2023 - Research.com Computer Science in Norway Leader Award
2022 - Research.com Computer Science in Norway Leader Award
His scientific interests lie mostly in Computational trust, Computer security, Subjective logic, Reputation system and Trust anchor. The Web of trust research Audun Jøsang does as part of his general Computational trust study is frequently linked to other disciplines of science, such as Knowledge management, Internet privacy and Focus, therefore creating a link between diverse domains of science. His Internet privacy study combines topics from a wide range of disciplines, such as E-commerce, User-centered design, Identity management, Usability and Service provider.
His Computer security research incorporates elements of Control and Protocol. His Subjective logic study introduces a deeper knowledge of Artificial intelligence. His study in Marketing is interdisciplinary in nature, drawing from both Statistical theory, Simplicity and Collaborative filtering.
The scientist’s investigation covers issues in Computer security, Subjective logic, Artificial intelligence, Internet privacy and Computational trust. His Computer security study incorporates themes from Service provider and Usability. Audun Jøsang focuses mostly in the field of Subjective logic, narrowing it down to matters related to Theoretical computer science and, in some cases, Transitive relation.
Much of his study explores Artificial intelligence relationship to Machine learning. Internet privacy is closely attributed to The Internet in his research. His work in the fields of Computational trust, such as Trust anchor, overlaps with other areas such as Knowledge management, Trust management, Express trust and Information security.
Audun Jøsang mostly deals with Subjective logic, Computer security, Artificial intelligence, Probability distribution and Authentication. His Subjective logic research integrates issues from Vagueness, Bayesian network, Multinomial distribution and Calculus. Audun Jøsang integrates many fields, such as Multinomial distribution and Computational trust, in his works.
His biological study deals with issues like Data-driven, which deal with fields such as Threat assessment. His Artificial intelligence study combines topics in areas such as Truth table and Natural language processing. His work in the fields of Authentication, such as Identity management, intersects with other areas such as USable.
His primary areas of study are Subjective logic, Artificial intelligence, Vagueness, Computer security and Probability distribution. The concepts of his Subjective logic study are interwoven with issues in Discrete mathematics and Expected utility hypothesis. His studies in Artificial intelligence integrate themes in fields like Cognitive science and Natural language processing.
Audun Jøsang interconnects Variety, Data-driven and Premise in the investigation of issues within Computer security. His Probability distribution study integrates concerns from other disciplines, such as Machine learning, Bayesian network, Probabilistic logic and Random variable. He integrates many fields, such as Multinomial distribution, Base and Computational trust, in his works.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A survey of trust and reputation systems for online service provision
Audun Jøsang;Roslan Ismail;Colin Boyd.
decision support systems (2007)
The Beta Reputation System
Roslan Ismail;Audun Josang.
bled econference (2002)
A logic for uncertain probabilities
Audun Jøsang.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (2001)
Filtering Out Unfair Ratings in Bayesian Reputation Systems
A. Whitby;A. Josang;J. Indulska.
The Third International Joint Conference on Autonomous Agenst Systems (2004)
Trust network analysis with subjective logic
Audun Jøsang;Ross Hayward;Simon Pope.
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48 (2006)
An Algebra for Assessing Trust in Certification Chains.
Audun Jøsang.
network and distributed system security symposium (1999)
Semantic constraints for trust transitivity
Audun Jøsang;Simon Pope.
asia pacific conference on conceptual modelling (2005)
The right type of trust for distributed systems
Audun Jøsang.
new security paradigms workshop (1996)
Analysing the Relationship between Risk and Trust
Audun Jøsang;Stéphane Lo Presti.
international conference on trust management (2004)
Exploring different types of trust propagation
Audun Jøsang;Stephen Marsh;Simon Pope.
international conference on trust management (2006)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Queensland University of Technology
Norwegian University of Science and Technology
United States Army Research Laboratory
Nanyang Technological University
Office National d'Études et de Recherches Aérospatiales
University of Queensland
Guangzhou University
University of Glasgow
City University of Macau
University of Maryland, College Park
Delft University of Technology
Memorial University of Newfoundland
National Technical University of Athens
University of Helsinki
National Institute of Standards and Technology
Sichuan University
Korea Institute of Science and Technology
University of Valencia
University of Stirling
University of Buenos Aires
University of Exeter
Science Systems and Applications (United States)
Oswaldo Cruz Foundation
University of Melbourne
University of Bristol
Collège de France