Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Per Kaijser is active.

Publication


Featured researches published by Per Kaijser.


Computer Communications | 1989

ODA: a document architecture for open systems

R. Hunter; Per Kaijser; F. Nielsen

Abstract The main concepts and aims of the new ISO 8613 standard — generally referred to as Office Document Architecture — that has been jointly published by the International Organization for Standardization and the Consultative Committee on International Telephone and Telegraph, is described here. ODA provides a general information architecture which can be used as a basis for encoding documents so that they can be transferred between dissimilar document processing systems. The architecture supports the representation of multi-media documents (containing text, raster graphics and computer graphics) in both revisable and final forms. ODA is expected to have a significant role in the integration of office systems, particularly those that operate in an Open Systems Interconnection environment.


australasian conference on information security and privacy | 1998

A Review of the SESAME Development

Per Kaijser

The development of the SESAME (Secure European System for Applications in a Multi-vendor Environment) security concept started approximately a decade ago. The flexibility and scalability properties, the focus on simple administration and the modular structure are some of the reasons why this architecture has formed the basis for several security products. This paper attempts to make a short summary of the SESAME development from its infancy to TrustedWeb, the latest solution particularly adapted for the administration and protection of Web-resources in large intra- and extranet environments.


Computer Communications | 1994

II: Security architectures: Security protection for parts of a data structure

Per Kaijser

How to provide security protection for parts of a data structure such as a document is the subject of this paper. It describes what security protection is possible, how it is achieved and what properties a data structure must possess for such protection to be possible.


Datenschutz Und Datensicherheit - Dud | 2008

Quantenphysik und die Zukunft der Kryptographie

Per Kaijser; Wernhard Markwitz

ZusammenfassungDer Beitrag fasst die Höhepunkte aus fast 2.500 Jahren Kryptographiegeschichte zusammen. Die Zeitachse zeigt, dass erst in letzten 50 Jahren drei wirklich revolutionäre Erfindungen erfolgten: Mitte der 70er Jahre wurde die Verschlüsselung mit öffentlichen Schlüsseln eingeführt. Danach wurden zwei Entdeckungen gemacht, die auf der Quantenphysik beruhen: Die Quanten-Kryptographie und der Quanten-Computer. Die Bedeutung dieser drei neuen Techniken für die Entwicklung und Zukunft der Kryptographie werden erläutert — und es wird gezeigt, warum diese drei als „Quantensprünge“ der Informationssicherheit betrachtet werden müssen.


communications and multimedia security | 1999

On Authentication, Digital Signatures and Signature Laws

Per Kaijser

The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues not much seen in the debate are discussed together with some suggestions as to how to overcome them. The aim of the paper is to help the promotion of both digital signatures and electronic signatures in order to improve the trust and confidence in, and acceptability of, documents in electronic form.


Archive | 1995

Data Protection in Communications and Storage

Per Kaijser

This paper presents the different kinds of data protections that can be achieved by IT-technology in data communications and in the storage of data. Data integrity, data confidentiality, data origin authentication and a set of non-repudiation services are examined in detail on what is actually achieved depending on how and where the protections are made. These can be performed either on the data object itself or by the communications or storage systems. It is shown that certain types of protections, such as the non-repudiation services, depend on where they are made, whereas others are independent thereof.


International Conference on Intelligence in Services and Networks | 1994

Surveillance and protection in IBC management

Dimitris Androutsopoulos; Per Kaijser; Socratis Katsikas; Kåre Presttun; Don Salmon; Paul G. Spirakis

Realization of the full potential of the very high performance communications technologies will depend on the availability and effectiveness of supporting intelligent control and management of the environment and infrastructure, allowing the delivery of end user services offering significant benefits in areas such as mobility, dependability, security, usability, as well as plain basic bits-per-secondper-ECU. The raw performance and facility levels will be of little benefit without the means to deploy the capacity in line with a wide spectrum of demands spanning 9 bulk commitments for, say, delivery of cable-tv and on-demand video, 9 high instantly available bandwidth for virtual private networks, 9 absolute priority needs of emergency services, 9 and so on down to the humble phone conversation or public electronic mail service.


Archive | 2002

Method for providing services in a data transmission network and associated components

Christine Hagn; Per Kaijser; Wernhard Markwitz


Physical Review A | 1987

Ab initio calculations of one-electron-scattering properties of methane

Per Kaijser; Vedene H. Smith; A. N. Tripathi; Geerd H. F. Diercksen


Archive | 2001

Method of signature

Per Kaijser; Wernhard Dr. Markwitz

Collaboration


Dive into the Per Kaijser's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

F. Nielsen

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge