Browse By Person: Josang, Audun
|Up a level|
Group by: Item Type | Date
Number of items: 32.
Alhaqbani, Bandar S., Josang, Audun, & Fidge, Colin J. (2009) A medical data reliability assessment model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), pp. 64-78.
Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2009) A User-centric Federated Single Sign-on System. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Josang, Audun (2008) Conditional Reasoning with Subjective Logic. Journal of Multiple-Valued Logic and Soft Computing, 15(1), pp. 5-38.
Josang, Audun, Ismail, Roslan, & Boyd, Colin A. (2007) A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), pp. 618-644.
Gray, Elizabeth, Josang, Audun, & Kinateder, Michael (2006) Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems, 4(2), pp. 139-161.
Josang, Audun (2002) The consensus operator for combining beliefs. Artificial Intelligence Journal, 142(1-2), pp. 157-170.
Josang, Audun (2001) A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3), pp. 279-311.
Bhuiyan, Touhid, Xu, Yue, Josang, Audun, Liang, Huizhi, & Cox, Clive (2010) Developing trust networks based on user tagging information for recommendation making. In Web Information Systems Engineering – WISE 2010 LNCS, Springer, Hong Kong, China, pp. 357-364.
Alzomai, Mohammed & Josang, Audun (2010) The mobile phone as a multi OTP device using trusted computing. In Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Crown Conference Centre, Melbourne, Victoria, pp. 75-82.
Bhuiyan, Touhid, Xu, Yue, & Josang, Audun (2009) State-of-the-Art Review on Opinion Mining from Online Customers’ Feedback. In Proceedings of the 9th Asia-Pacific Complex Systems Conference, Chuo University, Chuo University, Tokyo, pp. 385-390.
Bhuiyan, Touhid, Josang, Audun, & Xu, Yue (2009) An analysis of trust transitivity taking base rate into account. In Proceeding of the Sixth International Conference on Ubiquitous Intelligence and Computing, 7-9 July 2009, University of Queensland, Brisbane. (In Press)
Bhuiyan, Touhid, Xu, Yue, & Josang, Audun (2008) Integrating trust with public reputation in location-based social networks for recommendation making. In Proceeding of 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 9-12 December 2008, Sydney.
Josang, Audun, Bhuiyan, Touhid, & Xu, Yue (2008) Combining trust and reputation management for web-based services. In Proceeding of the 5th International Conference on Trust, Privacy and Security in Digital Business, 1-5 September, 2008, Turin, Italy.
Josang, Audun & Bhuiyan, Touhid (2008) Optimal trust network analysis with subjective logic. In Proceeding of the Second International Conference on Emerging Security Information, Systems and Technologies, 25-31 August 2008, Cap Esterel, France.
Al Fayyadh, Bander & Josang, Audun (2008) Robust WYSIWYS: A method of ensuring that what you see is what you sign. In Brankovic, L & Miller, M (Eds.) Information Security 2008, 22-25 January 2008, Australia, New South Wales, Wollongong.
Alzomai, Mohammed, Foo, Ernest, Josang, Audun, & McCullagh, Adrian (2008) Strengthening SMS-based authentication through usability. In Werner, B (Ed.) Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, 10-12 December 2008, Australia, New South Wales, Sydney.
Alzomai, Mohammed, Al Fayyadh, Bander, Josang, Audun, & McCullagh, Adrian (2008) An experimental investigation of the usability of transaction authorization in online bank security systems. In Brankovic, L & Miller, M (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), 22-25 January 2008, Australia, New South Wales, Wollongong.
Josang, Audun, Al Fayyadh, Bander, Grandison, Tyrone, Alzomai, Mohammed, & McNamara, Judith (2007) Security usability principles for vulnerability analysis and risk assessment. In 23rd Annual Computer Security Application Conference, 10-14 December 2007, Miami Beach, Florida.
Suriadi, Suriadi, Ashley, Paul, & Josang, Audun (2007) Future standardization areas in identity management systems. In 2nd PRIME Standardization Workshop, 14-15 June 2007, Zurich, Switzerland.
Josang, Audun (2007) Probabilistic logic under uncertainty. In Gudmundsson, J. & Jay, B. (Eds.) Thirteenth Computing : The Australasian Theory Symposium (CATS2007), 30 January - 2 February 2007, Ballarat, Australia.
Josang, Audun, Alzomai, Mohammed, & Suriadi, Suriadi (2007) Usability and privacy in identity management architectures. In Brankovic, Ljiljana, Coddington, Paul, Roddick, John F., Steketee, Chris, Warren, Jim, & Wendelborn, Andrew (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Australia.
Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2007) A User-centric Federated Single Sign-on System. In Li, Keqiu, Xiang, Yang, Jin, Hai, Qu, Wenyu, & Cao, Zhiying (Eds.) IFIP International Conference on Network and Parallel Computing Workshops NPC 2007, 18-21 September 2007, Dalian, China.
Josang, Audun, Marsh, Stephen, & Pope, Simon (2006) Exploring Different Types of Trust Propagation. In Stolen, K, Winsborough, W, & Martinelli, F (Eds.) 4th International Conference on Trust Management, 16 - 19 May 2006, Italy, Tuscany, Pisa.
Au, Wai, Gollmann, Dieter, & Josang, Audun (2006) A Method for Access Authorisation Through Delegation Networks. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.
Josang, Audun, McAnally, David, & Pope, Simon (2006) Normalising the Consensus Operator for Belief Fusion. In Tijus, C (Ed.) Proceedings of the 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2-7 July 2006, France, Paris, Les Cordeliers.
Josang, Audun (2006) Online Reputation Systems for the Health Sector. In Croll, P, Morarji, H, & Au, R (Eds.) Proceedings of the National E-Health Privacy and Security Symposium 2006, 24-25 October 2006, Australia, Queensland, Brisbane.
Josang, Audun, Hayward, Ross F., & Pope, Simon (2006) Trust Network Analysis with Subjective Logic. In Estivill-Castro, V. & Dobbie, G. (Eds.) Twenty-Ninth Australasian Computer Science Conference (ACSW 2006), 16-19 January 2006, Hobart, Tasmania, Australia.
Boyd, Colin, Ismail, Roslan, Josang, Audun, & Russell, Selwyn (2004) An Efficient Off-Line Reputation Scheme Using Articulated Certificates. In Security In Information Systems, April 14-17 2004, Porto, Portugal.
Boyd, Colin, Ismail, Roslan, Josang, Audun, & Russell, Selwyn (2004) Private Reputation Schemes for P2P Systems. In Fernandex-Medina,, Castro,, & Villalba, (Eds.) Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, 13-14 April 2004, Porto, Portugal.
Boyd, Colin, Ismail, Roslan, Josang, Audun, & Russell, Selwyn (2003) A Security Architecture for Reputation Systems. In Bauknecht, K, Tjoa, M, & Quirchmayr, G (Eds.) E-Commerce and Web Technologies, September, 2003, Prague, Czech Republic.
Milosevic, Zoran, Josang, Audun, Dimitrakos, Theo, & Patton, Mary A. (2002) Discretionary enforcement of electronic contracts. In Sixth International Enterprise Distributed Object Computing Conference, 2002. EDOC '02, 17-20 September 2002, Lausanne, Switzerland.
Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.