Search For:

Displaying 1-4 out of 4 total
Toward Risk Assessment of Large-Impact and Rare Events
Found in: IEEE Security and Privacy
By Kjell Hole, Lars-Helge Netland
Issue Date:May 2010
pp. 21-27
Traditional risk assessment methods underestimate the risks of large-impact, hard-to-predict, and rare events in information systems. An alternative approach extends these methods to better evaluate risks associated with black and gray swans. In an example...
Risk Assessment of a National Security Infrastructure
Found in: IEEE Security and Privacy
By Kjell J. Hole, André N. Klingsheim, Lars-Helge Netland, Yngve Espelid, Thomas Tjøstheim, Vebjørn Moen
Issue Date:January 2009
pp. 34-41
In Norway, BankID is the banking industry's public-key infrastructure of choice for authenticating Internet customers, and it might soon become the government's national ID infrastructure as well. But do BankID's differences from standard PKIs make it a ri...
Open Wireless Networks on University Campuses
Found in: IEEE Security and Privacy
By Kjell J. Hole, Lars-Helge Netland, Yngve Espelid, André N. Klingsheim, Hallvar Helleseth, Jan B. Henriksen
Issue Date:July 2008
pp. 14-20
Open wireless networks raise privacy issues and entail increased risk of malicious attacks and illegal downloading activities. Such networks are nonetheless attractive—particularly to universities—because they enhance usability and thus expand access to no...
A Reflection-Based Framework for Content Validation
Found in: Availability, Reliability and Security, International Conference on
By Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal
Issue Date:April 2007
pp. 697-706
<p>Attacks embedded in application-level data have become one of the most successful ways to circumvent software security. Skilled hackers capitalize on misplaced trust by concealing their malicious code within a seemingly innocuous stream of applica...