SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Lindskog Stefan) srt2:(2000-2004)"

Search: WFRF:(Lindskog Stefan) > (2000-2004)

  • Result 1-21 of 21
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR6.1: Report on the knowledge gaps to be filled and the action plan
  • 2004
  • Reports (peer-reviewed)abstract
    • The EU FP6 network of excellence in wireless communication, Newcom, is a large network that covers most areas of wireless communication. The research work within Newcom is organized into a number of departments and projects where Department 6 addresses Protocols and Architectures, and Traffic Modelling for (Reconfigurable/ Adaptive) Wireless Networks. The scope of Department 6 is quite broad making it important to further identify and refine the focus areas of the department. This document summarizes research areas that fall within the competence of and are of interest for the members of Department 6 and also describes the background of the partners within these areas. A set of knowledge gaps that will be addressed within the department are identified. A number of integrating activities that can be used to coordinate the efforts of the partners are described and an action plan for the continued work within the department is provided
  •  
3.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR7.1: Report on the knowledge gaps to be filled and the action plan
  • 2004
  • Reports (peer-reviewed)abstract
    • This deliverable is the starting point of the activities in the NEWCOM Department 7 QoS Provision in Wireless Networks: Mobility, Security and Radio Resource Management. It provides the view of the department in terms of the objectives of the European research on Wireless Network aspects and, after developing the framework for QoS provision in wireless networks, it identifies the knowledge gaps existing in the fields of radio resource allocation, mobility management and security issues. As a result of that, the action plan for the future activities in the department is established
  •  
4.
  • Bubenko jr, Janis, et al. (author)
  • Promote IT 2004 : Proceedings of the Fourth Conference for the Promotion of research in IT at New Universities and University Colleges in Sweden, 5-7 May, Karlstad University, The Knowledge Foundation, Part 1 and Part 2
  • 2004
  • Book (peer-reviewed)abstract
    • The Knowledge Foundation of Sweden and Karlstad University are proud to announce the fourth annual conference for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. The conference takes place at Karlstad University in Sweden, May 5-7, 2004.The conference is in the Foundation's programme for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. Almost 200 MSEK (about 22 MEUR) has been allocated, for a period of five years, in order to increase the number of IT-teachers with a PhD. degree at Sweden's new universities and university colleges.Since the start of the programme in year 2000, almost one hundred persons are actively pursuing their graduate studies and research at these new universities and colleges. These are the persons that now present their progress at this conference
  •  
5.
  • Hallman, Mats, et al. (author)
  • A clinical histologic study of bovine hydroxyapatite in combination with autogenous bone and fibrin glue for maxillary sinus floor augmentation. Results after 6 to 8 months of healing.
  • 2001
  • In: Clinical Oral Implants Research. - : Wiley. - 0905-7161 .- 1600-0501. ; 12:2, s. 135-143
  • Journal article (peer-reviewed)abstract
    • Biopsies were taken from 16 out of 20 consecutive referral patients 6 to 8 months after maxillary sinus floor augmentation with a mixture of bovine hydroxyapatite (BH), autogenous bone particles and fibrin glue. Four days prior to biopsy retrieval the patients were given a single dose of tetracycline to label bone forming sites. Fluorescence microscopy of 100 microm thick sections revealed active bone formation in conjunction with the BH particles in 14 of 15 specimens analysed. Light microscopy and morphometry of ground sections from 16 patients showed various amounts of mineralised bone tissue in all except one specimen. In the latter case, the BH particles were encapsulated by a dense fibrous connective tissue. Sections from the augmented areas were occupied by non-mineralized tissue (54.1+12.6%), lamellar bone (21.2+24.5%), BH particles (14.5+10.3%) and woven bone (10.2+13.4%). The non-mineralized tissue seen in bone forming areas consisted of a loose connective tissue, rich of vessels and cells, and in the periphery of a more dense fibrous connective tissue. Woven bone with large and scattered osteocyte lacunae was bridging between the BH particles and the lamellar trabecular bone. There were no signs of resorption of the BH particles. The lamellar bone appeared to have originated from the recipient site and was seldom in contact with the BH particles. It is concluded that the tested implant material has bone conducting properties. The bone associated with the BH particles after 6 to 8 months of healing was mainly woven.
  •  
6.
  • Hedbom, Hans, et al. (author)
  • Risks and Dangers of Security Extensions
  • 2001
  • Conference paper (peer-reviewed)abstract
    • Securing computer systems is an increasing concern as more and more systems are connected together in large networks. Traditional operating system based protection mechanisms have failed to fully meet the demands of this new situation. To overcome some of the shortcomings of these mechanisms new types have been developed with the intention to stop or reduce the impact of the new threats. We would like to call these new mechanisms security extensions, since they are not usually part of the core operating system. However, security extensions often contain sensitive and vital information that also needs to be secured. Usually they are dependent on the security mechanisms of the operating system for their own protection, i.e., they are dependent on the security of a mechanism whose insecurity they are supposed to patch. This is clearly an undesirable situation. We thus argue that security extensions actually add risks and vulnerabilities to the system when the underlying system is insecure or when they are not capable of handling their own security by themselves. In this paper, we discuss and analyze possible vulnerabilities in three types of security extensions, i.e., anti-malware software, firewalls, and intrusion detection systems. We also introduce a crude classification scheme for the different types of risks that the security extensions discussed add to the system.
  •  
7.
  • Lindskog, Stefan, et al. (author)
  • A Content-Independent Scalable Encryption Model
  • 2004
  • Conference paper (peer-reviewed)abstract
    • User surveys have shown that security will be a key business enabler for applications of future communication systems. These systems will vary dramatically in their security requirementsfrom very low to extremely rigid. The aim of this paper is to demonstrate how security can be treated in a more flexible and dynamic way. We propose here a content-independent model for scalable encryption that is based on a selective encryption paradigm. The main advantage of the model is that users are able to make tradeoffs between security and performance. We describe the design and implementation of the proposed model and make an initial performance analysis
  •  
8.
  • Lindskog, Stefan, 1967, et al. (author)
  • A Content-Independent Scalable Encryption Model
  • 2004
  • In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). - Berlin, Heidelberg : Springer Berlin Heidelberg. - 1611-3349 .- 0302-9743. ; 3043:1, s. 821-830
  • Journal article (peer-reviewed)abstract
    • Various user surveys have shown that security will be a key business enabler for applications of future communication systems. In these, security requirements will vary heavily---from very low to extremely rigid. The aim of this paper is to demonstrate how security could be treated in a more flexible and dynamic way. A content-independent model for scalable encryption, which is based on a partial encryption paradigm, is proposed and described. The main advantage with this model is that the users are able to make trade-offs between security and performance. In the paper, we describe the design and implementation as well as an initial performance analysis of the proposed model.
  •  
9.
  • Lindskog, Stefan, et al. (author)
  • Adding Security to QoS Architectures
  • 2004
  • In: Perspectives on Multimedia: Communication, Media and Information Technology. - West Sussex, UK : John Wiley & Sons.
  • Book chapter (other academic/artistic)abstract
    • In a Quality of Service (QoS) aware communication system, a user is able to choose between various service classes, each with different degrees of reliability, predictability, and efficiency. However, security has not to this time been recognized as a parameter in QoS architectures and no security-related service classes have been defined. This implies that users have no opportunity to configure their own level of security, which is remarkable. This paper surveys QoS architectures from a security perspective and gives some initial ideas on how QoS architectures can be extended by a security dimension
  •  
10.
  • Lindskog, Stefan, 1967, et al. (author)
  • Adding Security to QoS Architectures
  • 2004
  • In: Perspectives on Multimedia: Communication, Media and Information Technology. - 0470868635 ; , s. 145-158
  • Book chapter (other academic/artistic)abstract
    • In a Quality of Service (QoS) aware communication system, a user is able to choose between various service classes, each with different reliability, predictability, and efficiency degrees. However, until now security has not been recognized as a parameter in QoS architectures and no security-related service classes have been defined. This implies that users have no chance of configuring their level of security, which is remarkable. This paper contains a survey of QoS architectures as seen from a security point of view and gives some initial ideas on how QoS architectures can be extended with a security dimension.
  •  
11.
  • Lindskog, Stefan, et al. (author)
  • Adding Security to Quality of Service Architectures
  • 2002
  • Conference paper (peer-reviewed)abstract
    • In a Quality of Service (QoS) aware communication system, a user is able to choose between various service classes, each with different reliability, predictability, and efficiency degrees. However, until now security has not been recognized as a parameter in QoS architectures and no security-related service classes have been defined. This implies that end-users have no chance of configuring their level of security, which is remarkable. This paper contains a survey of QoS architectures as seen from a security point of view and gives some initial ideas on how QoS architectures can be extended with a security dimension.
  •  
12.
  • Lindskog, Stefan, et al. (author)
  • Different Aspects of Security Problems in Network Operating Systems
  • 2002
  • In: Proceedings of the Third Annual International Systems Security Engineering Association Conference (2002 ISSEA Conference), Orlando, 13-15 Mars 2002. - Orlando, FL, USA.
  • Conference paper (peer-reviewed)abstract
    • This paper presents research on computer security vulnerabilities in general-purpose network operating systems. The objective of this study is to investigate real intrusions in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. The paper is based on empirical data collected from three different systems, UNIX with NFS and NIS, Novell NetWare, and Windows NT. Five common security problems, improper input validation; improper use of cryptography; weak authentication; insecure bootstrapping; improper configuration, are identified, exemplified, and discussed from different perspectives. The work presented represents a further step towards a full understanding of the generic weaknesses that impair commercially available operating systems
  •  
13.
  • Lindskog, Stefan, et al. (author)
  • Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
  • 2004
  • In: Proceedings of the 4th Annual Information Security South Africa Conference. - Johannesburg, South Africa.
  • Conference paper (peer-reviewed)abstract
    • Security should be thought of as a tunable system attribute that allows users to request a specific protection level as a service from the system. This approach will be suitable in future networking environments with heterogeneous devices that have varying computing resources. The approach is also appropriate for multimedia applications that require tuning of the protection level to maintain performance at levels that are acceptable to users. In this paper, we investigate data protection services for network transfers that are designed to offer variable protection levels and propose a taxonomy for such services. The taxonomy provides a unified terminology for dynamic data protection services and a framework in which they can systematically be inspected, evaluated, and compared. The taxonomy is also intended to provide a basis for the development and identification of current and future user and/or application needs. It comprises four dimensions: type of protection service, protection level, protection level specification, and adaptiveness. On the basis of the taxonomy, a survey and categorization of existing dynamic data protection services for network transfers are made
  •  
14.
  • Lindskog, Stefan (author)
  • Observations on Operating System Security Vulnerabilities
  • 2000
  • Licentiate thesis (other academic/artistic)abstract
    • This thesis presents research on computer security vulnerabilities in general-purpose operating systems. The objective is to investigate intrusions in such systems in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. An attempt is made to create a conceptual basis for the generic modeling of vulnerabilities, addressing security concepts, definitions, and terminology. The investigation of intrusions is based on empirical data collected from three different systems, UNIX, Novell NetWare, and Windows NT. The UNIX and Novell NetWare data were generated from a number of practical intrusion experiments with Masters students, while the Windows NT data resulted from a security analysis that we performed ourselves. This analysis showed that Windows NT, initially thought to be quite secure, still displayed a significant number of vulnerabilities. A comparison with earlier UNIX analyses indicates that the security differences between the systems are related more to factors such as time on market and security-by-obscurity than to inherent security performance. A different approach was taken with the Novell NetWare system. Here, the initial experiments showed quite poor security behavior and we have investigated the security evolution as later versions of the system have been released and have reached the conclusion that, even though some effort has been made to improve security, no significant difference has been achieved, primarily due to backward compatibility requirements. In summary, the work performed here represents a further step towards a full understanding of the generic weaknesses and vulnerabilities that impair commercially available operating systems. This understanding is essential to our aspiration to make these systems secure, or at least sufficiently secure. It is expected that this work, when fully accomplished, will comprise a powerful basis for improving the security of operating systems, at least to the extent that research results are taken into consideration by software developers and manufacturers
  •  
15.
  •  
16.
  • Lindskog, Stefan, et al. (author)
  • Phenotypic expression of a family with multiple endocrine neoplasia type 2A due to a RET mutation at codon 618
  • 2004
  • In: The British journal of surgery. - : Oxford University Press (OUP). - 0007-1323 .- 1365-2168. ; 91:6, s. 713-8
  • Journal article (peer-reviewed)abstract
    • BACKGROUND: Multiple endocrine neoplasia type 2A (MEN2A) is caused by missense mutations in the RET proto-oncogene on chromosome 10. This paper reports the phenotypic expression of a family with MEN2A, in which serine substitutes for cysteine at codon 618 in exon 10 of the RET gene. It was first claimed that medullary thyroid cancer (MTC) with this rare mutation led to mild disease; this has recently been updated to intermediate-high risk, based on stratified genetic information. METHODS: The family was mapped over six generations. In 1971 family members were invited to join a screening programme. Genetic testing was started in 1994. RESULTS: Twenty-two individuals with MTC were identified, 16 by the screening programme. One screened patient had a phaeochromocytoma and four had hyperparathyroidism. At surgery for MTC 12 patients had local tumour metastases and two young patients also had liver metastases. No screened patient died from MTC during a mean observation time of 19 years. Six other family members were diagnosed with MTC by signs and symptoms, five of whom died from MTC. CONCLUSION: Because of the great interindividual differences in tumour aggressiveness within the family it is impossible to predict whether an individual gene carrier will have an aggressive MTC or not. This unpredictability is an additional argument, besides those obtained in stratified genetic studies, for operating on gene carriers at young age.
  •  
17.
  • Lindskog, Stefan, et al. (author)
  • [Phenotypic expression of a mutation in MEN 2A documented in a family in the western part of Sweden]. : Fenotypiskt uttryck av mutation vid MEN 2A kartlagd i västsvensk familj.
  • 2001
  • In: Lakartidningen. - 0023-7205. ; 98:35
  • Journal article (other academic/artistic)abstract
    • A missense mutation at codon 618 of the RET proto-oncogene is a rather unusual cause of multiple endocrine neoplasia 2A. We report the phenotypic expression of this specific RET mutation in a large Swedish family. The family was mapped back to the 18th century. Since 1971 the family has been included in a biochemical screening program, and since 1994 has undergone genetic screening. Twenty-seven individuals were found to have medullary thyroid carcinoma (MTC). Eighteen were detected by screening. The incidence of pheochromocytoma (4%) and hyperparathyroidism (7%) was low. Five individuals died of MTC, but of these none had been included in the screening program. One patient underwent prophylactic thyroidectomy after positive genetic screening. MTC tumor aggressivity differed markedly between gene carriers. The screening program shows that the clinical aggressivity of MTC can be mitigated by early and adequate surgical intervention.
  •  
18.
  • Lindskog, Stefan, 1967-, et al. (author)
  • Physical Separation for Data Protection based on SCTP Multihoming
  • 2004
  • In: Proceedings of the Second Swedish National Computer Networking Workshop. - Karlstad.
  • Conference paper (peer-reviewed)abstract
    • Network security is an increasingly important issue. Traditional solutions for protecting data when transferred over the network are almost exclusively based on cryptography. As a complement, we propose the use of SCTP and its support for physically separate paths to accomplish protection against eavesdropping attacks near the end points.
  •  
19.
  • Lindskog, Stefan, et al. (author)
  • Träskivor kan CE-märkas
  • 2003
  • In: BrandPosten. ; :29, s. 41-
  • Journal article (pop. science, debate, etc.)
  •  
20.
  • Lindskog, Stefan, et al. (author)
  • Web Site Privacy with P3P
  • 2003
  • Book (peer-reviewed)abstract
    • Privacy on the Internet is a very complicatedand delicatesubject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server. The Platform for Privacy Preferences Project (P3P), an emerging industry standards set developed by the World Wide Web Consortium (W3C), provides a simple way for users to gain more control over the use of personal information on the Web sites they visit. By using P3P to encode privacy policies in XML format, browsers can interpret whether a Web site meets an individuals privacy standards and alert the user when a site does not.Written by experts, this is the first book to show systems architects how to embed and design a Web site that is compliant with P3P. The authors provide detailed descriptions of the P3P standard and its parameters, as well as guidelines, explanations, and P3P how-to examples that you can follow. In addition to the detailed example of how to encode a Web sites P3P policy with XML and a complete XML tutorial appendix, youll also learn valuable information such as:- Vulnerabilities and threats to Internet security- The lowdown on log files, cookies, spam, Web bugs, and tracking- P3P policies and policy reference files- P3P and the mobile Internet
  •  
21.
  • Norlén, Andreas, 1973- (author)
  • Oskälighet och 36 § avtalslagen
  • 2004
  • Doctoral thesis (other academic/artistic)abstract
    • Section 36 of the Swedish Contracts Act stipulates that a term of a contract can be modified or set aside, if it is "unreasonable". The thesis discusses the meaning of the prerequisite "unreasonable" and how the meaning can and should be defined, using the means of legal science. Normative ethics is thereby introduced as a supplementary source of norms, and scientific works regarding contract law in other European countries are regarded, as well as the Principles of European Contract Law.One chapter deals primarily with legal theory, in particular how a position regarding a legal matter can be justified. The role of normative ethics, especially virtue ethics, in legal science is discussed in that context and "the virtues of the contractual relationship" are identified (for example justness, honesty, carefulness). The following chapter focuses on the relationship between those virtues and some principles of contract law (for example the principle of trust, the principle of loyalty), and it is being maintained that the value basis for the virtues on the one hand and the principles on the other hand is largely the same. It is also being maintained that there are strong arguments in favour of letting the virtues and principles affect the definition of the prerequisite "unreasonable" in section 36.In the last major chapter, four cases are used as starting points of a discussion regarding various situations, in which "unreasonable" has to be defined. The impact on the definition of "unreasonable" of the previously introduced virtues and principles is discussed, as well as the significance of various circumstances. The duty of disclosure, the significance of balance between the rights and duties of the parties under the contract and the importance of events occurring after the conclusion of the contract are some of the issues, which are treated.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-21 of 21
Type of publication
conference paper (6)
journal article (5)
book (3)
reports (2)
book chapter (2)
licentiate thesis (2)
show more...
doctoral thesis (1)
show less...
Type of content
peer-reviewed (13)
other academic/artistic (7)
pop. science, debate, etc. (1)
Author/Editor
Lindskog, Stefan (15)
Lindskog, Stefan, 19 ... (4)
Jonsson, Erland, 194 ... (4)
Jonsson, Erland (4)
Brunström, Anna (3)
Fischer-Hübner, Simo ... (2)
show more...
Ysander, L (2)
Strandbergh, Johan (2)
Hackman, Mikael (2)
Nilsson, O (1)
Grinnemo, Karl-Johan ... (1)
Jansson, Svante, 194 ... (1)
Ahlman, Håkan, 1947 (1)
Nilsson, Ola, 1957 (1)
Wennergren, Göran, 1 ... (1)
Herlofson, Jörgen (1)
Nilsson-Ehle, Peter (1)
Jansson, S (1)
Tisell, Lars-Eric, 1 ... (1)
Nilsson, Bengt E, 19 ... (1)
Nilsson, B (1)
Martucci, Leonardo (1)
Brunstrom, Anna, 196 ... (1)
Hallman, Mats (1)
Cederlund, Andreas (1)
Nilsson, Anders G. (1)
Andrén-Sandberg, Åke (1)
Illerskog-Lindström, ... (1)
Garcia, Johan (1)
Bergh, Birger (1)
Thureson, Per (1)
Öwall, Bengt (1)
Lundgren, Stefan (1)
Wahlberg, Peter (1)
Bubenko Jr., Janis (1)
Sennerby, Lars (1)
Lindskog, Sven (1)
Hedbom, Hans (1)
Ahlman, H (1)
Lindskog, Bengt I. (1)
Buckhöj, Poul (1)
Greitz, Torgny (1)
Hambraeus, Lars (1)
Olding, Lars (1)
Illerskog, A (1)
Tisell, L E (1)
Norlén, Andreas, 197 ... (1)
Arnesdotter, Ingrid (1)
Lindskog, Stefan, Do ... (1)
show less...
University
Karlstad University (12)
Chalmers University of Technology (5)
University of Gothenburg (3)
Umeå University (1)
Linköping University (1)
RISE (1)
show more...
Karolinska Institutet (1)
show less...
Language
English (16)
Swedish (5)
Research subject (UKÄ/SCB)
Natural sciences (14)
Medical and Health Sciences (3)
Engineering and Technology (1)
Humanities (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view