• QoE Analysis of the Setup of Different Internet Services for FIFO Server Systems 

      Hoßfeld, Tobias; Varela, Martin; Heegaard, Poul Einar; Skorin-Kapov, Lea (Journal article; Peer reviewed, 2018)
      Queueing systems following a first-in-first-out (FIFO) strategy are well understood and various results are known for the response time of the system. However, the question arises how the results look like when taking into ...
    • Saliency-based Image Object Indexing and Retrieval 

      Lam, Yat Hong; Yildirim, Sule (Journal article; Peer reviewed, 2018)
      We suggest a novel approach to combine visual saliency model and object recognition to provide a more semantic description of an image based on human attention priority. The idea is to index and retrieve semantically more ...
    • Security notions for cloud storage and deduplication 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen (Journal article; Peer reviewed, 2018)
      Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required ...
    • Security Requirements for the Deployment of Services Across Tactical SOA 

      Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2017)
      Service Oriented Architectures (SOA) have been identified as a suitable mediator towards the attainment of the requirements imposed by modern warfare. Earlier studies focused primarily on the strategic domain, or the ...
    • Social Preferences in Decision Making Under Cybersecurity Risks and Uncertainties 

      Kianpour, Mazaher; Øverby, Harald; Kowalski, Stewart James; Frantz, Christopher (Peer reviewed; Journal article, 2019)
      The most costly cybersecurity incidents for organizations result from the failures of their third parties. This means that organizations should not only invest in their own protection and cybersecurity measures, but also ...
    • Split payments in payment networks 

      Piatkivskyi, Dmytro; Nowostawski, Mariusz (Journal article; Peer reviewed, 2018)
      Traditional blockchain systems, such as Bitcoin, focus on transactions in which entire amount is transferred from one owner to the other, in a single, atomic operation. This model has been re-used in the context of payment ...
    • Strong Authentication for Web services with Mobile Universal Identity 

      Do, Van Thanh; Ivar, Jørstad; Do, Van Thuan (Journal article, 2015)
      To access services on the Web, users need quite often to have accounts, i.e. user names and passwords. This becomes a problem when the number of accounts keeps increasing at the same time password is a very weak form of ...
    • Survival by Deception 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Sørensen, Jan Tore (Journal article; Peer reviewed, 2007)
      A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. ...
    • Synthesizing Components with Sessions from Collaboration-Oriented Service Specifications 

      Kraemer, Frank Alexander; Bræk, Rolv; Herrmann, Peter Michael (Journal article; Peer reviewed, 2007)
      A fundamental problem in the area of service engineering is the so-called cross-cutting nature of services, i.e., that service behavior results from a collaboration of partial component behaviors. We present an approach ...
    • Towards new privacy regulations in europe: Users' privacy perception in recommender systems 

      Mohallick, Itishree; De Moor, Katrien; Özgöbek, Özlem; Gulla, Jon Atle (Journal article; Peer reviewed, 2018)
      Despite the fact that recommender systems are becoming increasingly popular in every aspect of the web, users might hesitate to use these personalization-based services in return of their personal information if they believe ...
    • Valuable Puzzles for Proofs-of-Work 

      Boyd, Colin Alexander; Carr, Christopher (Journal article; Peer reviewed, 2018)
      Proof-of-work (PoW) is used as the consensus mechanism in most cryptocurrencies. PoW-based puzzles play an important part in the operation and security of a cryptocurrency, but come at a considerable energy cost. One ...