default search action
Martin Gilje Jaatun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j35]Guillaume Bour, Camillo Bosco, Rita Maria Ugarelli, Martin Gilje Jaatun:
Water-Tight IoT-Just Add Security. J. Cybersecur. Priv. 3(1): 76-94 (2023) - 2022
- [j34]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Guttorm Sindre:
Influencing the security prioritisation of an agile software development project. Comput. Secur. 118: 102744 (2022) - [j33]Chunming Rong, Jiahui Geng, Thomas J. Hacker, Haakon Bryhni, Martin Gilje Jaatun:
OpenIaC: open infrastructure as code - the network is my computer. J. Cloud Comput. 11: 12 (2022) - [j32]Tor Onshus, Lars Bodsberg, Stein Hauge, Martin Gilje Jaatun, Mary Ann Lundteigen, Thor Myklebust, Maria Vatshaug Ottermo, Stig Petersen, Egil Wille:
Security and Independence of Process Safety and Control Systems in the Petroleum Industry. J. Cybersecur. Priv. 2(1): 20-41 (2022) - [j31]Simon Vrhovec, Béla Genge, Martin Gilje Jaatun:
Guest Editorial: Special Issue on Interdisciplinary Cybersecurity. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 1-3 (2022) - [j30]Karin Bernsmed, Daniela Soares Cruzes, Martin Gilje Jaatun, Monica Iovan:
Adopting threat modelling in agile software development projects. J. Syst. Softw. 183: 111090 (2022) - 2021
- [j29]Ravishankar Borgaonkar, Inger Anne Tøndel, Merkebu Zenebe Degefa, Martin Gilje Jaatun:
Improving smart grid security through 5G enabled IoT and edge computing. Concurr. Comput. Pract. Exp. 33(18) (2021) - [j28]Joanna Kolodziej, Martin Gilje Jaatun:
Secure mobile cloud computing. Concurr. Comput. Pract. Exp. 33(18) (2021) - 2020
- [j27]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes:
IT Security Is From Mars, Software Security Is From Venus. IEEE Secur. Priv. 18(4): 48-54 (2020) - [j26]Martin Gilje Jaatun, Siani Pearson, Frederic Gittler, Ronald Leenes, Maartje G. H. Niezen:
Enhancing accountability in the cloud. Int. J. Inf. Manag. 53: 101498 (2020) - [j25]Inger Anne Tøndel, Martin Gilje Jaatun:
Towards a Conceptual Framework for Security Requirements Work in Agile Software Development. Int. J. Syst. Softw. Secur. Prot. 11(1): 33-62 (2020) - [j24]Pekka Abrahamsson, Goetz Botterweck, Hadi Ghanbari, Martin Gilje Jaatun, Petri Kettunen, Tommi J. Mikkonen, Anila Mjeda, Jürgen Münch, Anh Nguyen Duc, Barbara Russo, Xiaofeng Wang:
Towards a Secure DevOps Approach for Cyber-Physical Systems: An Industrial Perspective. Int. J. Syst. Softw. Secur. Prot. 11(2): 38-57 (2020) - 2019
- [j23]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie A. Williams:
Collaborative security risk estimation in agile software development. Inf. Comput. Secur. 27(4) (2019) - 2018
- [j22]Christian Frøystad, Inger Anne Tøndel, Martin Gilje Jaatun:
Security Incident Information Exchange for Cloud Service Provisioning Chains. Cryptogr. 2(4): 41 (2018) - [j21]Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Inger Anne Tøndel:
A Secure MANET Routing Protocol for Crisis Situations. Int. J. Syst. Softw. Secur. Prot. 9(4): 17-45 (2018) - [j20]Martin Gilje Jaatun, Inger Anne Tøndel, Nils Brede Moe, Daniela Soares Cruzes, Karin Bernsmed, Børge Haugset:
Accountability Requirements in the Cloud Provider Chain. Symmetry 10(4): 124 (2018) - 2017
- [j19]Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela Soares Cruzes:
A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams. Int. J. Secur. Softw. Eng. 8(1): 1-27 (2017) - [j18]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Nils Brede Moe:
Risk Centric Activities in Secure Software Development in Public Organisations. Int. J. Secur. Softw. Eng. 8(4): 1-30 (2017) - 2016
- [j17]Maria Bartnes Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations. Int. J. Crit. Infrastructure Prot. 12: 12-26 (2016) - 2014
- [j16]Inger Anne Tøndel, Maria B. Line, Martin Gilje Jaatun:
Information security incident management: Current practice as reported in the literature. Comput. Secur. 45: 42-57 (2014) - [j15]Per Håkon Meland, Karin Bernsmed, Martin Gilje Jaatun, Humberto Nicolás Castejón Martínez, Astrid Undheim:
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers. Int. J. Cloud Comput. 3(1): 69-93 (2014) - 2013
- [j14]Chunming Rong, Son Thanh Nguyen, Martin Gilje Jaatun:
Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1): 47-54 (2013) - [j13]Jostein Jensen, Martin Gilje Jaatun:
Federated Identity Management - We Built It; Why Won't They Come? IEEE Secur. Priv. 11(2): 34-41 (2013) - [j12]Joanna Kolodziej, Martin Gilje Jaatun, Samee Ullah Khan, Mario Koeppen:
"Security-Aware and Data Intensive Low-Cost Mobile Systems" Editorial. Mob. Networks Appl. 18(5): 591-593 (2013) - 2012
- [j11]Martin Gilje Jaatun, Gansen Zhao, Athanasios V. Vasilakos, Åsmund Ahlmann Nyre, Stian Alapnes, Yong Tang:
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing. J. Cloud Comput. 1: 13 (2012) - [j10]Aryan TaheriMonfared, Martin Gilje Jaatun:
Handling compromised components in an IaaS cloud installation. J. Cloud Comput. 1: 16 (2012) - [j9]Martin Gilje Jaatun, Costas Lambrinoudakis, Chunming Rong:
Special issue on security in cloud computing. J. Cloud Comput. 1: 17 (2012) - [j8]Gansen Zhao, Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes:
Reference deployment models for eliminating user concerns on cloud security. J. Supercomput. 61(2): 337-352 (2012) - 2011
- [j7]Jostein Jensen, Martin Gilje Jaatun:
Not Ready for Prime Time: A Survey on Security in Model Driven Development. Int. J. Secur. Softw. Eng. 2(4): 49-61 (2011) - 2010
- [j6]Torstein Nicolaysen, Richard Sasson, Maria B. Line, Martin Gilje Jaatun:
Agile Software Development: The Straight and Narrow Path to Secure Software? Int. J. Secur. Softw. Eng. 1(3): 71-85 (2010) - 2009
- [j5]Martin Gilje Jaatun, Jostein Jensen, Havard Vegge, Finn Michael Halvorsen, Rune Walso Nergard:
Fools Download Where Angels Fear to Tread. IEEE Secur. Priv. 7(2): 83-86 (2009) - [j4]Martin Gilje Jaatun, Maria B. Line, Tor Olav Grøtan:
Secure remote access to autonomous safety systems: A good practice approach. Int. J. Auton. Adapt. Commun. Syst. 2(3): 297-312 (2009) - [j3]Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel, Odd Helge Longva:
A framework for incident response management in the petroleum industry. Int. J. Crit. Infrastructure Prot. 2(1-2): 26-37 (2009) - 2008
- [j2]Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland:
Security Requirements for the Rest of Us: A Survey. IEEE Softw. 25(1): 20-27 (2008) - 2007
- [j1]Frans J. M. Panken, Gerard Hoekstra, Delphin Barankanira, John Charles Francis, Rico Schwendener, Ole Grøndalen, Martin Gilje Jaatun:
Extending 3G/WiMAX Networks and Services through Residential Access Capacity[Wireless Broadband Access]. IEEE Commun. Mag. 45(12): 62-69 (2007)
Conference and Workshop Papers
- 2024
- [c104]Karin Bernsmed, Martin Gilje Jaatun:
Security-by-design challenges for medical device manufacturers. EICC 2024: 155-160 - [c103]Steve Taylor, Martin Gilje Jaatun, Alan Mc Gibney, Robert Seidl, Pavlo Hrynchenko, Dmytro Prosvirin, Rosella Mancilla:
