• Decision-cache based XACML authorisation and anonymisation for XML documents 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A (Journal article; Peer reviewed, 2012)
      This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element ...
    • Design requirements for a patient administered personal electronic health record 

      Fensli, Rune; Oleshchuk, Vladimir A; O'Donoghue, John; O'Reilly, Philip (Chapter; Peer reviewed, 2011)
    • Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A; Køien, Geir M. (Journal article; Peer reviewed, 2010)
      The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation ...
    • Mobile security with location-aware role-based access control 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;94, Chapter; Peer reviewed, 2012)
      This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation ...
    • Privacy Violation Classification of Snort Ruleset 

      Ulltveit-Moe, Nils; Oleshchuk, Vladimir A (Journal article; Peer reviewed, 2010)
      It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand and quantify the privacy-invasiveness of network monitoring services. The objective in this paper is to classify ...
    • Remote Patient Monitoring Within a Future 5G Infrastructure 

      Oleshchuk, Vladimir A; Fensli, Rune (Peer reviewed; Journal article, 2010)
      Systems of wearable or implantable medical devices (IMD), sensor systems for monitoring and transmitting physiological recorded signals, will in future health care services be used for purposes of remote monitoring. Today, ...
    • Secure Group Communication Using Fractional Public Keys 

      Eskeland, Sigurd; Oleshchuk, Vladimir A (Peer reviewed; Journal article, 2010)
      In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed ...
    • Secure interworking with P2PSIP and IMS 

      Zheng, Xianghan; Oleshchuk, Vladimir A (Academic article, 2010)
      In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3. party ...
    • Security in mobile wireless sensor networks - A survey 

      Ren, Yi; Oleshchuk, Vladimir A; Li, Frank Yong; Ge, Xiaohu (Journal article; Peer reviewed, 2011)
      Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various ...
    • A spatial role-based authorization framework for sensor network-assisted indoor WLANs 

      Ren, Yi; Oleshchuk, Vladimir A; Li, Frank Yong (Chapter; Peer reviewed, 2009)
      In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The ...
    • A survey on peer-to-peer SIP based communication systems 

      Zheng, Xianghan; Oleshchuk, Vladimir A (Journal article; Peer reviewed, 2010)
      Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each ...
    • Trust-aware RBAC 

      Oleshchuk, Vladimir A (Lecture Notes in Computer Science;7531, Chapter; Peer reviewed, 2012)
      In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with ...