Per Kaijser
Siemens
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Per Kaijser.
Computer Communications | 1989
R. Hunter; Per Kaijser; F. Nielsen
Abstract The main concepts and aims of the new ISO 8613 standard — generally referred to as Office Document Architecture — that has been jointly published by the International Organization for Standardization and the Consultative Committee on International Telephone and Telegraph, is described here. ODA provides a general information architecture which can be used as a basis for encoding documents so that they can be transferred between dissimilar document processing systems. The architecture supports the representation of multi-media documents (containing text, raster graphics and computer graphics) in both revisable and final forms. ODA is expected to have a significant role in the integration of office systems, particularly those that operate in an Open Systems Interconnection environment.
australasian conference on information security and privacy | 1998
Per Kaijser
The development of the SESAME (Secure European System for Applications in a Multi-vendor Environment) security concept started approximately a decade ago. The flexibility and scalability properties, the focus on simple administration and the modular structure are some of the reasons why this architecture has formed the basis for several security products. This paper attempts to make a short summary of the SESAME development from its infancy to TrustedWeb, the latest solution particularly adapted for the administration and protection of Web-resources in large intra- and extranet environments.
Computer Communications | 1994
Per Kaijser
How to provide security protection for parts of a data structure such as a document is the subject of this paper. It describes what security protection is possible, how it is achieved and what properties a data structure must possess for such protection to be possible.
Datenschutz Und Datensicherheit - Dud | 2008
Per Kaijser; Wernhard Markwitz
ZusammenfassungDer Beitrag fasst die Höhepunkte aus fast 2.500 Jahren Kryptographiegeschichte zusammen. Die Zeitachse zeigt, dass erst in letzten 50 Jahren drei wirklich revolutionäre Erfindungen erfolgten: Mitte der 70er Jahre wurde die Verschlüsselung mit öffentlichen Schlüsseln eingeführt. Danach wurden zwei Entdeckungen gemacht, die auf der Quantenphysik beruhen: Die Quanten-Kryptographie und der Quanten-Computer. Die Bedeutung dieser drei neuen Techniken für die Entwicklung und Zukunft der Kryptographie werden erläutert — und es wird gezeigt, warum diese drei als „Quantensprünge“ der Informationssicherheit betrachtet werden müssen.
communications and multimedia security | 1999
Per Kaijser
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues not much seen in the debate are discussed together with some suggestions as to how to overcome them. The aim of the paper is to help the promotion of both digital signatures and electronic signatures in order to improve the trust and confidence in, and acceptability of, documents in electronic form.
Archive | 1995
Per Kaijser
This paper presents the different kinds of data protections that can be achieved by IT-technology in data communications and in the storage of data. Data integrity, data confidentiality, data origin authentication and a set of non-repudiation services are examined in detail on what is actually achieved depending on how and where the protections are made. These can be performed either on the data object itself or by the communications or storage systems. It is shown that certain types of protections, such as the non-repudiation services, depend on where they are made, whereas others are independent thereof.
International Conference on Intelligence in Services and Networks | 1994
Dimitris Androutsopoulos; Per Kaijser; Socratis Katsikas; Kåre Presttun; Don Salmon; Paul G. Spirakis
Realization of the full potential of the very high performance communications technologies will depend on the availability and effectiveness of supporting intelligent control and management of the environment and infrastructure, allowing the delivery of end user services offering significant benefits in areas such as mobility, dependability, security, usability, as well as plain basic bits-per-secondper-ECU. The raw performance and facility levels will be of little benefit without the means to deploy the capacity in line with a wide spectrum of demands spanning 9 bulk commitments for, say, delivery of cable-tv and on-demand video, 9 high instantly available bandwidth for virtual private networks, 9 absolute priority needs of emergency services, 9 and so on down to the humble phone conversation or public electronic mail service.
Archive | 2002
Christine Hagn; Per Kaijser; Wernhard Markwitz
Physical Review A | 1987
Per Kaijser; Vedene H. Smith; A. N. Tripathi; Geerd H. F. Diercksen
Archive | 2001
Per Kaijser; Wernhard Dr. Markwitz