Vis enkel innførsel

dc.contributor.authorKlingsheim, André N.eng
dc.date.accessioned2010-09-24T06:34:37Z
dc.date.available2010-09-24T06:34:37Z
dc.date.issued2008-09-24eng
dc.identifier.isbn978-82-308-0632-6 (print version)en_US
dc.identifier.urihttps://hdl.handle.net/1956/4200
dc.description.abstractNetworked computer systems yield great value to businesses and governments, but also create risks. The eight papers in this thesis highlight vulnerabilities in computer systems that lead to security and privacy risks. A broad range of systems is discussed in this thesis: Norwegian online banking systems, the Norwegian Automated Teller Machine (ATM) system during the 90's, mobile phones, web applications, and wireless networks. One paper also comments on legal risks to bank customers.en_US
dc.language.isoengeng
dc.publisherThe University of Bergenen_US
dc.relation.haspartPaper I: Hole, K. H.; Klingsheim, A. N.; Netland, L-H.; Espelid, Y.; Tjøstheim, T.; Moen, V., 2008, Risk Assessment of Services in a National Security Infrastructure. Full text not available in BORA.en_US
dc.relation.haspartPaper II: IEEE security & privacy 5(6), Hole, K. J.; Moen, V.; Klingsheim, A. N.; Tande, K. M., Lessons From the Norwegian ATM System, pp. 26-31. Copyright 2007 IEEE. Reproduced with permission. The published version is also available at: <a href="http://dx.doi.org/ 10.1109/MSP.2007.168"target=_blank>http://dx.doi.org/ 10.1109/MSP.2007.168</a>en_US
dc.relation.haspartPaper III: Financial Cryptography and Data Security, Lecture Notes in Computer Science, 5143, Espelid, Y.; Netland, L-H.; Klingsheim, A. N.; Hole, K. H., A Proof of Concept Attack against Norwegian Internet Banking Systems. Copyright 2008 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: <a href="http://dx.doi.org/ 10.1007/978-3-540-85230-8_18"target=_blank>http://dx.doi.org/ 10.1007/978-3-540-85230-8_18</a>en_US
dc.relation.haspartPaper IV: Proceedings of The Ifip Tc 11 23rd International Information Security Conference 278, Espelid, Y.; Netland, L-H.; Klingsheim, A. N.; Hole, K. J., Robbing Banks with Their Own Software - an Exploit against Norwegian Online Banks. Copyright 2008 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: <a href="http://dx.doi.org/10.1007/978-0-387-09699-5_5"target=_blank>ttp://dx.doi.org/10.1007/978-0-387-09699-5_5</a>en_US
dc.relation.haspartPaper V: IEEE Computer 40(2), Klingsheim, A. N.; Moen, V.; Hole, K. J., Challenges in Securing Networked J2ME Applications, pp. 24-30. Copyright 2007 IEEE. Reproduced with permission. The published version is also available at: <a href="http://dx.doi.org/10.1109/MC.2007.49"target=_blank<http://dx.doi.org/10.1109/MC.2007.49></a>en_US
dc.relation.haspartPaper VI: Moen, V.; Klingsheim, A. N.; Simonsen, K. I. F.; Hole, K. J., Vulnerabilities in E-Governments. Full text not available in BORA.en_US
dc.relation.haspartPaper VII: Financial Cryptography and Data Security, Lecture Notes in Computer Science, 5143, Klingsheim, A. N.; Hole, K. J., Identity Theft: Much too Easy? A Study of Online Systems in Norway, pp. 192-196. Copyright 2009 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: <a href="http://dx.doi.org/10.1007/978-3-540-85230-8_17"target=_blank>Paper VII: Financial Cryptography and Data Security, Lecture Notes in Computer Science, 5143, Klingsheim, A. N.; Hole, K. J., Identity Theft: Much too Easy? A Study of Online Systems in Norway, pp. 192-196. Copyright 2009 Springer. Full text not available in BORA due to publisher restrictions. The published version is available at: http://dx.doi.org/10.1007/978-3-540-85230-8_17</a>en_US
dc.relation.haspartPaper I: IEEE security & privacy 6(4), Netland, L-H.; Espelid, Y.; Klingsheim, A. N.; Helleseth, H.; Henriksen, J. B:, Open Wireless Networks on University Campuses, pp. 14-20. Copyright 2008 IEEE. Reproduced with permission. Published version. The published version is also available at: <a href="http://dx.doi.org/10.1109/MSP.2008.92"target=_blank>http://dx.doi.org/10.1109/MSP.2008.92</a>en_US
dc.titleRisks in Networked Computer Systemsen_US
dc.typeDoctoral thesis
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424nob


Tilhørende fil(er)

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel