
Chief Research Scientist
Habtamu Abie
- Department Applied research in information and communication technology
- Phone number +47 22 85 25 95
- E-mail abie@nr.no
Dr. Habtamu Abie is currently chief research scientist at the Norwegian Computing Centre. Previously senior engineer and research scientist at Telenor Research and Development (1997-1999), scientific associate and fellow at CERN (European Organization for Nuclear Research), Geneva, Switzerland (1989-1993). Researcher at ABB Corporate Research, software development engineer at Nera-AS, Billingstad, Norway, and Alcatel Telecom Norway AS, Oslo, Norway (1994-1997). Received Engineering Diploma in Electrical Data Processing from Gjøvik Engineering College, and B.Sc., M.Sc. and Ph.D. degrees in Computer Science from the University of Oslo. Member of EURASC (European Academy of Sciences). IEEE Senior Member. Fellow of AAIA.
Other CVs
Research Interests
- Adaptive and Evolving Security, Cyber Security, 5G-IoT, machine learning
- AI for security, Cognitive IoT security, Game theory, evolving algorithms
- Security for distributed systems, distributed object computing
- Digital Rights Management, Privacy, Trust, Policy and Risk Management
- Context-awareness, Mobile ad-hoc network, ubiquitous and ambient intelligent computing
Education
- 1988 – Cand. Scient, Digital Technique, University of Oslo
- 2005 – Dr. Scient, Informatics, University of Oslo
Work experience
- 2016- Chief Research Scientist, Norwegian Computing Center, Norway
- 2000-2016 Senior Research Scientist, Norwegian Computing Center, Norway
- 1998-1999 Research Scientist, Telenor R&D, Security Group, Oslo, Norway
- 1997-1998 Senior Engineer, Telenor R&D, Oslo, Norway
- 1996-1997 Software Development Engineer, Alcatel Telecom Norway A/S
- 1994-1996 Researcher, ABB Corporate Research and NERA AS Division Satcom, Norway
- 1991-1993 Scientific Fellow, CERN PS/PO /CO, Geneva, Switzerland
- 1989-1990 Scientific Associate, CERN/DELPHI, Geneva, Switzerland, FYS/UIO
Scientific Activities
- 22+ journal articles
- 4 books
- 80 book chapters and scientific presentation at international conferences
- Supervision of PhD students: 4 candidates
Chaired and Co-chaired
- Cloud Security forum at IEEE ICC 2012 Industry Forums, Ottawa, Canada
- EAI BodyNets-SeTTIT 2012 Workshop, Oslo Norway
- ACM UbiComp-ASPI 2013 Workshop, Zurich, Switzerland
- IEEE WiMob 2016 UCSA Symposium, New York, USA
- MeSSa 2014, Vienna, Austria, MeSSa 2016, Copenhagen, Denmark, MeSSa 2017, Canterbury, United Kingdom, MeSSa 2018, Madrid, Spain, DeMeSSA 2019, Paris, France
- Special Session on Cyber Security in Healthcare at IEEE ISMICT 2019, Oslo Norway
- FINSEC 2019 in conjunction with ESORICS 2019, Luxembourg, CPS4CIP 2020 in conjunction with ESORICS 2020, Guildford, UK, CPS4CIP 20201 in conjunction with ESORICS 2021, Darmstadt, Germany on October 04–08, 2021
- First ECSCI (European Cluster for Securing Critical Infrastructure) Workshop on Critical Infrastructure Protection, Virtual on Google Meet conference room, 24-25 June 2020
- 1st Workshop on Cybersecurity in Healthcare 4.0 (SecHealth 2021) in conjunction with the Int. Conference on Availability, Reliability and Security (ARES 2021)
Projects

- Digital security and privacy
Testbed for Critical Infrastructure Protection

- Information and communication technology
- Digital security and privacy
A framework for decentralised identity and consent management

- Information and communication technology
- Digital security and privacy
Developing a national framework for data management and AI in remote care

- Digital security and privacy
Adaptive health data in blockchain technology

- Digital security and privacy
- Earth observation
- Explainable Artificial Intelligence
Trustworthy and sustainable AI (ENFIELD)
Publications
- 286 publications found
- Publisher
Dynamic Safety and Security Risk Assessment in Healthcare and Critical Infrastructures Communications in Computer and Information Science (CCIS), vol. 2404, pp. 23 42 , (ISSN 1865-0929 1865-0937 ), doi: https://doi.org/10.1007/978-3-031-85558-0_2 , 2025. Scientific article
Preface - Secure and Resilient Digital Transformation of Healthcare pp. 1 3 , doi: https://doi.org/10.1007/978-3-031-85558-0 , 2025. Introduction
Habtamu Abie; Vasileios Gkioulos; Sokratis Katsikas; Sandeep Pirbhulal; Secure and Resilient Digital Transformation of Healthcare: Second International Workshop, SUNRISE 2024, Bergen, Norway, November 25, 2024, Proceedings (ISSN 9783031855580 ), 2025. Scientific anthology / conference series
An Architecture of Adaptive Cognitive Digital Twins for Resilient Healthcare Infrastructures and Services Communications in Computer and Information Science (CCIS), (ISSN 1865-0929 1865-0937 ), 2025. Scientific article
AI/ML for 5G and Beyond Cybersecurity arXiv.org, (ISSN 2331-8422 ), doi: https://doi.org/10.48550/arXiv.2505.18402 , 2025. Scientific article
Webinar on Adaptive AI for Pioneering Secure Healthcare Innovation 2025. Scientific lecture
AD-5GIoT: AI-based Anomaly Detection System for 5G-IoT Networks 2025. Scientific lecture
Habtamu Abie; Vasileios Gkioulos; Sokratis Katsikas; Sandeep Pirbhulal; Secure and Resilient Digital Transformation of Healthcare, First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings (ISSN 9783031558283 ), doi: https://doi.org/10.1007/978-3-031-55829-0 , 2024. Scientific anthology / conference series
Sokratis Katsikas; Habtamu Abie; Naoto Yanai; Basel Katt; Sandeep Pirbhulal; Ankur Shukla; Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II (ISSN 9783031541285 ), 2024. Scientific anthology / conference series
Habtamu Abie; Secure and Resilient Digital Transformation of Healthcare doi: https://doi.org/10.1007/978-3-031-55829-0 , 2024. Scientific chapter / article / conference article
Preface - Secure and Resilient Digital Transformation of Healthcare Communications in Computer and Information Science (CCIS), vol. 1884, (ISSN 1865-0929 1865-0937 ), doi: https://doi.org/10.1007/978-3-031-55829-0 , 2024. Editorial
IoT cybersecurity in 5G and beyond: a systematic literature review International Journal of Information Security, pp. 2827 2827 , (ISSN 1615-5262 1615-5270 ), doi: https://doi.org/10.1007/s10207-024-00865-5 , 2024. Scientific article
Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications pp. 153 163 , doi: https://doi.org/10.1007/978-3-031-61382-1_10 , 2024. Scientific chapter / article / conference article
Autonomous Adaptive Security Framework for 5G-Enabled IoT arXiv.org, (ISSN 2331-8422 ), doi: https://doi.org/10.48550/arXiv.2406.03186 , 2024. Scientific article
Enablers of digital trust, security and safety in critical sectors 2024. Scientific lecture
SFI NORCICS NESIOT (Norwegian Ecosystem for Secure IT-OT Integration) Introduction 2024. Scientific lecture
CybAlliance WP2 Annual Mobility Report 2024 , 2024. Report
CybAlliance WP2 Annual Open Seminar Report 2024 , 2024. Report
Computer Security. ESORICS 2023 International Workshops. CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II (ISSN 9783031541285 ), doi: https://doi.org/10.1007/978-3-031-54129-2 , 2024. Scientific anthology / conference series
Secure and Resilient Digital Transformation of Healthcare. First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings (ISSN 9783031558283 ), doi: https://doi.org/10.1007/978-3-031-55829-0 , 2024. Scientific anthology / conference series
Ensuring Security Continuum from Edge to Cloud: Adaptive Security for IoT-based Critical Infrastructures using FL at the Edge pp. 4921 4929 , doi: https://doi.org/10.1109/BigData62323.2024.10825993 , 2024. Scientific chapter / article / conference article
SFI-NORCICS Norwegian Ecosystem for Secure IT-OT Integration (NESIOT) Kick-off 2023. Scientific lecture
Habtamu Abie; Aleksandar Jovanović; Rita Maria Ugarelli; Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience (ISSN 9783956632853 ), , 2023. Scientific anthology / conference series
The ECSCI Cluster Achievements pp. 18 20 , , 2023. Introduction
A Cognitive Digital Twin Architecture for Cybersecurity in IoT-Based Smart Homes Lecture Notes in Electrical Engineering, vol. 1035, pp. 63 70 , (ISSN 1876-1100 1876-1119 ), doi: https://doi.org/10.1007/978-3-031-29871-4_8 , 2023. Scientific article
EU-CIP: European Knowledge Hub and Policy Testbed for Critical Infrastructure Protection Proceedings of the Research and Innovation Symposium for European SECURITY and Defense – RISE-SD Conferences, pp. 130 133 , (ISSN 2945-1183 ), 2023. Article journal
ECSCI: European Cluster for Securing Critical Infrastructures Proceedings of the Research and Innovation Symposium for European SECURITY and Defense – RISE-SD Conferences, pp. 161 163 , (ISSN 2945-1183 ), 2023. Article journal
Sandeep Pirbhulal; Habtamu Abie; Shukla Ankur; Basel Katt; A Cognitive Digital Twin Architecture for Cybersecurity in IoT-Based Smart Homes Lecture Notes in Electrical Engineering, (ISSN 1876-1100 1876-1119 ), 2023. Scientific article
Sokratis Katsikas; Massimiliano Albanese; Habtamu Abie; Basel Katt; Sandeep Pirbhulal; Ankur Shukla; Computer Security. ESORICS 2022 International Workshops, CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022 (ISSN 9783031254604 ), 2023. Scientific anthology / conference series
CybAlliance WP2 Annual Mobility Report 2023 , 2023. Report
CybAlliance WP2 Annual Open Seminar Report 2023 , 2023. Report
Evidence in the fog – Triage in fog computing systems Forensic Science International: Digital Investigation, vol. 44, pp. 1 11 , (ISSN 2666-2825 2666-2817 ), doi: https://doi.org/10.1016/j.fsidi.2023.301506 , 2023. Scientific article
CPS4CIP 2023 Preface - The 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection Lecture Notes in Computer Science (LNCS), pp. 1 5 , (ISSN 0302-9743 1611-3349 ), doi: https://doi.org/10.1007/978-3-031-54129-2 , 2023. Editorial
A Lightweight Security Scheme for Failure Detection in Microservices IoT-Edge Networks 2022. Scientific lecture
Sokratis Katsikas; Marco Antonio Sotelo Monge; Habtamu Abie; Computer Security. ESORICS 2021 International Workshops CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers (ISSN 9783030954833 ), 2022. Scientific anthology / conference series
Sokratis Katsikas; Costas Lambrinoudakis; Nora Cuppens; John Mylopoulos; Christos Kalloniatis; et al. Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE doi: https://doi.org/10.1007/978-3-030-95484-0 , 2022. Scientific chapter / article / conference article
A Homomorphic Digital Signature Scheme for the Internet of Things IoT, (ISSN 2624-831X ), doi: https://doi.org/10.20944/preprints202202.0238.v1 , 2022. Article journal
Adaptive Security and Trust Management for Autonomous Messaging Systems arXiv.org, (ISSN 2331-8422 ), doi: https://doi.org/10.48550/arXiv.2203.03559 , 2022. Scientific article
Adaptive Safety for Internet of Things in e-Health arXiv.org, (ISSN 2331-8422 ), doi: https://doi.org/10.48550/arXiv.2203.05309 , 2022. Scientific article
Quantifying data volatility for IoT forensics with examples from Contiki OS Forensic Science International: Digital Investigation, vol. 40, (ISSN 2666-2825 2666-2817 ), doi: https://doi.org/10.1016/j.fsidi.2022.301343 , 2022. Scientific article
A Lightweight Security Scheme for Failure Detection in Microservices IoT-Edge Networks doi: https://doi.org/10.1007/978-3-030-98886-9_31 , 2022. Scientific chapter / article / conference article
Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications IEEE Vehicular Technology Conference (VTC), (ISSN 1090-3038 2577-2465 ), doi: https://doi.org/10.1109/VTC2022-Spring54318.2022.9860581 , 2022. Scientific article
A Cognitive Digital Twin Architecture for Cybersecurity in IoT-based Smart Homes 2022. Scientific lecture
Focus Area 1-IT and OT Integration 2022. Scientific lecture
5G-Enabled IoT for IT-OT Integration. 2022. Scientific lecture
AI/ML for 5G and Beyond Cybersecurity 2022. Report
Sokratis Katsikas; Marco Antonio Sotelo Monge; Habtamu Abie; Computer Security. ESORICS 2021 International Workshops (ISSN 9783030954833 ), doi: https://doi.org/10.1007/978-3-030-95484-0 , 2022. Scientific anthology / conference series
NORCICS D3.6.1.22: Report on strategies and specification for cybersecurity scenarios for 5G-enabled IoT 2022. Report
NORCICS D3.6.2.22: Requirements and specification for dynamic risk assessment in 5G-enabled IoT 2022. Report
CPS4CIP 2022 Preface - 3rd Cyber-Physical Security for Critical Infrastructures Protection Lecture Notes in Computer Science (LNCS), (ISSN 0302-9743 1611-3349 ), doi: https://doi.org/10.1007/978-3-031-25460-4 , 2022. Editorial
Habtamu Abie; Federica Battisti; Cyber-Physical Security for Critical Infrastructures Protection (ISSN 9783030697815 ), , 2021. Scientific anthology / conference series
A Cloud-Based Anomaly Detection for IoT Big Data pp. 87 104 , doi: https://doi.org/10.1007/978-3-030-69781-5_7 , 2021. Scientific chapter / article / conference article
Anomaly Detection for Critical Financial Infrastructure Protection pp. 495 514 , doi: https://doi.org/10.1561/9781680838237.ch22 , 2021. Scientific chapter / article / conference article
Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids pp. 83 90 , doi: https://doi.org/10.5220/0010580700830090 , 2021. Scientific chapter / article / conference article
Habtamu Abie; Evangelos Markakis; Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection, Virtual Workshop, June 24–25, 2020 (ISSN 9783956630873 ), , 2021. Scientific anthology / conference series
Coffee forensics — Reconstructing data in IoT devices running Contiki OS Forensic Science International: Digital Investigation, vol. 37, (ISSN 2666-2825 2666-2817 ), doi: https://doi.org/10.1016/j.fsidi.2021.301188 , 2021. Scientific article
Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions Lecture Notes in Electrical Engineering, vol. 739, pp. 71 81 , (ISSN 1876-1100 1876-1119 ), doi: https://doi.org/10.1007/978-981-33-6385-4_7 , 2021. Scientific article
CPS4CIP 2020 Preface - Cyber-Physical Security for Critical Infrastructures Protection Lecture Notes in Computer Science (LNCS), (ISSN 0302-9743 1611-3349 ), doi: https://doi.org/10.1007/978-3-030-69781-5 , 2021. Editorial
ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC (ISSN 9783030420512 ), 2020. Scientific anthology / conference series
Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure pp. 104 142 , doi: https://doi.org/10.1561/9781680836875.ch7 , 2020. Scientific chapter / article / conference article
Risk-driven security metrics for an Android smartphone application International Journal of Electronic Business, vol. 15, pp. 297 324 , (ISSN 1470-6067 1741-5063 ), doi: https://doi.org/10.1504/IJEB.2020.111059 , 2020. Scientific article
Security in Android smartphone, Confidentiality in IoT-enabled Smart Grids, and Fault-tolerant privacy-preserving in AMS , 2020. Report
Svetlana Boudko; Peder Aursand; Habtamu Abie; Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids Information, (ISSN 2078-2489 2078-2489 ), doi: https://doi.org/10.3390/info11120582 , 2020. Scientific article
Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids Information, vol. 11, (ISSN 2078-2489 ), doi: https://doi.org/10.3390/info11120582 , 2020. Scientific article
Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions 2020. Scientific lecture
Anticipatory Adaptive Security for IoT-based Smart Grids Infrastructure and Value-added Services , 2020. Report
Finsec 2019 preface Lecture Notes in Computer Science (LNCS), vol. 11981 LNCS, pp. xiii xiv , (ISSN 0302-9743 1611-3349 ), 2020. Editorial