A Framework Addressing Challenges in Cybersecurity Testing of IoT Ecosystems and Components. IoTBDS 2024: 226-234 - [c102]Steve Taylor, Martin Gilje Jaatun, Karin Bernsmed, Christos Androutsos, Dietmar Frey, Simone Favrin, João Rodrigues, DusKo Milojevic, Dimitrios A. Karras, Ioannis Siachos, Gregory Epiphaniou, Nabil Moukafih, Sotiris Messinis, Ioannis Rallis, Nicholas E. Protonotarios, Paul Gedeon, Andres Castillo, Carsten Maple, Nikolaos Drivalos Matragkas, Rance J. DeLong, Theodoros N. Arvanitis, Konstantinos Katzis:
A Way Forward for the MDCG 2019-16 Medical Device Security Guidance. PETRA 2024 - [c101]Martin Gilje Jaatun, Jørn Foros, Maren Istad:
Identification of Cyber Threats and Vulnerabilities in Norwegian Distribution Networks. SEC 2024: 177-190 - 2023
- [c100]Martin Gilje Jaatun, Steve Taylor, Colin Upstill, Ariel Farkash, Salvador Garcia, Christos Androutsos:
NEMECYS: Addressing Challenges to Building Security Into Connected Medical Devices. CENTERIS/ProjMAN/HCist 2023: 1361-1368 - [c99]Lars Andreassen Jaatun, Silje Marie Sørlien, Ravishankar Borgaonkar, Steve Taylor, Martin Gilje Jaatun:
Software Bill of Materials in Critical Infrastructure. CloudCom 2023: 319-324 - [c98]Umit Cali, Ferhat Özgür Çatak, Zsolt György Balogh, Rita Maria Ugarelli, Martin Gilje Jaatun:
Cyber-physical Hardening of the Digital Water Infrastructure. EICC 2023: 181-188 - 2022
- [c97]Håkon Teppan, Lars Halvdan Flå, Martin Gilje Jaatun:
A Survey on Infrastructure-as-Code Solutions for Cloud Development. CloudCom 2022: 60-65 - [c96]Hanif Tadjik, Jiahui Geng, Martin Gilje Jaatun, Chunming Rong:
Blockchain Empowered and Self-sovereign Access Control System. CloudCom 2022: 74-82 - [c95]Knut Øien, Stein Hauge, Martin Gilje Jaatun, Lars Halvdan Flå, Lars Bodsberg:
A Survey on Cybersecurity Barrier Management in Process Control Environments. CloudCom 2022: 113-120 - [c94]Lars Andreassen Jaatun, Anders Ringen, Martin Gilje Jaatun:
Yet Another Blockchain-based Privacy-friendly Social Network. CloudCom 2022: 222-229 - [c93]Dennis Biström, Magnus Westerlund, Bob Duncan, Martin Gilje Jaatun:
Privacy and security challenges for autonomous agents : A study of two social humanoid service robots. CloudCom 2022: 230-237 - [c92]Chunming Rong, Jiahui Geng, Martin Gilje Jaatun:
Managing Digital Objects with Decentralised Identifiers based on NFT-like schema. CloudCom 2022: 246-251 - [c91]Andrea Neverdal Skytterholm, Martin Gilje Jaatun:
Exploring the Need for a CERT for the Norwegian Construction Sector. Cyber Science 2022: 57-73 - [c90]Gencer Erdogan, Inger Anne Tøndel, Shukun Tokas, Michele Garau, Martin Gilje Jaatun:
Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid. ICSOFT 2022: 21-32 - [c89]Gencer Erdogan, Iver Bakken Sperstad, Michele Garau, Oddbjørn Gjerde, Inger Anne Tøndel, Shukun Tokas, Martin Gilje Jaatun:
Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs. ICSOFT (Selected Papers) 2022: 98-121 - [c88]Sohrab Chalishhafshejani, Bao Khanh Pham, Martin Gilje Jaatun:
Automating Security in a Continuous Integration Pipeline. IoTBDS 2022: 231-238 - 2021
- [c87]Lars Bodsberg, Tor Olav Grøtan, Martin Gilje Jaatun, Irene Wærø:
HSE and Cyber Security in Remote Work. CyberSA 2021: 1-8 - [c86]Lars Halvdan Flå, Ravishankar Borgaonkar, Inger Anne Tøndel, Martin Gilje Jaatun:
Tool-assisted Threat Modeling for Smart Grid Cyber Security. CyberSA 2021: 1-8 - [c85]Martin Gilje Jaatun, Daniela Soares Cruzes:
Care and Feeding of Your Security Champion. CyberSA 2021: 1-7 - [c84]Jiahui Geng, Neel Kanwal, Martin Gilje Jaatun, Chunming Rong:
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities. EASE 2021: 329-335 - [c83]Mari Langås, Sanna Løfqvist, Basel Katt, Thomas Haugan, Martin Gilje Jaatun:
With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises. EICC 2021: 46-53 - [c82]Gunnar Brataas, Inger Anne Tøndel, Eivind Okstad, Ola Løkberg, Martin Gilje Jaatun, Geir Kjetil Hanssen, Thor Myklebust:
The Quality Triage Method: Quickly Identifying User Stories with Quality Risks. SA 2021: 1-7 - [c81]Racin Gudmestad, Siv Hilde Houmb, Martin Gilje Jaatun:
Saving Nine Without Stitching in Time: Integrity Check After-the-fact. SA 2021: 1-8 - 2020
- [c80]Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan, Marie Elisabeth Gaup Moe:
An Empirical Study of CERT Capacity in the North Sea. Cyber Security 2020: 1-8 - [c79]Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad:
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios. Cyber Security 2020: 1-8 - [c78]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun:
Achieving "Good Enough" Software Security: The Role of Objectivity. EASE 2020: 360-365 - [c77]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun:
Using Situational and Narrative Analysis for Investigating the Messiness of Software Security. ESEM 2020: 27:1-27:6 - [c76]Zhiming Zhao, Chunming Rong, Martin Gilje Jaatun:
A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud. ICPADS 2020: 617-624 - 2019
- [c75]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Kalle Rindell:
The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects. ARES 2019: 59:1-59:8 - [c74]Kalle Rindell, Karin Bernsmed, Martin Gilje Jaatun:
Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt. ARES 2019: 60:1-60:8 - [c73]Martin Gilje Jaatun:
Putting the "Account" into Cloud Accountability. CLOSER 2019: 9-18 - [c72]Martin Gilje Jaatun:
Architectural Risk Analysis in Agile Development of Cloud Software. CloudCom 2019: 295-300 - [c71]Magnus Westerlund, Martin Gilje Jaatun:
Tackling the Cloud Forensic Problem While Keeping Your Eye on the GDPR. CloudCom 2019: 418-423 - [c70]Chunlei Li, Chunming Rong, Martin Gilje Jaatun:
A Cost-efficient Protocol for Open Blockchains. Cyber Security 2019: 1-7 - [c69]Karin Bernsmed, Martin Gilje Jaatun:
Threat modelling and agile software development: Identified practice in four Norwegian organisations. Cyber Security 2019: 1-8 - [c68]Ravishankar Borgaonkar, Martin Gilje Jaatun:
5G as an Enabler for Secure IoT in the Smart Grid : Invited Paper. SA 2019: 1-7 - [c67]Karin Bernsmed, Martin Gilje Jaatun, Christian Frøystad:
Is a Smarter Grid Also Riskier? STM 2019: 36-52 - 2018
- [c66]Martin Gilje Jaatun:
Software Security Activities that Support Incident Management in Secure DevOps. ARES 2018: 8:1-8:6 - [c65]Daniela Soares Cruzes, Martin Gilje Jaatun, Karin Bernsmed, Inger Anne Tøndel:
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects. ASWEC 2018: 111-120 - [c64]Martin Gilje Jaatun, Marie Elisabeth Gaup Moe, Per Erik Nordbo:
Cyber Security Considerations for Self-healing Smart Grid Networks. Cyber Security 2018: 1-7 - [c63]Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd:
OWASP Top 10 - Do Startups Care? Cyber Security 2018: 1-8 - [c62]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela S. Cruzes, Tosin Daniel Oyetoyan:
Understanding Challenges to Adoption of the Protection Poker Software Security Game. CyberICPS/SECPRE@ESORICS 2018: 153-172 - [c61]Inger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela S. Cruzes:
Understanding challenges to adoption of the Microsoft elevation of privilege game. HotSoS 2018: 2:1-2:10 - [c60]Daniela S. Cruzes, Martin Gilje Jaatun, Tosin Daniel Oyetoyan:
