• Analyse av internasjonal forretningsutvikling ved en typisk norsk lystbåtprodusent 

      Robbersmyr, Kjell G.; Våge, Magne M.; Oleshchuk, Vladimir A; Laake, Morten (Skriftserien (Universitetet i Agder), Book, 2009)
      Rapporten beskriver kartlegging av en bedrifts internasjonalisering. GrimstadBåt AS er den valgte bedrift, og er en fiktiv bedrift lokalisert på Sørlandet. I dette prosjektet har vi foretatt ”intervjuer” med de mest ...
    • Analyse av utviklingsprosessen ved en typisk norsk lystbåtprodusent 

      Våge, Magne M.; Oleshchuk, Vladimir A; Robbersmyr, Kjell G.; Laake, Morten (Skriftserien (Universitetet i Agder);152e, Book, 2010-10-01)
      Rapporten beskriver kartlegging av produktutviklingsprosessen ved en bedrift lokalisert på Sørlandet, GrimstadBåt AS (GB). Dette er et fiktivt navn på en båtprodusent lokalisert på sørlandet og rapporten baserer seg på ...
    • Decision-cache based XACML authorisation and anonymisation for XML documents 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A (Journal article; Peer reviewed, 2012)
      This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element ...
    • Design requirements for a patient administered personal electronic health record 

      Fensli, Rune; Oleshchuk, Vladimir A; O'Donoghue, John; O'Reilly, Philip (Chapter; Peer reviewed, 2011)
    • Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A; Køien, Geir M. (Journal article; Peer reviewed, 2010)
      The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation ...
    • Mobile security with location-aware role-based access control 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;94, Chapter; Peer reviewed, 2012)
      This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation ...
    • Privacy Violation Classification of Snort Ruleset 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A (Conference object; Peer reviewed, 2010)
      It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand and quantify the privacy-invasiveness of network monitoring services. The objective in this paper is to classify ...
    • Proceedings for Scandinavian Conference in Health Informatics : Arendal, Norway 23-25 august 2004 

      Dale, Jan Gunnar; Fensli, Rune; Oleshchuk, Vladimir A (Skriftserien (Høgskolen i Agder), Book, 2004)
      Denne publikasjonen er en samling av vitenskaplige presentasjoner og prosjektpresentasjoner som blir presentert på konferansen "Scandinavian Conference in Health Informatics 2004" som arrangeres av Høgskolen i Agder og ...
    • Remote Patient Monitoring Within a Future 5G Infrastructure 

      Oleshchuk, Vladimir A; Fensli, Rune (Peer reviewed; Journal article, 2010)
      Systems of wearable or implantable medical devices (IMD), sensor systems for monitoring and transmitting physiological recorded signals, will in future health care services be used for purposes of remote monitoring. Today, ...
    • Secure and efficient data storage in unattended wireless sensor networks 

      Ren, Yi; Oleshchuk, Vladimir A; Li, Frank Yong (Conference object; Peer reviewed, 2009)
      Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient ...
    • Secure Group Communication Using Fractional Public Keys 

      Eskeland, Sigurd; Oleshchuk, Vladimir A (Peer reviewed; Journal article, 2010)
      In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ...
    • Secure interworking with P2PSIP and IMS 

      Zheng, Xianghan; Oleshchuk, Vladimir A (Conference object; Peer reviewed, 2010)
      In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party ...
    • Security in mobile wireless sensor networks - A survey 

      Ren, Yi; Oleshchuk, Vladimir A; Li, Frank Yong; Ge, Xiaohu (Journal article; Peer reviewed, 2011)
      Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various ...
    • A spatial role-based authorization framework for sensor network-assisted indoor WLANs 

      Ren, Yi; Oleshchuk, Vladimir A; Li, Frank Yong (Conference object; Peer reviewed, 2009)
      In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The ...
    • A survey on peer-to-peer SIP based communication systems 

      Zheng, Xianghan; Oleshchuk, Vladimir A (Journal article; Peer reviewed, 2010)
      Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each ...
    • Trust-aware RBAC 

      Oleshchuk, Vladimir A (Lecture Notes in Computer Science;7531, Chapter; Peer reviewed, 2012)
      In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with ...