FINSEC 2019 Preface - 1st International Workshop on Security for Critical Financial Infrastructures and Services Lecture Notes in Computer Science (LNCS), (ISSN 0302-9743 1611-3349 ), doi: https://doi.org/10.1007/978-3-030-42051-2 , 2020. Editorial
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems International Symposium on Medical Information and Communication Technology, vol. 2019-May, (ISSN 2326-828X 2326-8301 ), doi: https://doi.org/10.1109/ISMICT.2019.8743670 , 2019. Scientific article
Adaptive Cybersecurity Framework for Healthcare Internet of Things International Symposium on Medical Information and Communication Technology, vol. 2019-May, (ISSN 2326-828X 2326-8301 ), doi: https://doi.org/10.1109/ISMICT.2019.8743905 , 2019. Scientific article
An evolutionary game for integrity attacks and defences for advanced metering infrastructure doi: https://doi.org/10.1145/3241403.3241463 , 2018. Scientific chapter / article / conference article
Risk-based adaptive authentication for internet of things in smart home eHealth pp. 102 108 , doi: https://doi.org/10.1145/3129790.3129801 , 2017. Scientific chapter / article / conference article
Measurable Adaptive Cyber-Physical Security for IoT Smart Grids 2017. Scientific lecture
ASSET Project Progress: ideas and concepts II 2015. Lecture
ASSET Results Integration and Utilization Final 2015. Lecture
ASSET Project Management Final 2015. Lecture
IoTSec - Security in IoT for Smart Grids 2015. Lecture
Measurable Security, Privacy and Dependability in Smart Grids Journal of Cyber Security and Mobility, vol. 3, pp. 371 398 , (ISSN 2245-1439 2245-4578 ), doi: https://doi.org/10.13052/jcsm2245-1439.342 , 2015. Scientific article
Risk-Driven Security Metrics Development for an e-Health IoT Application doi: https://doi.org/10.1109/issa.2015.7335061 , 2015. Scientific chapter / article / conference article
ASSET Project 213131 2015 Final Annual Meeting, 05-06 March: Meeting Minutes & Documentation 2015. Report
Game Theory and Risk Models: Deliverable D4.1 2015. Report
Development of Metrics: Deliverable D5.1 2015. Report
Case Study Gap Analysis: Deliverable D6.1 2015. Report
Case Study Validation: Deliverable D6.3 2015. Report
Prototyping of Methods: Deliverable D4.2 2015. Report
An Evaluation Framework for Adaptive Security for the IoT in eHealth International journal on advances in security, vol. 7, pp. 93 109 , (ISSN 1942-2636 ), , 2014. Scientific article
Security Measuring for Self-adaptive Security doi: https://doi.org/10.1145/2642803.2642808 , 2014. Scientific chapter / article / conference article
Game-based adaptive security in the Internet of Things for eHealth pp. 920 925 , doi: https://doi.org/10.1109/ICC.2014.6883437 , 2014. Scientific chapter / article / conference article
Towards Run-Time Verification of Adaptive Security for IoT in eHealth doi: https://doi.org/10.1145/2642803.2642807 , 2014. Scientific chapter / article / conference article
An Evaluation Scenario for Adaptive Security in eHealth pp. 6 11 , , 2014. Scientific chapter / article / conference article
Results Integration and Utilization in ASSET III 2014. Scientific lecture
ASSET Project Progress: ideas, theories, and methods 2014. Scientific lecture
Case Study, validation of results in the eHealth (ASSET WP4) 2014. Scientific lecture
Development of risk-based adaptive security models for IoT systems (ASSET WP2) 2014. Scientific lecture
Design of security measurement and metrics (ASSET WP3) 2014. Scientific lecture
Key Challenges to Knowledge and Objectives 2014. Scientific lecture
Adaptive feedback Control loops as first class entities 2014. Scientific lecture
Project status and progress report 2014. Scientific lecture
Framework for integrating ASSET methods II 2014. Scientific lecture
Design of security measurement and metrics 2014. Scientific lecture
Results integrating and utilizing by the ASSET project II 2014. Scientific lecture
Analysis of risk-based adaptive security models (ASSET WP1) 2014. Scientific lecture
ASSET Project Management (ASSET WP0) 2014. Scientific lecture
Framework for integrating ASSET methods I 2014. Scientific lecture
ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014, September 30,2014 2014. Report
Development and Validation of Requirements for Evidential Value for Assessing Trustworthiness of Digital Records over Time Journal of Information, vol. 16, pp. 1945 1980 , (ISSN 1343-4500 1344-8994 ), doi: https://doi.org/10.1109/mobhoc.2009.5336917 , 2013. Scientific article
Adaptive security and privacy management for the internet of things (ASPI 2013) doi: https://doi.org/10.1145/2494091.2499770 , 2013. Scientific chapter / article / conference article
Metrics-driven security objective decomposition for an e-health application with adaptive security management doi: https://doi.org/10.1145/2523501.2523507 , 2013. Scientific chapter / article / conference article
A testbed for adaptive security for IoT in eHealth doi: https://doi.org/10.1145/2523501.2523506 , 2013. Scientific chapter / article / conference article
Results integrating and utilizing by the ASSET project I 2013. Scientific lecture
2nd PETweb II & ASSET joint PhD Seminar 2013. Report
Analysis of Reasoning Methods: Deliverable D3.1 V1 2013. Report
Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth: Deliverable D3.2 V1 2013. Report
Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications pp. 276 281 , doi: https://doi.org/10.4108/icst.bodynets.2012.250241 , 2012. Scientific chapter / article / conference article
Risk-Based Adaptive Security for Smart IoT in eHealth pp. 269 275 , doi: https://doi.org/10.4108/icst.bodynets.2012.250235 , 2012. Scientific chapter / article / conference article
Conducting a Systematic Literature Review of Information Systems Research 2012. Scientific lecture
Defining the ASSET Scenarios , 2012. Report
Defining the ASSET Lab , 2012. Report
Assessment of the Trustworthiness of Digital Records IFIP Advances in Information and Communication Technology, pp. 300 311 , (ISSN 1868-4238 1868-422X ), doi: https://doi.org/10.1007/978-3-642-22200-9_24 , 2011. Scientific article
A framework for the assessment of the trustworthiness of digital records over time pp. 738 744 , doi: https://doi.org/10.1109/trustcom.2011.96 , 2011. Scientific chapter / article / conference article
On Time, Conflict, Weighting and Dependency Aspects of Assessing the Trustworthiness of Digital Records pp. 7 13 , 2011. Scientific chapter / article / conference article
A Frame for Security Metrics 2011. Lecture
Advanced Framework for Digital Forensic Technologies and Procedures Journal of Forensic Sciences, vol. 55, pp. 1471 1480 , (ISSN 0022-1198 1556-4029 ), doi: https://doi.org/10.1111/j.1556-4029.2010.01528.x , 2010. Scientific article
Advances in Adaptive Secure Message Oriented Middleware for Distributed Business Critical Systems Ukjent, vol. AIP Conference Proceedings Volume 1281, pp. 291 294 , 2010. Scientific article
Self-Healing and Secure Adaptive Messaging Middleware for Business Critical Systems International journal on advances in security, vol. 3, pp. 34 51 , (ISSN 1942-2636 ), 2010. Scientific article
Advances in Adaptive Secure Message-Oriented Middleware for Distributed Business-Critical Systems AIP Conference Proceedings, vol. 1281, pp. 291 294 , (ISSN 0094-243X 1551-7616 ), doi: https://doi.org/10.1063/1.3498454 , 2010. Scientific article
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments pp. 85 92 , 2010. Scientific chapter / article / conference article
Innovations and Advances in Adaptive Secure Message-Oriented Middleware - the GEMOM Project pp. 288 289 , 2010. Scientific chapter / article / conference article
Advances in Adaptive Secure Message Oriented Middleware for Distributed Business Critical Systems pp. 291 294 , 2010. Scientific chapter / article / conference article
Applicability of security metrics for adaptive security management in a universal banking hub system pp. 197 204 , 2010. Scientific chapter / article / conference article
Adaptive Policy Manager 2010. Lecture
WP6 Quality of Service and Security: Status 2010. Lecture
Adaptive Identity Management 2010. Lecture
QoS and Security: Common Stories/Scenarios 2010. Lecture
Adaptive Security Scenarios for Case Studies 2010. Lecture
Quality of Service and Security: Adaptive Security 2010. Lecture
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks Journal of Networks, vol. 07.04.2012, pp. 15 15 , (ISSN 1796-2056 ), 2009. Scientific article
Development of Measurable Security for a Distributed Messaging System International journal on advances in security, vol. 2, pp. 358 380 , (ISSN 1942-2636 ), , 2009. Scientific article
Distributed Digital Rights Management: Frameworks, Processes, Procedures and Algorithms 2009. Non fiction book
Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time pp. 796 803 , 2009. Scientific chapter / article / conference article
Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems pp. 153 160 , , 2009. Scientific chapter / article / conference article
Development of security metrics for a distributed messaging system pp. 1 6 , , 2009. Scientific chapter / article / conference article
Identification of Basic Measurable Security Components for a Distributed Messaging System pp. 121 128 , , 2009. Scientific chapter / article / conference article
Adaptive security and trust management for autonomic message-oriented middleware pp. 810 817 , , 2009. Scientific chapter / article / conference article
Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware 2009. Scientific lecture
WP6 – QoS and Security Deliverables 2009. Lecture
WP6 – QoS and Security: Adaptive Security in Brief 2009. Lecture
Quality of Service and Security: Adaptive Security Demo 2009. Lecture
GEMOM - IBM WebSphereMQ Bridging Demo 2009. Lecture
D6.3 - Security Implementation 2009. Report
D6.4 – Security and QoS Monitoring Implementation 2009. Report
Meldingsformidling er en milliardbransje - i euro! ComputerWorld Norge, (ISSN 1501-6595 ), , 2008. Reader opinion
Threat Assessment of Wireless Patient Monitoring Systems 2008. Scientific chapter / article / conference article
Towards a Research Road Map for the Management of Privacy Risks in Information Systems 2008. Scientific chapter / article / conference article
Information Use-Control in E-Government Applications pp. 1926 1934 , , 2008. Scientific chapter / article / conference article
GEMOM - Significant and Measurable Progress beyond the State of the Art pp. 191 196 , , 2008. Scientific chapter / article / conference article
Threat assessment of wireless patient monitoring systems 2008. Scientific lecture
LongRec – TRUST Preservation of Trust and Security 2008. Lecture
GEMOM: Qualities of Service and Security 2008. Lecture
Preservation of Trust in Long-Term Records Management Systems (ISSN 9788253905273 ), , 2008. Report
D2.2 – System Specification Document 2008. Report
D6.1 - QoS and Security Requirements Specification 2008. Report
D2.1 - Requirements Analysis Document 2008. Report
D6.2 – Trust Model and Security Architecture 2008. Report
D5.1 – Design Document for Broker Managing Agent 2008. Report
Threat Assessment of Wireless Patient Monitoring Systems , 2007. Poster
Frontiers of DRM Knowledge and Technology International Journal of Computer Science and Network Security, vol. 7, pp. 216 231 , (ISSN 1738-7906 ), , 2007. Scientific article
Riskohåndtering er nøkkelen til sikkerhet og tillit ComputerWorld Norge, pp. 1 1 , (ISSN 1501-6595 ), , 2007. Science for the public article
An Ontological Analysis of Privacy Threat Impact , 2007. Lecture
Preservation of Trust & Security – Best Practices 2007. Lecture
Privacy Threat Ontology 2007. Lecture
LongRec - Preservation of Evidential Value 2007. Lecture
Utvikling av prototyp for sikker epost 2007. Report
Risikoanalyse og risikostyringi et helhetlig perspektiv , 2006. Scientific lecture
Risikoanalyse og risikostyring i et helhetlig perspektiv 2006. Scientific lecture
Towards a Holistic, Adaptive, and Multidisciplinary Risk Management- State of Art and Future Directions 2006. Report
A Conceptual Formal Framework for Developing and Maintaining Security-Critical Systems International Journal of Computer Science and Network Security, vol. Vol. 5, No. 12, pp. 10 10 , (ISSN 1738-7906 ), , 2005. Scientific article
A Distributed Digital Rights Management Model for Secure Information-Distribution Systems 2005. Non fiction book
State of the Art in DRM 2005. Scientific lecture
The Pros and Cons of Different Ways to Authenticate Users 2005. Scientific lecture
A Distributed Digital Rights Management Model for Information Systems International Journal of Information Security, vol. 2004, pp. 22 22 , (ISSN 1615-5262 1615-5270 ), 2004. Scientific article
Integrating a security requirement language with UML Lecture Notes in Computer Science (LNCS), vol. 3273, pp. 350 364 , (ISSN 0302-9743 1611-3349 ), doi: https://doi.org/10.1007/978-3-540-30187-5_25 , 2004. Scientific article
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems pp. 293 296 , 2004. Scientific chapter / article / conference article
A Distributed Digital Rights Management Model for Information Distribution Systems 2004. Scientific lecture
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2004. Scientific lecture
Digital Rights Management (DRM) for Establishing and Increasing Trust and Privacy , 2004. Scientific lecture
DigiRight: Relevance to and Potential Impact on Europe's Need to Strengthen the Science and Technology Excellence on DRM Ukjent, vol. 2003, pp. 8 8 , 2003. Scientific article
The Need for a Digital Rights Management Framework for the Next Generation of E-Government Services Electronic Government, an International Journal, vol. 2003, pp. 13 13 , (ISSN 1740-7494 1740-7508 ), 2003. Scientific article
DigiRight: Network of Excellence for a Framework for Policy, Privacy, Trust and Risk Management for Digital Rights Management Ukjent, vol. 2003, pp. 10 10 , 2003. Scientific article
Authentication and Authorization for Digital Rights Management for Information Distribution Systems Ukjent, vol. 2003, pp. 8 8 , 2003. Scientific article
DRM-Net: Network of Excellence for a Framework for Digital Rights Management 2003. Scientific lecture
Digital Rights Management (DRM) 2003. Scientific lecture
DigiRight: Joint Programme of Activities (JPAs) 2003. Scientific lecture
NoE on Digital Rights Management 2003. Scientific lecture
Network of Excellence (NoE) for a Framework for Digital Rights Management 2003. Scientific lecture
DigiRight: Workpackages 2003. Scientific lecture
A rights management model for distributed object-oriented information distribution systems pp. 185 194 , 2002. Scientific chapter / article / conference article
EU FP6 Proposals for NoEs and IPs in DRM, Security, Privacy and Trust 2002. Scientific lecture
NoE on digital rights management 2002. Scientific lecture
CORBA firewall security: increasing the security of CORBA applications Telektronikk, vol. 96, pp. 53 64 , (ISSN 0085-7130 1891-8220 ), , 2000. Scientific article
An overview of firewall technologies Telektronikk, vol. 96, pp. 47 52 , (ISSN 0085-7130 1891-8220 ), , 2000. Scientific article
Security Requirements for Middleware 2000. Scientific lecture
The Role of Middleware in Telemedicine, HARP, Haifa Israel 2000. Scientific lecture
Security in Middleware 2000. Scientific lecture
Firewall technologies: CORBA firewall security 2000. Report
Surveying the Requirements for Middleware Security 2000. Report