• A Farewell to Trust: An Approach to Confidentiality Control in the Cloud 

      JAATUN, Martin Gilje; Nyre, Åsmund Ahlmann; Alapnes, Stian; Zhao, Gansen (Chapter, 2011)
      This paper applies a divide-and-conquer approach to achieve confidentiality control in Cloud Computing. We sketch how a Redundant Array of Independent Net-storages (RAIN) for Cloud Computing can be designed using techniques ...
    • A secure MANET routing protocol for first responders 

      Nyre, Åsmund Ahlmann; JAATUN, Martin Gilje; Tøndel, Inger Anne (Chapter, 2011)
      Emergency and rescue operations are often carried out in areas where the network infrastructure cannot be relied on for message exchange between first responders. Since the fundamental feature of Mobile Ad Hoc Network is ...
    • A server-side approach to privacy policy matching 

      Nyre, Åsmund Ahlmann; Bernsmed, Karin; Bø, Solvår; Pedersen, Stian (Chapter, 2011)
      With the increasing use of online services that require sharing of information there is a need for Privacy Enhancing Technology tailored for personal information con- trol. Commonly, web privacy is handled through matching ...
    • A survey on security in Mobile Ad Hoc Networks 

      Nyre, Åsmund Ahlmann (Chapter, 2011)
      Mobile ad hoc networks (MANETs) has for several years been viewed as a promising technology for several application areas where fixed infrastructure is either unreliable or non-existent. Although the technology has been ...
    • Controlled Sharing of Personal Information in Android 

      Bø, Solvår; Pedersen, Stian; Nyre, Åsmund Ahlmann; Bernsmed, Karin (Journal article; Peer reviewed, 2011)
      Smartphones with third-party applications have become very popular. Recently, they have received attention for quietly monitoring and transferring personal information without the users’ knowledge. The objective of this ...
    • Deliverance from Trust through a Redundant Array of Independent Net-storages in Cloud Computing 

      Zhao, Gansen; JAATUN, Martin Gilje; Vasilakos, Athanasios; Nyre, Åsmund Ahlmann; Alapnes, Stian; Yue, Qiang; Tang, Yong (Chapter, 2011)
      Cloud storage services are gaining more and more attention. Surveys suggest that the confidentiality issue is one of the major obstacles for users to use cloud storage services to keep sensitive data. This paper proposes ...
    • Learning Privacy Preferences 

      Tøndel, Inger Anne; Nyre, Åsmund Ahlmann; Bernsmed, Karin (Chapter, 2011)
      This paper suggests a machine learning approach to preference generation in the context of privacy agents. With this solution, users are relieved from the complex task of specifying their preferences beforehand, disconnected ...
    • Security Requirements for MANETs Used in Emergency and Rescue Operations 

      Tøndel, Inger Anne; JAATUN, Martin Gilje; Nyre, Åsmund Ahlmann (Chapter, 2011)
      Ad hoc networks for first responders in emergency situations have some unique characteristics that differ from general ad hoc networks, since it is desirable to restrict who can participate in the network without relying ...
    • Survival by Deception 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Sørensen, Jan Tore (Journal article; Peer reviewed, 2007)
      A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. ...
    • Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies 

      Tøndel, Inger Anne; Nyre, Åsmund Ahlmann (Journal article; Peer reviewed, 2012)
      Current approaches to privacy policy comparison use strict evaluation criteria (e.g. user preferences) and are unable to state how close a given policy is to fulfil these criteria. More flexible approaches for policy ...
    • User agents for matching privacy policies with user preferences 

      Bernsmed, Karin; Nyre, Åsmund Ahlmann; JAATUN, Martin Gilje (Chapter, 2011)
      Privacy policies are commonly used by service providers to state how personal data obtained from users will be handled. However, the complexity and sheer length of such policies make them incomprehensible to the common web ...