Audun Jøsang
#136,271
Most Influential Person Now
Audun Jøsang's AcademicInfluence.com Rankings
Audun Jøsangcomputer-science Degrees
Computer Science
#6268
World Rank
#6611
Historical Rank
Database
#3368
World Rank
#3509
Historical Rank

Download Badge
Computer Science
Why Is Audun Jøsang Influential?
(Suggest an Edit or Addition)Audun Jøsang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A survey of trust and reputation systems for online service provision (2007) (3726)
- The Beta Reputation System (2002) (1738)
- A Logic for Uncertain Probabilities (2001) (1108)
- Filtering Out Unfair Ratings in Bayesian Reputation Systems (2004) (609)
- Trust network analysis with subjective logic (2006) (437)
- An Algebra for Assessing Trust in Certification Chains (1999) (390)
- The right type of trust for distributed systems (1996) (346)
- Analysing the Relationship between Risk and Trust (2004) (314)
- User Centric Identity Management (2005) (254)
- Challenges for Robust Trust and Reputation Systems (2009) (233)
- Semantic Constraints for Trust Transitivity (2005) (215)
- Dirichlet Reputation Systems (2007) (212)
- Simplification and analysis of transitive trust networks (2006) (204)
- The consensus operator for combining beliefs (2002) (204)
- Can We Manage Trust? (2005) (203)
- Exploring Different Types of Trust Propagation (2006) (196)
- Artificial Reasoning with Subjective Logic (2008) (193)
- The state-of-the-art in personalized recommender systems for social networking (2012) (193)
- A metric for trusted systems (1998) (192)
- TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS (1999) (172)
- Subjective Logic: A Formalism for Reasoning Under Uncertainty (2016) (170)
- Trust Requirements in Identity Management (2005) (165)
- Usability and Privacy in Identity Management Architectures (2007) (154)
- Technologies for Trust in Electronic Commerce (2004) (153)
- Trust and Reputation Systems (2007) (146)
- A Subjective Metric of Authentication (1998) (138)
- Subjective Logic (2016) (137)
- Optimal Trust Network Analysis with Subjective Logic (2008) (137)
- The Impact of Quantum Computing on Present Cryptography (2018) (133)
- Simulating the Effect of Reputation Systems on E-markets (2003) (113)
- Strategies for combining conflicting dogmatic beliefs (2003) (102)
- Multiplication and comultiplication of beliefs (2005) (101)
- Conditional Reasoning with Subjective Logic (2009) (91)
- Probabilistic Logic under Uncertainty (2007) (82)
- Security Usability Principles for Vulnerability Analysis and Risk Assessment (2007) (78)
- Cumulative and Averaging Fission of Beliefs (2007) (71)
- A User-centric Federated Single Sign-on System (2007) (69)
- Discretionary enforcement of electronic contracts (2002) (66)
- Advanced Features in Bayesian Reputation Systems (2009) (66)
- Robustness of Trust and Reputation Systems: Does It Matter? (2012) (59)
- Security in Mobile Communications: Challenges and Opportunities (2003) (57)
- Prospectives for Modelling Trust in Information Security (1997) (57)
- Analysis of Competing Hypotheses using Subjective Logic (2005) (55)
- DEMPSTER’S RULE AS SEEN BY LITTLE COLORED BALLS (2012) (52)
- Conditional Deduction Under Uncertainty (2005) (49)
- Subjective Evidential Reasoning � (2002) (49)
- Interpretation and fusion of hyper opinions in subjective logic (2012) (49)
- Trust Transitivity and Conditional Belief Reasoning (2012) (43)
- Global perspectives on cybersecurity education for 2030: a case for a meta-discipline (2018) (41)
- What You See is Not Always What You Sign (2002) (39)
- An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems (2008) (39)
- URREF self-confidence in information fusion trust (2014) (38)
- Continuous Ratings in Discrete Bayesian Reputation Systems (2008) (38)
- Consequences of Botnets Spreading to Mobile Devices (2009) (36)
- Combining Trust and Reputation Management for Web-Based Services (2008) (35)
- Legal reasoning with subjective logic (2000) (34)
- Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review (2013) (34)
- Belief-Based Risk Analysis (2004) (32)
- Conditional inference in subjective logic (2003) (30)
- Combining Recommender and Reputation Systems to Produce Better Online Advice (2013) (30)
- Determining model correctness for situations of belief fusion (2013) (27)
- Subjective Networks: Perspectives and Challenges (2015) (26)
- Uncertainty Characteristics of Subjective Opinions (2018) (26)
- Normalising the Consensus Operator for Belief Fusion (2006) (26)
- Behavioural Computer Science: an agenda for combining modelling of human and system behaviours (2018) (23)
- Local user-centric identity management (2015) (23)
- State-of-the-art review on opinion mining from online customers' feedback (2009) (22)
- Improving Usability of Password Management with Standardized Password Policies (2012) (22)
- A normal-distribution based rating aggregation method for generating product reputations (2015) (21)
- Authentication for Humans (2001) (21)
- Taste and Trust (2011) (21)
- The Mobile Phone as a Multi OTP Device Using Trusted Computing (2010) (21)
- Interpreting Belief Functions as Dirichlet Distributions (2007) (21)
- Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings (2010) (20)
- The OffPAD: Requirements and Usage (2013) (20)
- A Security Architecture for Reputation Systems (2003) (20)
- Data-Driven Threat Hunting Using Sysmon (2018) (20)
- Trust Management for E-Commerce (2000) (20)
- Security Usability of Petname Systems (2009) (20)
- Trust and Reputation Management in Web-based Social Network (2010) (20)
- Extended HTTP Digest Access Authentication (2013) (19)
- Developing Trust Networks Based on User Tagging Information for Recommendation Making (2010) (19)
- Contract performance assessment for secure and dynamic virtual collaborations (2003) (18)
- Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making (2008) (18)
- Fission of opinions in subjective logic (2009) (17)
- A method for access authorisation through delegation networks (2006) (17)
- PKI Seeks a Trusting Relationship (2000) (17)
- A Normal-Distribution Based Reputation Model (2014) (17)
- Identity management and trusted interaction in internet and mobile computing (2014) (17)
- User Interface Requirements for Authentication of Communication (2003) (17)
- Robustness of Trust and Reputation Systems (2010) (16)
- Semantic Cyberthreat Modelling (2016) (16)
- Service provider authentication assurance (2012) (16)
- Probabilistic Modelling of Humans in Security Ceremonies (2014) (16)
- Strengthening SMS-Based Authentication through Usability (2008) (16)
- An Analysis of Trust Transitivity Taking Base Rate into Account (2009) (16)
- PKI Trust Models (2013) (15)
- A Framework for Data-Driven Physical Security and Insider Threat Detection (2018) (15)
- Abductive Reasoning with Uncertainty (2008) (15)
- Identity and Privacy in the Internet Age (2009) (15)
- Mathematical Modelling of Trust Issues in Federated Identity Management (2015) (14)
- Private Reputation Schemes for P2P systems (2004) (14)
- Correlation of Intrusion Alarms with Subjective Logic (2001) (14)
- Product Feature Taxonomy Learning based on User Reviews (2014) (14)
- Trust Extortion on the Internet (2011) (13)
- Display security for online transactions: SMS-based authentication scheme (2010) (13)
- Online Reputation Systems for the Health Sector (2008) (13)
- Generalising Bayes' theorem in subjective logic (2016) (13)
- Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign (2008) (12)
- Multi-Agent Preference Combination using Subjective Logic (2013) (12)
- Mesmerize - an open framework for enterprise security management (2004) (12)
- Multi-source fusion in subjective logic (2017) (12)
- Vulnerabilities in personal firewalls caused by poor security usability (2010) (12)
- A Consistent Definition of Authorization (2017) (11)
- A rating aggregation method for generating product reputations (2014) (10)
- Cybersecurity Through Secure Software Development (2015) (10)
- One-Time Biometrics for Online Banking and Electronic Payment Authentication (2014) (10)
- Trust revision for conflicting sources (2015) (9)
- Prospectives for Online Trust Management (9)
- Entity Authentication and Trust Validation in PKI Using Petname Systems (2013) (9)
- Towards Behavioural Computer Science (2016) (8)
- A Medical Data Reliability Assessment Model (2009) (8)
- Principles of subjective networks (2016) (8)
- Personal Federation Control with the Identity Dashboard (2010) (8)
- Bayesian Deduction with Subjective Opinions (2016) (8)
- Generating Product Feature Hierarchy from Product Reviews (2014) (8)
- Threat Actor Type Inference and Characterization within Cyber Threat Intelligence (2021) (8)
- Towards subjective networks: Extending conditional reasoning in subjective logic (2015) (7)
- Threat Poker: Solving Security and Privacy Threats in Agile Software Development (2018) (7)
- A new approach for multi-biometric fusion based on subjective logic (2017) (7)
- Decision making under vagueness and uncertainty (2016) (7)
- Managing Trust in Online Social Networks (2010) (7)
- A Combined Method for Mitigating Sparsity Problem in Tag Recommendation (2014) (7)
- Privacy Policy Referencing (2010) (7)
- Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings (2009) (6)
- FIDO Trust Requirements (2015) (6)
- How to trust systems (1997) (6)
- Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic (2018) (6)
- DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking (2016) (6)
- Redefining material implication with subjective logic (2011) (6)
- Base Rates for Belief Functions (2013) (6)
- An accurate rating aggregation method for generating item reputation (2015) (6)
- A Review of Trust in Online Social Networks to Explore New Research Agenda (2010) (6)
- Passwords are not always stronger on the other side of the fence (2015) (6)
- An Efficient Off-Line Reputation Scheme Using Articulated Certificates (2004) (6)
- Assurance Requirements for Mutual User and Service Provider Authentication (2014) (6)
- INVERTING CONDITIONAL OPINIONS IN SUBJECTIVE LOGIC (2014) (5)
- A Trust policy framework (1997) (5)
- Web Security: The Emperor's New Armour (2001) (5)
- Trust Management in Online Communities (2011) (5)
- Formal Methods of Countering Deception and Misperception in Intelligence Analysis (2006) (5)
- Recommender Systems for Web Intelligence (2010) (5)
- The base rate fallacy in belief reasoning (2010) (4)
- Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique (2017) (4)
- The difficulty of standardizing smart card security evaluation (1995) (4)
- Categories of Belief Fusion (2019) (4)
- Server Certificates based on DNSSEC (2011) (4)
- Ontology Learning from User Tagging for Tag Recommendation Making (2011) (4)
- Bayesian Reputation Systems (2016) (4)
- Information Theory for Subjective Logic (2015) (4)
- SimTrust: A New Method of Trust Network Generation (2010) (3)
- Global perspectives on cybersecurity education (2018) (3)
- Trust and Trust Management (2010) (3)
- Multiplication of Multinomial Subjective Opinions (2010) (3)
- Biometric data fusion based on subjective logic (2014) (3)
- Analysing Trust Transitivity and the Effects of Unknown Dependence (2010) (3)
- Multi-source trust revision (2017) (3)
- Belief Mosaics of Subjective Opinions (2019) (3)
- Subjective Networks : Prospectives and Challenges ∗ (2015) (2)
- An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations (2018) (2)
- Joint Subjective Opinions (2017) (2)
- Analysis of Competing Hypotheses using Subjective Logic (ACH-SL) (2005) (2)
- A Survey on Uncertainty Reasoning and Quantification for Decision Making: Belief Theory Meets Deep Learning (2022) (2)
- Principles of Subjective Logic (2016) (2)
- Reflections on Behavioural Computer Science (2016) (2)
- Secure IT Systems (2012) (2)
- Offpad: Offline personal authenticating device: implementations and applications (2016) (2)
- 1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space (2015) (2)
- Guest Editors' Introduction: Trust and Trust Management (2010) (2)
- Threat Poker: Gamification of Secure Agile (2020) (2)
- Future Standardization Areas for Identity Management Systems (2007) (2)
- AusCERT Conference 2005 User Centric Identity Management (2005) (1)
