Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jørgen Bøegh is active.

Publication


Featured researches published by Jørgen Bøegh.


digital image computing: techniques and applications | 2012

Towards a standard for Service Behavior Trustworthiness Management

Jørgen Bøegh; Yuyu Yuan

Trustworthiness is an important aspect of social interaction, but is difficult to assess when interacting with Internet based IT services which do not have the same social cues, and often leave users with strong concerns. Trustworthiness is therefore one of the key elements for successful IT service deployment. We analyze the concepts of trust and trustworthiness and sketch a Service Behavior Trustworthiness Management scheme aiming at improving the trustworthiness of IT services. The proposal is currently under further study and evaluation within ISO. A major standardization effort in this area is anticipated in the near future.


International Conference on Trustworthy Computing and Services | 2013

Multi-layer CAPTCHA Based on Chinese Character Deformation

Tingting Wang; Jørgen Bøegh

The main function of CAPCHA is to prevent malicious programs from register or login, malicious irrigation, bag breaking and other network attacks. Most of the current graphic CAPTCHA’s are generated based on numbers or letters by using a random function and then perform distortion or add viscosity curves. These graphic CAPTCHA’s can easily be identified by user, but provides an opportunity for malicious software attack website system. This paper puts forward an algorithm based on multiple layers to generate random Chinese character CAPTCHA’s which has a variety of deformation features. We apply it to dynamic webpage, to ensure the security of land check.


International Conference on Trustworthy Computing and Services | 2013

The Evaluation of Service Trustworthiness Based on BP-Neural Network

Yue Li; Qingyang Gao; Jørgen Bøegh

With the development of Internet, business models of offline service rendering and online service promotion and evaluation developed. But how to evaluate the service trustworthiness has not attracted great attention and much research. We build a Service Trustworthiness Evaluation Model based on outlier detection, user clustering and BP-Neural Network. In this paper, we use real data of trustworthy community to prove our assumption. Results of practical experiments show that the Service Trustworthiness Evaluation Model proposed in this paper can objectively reflect service trustworthiness. At the same time, it has significance for other evaluation systems.


International Conference on Trustworthy Computing and Services | 2013

Trust and Trustworthiness in Human Behavior and IT Services - Concepts, Definitions and Relations

Jørgen Bøegh

This paper discusses trust and trustworthiness as human and social phenomena and shows how these concepts can be translated into trust and trustworthiness for IT services, providing an objective measure of IT trustworthiness. In contrast, the user’s trust is subjectively derived from the service trustworthiness in combination with the user’s perceived risk related to the transaction.


International Conference on Trustworthy Computing and Services | 2013

Research on Trustworthy Sensor Network Based on Zigbee Technology

Shuaisen Wang; Jørgen Bøegh; Jincui Yang

This article introduces a trustworthy sensor network construction scheme based on a trustworthy node selection method. With this scheme, sensor networks will be safer and more reliable. This sensor network is based on Zigbee technology and selects corresponding appropriate pattern of networking. The nodes of Zigbee sensor network will be chosen using a node credibility formula. According to the setting scenarios, the result of simulation will be shown. Through this article, sensor network will be more useful in future application.


Archive | 2012

Situation Analysis and Policy Research of Software Engineering Standardization of China

Yangyang Zhang; Yuyu Yuan; Jørgen Bøegh

In China, almost all large and medium size software enterprises hope that their software goes international, but this ambition is heavy going. The article compares and describes the different standard system architecture in software engineering. As the core content of this article, it emphasizes to compare the difference between software engineering standardization in China and ISO/IEC standardization. From this analysis it concludes that the main reason, which cause the difference between national self-innovated standardization and international’s, are standard system, speed of developing, language and degree of mastering advanced technology.


International Conference on Trustworthy Computing and Services | 2012

Trustworthiness: From a Social Phenomenon to Internet Technology

Jørgen Bøegh

Trustworthiness is an important concept in human life. This paper discusses trustworthiness from a human social point of view. Today trustworthiness has become equally important for IT services. A definition of trustworthiness is proposed. It is shows that this definition is both consistent with our intuitive understanding and suitable for IT services. The definition leads naturally to a formula useful for describing and measuring trustworthiness.


International Conference on Trustworthy Computing and Services | 2012

Who Can Haul the ANDON-CORD in the Software Development Process

Liu Yinglian; Jørgen Bøegh; Sun Qi

Recently, many software engineers have drown their attentions on software process improvement and many research approaches have been proposed, but only few of them have been applied to industrial practice. There are still many significant challenges for our further success. For many years, we are supposing to develop a method which can make the Software Development Process (SDP) as efficient as the Hardware Production Line (HPL). In this paper, we discussed how to apply the successful mechanism (ANDON-CORD) in Toyota to the software development process. Finally, we highlight the importance of every member in the software development process for assuring the high quality of software products.


International Conference on Trustworthy Computing and Services | 2012

A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks

Tianle Zhang; Yuyu Yuan; Jørgen Bøegh; Xu Wu

In realistic vehicular communication systems, network connections suffer from dynamic mobility and random operations of independent nodes. End to end fully connected path may never exist. VDTNs (Vehicular Delay/Disruption Tolerant Networks) achieve tolerably timely packet delivery by utilization of asynchronous relays among mobile nodes. Mobility pattern has a strong impact on the performance. Unrealistic or unreasonable mobility model may mislead the design and research. In this paper, a driving manipulations based mobility model is proposed to simulate the trajectory of mobile nodes of multi-hop VDTN networks. The proposed model can generate smooth and reasonable trajectory which resembles the real world driving behaviors. It can also output most results of existing models and can be a general option for a wide range of applications. Simulation is conducted to validate the design.


international conference on agile software development | 2011

Agile Testing and Critical Systems

Jørgen Bøegh; Juan Garbajosa; Alex Rennoch

The need to count on critical systems is growing day by day. Together with traditional domains such as medical devices, automotive, railway, aeronautical, space and telecommunications, new applications and services are coming up every day. Terms such as ubiquitous, pervasive, or autonomic computing, products under the general umbrella of smart devices or the use of large wireless sensors networks indicate a clear trend in the increase of application complexity and dependency. The dependency of daily life on computers and computer based systems is growing up at a high rate, and testing is gaining importance at the same rate.

Collaboration


Dive into the Jørgen Bøegh's collaboration.

Top Co-Authors

Avatar

Yuyu Yuan

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jincui Yang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Liu Yinglian

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Qingyang Gao

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Shuaisen Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Sun Qi

Southwest University for Nationalities

View shared research outputs
Top Co-Authors

Avatar

Tianle Zhang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Tingting Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xu Wu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yangyang Zhang

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge