|
| 1 | +The following papers are included in this dissertation: |
| 2 | + |
| 3 | +\begin{description} |
| 4 | + \item[Paper~I] |
| 5 | + \paperIref |
| 6 | + \item[Paper~II] |
| 7 | + \paperIIref |
| 8 | + \item[Paper~III] |
| 9 | + \paperIIIref |
| 10 | + \item[Paper~IV] |
| 11 | + \paperIVref |
| 12 | + |
| 13 | + This dissertation contains the full version of this paper, with extended descriptions and motivations of the recommender and its parameters. |
| 14 | + \item[Paper~V] |
| 15 | + \paperVref |
| 16 | + \item[Paper~VI] |
| 17 | + \paperVIref |
| 18 | +\end{description} |
| 19 | + |
| 20 | +\newpage |
| 21 | +\noindent |
| 22 | +The table below summarizes the responsibilities Linus Karlsson had in each paper: |
| 23 | + |
| 24 | +\vspace{1em} |
| 25 | +\begin{center} |
| 26 | +\begin{tabular}{lllll} |
| 27 | + \toprule |
| 28 | + \emph{Paper} & \emph{Writing} & \emph{Concepts} & \emph{Implementation} & \emph{Evaluation} \\ |
| 29 | + \midrule |
| 30 | + \textbf{I} & yes & yes & YES & -- \\ |
| 31 | + \textbf{II} & YES & YES & YES & -- \\ |
| 32 | + \textbf{III} & yes & partial & yes & yes \\ |
| 33 | + \textbf{IV} & YES & yes & YES & yes \\ |
| 34 | + \textbf{V} & yes & yes & YES & YES \\ |
| 35 | + \textbf{VI} & YES & partial & YES & YES \\ |
| 36 | + \bottomrule |
| 37 | +\end{tabular} |
| 38 | +\end{center} |
| 39 | +\vspace{1em} |
| 40 | + |
| 41 | +\noindent |
| 42 | +Capital letters indicate roles where Linus Karlsson took primary responsibility for the given role. |
| 43 | +The individual contributions of Linus are described in more detail in the following paragraphs. |
| 44 | + |
| 45 | +In Paper~I, Linus was involved in writing and concept design. |
| 46 | +Linus solely constructed the implementation to test the proposed concept. |
| 47 | + |
| 48 | +In Paper~II, Linus had the main responsibility for both writing and designing the proposed solution. |
| 49 | +He also solely constructed the implementation to verify the solution. |
| 50 | + |
| 51 | +In Paper~III, Linus was responsible for writing the sections about trust anchors in general, and everything related to the application plane. |
| 52 | +% Sections~\ref{subsec:trust-anchors}, \ref{subsec:application-plane-trust}, \ref{subsec:trustanchors:appplane}, \ref{subsec:application-evaluation}. |
| 53 | +He was partially responsible for the concepts in the paper: those related to the application plane. |
| 54 | +Linus was also responsible for the implementation and performance evaluation of the application plane network element enrollment. |
| 55 | + |
| 56 | +In Paper~IV, Linus was responsible for writing all of the system model and implementation sections. |
| 57 | +Together with the other authors, he defined the overall goals of the recommender, and was then responsible for the detailed design of the system. |
| 58 | +He was solely responsible for the implementation of the system. |
| 59 | + |
| 60 | +In Paper~V, Linus was responsible for writing the sections about privacy profiles, isolated execution, implementation, and evaluation. |
| 61 | +Together with the other authors, he defined the proposed privacy-preserving solution. |
| 62 | +He was solely responsible for the implementation and evaluation of the solution. |
| 63 | + |
| 64 | +In Paper~VI, Linus was the main responsible for writing of the complete paper. |
| 65 | +He was partially involved in the design of the proposed algorithm. |
| 66 | +Linus was solely responsible for the implementation of the newly proposed algorithms, as well as the evaluation of the results. |
| 67 | + |
| 68 | +A further description of the papers' contributions \emph{to the research field} is presented in Section~\ref{sec:kappa-contributions}. |
| 69 | + |
| 70 | +\newpage |
| 71 | +\subsection*{Other Contributions} |
| 72 | + |
| 73 | +The following peer-reviewed publications have also been published during my PhD studies, but are not included in this dissertation. |
| 74 | + |
| 75 | +\begin{itemize} |
| 76 | + \item Christopher Jämthagen, Linus Karlsson, Paul Stankovski, and Martin Hell: ``eavesROP: Listening for ROP Payloads in Data Streams''. In \emph{Information Security Conference, ISC 2014, Hong Kong}, LNCS Vol. 8783, pp. 413--424, Springer. |
| 77 | + \item Linus Karlsson, Martin Hell, and Paul Stankovski. ``Improved Greedy Nonrandomness Detectors for Stream Ciphers''. In \emph{3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal}. pp. 225--232, SCITEPRESS. |
| 78 | + \item Nicolae Paladi and Linus Karlsson. ``Safeguarding VNF Credentials with Intel SGX''. In \emph{SIGCOMM Posters and Demos '17, Los Angeles, CA, USA}. ACM. |
| 79 | + \item Alexander Cobleigh, Martin Hell, Linus Karlsson, Oscar Reimer, Jonathan Sönnerup, and Daniel Wisenhoff. ``Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code''. In \emph{2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW), Stockholm, Sweden}. pp. 208-211, IEEE. |
| 80 | +\end{itemize} |
| 81 | + |
| 82 | + |
| 83 | +%N. Paladi, L. Karlsson, K. Elbashir: “Trust Anchors in Software Defined Networks”. ESORICS 2018, Barcelona, Spain, LNCS Vol. 11009, pp. 485–504, Springer. DOI: 10.1007/978-3-319-98989-1_24 |
| 84 | +%[PDF] |
| 85 | +% |
| 86 | +% |
| 87 | +%L. Karlsson, M. Hell, P. Stankovski: “Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors”. Information Systems Security and Privacy. ICISSP 2017, Revised Selected Papers, CCIS Vol. 867, pp. 273–294, Springer. DOI: 10.1007/978-3-319-93354-2_13 |
| 88 | +%[PDF] |
| 89 | +% |
| 90 | +%L. Karlsson, M. Hell: “Enabling Key Migration Between Non-Compatible TPM Versions”. Trust and Trustworthy Computing, TRUST 2016, Vienna, Austria, LNCS Vol. 9824, pp. 101–118, Springer. DOI: 10.1007/978-3-319-45572-3_6 |
| 91 | +%[PDF] |
| 92 | +% |
| 93 | +%M. Hell, L. Karlsson, B. Smeets, J. Mirosavljevic: “Using TPM Secure Storage in Trusted High Availability Systems”. The 6th International Conference on Trusted Systems, INTRUST 2014, Beijing, China, LNCS Vol. 9473, pp. 243–258, Springer. DOI: 10.1007/978-3-319-27998-5_16 |
| 94 | +%[PDF] |
| 95 | +% |
| 96 | + |
| 97 | + |
| 98 | + |
| 99 | +%L. Karlsson, M. Hell, P. Stankovski: “Improved Greedy Nonrandomness Detectors for Stream Ciphers”. 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, pp. 225–232, SCITEPRESS. DOI: 10.5220/0006268202250232 |
| 100 | +%[PDF] |
| 101 | +% |
| 102 | +%N. Paladi, L. Karlsson: “Safeguarding VNF Credentials with Intel SGX”. SIGCOMM Posters and Demos ’17, Los Angeles, CA, USA, ACM. DOI: 10.1145/3123878.3132016 |
| 103 | +% |
| 104 | +%A. Cobleigh, M. Hell, L. Karlsson, O. Reimer, J. Sönnerup, D. Wisenhoff: “Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code”. IEEE EDOCW 2018, Stockholm, Sweden, pp. 208–211, IEEE. DOI: 10.1109/EDOCW.2018.00038 |
| 105 | + |
| 106 | + |
| 107 | + |
| 108 | + |
| 109 | +% C. Jämthagen, L. Karlsson, P. Stankovski, M. Hell: “eavesROP: Listening for ROP Payloads in Data Streams”. Information Security Conference, ISC 2014, Hong Kong, LNCS Vol. 8783, pp. 413–424, Springer. DOI: 10.1007/978-3-319-13257-0_25 |
| 110 | +% [PDF] |
0 commit comments