- Vulnerability by Design in Mobile Network Security (2016) (1)
- The Cumulative Rule for Combining Beliefs (1)
- Proceedings of the 17th Nordic conference on Secure IT Systems (2012) (1)
- Usable Authentication with an Offline Trusted Device Proxy Architecture (long version) (2016) (1)
- Predictive Reasoning in Subjective Bayesian Networks (2016) (1)
- Privacy Concerns of TPM 2 . 0 (2016) (1)
- Authentication in Analogue Telephone Access Networks (1996) (1)
- Exploitation vs. Prevention: The Ongoing Saga of Software Vulnerabilities (2020) (1)
- The development of public key infrastructures; Are we on the right path? (1999) (1)
- Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange (2021) (1)
- Using Subjective Logic to Estimate Uncertainty in Multi-Armed Bandit Problems (2020) (1)
- The Cumulative Rule for Belief Fusion (2006) (1)
- An Ontology-based Method for Sparsity Problem in Tag Recommendation (2013) (1)
- The state-of-the-art in personalized recommender systems for social networking (2011) (1)
- Uncertainty-Aware Reward-based Deep Reinforcement Learning for Intent Analysis of Social Media Information (2023) (0)
- Interactive Web-Based Visual Analysis on Network Traffic Data (2022) (0)
- TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS 1 (1999) (0)
- Specification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment (2016) (0)
- Addition, Subtraction and Complement (2016) (0)
- Multinomial Multiplication and Division (2016) (0)
- Elements of Subjective Opinions (2016) (0)
- Binomial Multiplication and Division (2016) (0)
- Electronic Contract Administration – Legal and Security Issues Literature Review (2006) (0)
- TrustCom 2013: Message from the general chairs (2013) (0)
- Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age (2009) (0)
- Exploit Prevention, Quo Vadis? (2017) (0)
- Hey TPM, SignMyTransaction (2016) (0)
- Noninformative Prior Weights for Dirichlet PDFs* (2022) (0)
- Hey TPM, Sign My Transaction (2016) (0)
- Petname Systems: Background, Theory and Applications (2007) (0)
- Design of a Novel Trust Model and its Application in Trust based Routing to Defend against Dishonest Recommenders (2020) (0)
- Display Integrity Assurance for SMS Transaction Authorization (2012) (0)
- The Diiculty of Standardising Smart Card Security Evaluation 1]based On: Jos93] (1994) (0)
- Let's start by meaningfully navigating the current online authentication solutions space (2015) (0)
- Joint and Marginal Opinions (2016) (0)
- SIMON POPE AND AUDUN JØSANG , DSTC 3 Many alternative analysis (0)
- The Potential Relationship Between Trust and Interest Similarity (2010) (0)
- Open IN Service Provider Access (1999) (0)
- A hard problem : Disclosing how to break public key cryptosystems (1998) (0)
- Offline Personal Authenticating Device applied in Hospitals and E-banking - OffPAD (2016) (0)
- Multinomial Bayesian Reputation Systems (0)
- Research Proposals on Trust Modelling (2002) (0)
- Enabling Factors for IN Service Provider Access (1999) (0)
- Conditional Reasoning and Subjective Deduction (2016) (0)
- Multi-Label Temporal Evidential Neural Networks for Early Event Detection (2023) (0)
- Firewalls usability: An experiment investigating the usability of personal firewalls (2013) (0)
- Spam filter optimality based on signal detection theory (2009) (0)
- PPO-UE: Proximal Policy Optimization via Uncertainty-Aware Exploration (2022) (0)
- Information Security Posture to Organize and Communicate the Information Security Governance Program (2022) (0)
- Subjective Trust Networks (2016) (0)
- Workshop Message (2011) (0)
- Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications (2013) (0)
- A Formal Calculus for International Relations Computation and Evaluation (2016) (0)
- Strong Privacy in Reputation Systems ( preliminary version ) (2014) (0)
- Unfusion and Fission of Subjective Opinions (2016) (0)
- Root of Trust : Technical vs . Political Considerations (2017) (0)
- Security and Trust Management (2012) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Audun Jøsang?
Audun Jøsang is affiliated with the following schools: