• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • Faculty of Mathematics and Natural Sciences
  • Department of Informatics
  • Department of Informatics
  • View Item
  •   Home
  • Faculty of Mathematics and Natural Sciences
  • Department of Informatics
  • Department of Informatics
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Risks in Networked Computer Systems

Klingsheim, André N.
Doctoral thesis
Thumbnail
View/Open
Errata (92.91Kb)
Paper VIII: Published version (547.2Kb)
Paper V: Published version (267.0Kb)
Paper II: Published version (553.9Kb)
Main thesis (234.3Kb)
URI
https://hdl.handle.net/1956/4200
Date
2008-09-24
Metadata
Show full item record
Collections
  • Department of Informatics [536]
Abstract
Networked computer systems yield great value to businesses and governments, but also create risks. The eight papers in this thesis highlight vulnerabilities in computer systems that lead to security and privacy risks. A broad range of systems is discussed in this thesis: Norwegian online banking systems, the Norwegian Automated Teller Machine (ATM) system during the 90's, mobile phones, web applications, and wireless networks. One paper also comments on legal risks to bank customers.
Has parts
Paper I: Hole, K. H.; Klingsheim, A. N.; Netland, L-H.; Espelid, Y.; Tjøstheim, T.; Moen, V., 2008, Risk Assessment of Services in a National Security Infrastructure. Full text not available in BORA.

Paper II: IEEE security & privacy 5(6), Hole, K. J.; Moen, V.; Klingsheim, A. N.; Tande, K. M., Lessons From the Norwegian ATM System, pp. 26-31. Copyright 2007 IEEE. Reproduced with permission. The published version is also available at: http://dx.doi.org/ 10.1109/MSP.2007.168

Paper III: Financial Cryptography and Data Security, Lecture Notes in Computer Science, 5143, Espelid, Y.; Netland, L-H.; Klingsheim, A. N.; Hole, K. H., A Proof of Concept Attack against Norwegian Internet Banking Systems. Copyright 2008 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: http://dx.doi.org/ 10.1007/978-3-540-85230-8_18

Paper IV: Proceedings of The Ifip Tc 11 23rd International Information Security Conference 278, Espelid, Y.; Netland, L-H.; Klingsheim, A. N.; Hole, K. J., Robbing Banks with Their Own Software - an Exploit against Norwegian Online Banks. Copyright 2008 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: ttp://dx.doi.org/10.1007/978-0-387-09699-5_5

Paper V: IEEE Computer 40(2), Klingsheim, A. N.; Moen, V.; Hole, K. J., Challenges in Securing Networked J2ME Applications, pp. 24-30. Copyright 2007 IEEE. Reproduced with permission. The published version is also available at:

Paper VI: Moen, V.; Klingsheim, A. N.; Simonsen, K. I. F.; Hole, K. J., Vulnerabilities in E-Governments. Full text not available in BORA.

Paper VII: Financial Cryptography and Data Security, Lecture Notes in Computer Science, 5143, Klingsheim, A. N.; Hole, K. J., Identity Theft: Much too Easy? A Study of Online Systems in Norway, pp. 192-196. Copyright 2009 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: Paper VII: Financial Cryptography and Data Security, Lecture Notes in Computer Science, 5143, Klingsheim, A. N.; Hole, K. J., Identity Theft: Much too Easy? A Study of Online Systems in Norway, pp. 192-196. Copyright 2009 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: http://dx.doi.org/10.1007/978-3-540-85230-8_17

Paper I: IEEE security & privacy 6(4), Netland, L-H.; Espelid, Y.; Klingsheim, A. N.; Helleseth, H.; Henriksen, J. B:, Open Wireless Networks on University Campuses, pp. 14-20. Copyright 2008 IEEE. Reproduced with permission. Published version. The published version is also available at: http://dx.doi.org/10.1109/MSP.2008.92
Publisher
The University of Bergen

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit