Using trust for secure collaboration in uncertain environments V Cahill, E Gray, JM Seigneur, CD Jensen, Y Chen, B Shand, N Dimmock, ... IEEE pervasive computing 2 (3), 52-61, 2003 | 496 | 2003 |
Trust propagation in small worlds E Gray, JM Seigneur, Y Chen, C Jensen Trust Management: First International Conference, iTrust 2003 Heraklion …, 2003 | 166 | 2003 |
Cryptographic access control in a distributed file system A Harrington, C Jensen Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 145 | 2003 |
Trading privacy for trust JM Seigneur, CD Jensen International Conference on Trust Management, 93-107, 2004 | 142 | 2004 |
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. SJ Engberg, MB Harning, CD Jensen PST, 89-101, 2004 | 127 | 2004 |
The application of software defined networking on securing computer networks: A survey R Sahay, W Meng, CD Jensen Journal of Network and Computer Applications 131, 89-108, 2019 | 95 | 2019 |
Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of J Vitek, C Jensen Lecture Notes in Computer Science, 0 | 70* | |
Attributes enhanced role-based access control model QM Rajpoot, CD Jensen, R Krishnan Trust, Privacy and Security in Digital Business: 12th International …, 2015 | 67 | 2015 |
End-to-end trust starts with recognition JM Seigneur, S Farrell, CD Jensen, E Gray, Y Chen Security in Pervasive Computing: First International Conference, Boppard …, 2004 | 65 | 2004 |
A systematic review of cyber-resilience assessment frameworks DAS Estay, R Sahay, MB Barfod, CD Jensen Computers & security 97, 101996, 2020 | 59 | 2020 |
Video surveillance: Privacy issues and legal compliance QM Rajpoot, CD Jensen Biometrics: Concepts, Methodologies, Tools, and Applications, 1335-1358, 2017 | 58 | 2017 |
Integrating attributes into role-based access control QM Rajpoot, CD Jensen, R Krishnan Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 58 | 2015 |
Towards a framework for assessing trust-based admission control in collaborative ad hoc applications E Gray, P O’Connell, C Jensen, S Weber, JM Seigneur, C Yong Dept. of Computer Science, Trinity College Dublin, Technical Report 66, 2002 | 54 | 2002 |
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships R Sahay, W Meng, DAS Estay, CD Jensen, MB Barfod Future Generation Computer Systems 100, 736-750, 2019 | 48 | 2019 |
P2P with JXTA-Java pipes JM Seigneur, G Biegel, CD Jensen Proceedings of the 2nd international conference on Principles and practice …, 2003 | 48 | 2003 |
Security and privacy in video surveillance: requirements and challenges QM Rajpoot, CD Jensen IFIP international information security conference, 169-184, 2014 | 47 | 2014 |
Trust enhanced ubiquitous payment without too much privacy loss JM Seigneur, CD Jensen Proceedings of the 2004 ACM symposium on Applied computing, 1593-1599, 2004 | 47 | 2004 |
Trust-based route selection in dynamic source routing CD Jensen, PO Connell International conference on trust management, 150-163, 2006 | 46 | 2006 |
Privacy recovery with disposable email addresses JM Seigneur, CD Jensen IEEE Security & Privacy 1 (6), 35-39, 2003 | 42 | 2003 |
Trust transfer: Encouraging self-recommendations without sybil attack JM Seigneur, A Gray, CD Jensen Trust Management: Third International Conference, iTrust 2005, Paris, France …, 2005 | 38 | 2005 |