Follow
Jostein Jensen
Jostein Jensen
Unknown affiliation
Verified email at ippsen.com
Title
Cited by
Cited by
Year
Federated identity management challenges
J Jensen
2012 Seventh International Conference on Availability, Reliability and …, 2012
722012
Combining misuse cases with attack trees and security activity models
IA Tøndel, J Jensen, L Røstad
2010 International Conference on Availability, Reliability and Security, 438-445, 2010
692010
Secure software design in practice
PH Meland, J Jensen
2008 Third International Conference on Availability, Reliability and …, 2008
532008
Reusable security requirements for healthcare applications
J Jensen, IA Tøndel, MG Jaatun, PH Meland, H Andresen
2009 International conference on availability, Reliability and Security, 380-385, 2009
352009
Security in model driven development: A survey
J Jensen, MG Jaatun
2011 Sixth International Conference on Availability, Reliability and …, 2011
332011
Benefits of federated identity management-A survey from an integrated operations viewpoint
J Jensen
International Conference on Availability, Reliability, and Security, 1-12, 2011
312011
An architectural foundation for security model sharing and reuse
PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tøndel
2009 International Conference on Availability, Reliability and Security, 823-828, 2009
252009
Federated Identity Management - We Built it; Why Won't They Come?
J Jensen, M Jaatun
IEEE Security & Privacy 11 (2), 34 - 41, 2013
242013
Idea: reusability of threat models–two approaches with an experimental evaluation
PH Meland, IA Tøndel, J Jensen
International Symposium on Engineering Secure Software and Systems, 114-122, 2010
202010
Learning from software security testing
IA Tøndel, MG Jaatun, J Jensen
2008 IEEE International Conference on Software Testing Verification and …, 2008
172008
Where only fools dare to tread: An empirical study on the prevalence of zero-day malware
H Vegge, FM Halvorsen, RW Nergård, MG Jaatun, J Jensen
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
162009
Fools download where angels fear to tread
MG Jaatun, J Jensen, H Vegge, FM Halvorsen, RW Nergard
IEEE Security & Privacy 7 (2), 83-86, 2009
72009
Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks
J Jensen
Information and Communication Technology-EurAsia Conference, 343-352, 2013
62013
Experimental threat model reuse with misuse case diagrams
J Jensen, IA Tøndel, PH Meland
Information and Communications Security: 12th International Conference …, 2010
62010
A novel testbed for detection of malicious software functionality
J Jensen
2008 Third International Conference on Availability, Reliability and …, 2008
62008
Federated Identity Management and Usage Control-Obstacles to Industry Adoption
J Jensen, ÅA Nyre
2013 International Conference on Availability, Reliability and Security, 31-41, 2013
52013
Soa security–an experience report
J Jensen, ÅA Nyre
Proceedings of the Norwegian Information Security Conference (NISK …, 2009
52009
Not ready for prime time: A survey on security in model driven development
J Jensen, MG Jaatun
International Journal of Secure Software Engineering (IJSSE) 2 (4), 49-61, 2011
42011
The road to Hell is paved with good intentions: A story of (in) secure software development
R Sasson, MG Jaatun, J Jensen
2010 International Conference on Availability, Reliability and Security, 501-506, 2010
42010
A lightweight approach to secure software engineering
MG Jaatun, J Jensen, PH Meland, IA Tøndel
A Multidisciplinary Introduction to Information Security, 183, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20