Vulnerabilities in distributed computer systems
MetadataShow full item record
The society relies more and more on interconnected computers systems and distributed applications. This dissertation considers security in such systems, focusing on how to break the security. Online banking, wireless systems with thin clients, and e-government are covered by the seven papers included in the thesis.
Has partsPaper 1: Tjøstheim, Thomas and Moen, Vebjørn, Vulnerabilities in Online Banks. (pre-print).
Paper 2: Published in IEEE Security & Privacy, Vol 4, No. 2, Hole, Kjell Jørgen, Moen, Vebjørn, and Tjøstheim, Thomas, Case Study: Online Banking Security, March/April 2006, pp. 14-20. Copyright Institute of Electrical and Electronics Engineers (IEEE). This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. The published version available at: http://doi.ieeecomputersociety.org/10.1109/MSP.2006.36
Paper 3: Hole, Kjell J., Moen, Vebjørn, and Klingsheim, André N., Lessons from the Norwegian ATM system. (pre-print).
Paper 3 Reply: Lessions from the Norwegian ATM system : BSK comments with reply from authors.
Paper 4: Published in ACM SIGMOBILE Mobile Computing and Communications Review, Volume 8, Issue 2, Moen, Vebjørn, Raddum, Håvard, and Hole, Kjell J., Weaknesses in the Temporal Key Hash of WPA, April 2004, pp. 76-83. Copyright ACM Press. Published version available at: http://doi.acm.org/10.1145/997122.997132
Paper 5: imonsen, Kent Inge, Moen, Vebjørn, and Hole, Kjell Jørgen, Attack on Sun's MIDP Reference Implementation of SSL. (pre-print).
Paper 6: Klingsheim, André N., Moen, Vebjørn, and Hole, Kjell J., Secure Networked J2ME Applications: Problems and Challenges. (pre-print).
Paper 7: Moen, Vebjørn, Klingsheim, André N., Simonsen, Kent Inge Fagerland, and Hole, Kjell Jørgen,Vulnerabilities in E-Governments. (pre-print).