Challenges and approaches of performing canonical action research in software security: research paper. HotSoS 2018: 8:1-8:11 - [c59]Martin Gilje Jaatun:
Guiding Lights for Cloud Accountability. HPCS 2018: 707-708 - [c58]Martin Gilje Jaatun, Daniela Soares Cruzes:
Session details: SecSE 2018: International workshop on secure software engineering in DevOps and agile development. XP Companion 2018 - 2017
- [c57]Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna:
DevOps for Better Software Security in the Cloud Invited Paper. ARES 2017: 69:1-69:6 - [c56]Martin Gilje Jaatun, Inger Anne Tøndel, Nils Brede Moe, Daniela Soares Cruzes, Karin Bernsmed, Børge Haugset:
Accountability Requirements for the Cloud. CloudCom 2017: 375-382 - 2016
- [c55]Martin Gilje Jaatun, Rainer Koelle:
Cyber Security Incident Management in the Aviation Domain. ARES 2016: 510-516 - [c54]Tosin Daniel Oyetoyan, Daniela Soares Cruzes, Martin Gilje Jaatun:
An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings. ARES 2016: 548-555 - [c53]Chunming Rong, Hongbing Cheng, Martin Gilje Jaatun:
Securing big data in the Cloud by protected mapping over multiple providers. DMIAF 2016: 166-171 - [c52]Ellen A. A. Jaatun, Martin Gilje Jaatun:
Advanced Healthcare Services Enabled by a Computerized Pain Body Map. EUSPN/ICTH 2016: 251-258 - [c51]Martin Gilje Jaatun, Maria Bartnes, Inger Anne Tøndel:
Zebras and Lions: Better Incident Handling Through Improved Cooperation. I4CS 2016: 129-139 - [c50]Christian Frøystad, Erlend Andreas Gjære, Inger Anne Tøndel, Martin Gilje Jaatun:
Security Incident Information Exchange for Cloud Services. IoTBD 2016: 391-398 - [c49]Martin Gilje Jaatun:
I'll Trust You - for Now. IoTBD 2016: 399-402 - [c48]Martin Gilje Jaatun, Inger Anne Tøndel:
Playing Protection Poker for Practical Software Security. PROFES 2016: 679-682 - 2015
- [c47]Martin Gilje Jaatun, Inger Anne Tøndel:
How Much Cloud Can You Handle? ARES 2015: 467-473 - [c46]Daniela S. Cruzes, Martin Gilje Jaatun:
Cloud Provider Transparency - A View from Cloud Customers. CLOSER 2015: 30-39 - [c45]Martin Gilje Jaatun, Daniela S. Cruzes, Julio Angulo, Simone Fischer-Hübner:
Accountability Through Transparency for Cloud Customers. CLOSER (Selected Papers) 2015: 38-57 - [c44]Alfredo Ramiro Reyes Zúñiga, Martin Gilje Jaatun:
Passing the Buck: Outsourcing Incident Response Management. CloudCom 2015: 503-508 - [c43]Bob Duncan, Mark Whittington, Martin Gilje Jaatun, Alfredo Ramiro Reyes Zúñiga:
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements? ES 2015: 19-39 - [c42]Martin Gilje Jaatun, Daniela S. Cruzes, Karin Bernsmed, Inger Anne Tøndel, Lillian Røstad:
Software Security Maturity in Public Organisations. ISC 2015: 120-138 - 2014
- [c41]Karin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære:
Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward. ARES 2014: 158-165 - [c40]Matias Krempel, Martin Gilje Jaatun:
Learn to SWIM. ARES 2014: 556-560 - [c39]Martin Gilje Jaatun, Siani Pearson, Frederic Gittler, Ronald Leenes:
Towards Strong Accountability for Cloud Service Providers. CloudCom 2014: 1001-1006 - [c38]Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Information Security Incident Management: Planning for Failure. IMF 2014: 47-61 - [c37]Martin Gilje Jaatun, Ellen A. A. Jaatun, Russell Moser:
Security Considerations for Tablet-based eHealth Applications. PAHI 2014: 27-36 - 2013
- [c36]Martin Gilje Jaatun, Inger Anne Tøndel, Geir M. Køien:
GPRS Security for Smart Meters. CD-ARES 2013: 195-207 - [c35]Inger Anne Tøndel, Bodil Aamnes Mostue, Martin Gilje Jaatun, Gerd H. Kjølle:
Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems. CD-ARES 2013: 240-255 - [c34]Åsmund Ahlmann Nyre, Martin Gilje Jaatun:
Seeking Risks: Towards a Quantitative Risk Perception Measure. CD-ARES 2013: 256-271 - [c33]Karin Bernsmed, Astrid Undheim, Per Håkon Meland, Martin Gilje Jaatun:
Towards an Ontology for Cloud Security Obligations. ARES 2013: 577-581 - [c32]Martin Gilje Jaatun, Tor Erlend Fægri:
Sink or SWIM: Information Security Requirements in the Sky. ARES 2013: 794-801 - 2012
- [c31]Martin Gilje Jaatun:
Hunting for Aardvarks: Can Software Security Be Measured? CD-ARES 2012: 85-92 - [c30]Martin Gilje Jaatun, Karin Bernsmed, Astrid Undheim:
Security SLAs - An Idea Whose Time Has Come? CD-ARES 2012: 123-130 - [c29]Åsmund Ahlmann Nyre, Martin Gilje Jaatun:
Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry Perspective. CD-ARES 2012: 317-331 - [c28]Per Håkon Meland, Karin Bernsmed, Martin Gilje Jaatun, Astrid Undheim, Humberto Nicolás Castejón Martínez:
Expressing Cloud Security Requirements in Deontic Contract Languages. CLOSER 2012: 638-646 - [c27]Karin Bernsmed, Martin Gilje Jaatun, Per Håkon Meland, Astrid Undheim:
Thunder in the Clouds: Security challenges and solutions for federated Clouds. CloudCom 2012: 113-120 - [c26]Siani Pearson, Vasilios Tountopoulos, Daniele Catteddu, Mario Südholt, Refik Molva, Christoph Reich, Simone Fischer-Hübner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong, Javier López:
Accountability for cloud and other future Internet services. CloudCom 2012: 629-632 - [c25]Inger Anne Tøndel, Martin Gilje Jaatun, Maria Bartnes Line:
Threat Modeling of AMI. CRITIS 2012: 264-275 - [c24]Åsmund Ahlmann Nyre, Martin Gilje Jaatun:
On the Adoption of Usage Control Technology in Collaborative Environments. IICS 2012: 142-153 - [c23]Martin Gilje Jaatun, Christian Askeland, Anders Salvesen:
Drizzle: The RAIN Prototype. IICS 2012: 165-176 - 2011
- [c22]Karin Bernsmed, Martin Gilje Jaatun, Per Håkon Meland, Astrid Undheim:
Security SLAs for Federated Cloud Services. ARES 2011: 202-209 - [c21]Jostein Jensen, Martin Gilje Jaatun:
Security in Model Driven Development: A Survey. ARES 2011: 704-709 - [c20]Karin Bernsmed, Martin Gilje Jaatun, Astrid Undheim:
Security in Service Level Agreements for Cloud Computing. CLOSER 2011: 636-642 - [c19]Martin Gilje Jaatun, Gansen Zhao, Stian Alapnes:
A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages. CloudCom 2011: 172-179 - [c18]Aryan TaheriMonfared, Martin Gilje Jaatun:
As Strong as the Weakest Link: Handling Compromised Components in OpenStack. CloudCom 2011: 189-196 - [c17]Aryan TaheriMonfared, Martin Gilje Jaatun:
Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments. CloudCom 2011: 772-777 - [c16]Anne Gabrielle Bowitz, Espen Grannes Graarud, Lawrie Brown, Martin Gilje Jaatun:
BatCave: Adding security to the BATMAN protocol. ICDIM 2011: 199-204 - [c15]Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Cyber security challenges in Smart Grids. ISGT Europe 2011: 1-8 - 2010
- [c14]Richard Sasson, Martin Gilje Jaatun, Jostein Jensen:
The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development. ARES 2010: 501-506 - [c13]Ying Qian, Yulin Fang, Martin Gilje Jaatun, Stig Ole Johnsen, Jose J. Gonzalez:
Managing Emerging Information Security Risks during Transitions to Integrated Operations. HICSS 2010: 1-11 - [c12]Gansen Zhao, Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes:
Deployment models: Towards eliminating security concerns from cloud computing. HPCS 2010: 189-195 - 2009
- [c11]Jostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Herbjørn Andresen:
Reusable Security Requirements for Healthcare Applications. ARES 2009: 380-385 - [c10]Åsmund Ahlmann Nyre, Martin Gilje Jaatun:
Privacy in a Semantic Cloud: What's Trust Got to Do with It? CloudCom 2009: 107-118 - 2008
- [c9]Martin Gilje Jaatun, Inger Anne Tøndel:
Covering Your Assets in Software Engineering. ARES 2008: 1172-1179 - [c8]Martin Gilje Jaatun, Tor Olav Grøtan, Maria B. Line:
Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations. ATC 2008: 121-133 - [c7]Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel:
A Study of Information Security Practice in a Critical Infrastructure Application. ATC 2008: 527-539 - [c6]Maria B. Line, Eirik Albrechtsen, Martin Gilje Jaatun, Inger Anne Tøndel, Stig Ole Johnsen, Odd Helge Longva, Irene Wærø:
A Structured Approach to Incident Response Management in the Oil and Gas Industry. CRITIS 2008: 235-246 - [c5]Inger Anne Tøndel, Martin Gilje Jaatun, Jostein Jensen:
Learning from Software Security Testing. ICST Workshops 2008: 286-294 - [c4]Maria B. Line, Martin Gilje Jaatun, Zi Bin Cheah, A. B. M. Omar Faruk, Håvard Husevåg Garnes, Petter Wedum:
Penetration Testing of OPC as Part of Process Control Systems. UIC 2008: 271-283 - [c3]Jan Tore Sørensen, Martin Gilje Jaatun:
An Analysis of the Manufacturing Messaging Specification Protocol. UIC 2008: 602-615 - 2007
- [c2]Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Jan Tore Sørensen:
Survival by Deception. SAFECOMP 2007: 197-208 - 2006
- [c1]Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton:
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. SEC 2006: 389-400
Editorship
- 2023
- [e7]Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier J. A. Bellekens, Hanan Hindy, Martin Gilje Jaatun:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Cyber Science 2022, Wales, UK, June 20-21, 2022. Springer Proceedings in Complexity, Springer 2023, ISBN 978-981-19-6414-5 [contents] - 2021
- [e6]Martin Gilje Jaatun, Geir M. Køien, Oksana Kulyk:
EICC '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021. ACM 2021, ISBN 978-1-4503-9049-1 [contents] - 2017
- [e5]Martin Gilje Jaatun, Daniela Soares Cruzes:
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, September 14, 2017. CEUR Workshop Proceedings 1977, CEUR-WS.org 2017 [contents] - 2016
- [e4]Grant P. Cumming, Tara French, Heidi Gilstad, Martin Gilje Jaatun, Ellen A. A. Jaatun:
Proceedings of the 3rd European Workshop on Practical Aspects of Health Informatics, PAHI 2015, Elgin, Scotland, UK, October 27, 2015. CEUR Workshop Proceedings 1574, CEUR-WS.org 2016 [contents] - 2014
- [e3]Ellen A. A. Jaatun, Elizabeth Brooks, Kirsti Elisabeth Berntsen, Heidi Gilstad, Martin Gilje Jaatun:
Proceedings of the 2nd European Workshop on Practical Aspects of Health Informatics, Trondheim, Norway, May 19-20 , 2014. CEUR Workshop Proceedings 1251, CEUR-WS.org 2014 [contents] - 2009
- [e2]Martin Gilje Jaatun, Gansen Zhao, Chunming Rong:
Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings. Lecture Notes in Computer Science 5931, Springer 2009, ISBN 978-3-642-10664-4 [contents] - 2008
- [e1]Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang, Jianhua Ma:
Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings. Lecture Notes in Computer Science 5060, Springer 2008, ISBN 978-3-540-69294-2 [contents]
Informal and Other Publications
- 2021
- [i1]Jiahui Geng, Neel Kanwal, Martin Gilje Jaatun, Chunming Rong:
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities. CoRR abs/2105.08671 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint