Sandeep Pirbhulal, Sabarathinam Chockalingam, Habtamu Abie, Nathan Lau. Cognitive Digital Twins for Improving Security in IT-OT enabled Healthcare Applications. 26th International Conference on Human-Computer Interaction (HCI) 2024, 29 June - 4 July 2024, Washington DC, USA
Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, Andre Aarnes. Evidence in the fog-Triage in fog computing systems. Forensic Science International: Digital Investigation, Volume 44, Supplement, March 2023, 301506
Sandeep Pirbhulal, Habtamu Abie, Ankur Shukla, Basel Katt. A Cognitive Digital Twin Architecture for Cybersecurity in IoT-based Smart Homes. Fifteenth International Conference on Sensing Technology (ICST 2022), LNEE, Volume 1035, pp 63-70, 2022
Sandeep Pirbhulal, Habtamu Abie, Ankur Shukla. Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications. 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 2022, pp. 1-5, doi: 10.1109/VTC2022-Spring54318.2022.9860581.
Mohamed Hamdi, Sandeep Pirbhulal, Habtamu Abie. A Homomorphic Digital Signature Scheme for the Internet of Things. MDPI IoT, 2022, MDPI IoT, 2022, 18 February 2022, https://www.preprints.org/manuscript/202202.0238/v1
Habtamu Abie, Trenton Schulz, Reijo Savola. Adaptive Security and Trust Management for Autonomous Messaging Systems. arXiv preprint arXiv:2203.03559 (2022)
Denis Trcek, Habtamu Abie, Aasmund Skomedal. Adaptive Safety for Internet of Things in e-Health. arXiv preprint arXiv:2203.05309 (2022).
Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, Andre Aarnes. Quantifying data volatility for IoT forensics with examples from Contiki OS. Forensic Science International: Digital Investigation, volume 40, Supplement, 2022, 301343, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2022.301343.
Ali Hassan Sodhro, Abdullah Lakhan, Sandeep Pirbhulal, Tor Morten Groenli, Habtamu Abie A Lightweight Security Scheme for Failure Detection in Microservices IoT-Edge Networks. In: Sensing Technology pp 397â409, Lecture Notes in Electrical Engineering book series (LNEE,volume 886), 08 June 2022
Omri Soceanu, Lev Greenberg, Allon Adir, Ehud Aharoni and Habtamu Abie Anomaly Detection for Critical Financial Infrastructure Protection. In Cyber-Physical Threat Intelligence for Critical Infrastructures Security. Edited by John Soldatos, Isabel Praca and Aleksandar Jovanovic. pp. 495-514, 2021. Now Publishers. DOI: 10.1561/9781680838237.ch22.
Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, Andre Aarnes Coffee forensics - Reconstructing data in IoT devices running Contiki OS. In Forensic Science International: Digital Investigation, Volume 37, Supplement, July 2021, 301188
Svetlana Boudko, Habtamu Abie, Ethiopia Nigussie, Reijo Savola Towards Federated Learning-Based Collaborative Adaptive Cybersecurity for Multi-Microgrids. International Conference on Wireless Networks and Mobile Systems (WINSYS 2021)
Svetlana Boudko, Peder Aursand, Habtamu Abie Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids. In Information 2020, 11(12), 582; https://doi.org/10.3390/info11120582
Svetlana Boudko, Habtamu Abie, Mirna Boscolo, Davide Ferrario Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions.1In: Kim H., Kim K.J., Park S. (eds) Information Science and Applications. Lecture Notes in Electrical Engineering, vol 739. Springer, Singapore. https://doi.org/10.1007/978-981-33-6385-4_7
Svetlana Boudko, Peder Aursand, Habtamu Abie Evolutionary Game for Confidentiality in IoT-enabled Smart Grids. Preprints 2020, 2020110002 (doi: 10.20944/preprints202011.0002.v1).
Omri Soceanu, Allon Adir, Lev Greenberg, Ehud Aharoni and Habtamu Abie A Cloud-Based Anomaly Detection for IoT Big Data. 1st International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2020)Co-located with ESORICS (25th European Symposium on Research in Computer Security) 2020, Guildford, United Kingdom, 14-18 September 2020
Reijo M. Savola, Markku KylÃÂänpÃÂäÃÂä, Habtamu Abie Risk-driven security metrics for an Android smartphone application. In Int. J. Electronic Business, Vol. 15, No. 4, 2020, pp 297-234. https://doi.org/10.1504/IJEB.2020.111059
Habtamu Abie, Svetlana Boudko, Omri Soceanu, Lev Greenberg, Aidan Shribman, Beatriz Gallego-Nicasio, Enrico Cambiaso, Ivan Vaccari and Maurizio Aiello Adaptive and Intelligent Data Collection and Analytics for Securing Critical Financial Infrastructure. In Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures. Edited by John Soldatos, James Philpot and Gabriele Giunta.2020. pp. 104-142. Now Publishers. DOI: 10.1561/9781680836875.ch7.
Reijo M. Savola, Markku KylÃÂänpÃÂäÃÂä, Habtamu Abie Risk-driven Security Objectives, Controls, and Metrics for an Android Smartphone Application. The submitted (not peer-reviewed) version of https://doi.org/10.1504/IJEB.2020.111059.
Habtamu Abie Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems, In the Proceedings of the IEEE 13th International Symposium on Medical Information and Communication Technology (ISMICT 2019), Oslo, Norway, 8-10 May 2019
Svetlana Boudko and Habtamu Abie Adaptive Cybersecurity Framework for Healthcare Internet of Things, In the Proceedings of the IEEE 13th International Symposium on Medical Information and Communication Technology (ISMICT 2019), Oslo, Norway, 8-10 May 2019
Habtamu Abie: Keynote Speech Cyber-physical critical infrastructure protection: the FINSEC integrated, predictive and collaborative approach, MeSSa 2018-5th International Workshop on Measurability of Security in Software Architectures, in conjunction with the 12th European Conference on Software Architecture (ECSA 2018), 24-28 September, 2018, Madrid, Spain
Svetlana Boudko and Habtamu Abie An Evolutionary Game for Integrity Attacks and Defences for Advanced Metering Infrastructure. In 12th European Conference on Software Architecture: Companion Proceedings (ECSA'18), September 24-28, 2018, Madrid, Spain. ACM, New York, NY, USA, 7 pages. https://doi.org/10.1145/3241403.3241463
Habtamu Abie: Keynote Speech Measurable Adaptive Cyber-Physical Security for IoT Smart Grid, MeSSa 2017-4th International Workshop on Measurability of Security in Software Architectures, in conjunction with the 11th European Conference on Software Architecture, Canterbury, United Kingdom, September 11-15, 2017
Mattias Gebrie, Habtamu Abie Risk-based Adaptive Authentication for Internet of Things in Smart Home eHealth, ECSA '17 Proceedings of the 11th European Conference on Software Architecture, Pages 102-108, Canterbury, United Kingdom, September 11-15, 2017, ACM New York, NY, USA
Mohamed Hamdi, Habtamu Abie A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things, Confidential NR Note, DART/05/2015, September 2015
Denis Trcek, Habtamu Abie, ÃÂÃÂ smund Skomedal Trust based Adaptive Safety for Sensor Networks in e-Health, Confidential NR Note, DART/06/2015, September 2015
Josef Noll, IÃÂñaki Garitano, Seraj Fayyad, Erik ÃÂàsberg and Habtamu Abie Measurable Security, Privacy and Dependability in Smart Grids, Journal of Cyber Security, Vol. 3, 371?398, 3 April 2015, River Publishers, doi: 10.13052/jcsm2245-1439.342
Antti Evesti, Habtamu Abie, Reijo
Savola Security
Measuring for Self-adaptive Security, ECSAW, August 25 - 29 2014, Vienna, Austria
Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek,
ÃÂÃÂ smund Skomedal Towards Run-Time Verification of Adaptive Security for IoT in eHealth, ECSAW, August 25 - 29 2014, Vienna, Austria.
Mohamed Hamdi and Habtamu Abie, Game-Based Adaptive Security in the Internet of Things for eHealth, IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014
Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
Reijo M. Savola and Habtamu Abie Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things
(ASPI) 2013, Sept. 8, 2013, ZÃÂürich, Switzerland, 8
p. http://dx.doi.org/10.1145/2523501.2523507, ACM (ISBN
978-1-4503-2543-1), 2013
Yared Berhanu, Habtamu Abie, and Mohamed Hamdi A Testbed for
Adaptive Security for IoT in eHealth. Int. Workshop on
Adaptive Security & Privacy Management for the Internet of Things
(ASPI) 2013, Sept. 8, 2013, ZÃÂürich, Switzerland, 8
p. http://dx.doi.org/10.1145/2523501.2523506 ACM (ISBN
978-1-4503-2543-1), 2013
Stefan Poslad, Mohamed Hamdi, and Habtamu Abie Adaptive Security &
Privacy management for the Internet of Things (ASPI
2013). In Proc. of UbiComp '13 Adjunct Proceedings of
the 2013 ACM conference on Pervasive and ubiquitous computing
adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378,
http://dx.doi.org/10.1145/2494091.2499770
Yared Berhanu and Habtamu Abie Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth. NR-notat DART/07/2013. pp 25. 2013.
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd Development and validation of requirements for
evidential value for assessing trustworthiness of digital records
over time, Information Journal, Vol. 16, No. 3(A),
pp. 1945-1980, March 2013, http://www.information-iii.org/abs_e2.html#No3%28A%29-2013
Habtamu Abie and John Borking Risk Analysis
Methods and Practices: Privacy Risk Analysis
Methodology, Report DART/05/2012, September 4,
2012
Habtamu Abie and Ilangko Balasingham Risk-Based
Adaptive Security for Smart IoT in eHealth, 7th
International Conference on Body Area Networks (BODYNETS 2012),
Workshop on Security Tools and Techniques for Internet of Things
(SeTTIT 2012), September 24ÃÂÃÂ26, 2012, Oslo, Norway.
Reijo M. Savola, Habtamu Abie, and Markus Sihvonen Towards
Metrics-Driven Adaptive Security Management in E-Health IoT
Applications, 7th International Conference on Body
Area Networks (BODYNETS 2012), Workshop on Security Tools and
Techniques for Internet of Things (SeTTIT 2012), September 24-26,
2012, Oslo, Norway.
Wolfgang Leister, PÃÂÃÂ¥l Anders Floor, Yared Berhanu Woldegiorgis,
Ilangko Balasingham, and Habtamu Abie Defining the ASSET
Lab, NR-notat DART/16/2012. pp 43. 2012
Wolfgang Leister, Habtamu Abie, and Stefan Poslad Defining the ASSET
Scenarios, NR-notat DART/17/2012. pp 17. 2012
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd A
Framework for the Assessment of the Trustworthiness of Digital
Records over Time, IEEE ISSR-2011 (Third IEEE
International Workshop on Security in e-Science and e-Research),
Changsha, China, November 16-18, 2011
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd On
Time, Conflict, Weighting and Dependency Aspects of Assessing the
Trustworthiness of Digital Records, DEPEND 2011 (The
Fourth International Conference on Dependability), August 21-27,
2011 - French Riviera, Nice/Saint Laurent du Var, France
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd Assessment of the Trustworthiness of Digital
Records, IFIPTM 2011 5th IFIP WG 11.11 International
Conference on Trust Management, June 29 - July 1, 2011, Copenhagen,
Denmark
Mohamed Hamdi, Habtamu Abie A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things, Confidential NR Note, DART/05/2015, September 2015
Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie, and Markus Sihvonen Risk-Driven Security Metrics Development for an e-Health IoT Application, Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3
Denis Trcek, Habtamu Abie, ÃÂÃÂ smund Skomedal Trust based Adaptive Safety for Sensor Networks in e-Health, Confidential NR Note, DART/06/2015, September 2015
Josef Noll, IÃÂñaki Garitano, Seraj Fayyad, Erik ÃÂàsberg and Habtamu Abie Measurable Security, Privacy and Dependability in Smart Grids, Journal of Cyber Security, Vol. 3, 371?398, 3 April 2015, River Publishers, doi: 10.13052/jcsm2245-1439.342
Antti Evesti, Habtamu Abie, Reijo
Savola Security
Measuring for Self-adaptive Security, ECSAW, August 25 - 29 2014, Vienna, Austria
Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek,
ÃÂÃÂ smund Skomedal Towards Run-Time Verification of Adaptive Security for IoT in eHealth, ECSAW, August 25 - 29 2014, Vienna, Austria.
Mohamed Hamdi and Habtamu Abie, Game-Based Adaptive Security in the Internet of Things for eHealth, IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014
Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
Reijo M. Savola and Habtamu Abie Metrics-Driven
Security Objective Decomposition for an E-Health Application with
Adaptive Security Management. Int. Workshop on
Adaptive Security & Privacy Management for the Internet of Things
(ASPI) 2013, Sept. 8, 2013, ZÃÂürich, Switzerland, 8
p. http://dx.doi.org/10.1145/2523501.2523507, ACM (ISBN
978-1-4503-2543-1), 2013
Yared Berhanu, Habtamu Abie, and Mohamed Hamdi A Testbed for
Adaptive Security for IoT in eHealth. Int. Workshop on
Adaptive Security & Privacy Management for the Internet of Things
(ASPI) 2013, Sept. 8, 2013, ZÃÂürich, Switzerland, 8
p. http://dx.doi.org/10.1145/2523501.2523506 ACM (ISBN
978-1-4503-2543-1), 2013
Stefan Poslad, Mohamed Hamdi, and Habtamu Abie Adaptive Security &
Privacy management for the Internet of Things (ASPI
2013). In Proc. of UbiComp '13 Adjunct Proceedings of
the 2013 ACM conference on Pervasive and ubiquitous computing
adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378,
http://dx.doi.org/10.1145/2494091.2499770
Yared Berhanu and Habtamu Abie Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth. NR-notat DART/07/2013. pp 25. 2013.
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd Development and validation of requirements for
evidential value for assessing trustworthiness of digital records
over time, Information Journal, Vol. 16, No. 3(A),
pp. 1945-1980, March 2013, http://www.information-iii.org/abs_e2.html#No3%28A%29-2013
Habtamu Abie and John Borking Risk Analysis
Methods and Practices: Privacy Risk Analysis
Methodology, Report DART/05/2012, September 4,
2012
Habtamu Abie and Ilangko Balasingham Risk-Based
Adaptive Security for Smart IoT in eHealth, 7th
International Conference on Body Area Networks (BODYNETS 2012),
Workshop on Security Tools and Techniques for Internet of Things
(SeTTIT 2012), September 24ÃÂÃÂ26, 2012, Oslo, Norway.
Reijo M. Savola, Habtamu Abie, and Markus Sihvonen Towards
Metrics-Driven Adaptive Security Management in E-Health IoT
Applications, 7th International Conference on Body
Area Networks (BODYNETS 2012), Workshop on Security Tools and
Techniques for Internet of Things (SeTTIT 2012), September 24-26,
2012, Oslo, Norway.
Wolfgang Leister, PÃÂÃÂ¥l Anders Floor, Yared Berhanu Woldegiorgis,
Ilangko Balasingham, and Habtamu Abie Defining the ASSET
Lab, NR-notat DART/16/2012. pp 43. 2012
Wolfgang Leister, Habtamu Abie, and Stefan Poslad Defining the ASSET
Scenarios, NR-notat DART/17/2012. pp 17. 2012
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd A
Framework for the Assessment of the Trustworthiness of Digital
Records over Time, IEEE ISSR-2011 (Third IEEE
International Workshop on Security in e-Science and e-Research),
Changsha, China, November 16-18, 2011
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd On
Time, Conflict, Weighting and Dependency Aspects of Assessing the
Trustworthiness of Digital Records, DEPEND 2011 (The
Fourth International Conference on Dependability), August 21-27,
2011 - French Riviera, Nice/Saint Laurent du Var, France
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad, and Mads
NygÃÂÃÂ¥rd Assessment of the Trustworthiness of Digital
Records, IFIPTM 2011 5th IFIP WG 11.11 International
Conference on Trust Management, June 29 - July 1, 2011, Copenhagen,
Denmark
Habtamu Abie, Reijo M. Savola, Jinfu Wang, and Domenico Rotondi Advances in Adaptive Secure Message Oriented Middleware for Distributed Business Critical Systems, 8th International Conference of Numerical Analysis and Applied Mathematics (ICNAAM 2010), September 19-25, 2010, Rhodes, Greece
Habtamu Abie, Reijo M. Savola, John Bigham, Ilesh Dattani, Domenico Rotondi, and Giorgio Da Bormida Self-Healing and Secure Adaptive Messaging Middleware for Business Critical Systems, In: International Journal on Advances in Security, ISSN 1942-2636, Vol. 3, No. 1&2, September 5, 2010, 34-51, http://wwww.iariajournals.org/security/
Lorenzo Blasi, Reijo M. Savola, Habtamu Abie, and Domenico Rotondi Applicability of Security Metrics for Adaptive Security Management in a Universal Banking Hub System, 1st International Workshop on Measurability of Security in Software Architectures (MeSSa 2010), Copenhagen, Denmark, August 23, 2010
Mohamed Hamdi, Noureddine Boudriga, Habtamu Abie, and Mieso Denko Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments, International Conference on Data Communication Networking 2010 (DCNET 2010) part of 7th International Joint Conference on e-Business and Telecommunications 2010 (ICETE 2010), July 26-28, 2010, Athens, Greece, pp 85-92, ISBN 978-989-8425-25-6
Reijo Savola and Habtamu Abie Development of Measurable Security for a Distributed Messaging System, In: International Journal on Advances in Security, Vol. 2, No. 4, 2009, ISSN 1942-2636, pp 358-380 (Published in March 2010) http://www.iariajournals.org/security/
Denis Trcek, Habtamu Abie, ÃÂÃÂ smund Skomedal and Iztok Starc
Advanced Framework for Digital Forensic Technologies and Procedures, Journal of Forensic Sciences, American Academy of Forensic Sciences, 23 August 2010, Wiley-Blackwel, Available online at: interscience.wiley.com
Reijo Savola, Habtamu Abie, John Bigham, and Domenico Rotondi Innovations and
Advances in Adaptive Secure Message-Oriented Middleware - the GEMOM Project.. In: The 2nd Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (RDCS 2010), in Proceedings of the 2010 International Conference on Distributed Computing Systems Workshops (IDCSW 2010), June 21-25, 2010, Genoa, Italy, ISBN-13: 978-0-7695-4079-5, pp. 288-289.
Habtamu Abie, Reijo Savola and Ilesh Dattani
Robust, Secure, Self-Adaptive and Resilient Messaging Middleware for Business Critical Systems,The First International Conference on Adaptive and Self-adaptive Systems and Applications, ADAPTIVE 2009, November 15-20, 2009 - Athens/Glyfada, Greece, Best Paper Award
Reijo Savola and Habtamu Abie
Development
of Security Metrics for a Distributed Messaging System, The 3rd
International Conference on Application of Information and
Communication Technologies, AICT2009, Azerbaijan, Baku, 14-16 October 2009,ISBN: 978-1-4244-4739-8, doi: 10.1109/ICAICT.2009.5372566
Habtamu Abie
Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware, IEEE Symposium on Trust, Security and Privacy for Pervasive Applications (TSP) 2009, October 12-14, 2009 in Macau SAR, P.R.China
Jianqiang Ma, Habtamu Abie, TorbjÃÂørn Skramstad and Mads NygÃÂÃÂ¥rd
Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time, IEEE Symposium on Trust, Security and Privacy for Pervasive Applications (TSP) 2009, October 12-14, 2009 in Macau SAR, P.R.China
Reijo Savola and Habtamu Abie On-Line and Off-Line Security Measurement Framework for Mobile
Ad Hoc Networks, Journal of Networks Special Issue on
Security of Wireless Communication Systems, Academy Publisher,
Volume 4, Issue 7, September 2009
Reijo Savola and Habtamu Abie Identification of Basic Measurable Security Components for a
Distributed Messaging System, The 3rd International Conference
on Emerging Security Information, Systems and Technologies (SECURWARE)
2009, June 18-23, 2009 - Athens/Glyfada, Greece, Best Paper Award
Habtamu Abie, Ilesh Dattani, Milan Novkovic, John Bigham, Shaun Topham, and Reijo Savola GEMOM (Genetic Message Oriented Secure Middleware) - Significant and Measurable Progress beyond the State of the Art, The Third International Conference on
Systems and Networks Communications, ICSNC 2008, October 26-31, 2008 -
Sliema, Malta
Wolfgang Leister, Habtamu Abie, Arne-Kristian Groven, Truls Fretland, Ilangko Balasingham Threat Assessment of Wireless Patient Monitoring Systems, ICTTA'08 (Intl. Conf. on Information and Communication Technologies: From Theory to Practice), April 08, 2008
Lothar Fritsch and Habtamu Abie Towards a Research Road Map for the Management of Privacy Risks in Information Systems, SICHERHEIT 2008 - Proceedings - Lecture Notes in Informatics
Jianqiang Ma, Habtamu Abie and TorbjÃÂørn Skramstad Preservation of Trust and Security in Long-Term Record Management, Sixth Annual Conference on Privacy, Security and Trust, Graduate Student Symposium (PST2008), October 1-3, 2008, Delta Fredericton, New Brunswick, Canada
Habtamu Abie Frontiers of DRM Knowledge and Technology, IJCSNS International Journal of Computer Science and Network Security, Vol.7, No.1, pp 216-231, January 30, 2007
Habtamu Abie The Establishment of a National IT Security Body in a Nutshell: A Suggested Perspective on the Absorption of ICT by African Countries, submitted to the African Union, Economic Commission for Africa, and Secretary of the United Nations, May 10, 2006
A. Mana, M. Yague, S. Karnoukos and H. Abie Information Use-Control in Digital Government Applications, book chapter in Encyclopaedia for Digital Government, May 2006, Idea Group Reference
Habtamu Abie A Distributed Digital Rights Management Model, Series
of dissertations submitted to the Faculty of Mathematics and Natural Sciences, University of Oslo, Pages 182, January 15, 2005, ISSN 1501-7710, UniPub AS
Habtamu Abie, PÃÂÃÂ¥l Spilling and Bent Foyn Rights-Carrying and Self-Enforcing Information Objects for Information Distribution Systems, book chapter in Information And Communications Security: 6th International
Conference, Icics 2004, Malaga, Spain, October 27-29, 2004, Proceedings by Javier Lopez, ISBN 3540235639, Springer-Verlag New York Inc, 546(17), December 2004
H. Abie, P. Spilling and B. Foyn A Distributed Digital Rights Management Model for Secure Information Distribution Systems,
International Journal of Information Security (IJIS), Springer-Verlag,2004
H. Abie, B. Foyn, J. Bing, B. Blobel, P. Pharow, J. Delgado,
S. Karnouskos, O. PitkÃÂänen, and D. Tzovaras The Need for a Digital Rights Management Framework for the Next Generation of E-Government Services, International Journal of Electronic Government, Vol. 1 No.1, pp 8-28, Inderscience Publishers, (ISSN: Print 1740-7494, Online 1740-7508), 2004
Habtamu Abie, PÃÂÃÂ¥l Spilling and Bent Foyn Rights-Carrying and Self-Enforcing Information Objects for Information Distribution Systems, in the Proc. of the Sixth International Conferences on Information and
Communications Security - ICICS'04 -
October 27-29, 2004, Malaga, Spain
H. Abie, D. B. Aredo, T. Kristoffersen, S. Mazaher and T. Raguin Integrating a Security Requirement Language with UML, in the Proc. of the Seventh International Conference on UML Modelling Languages and Applications - UML2004 - October 11-15,
2004, Lisbon, Portugal
Habtamu Abie, PÃÂÃÂ¥l Spilling and Bent Foyn Authentication and Authorization for Digital Rights Management for Information Distribution Systems, The IASTED International Conference on Communication, Network, and Information Security, CNIS2003, Architecture and Languages for Digital Rights Management and Access Control, December 10-12, 2003, New York, USA
Habtamu Abie A Rights Management Model for Distributed Object-Oriented Information Distribution Systems, in the Proc. of IFIP WG6.7 Workshop and EUNICE on Adaptable Networks and Teleservices September 2-4, 2002, NTNU Trondheim, Norway
Abie, H. et al. Control Protocol: Large Scale
Implementation at the CERN PS Complex, CERN/PS 93-46 (CO),
International Conference on Accelerator and Large Experimental Physics
Control Systems (ICALEPCS), Berlin, Germany, October 18-22, 1993
Delphi Collaboration The DELPHI detector at LEP, Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, 303(2), 01/06/1991, 233-276, North-Holland
P. Aarnio, H. Abie et al.(645) DELPHI
Collaboration/The DELPHI
detector at LEP, Nuclear Instruments and Methods in Physics
Research A303 (1991) 233-276, Elsevier Science Publishers B.V. (North-Holland), 1991.
Ph.D. and M.Sc. Theses
Habtamu Abie, Ph.D. (Dr. Scient.) Thesis A Distributed Digital Rights
Management Model for Secure Information Distribution Systems (Abstact) whose primary aim was to investigate and develop a distributed DRM model that manages access to and use of digital information objects persistently and fine-grainedly, and protects the privacy of users in a flexible and secure fashion. Departement of Informatics, University of
Oslo, November 2004
Habtamu Abie, Master's (Cand. Scient.) Thesis Monitoring and Control of the
LEP-DELPHI Small Angle Detector (Abstract), Departement of Informatics, University of Oslo, November 1988.
Technical Reports and Presentations
Habtamu Abie, Wolfgang Leister. Case Study Validation: Deliverable D6.3. Oslo: Norsk Regnesentral 2015 20 s. NR-notat(DART/18/2015)
Habtamu Abie, Wolfgang Leister.Case Study Simulation and Evaluation: Deliverable 6.2. Oslo: Norsk Regnesentral 2015 15 s. NR-notat(DART/17/2015)
Habtamu Abie, Wolfgang Leister. Case Study Gap Analysis: Deliverable D6.1. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/16/2015)
Habtamu Abie. Evaluation and Validation Using Metrics: Deliverable D5.2. Oslo: Norsk Regnesentral 2015 22 s. NR-notat(DART/15/2015)
Habtamu Abie. Development of Metrics: Deliverable D5.1. Oslo: Norsk Regnesentral 2015 26 s. NR-notat(DART/14/2015)
Habtamu Abie. Optimizing and Combining Algorithms: Deliverable D4.3. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/13/2015)
Habtamu Abie.Prototyping of Methods: Deliverable D4.2. Oslo: Norsk Regnesentral 2015 19 s. NR-notat(DART/12/2015)
Habtamu Abie. Game Theory and Risk Models: Deliverable D4.1. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/11/2015)
Habtamu Abie.ASSET Project 213131 Progress Report 2015: Reporting Period 01/10/2014-30/09/2015. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/08/2015)
Habtamu Abie, Stefan Poslad, Wolfgang Leister. ASSET Project 213131 2015 Final Annual Meeting, 05-06 March: Meeting Minutes & Documentation. Oslo: Norsk Regnesentral 2015 25 s. NR-notat(DART/07/2015)
Habtamu Abie. ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014, September 30,2014. Oslo: NR 2014 22 s. NR-notat(DART/07/2014)
Habtamu Abie, Wolfgang Leister, and Trenton Schulz.ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation. NR-notat DART/01/2014. pp 28. 2014.
