Communication Technology-EurAsia Conference, 343-352, 2013 | 7 | 2013 |
Fools download where angels fear to tread MG Jaatun, J Jensen, H Vegge, FM Halvorsen, RW Nergard IEEE Security & Privacy 7 (2), 83-86, 2009 | 7 | 2009 |
Experimental threat model reuse with misuse case diagrams J Jensen, IA Tøndel, PH Meland Information and Communications Security: 12th International Conference …, 2010 | 6 | 2010 |
A novel testbed for detection of malicious software functionality J Jensen 2008 Third International Conference on Availability, Reliability and …, 2008 | 6 | 2008 |
Federated Identity Management and Usage Control-Obstacles to Industry Adoption J Jensen, ÅA Nyre 2013 International Conference on Availability, Reliability and Security, 31-41, 2013 | 5 | 2013 |
Soa security–an experience report J Jensen, ÅA Nyre Proceedings of the Norwegian Information Security Conference (NISK …, 2009 | 5 | 2009 |
Not ready for prime time: A survey on security in model driven development J Jensen, MG Jaatun International Journal of Secure Software Engineering (IJSSE) 2 (4), 49-61, 2011 | 4 | 2011 |
The road to Hell is paved with good intentions: A story of (in) secure software development R Sasson, MG Jaatun, J Jensen 2010 International Conference on Availability, Reliability and Security, 501-506, 2010 | 4 | 2010 |
A lightweight approach to secure software engineering MG Jaatun, J Jensen, PH Meland, IA Tøndel A Multidisciplinary Introduction to Information Security, 183, 2011 | 3 | 2011 |