Meiko Jensen

Ph.D.

  • Campusvej 55

    5230 Odense M

    Denmark

If you made any changes in Pure these will be visible here soon.

Research Output

  • 25 Article in proceedings
  • 3 Journal article
Filter
Article in proceedings
2018

Platelet activation by activated von Willebrand factor is a marker of intestinal wound healing in patients with Crohn's disease

Manon-Jensen, T., Langholm, L., Sun, S., Mortensen, JH., He, Y., Krag, A., Jensen, MD., Bay-Jensen, A-C., Kjeldsen, J. & Karsdal, MA., 2018, 13th Congress of the European Crohn’s and Colitis Organisation. Vol. 12.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2013

Challenges of privacy protection in big data analytics

Jensen, M., 2013, Proceedings - 2013 IEEE International Congress on Big Data, BigData 2013. IEEE, p. 235-238 6597142

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Secure combination of XML signature application with message aggregation in multicast settings

Becker, A. & Jensen, M., 2013, Proceedings of the IEEE 20th International Conference on Web Services, ICWS. IEEE Press, p. 531-538 6649621

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Towards privacy-friendly transparency services in inter-organizational business processes

Jensen, M., 21. Oct 2013, Proceedings of the 37th International Computer Software and Applications Conference. p. 200-205 06605789

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2012

XSpRES: Robust and effective XML signatures for Web Services

Mainka, C., Jensen, M., Iacono, L. L. & Schwenk, J., 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 187-197

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2011

All your clouds are belong to us - Security analysis of cloud management interfaces

Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N. & Iacono, L. L., 16. Nov 2011, Proceedings of the ACM Conference on Computer and Communications Security. p. 3-14 12 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Crouching tiger - Hidden payload: Security risks of scalable vectors graphics

Heiderich, M., Frosch, T., Jensen, M. & Holz, T., 2011, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 239-250

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Expressiveness considerations of XML signatures

Jensen, M. & Meyer, C., 1. Nov 2011, Proceedings - International Computer Software and Applications Conference. p. 392-397 6 p. 6032270

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

On the effectiveness of XML schema validation for countering XML signature wrapping attacks

Jensen, M., Meyer, C., Somorovsky, J. & Schwenk, J., 9. Nov 2011, Proceedings - 2011 1st International Workshop on Securing Services on the Cloud, IWSSC 2011. p. 7-13 7 p. 6049019

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Security prospects through cloud computing by adopting multiple clouds

Jensen, M., Schwenk, J., Bohli, J. M., Gruschka, N. & Iacono, L. L., 29. Sep 2011, Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011. p. 565-572 8 p. 6008756

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Towards privacy-preserving XML transformation

Jensen, M. & Kerschbaum, F., 29. Sep 2011, Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011. p. 65-72 8 p. 6009373

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2010

A design pattern for event-based processing of security-enriched SOAP messages

Gruschka, N., Jensen, M. & Lo Iacono, L., 21. May 2010, ARES 2010 - 5th International Conference on Availability, Reliability, and Security. p. 410-415 6 p. 5438062

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Attack surfaces: A taxonomy for attacks on cloud services

Gruschka, N. & Jensen, M., 21. Oct 2010, Proceedings - 2010 IEEE 3rd International Conference on Cloud Computing, CLOUD 2010. p. 276-279 4 p. 5557984

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Secure bindings of SAML assertions to TLS sessions

Kohlar, F., Schwenk, J., Jensen, M. & Gajek, S., 21. May 2010, International Conference on Availability, Reliability, and Security: ARES 2010 . p. 62-69 8 p. 5438111

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Streaming-based verification of XML signatures in SOAP messages

Somorovsky, J., Jensen, M. & Schwenk, J., 5. Nov 2010, Proceedings - 2010 6th World Congress on Services, Services-1 2010. p. 637-644 8 p. 5575516

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Towards an anonymous access control and accountability scheme for cloud computing

Jensen, M., Schäge, S. & Schwenk, J., 21. Oct 2010, Proceedings - 2010 IEEE 3rd International Conference on Cloud Computing, CLOUD 2010. p. 540-541 2 p. 5558024

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Towards automated processing of the right of access in inter-organizational Web Service compositions

Herkenhöner, R., De Meer, H., Jensen, M. & Pöhls, H. C., 5. Nov 2010, Proceedings - 2010 6th World Congress on Services, Services-1 2010. p. 645-652 8 p. 5575518

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2009

Analysis of signature wrapping attacks and countermeasures

Gajek, S., Jensen, M., Liao, L. & Schwenk, J., 19. Nov 2009, 2009 IEEE International Conference on Web Services, ICWS 2009. p. 575-582 8 p. 5175871

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

A security modeling approach for web-service-based business processes

Jensen, M. & Feja, S., 16. Jul 2009, Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems. p. 340-347 8 p. 4839262

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Extending the similarity-based XML multicast approach with digital signatures

Azzini, A., Marrara, S., Jensen, M. & Schwenk, J., 1. Dec 2009, Proceedings of the ACM Conference on Computer and Communications Security. p. 45-52 8 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Generating WS-SecurityPolicy documents via security model transformation

Jensen, M., 1. Dec 2009, Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI). p. 233-234 2 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

On technical security issues in cloud computing

Jensen, M., Schwenk, J., Gruschka, N. & Iacono, L. L., 1. Dec 2009, International Conference on Cloud Computing: CLOUD 2009 - 2009 IEEE . IEEE, p. 109-116 5284165

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Privacy against the business partner: Issues for realizing end-to-end confidentiality in web service compositions

Jensen, M. & Gruschka, N., 1. Dec 2009, International Workshop on Database and Expert Systems Applications. p. 117-121 5 p. 5337449

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The accountability problem of flooding attacks in service-oriented architectures

Jensen, M. & Schwenk, J., 12. Oct 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 25-32 5066451

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The curse of namespaces in the domain of XML signature

Jensen, M., Liao, L. & Schwenk, J., 1. Dec 2009, Proceedings of the ACM Conference on Computer and Communications Security. p. 29-36

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review