Habtamu Abie, Mohamed Hamdi, Stefan Poslad, PÃÂÃÂ¥l Anders. Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth, Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013
Habtamu Abie, Mohamed Hamdi, Stefan Poslad.Analysis of Reasoning Methods, Deliverable D3.1, NR-notat DART/10/2013, 27 September 2013
Habtamu Abie.ASSET Project 213131 Progress Report 2013: Reporting Period 01/10/2012-30/09/2013. Oslo: Norsk Regnesentral 2013 22 s. NR-notat(DART/11/2013)
Yared Berhanu Woldegiorgis, Habtamu Abie.Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth, NR-Notat (DART/07/2013), 16. August. 2013
Lothar Fritsch, Habtamu Abie. 2nd PETweb II & ASSET joint PhD Seminar. Oslo: Norsk Regnesentral 2013 99 s. NR-notat(DART/01/2013)
Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan. Defining the ASSET Scenarios, Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
Leister, Wolfgang; Floor, PÃÂÃÂ¥l Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu.Defining the ASSET Lab, Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS
Habtamu Abie, "National Center of Excellence for Supporting a
High Level of IT Security", NR Note GEM/04/02, 2002
Habtamu Abie, "LAVA e-Learning: Security Model and Architecture", NR Note GEM/06/02, 2002
Habtamu Abie, Tom A. Opperud, and Jon Haugsand, "Surveying the Requirements for Middleware Security", Telenor (internal report), February 11, 2001
Habtamu Abie, Knut Boge, Jon Haugsand, Jon Skritting, and Jon ÃÂÃÂlnes (contributors from NR), "Specifications of the Cross-Security Harmonizing Platform with all its Components and Features Focused on Telemedicine Scenarios", EU Project Report, IST project IST-1999-10923 HARP, Deliverable 3.1, January 31, 2001
Habtamu Abie, Jon Haugsand, and Jon ÃÂÃÂlnes (contributors from NR), "List and Description of Criteria for Evaluating WWW-tools, technologies, products, security requirements, and telemedicine scenarios", EU Project Report, IST project IST-1999-10923 HARP, Deliverable 2.1, July 2000
Abie, H. and Beckmann, H. (1994) Analysis, specification and modelling
of ABB Tralfa's robot system for Continuous Programming (CP) mode (both
teaching and running) using the Coad/Yourdon Object Model, ABB Corporate
Research, Internal Report, July 1994.
Abie, H. et al. (1994) ABB Corporate Research, The SATCOM Test
Case (Experiment Q), Service Creation in an Object-oriented Reuse Environment
(SCORE) - RACE Ref.: 2017, A334AB01, August 15, 1994 (co-author)
Abie, H. et al. (1993) Control Protocol: Large Scale
Implementation at the CERN PS Complex - A First Assesment, CERN/PS
93-46 (CO), PS Reports, 1993
Abie, H. et al. (1993) MPV908 Analog I/O VMEbus Board Driver,
CERN PS/PO Note 93-10, CERN Geneva 23, Switzerland, January 05, 1993.
Abie, H. and Gruber, J. (1993) QSPIRES on SLACVM: How to use it, CERN PS/PO/Note 93-20 (Inf.), CERN Geneva 23, Switzerland, June 28, 1993.
Abie, H. and Heinze, W. (1992) MPV908A-ADC VMEbus Board Driver
under LynxOS, CERN PS/PO Note 92-07, CERN Geneva 23, Switzerland,
September 29, 1992.
Abie, H. et al. (1992) Real-Time Control Of The CERN Linac
Power Supplies, PS/CO-PO, Internal report, CERN Geneva 23, Switzerland, 1992
Abie, H. and Gagnaire, A. (1991) Installing Dynamically Loadable Device
Drivers under LynxOS in the DSC at PS, CERN PS/PO, CERN Geneva 23, Switzerland,
June 3, 1991.
Smart
University'05 - September 20-23, 2005, Sophia Antipolis - French Riviera
ICICS'04 - Sixth
International Conference on Information and Communications Security,
October 27-29, 2004, Malaga, Spain
IASTED CNIS 2003 - The IASTED International Conference on Communication, Network, and
Information Security, CNIS 2003, December 10-12, 2003,New York, USA
NORDSEC
2003, October 15-17, 2003, GjÃÂøvik, Norway
ESORICS 2003 - 8th European Symposium on Research in Computer Security, October 13-15, 2003, GjÃÂøvik, Norway
MobileIPR 2003, First International Mobile IPR Workshop: Rights
Management of Information Products on the Mobile Internet, August
27-28, 2003, HIIT, Helsinki, Finland