Til hovedinnhold

Per Håkon Meland

Seniorforsker/dr.gradsstipendiat

Per Håkon Meland

Seniorforsker/dr.gradsstipendiat

Per Håkon Meland
Telefon: 411 08 148
Mobil: 411 08 148
Avdeling: Software Engineering, Safety and Security
Kontorsted: Trondheim

Publikasjoner og ansvarsområder

Publikasjoner

Publikasjon

Security Requirements for SATCOM Datalink Systems for Future Air Traffic Management

https://www.sintef.no/publikasjoner/publikasjon/?pubid=CRIStin+1502054

Aircraft equipped with satellite communication (SATCOM) systems will enable advanced Air Traffic Management (ATM) operations over datalink on a global basis. A key concept of future ATM is 4D trajectory management, which aims to ensure an optimal path and designated arrival time for the flight by in...

År 2017
Type Konferanseartikkel/Bokkapittel
Publikasjon

Protecting Future Maritime Communication

https://www.sintef.no/publikasjoner/publikasjon/?pubid=CRIStin+1502072

Our oceans are filled with ships that take care of the most important distribution of goods in the world economy. Evolving from isolated chunks of hollow metal containers, ships are becoming more and more like interconnected floating computers, and thus increasingly exposed to unwanted cyber events....

År 2017
Type Konferanseartikkel/Bokkapittel
Publikasjon

Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

https://www.sintef.no/publikasjoner/publikasjon/?pubid=SINTEF+A27131

This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, a...

År 2015
Type Rapport
Publikasjon

Using Cyber-Insurance as a Risk Management Strategy: Knowledge Gaps and Recommendations for Further Research

https://www.sintef.no/publikasjoner/publikasjon/?pubid=SINTEF+A27298

Risk transfer can be an economically favorable way of handling security and privacy issues, but choosing this option indiscriminately and without proper knowledge is a risk in itself. This report provides an overview of knowledge gaps related to cyber-insurance as a risk management strategy. These a...

Publikasjon

Mitigating Risk with Cyberinsurance

https://www.sintef.no/publikasjoner/publikasjon/?pubid=CRIStin+1301078

To achieve a proper balance between security investments and acceptable loss, businesses take a mixed approach to risk management. In addition to preventive and remedial actions and self-insurance, many are now buying cyberinsurance, a cost-saving but still-developing strategy....

År 2015
Type Tidsskriftsartikkel
Publikasjon

Using Cyber-Insurance as a Risk Management Strategy: Knowledge Gaps and Recommendations for Further Research

https://www.sintef.no/publikasjoner/publikasjon/?pubid=CRIStin+1306136

Risk transfer can be an economically favorable way of handling security and privacy issues, but choosing this option indiscriminately and without proper knowledge is a risk in itself. This report provides an overview of knowledge gaps related to cyber-insurance as a risk management strategy. These a...

Publikasjon

Extending software development methodologies to support trustworthiness-by-design

https://www.sintef.no/publikasjoner/publikasjon/?pubid=CRIStin+1278906

People are increasingly concerned about the trustworthiness of software that they use when acting within socio-technical systems. Ideally, software development projects have to address trustworthiness requirements from the very early stages of development using constructive methods to enable trustwo...

Forfattere Mohammadi Nazila Gol Bandyszak Torsten Paulus Sachar Meland Per Håkon Weyer Thorsten Pohl Klaus
År 2015
Type Tidsskriftsartikkel
Publikasjon

Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

https://www.sintef.no/publikasjoner/publikasjon/?pubid=CRIStin+1334380

This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, a...

År 2015
Type Rapport
Vis alle publikasjoner