{"id":32,"date":"2019-09-18T21:58:58","date_gmt":"2019-09-18T21:58:58","guid":{"rendered":"http:\/\/prosaweb.duckdns.org\/?page_id=32"},"modified":"2021-11-30T09:07:51","modified_gmt":"2021-11-30T09:07:51","slug":"about-us","status":"publish","type":"page","link":"https:\/\/prosasecurity.com\/index.php\/about-us\/","title":{"rendered":"History"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"32\" class=\"elementor elementor-32\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da8b879 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da8b879\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2cac23f1\" data-id=\"2cac23f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67d805c5 elementor-widget elementor-widget-text-editor\" data-id=\"67d805c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>PROSA: 12 years of research and development<\/h3>\n<p>Founded in 2015, our technology was originally derived from our CEO, Anders Moen Hagalisletto, 2007 PhD thesis at the University of Oslo. The technology and methods were first explored and financed through a number of EU and <a href=\"https:\/\/nfr.no\">Norwegian Research Council <\/a>projects, mainly carried out in collaboration with the <a href=\"https:\/\/nr.no\">Norwegian Computing Center<\/a>, before the founding of the PROSA Security company, which started taking fully commercial projects.<\/p>\n<p>Here are some newspaper articles and publications about our work:<\/p>\n<p>November 2018, Corda Newsletter: <a href=\"https:\/\/cordis.europa.eu\/result\/rcn\/240691_en.html?WT.mc_id=exp\">&#8220;An EU team has enabled the design of genuinely secure computer systems&#8221;<\/a><\/p>\n<p>August 2017, in digi.no:<a href=\"https:\/\/www.digi.no\/artikler\/har-visma-hafslund-og-bankid-pa-kundelisten-slik-skal-de-ukjente-grunderne-gjore-utviklingslopet-ditt-langt-raskere\/403777?key=9yLlzGhc\"> &#8220;Har Visma, Hafslund og BankID p\u00e5 kundelisten: Slik skal de ukjente gr\u00fcnderne gj\u00f8re utviklingsl\u00f8pet ditt langt raskere&#8221;<\/a><\/p>\n<p>A list of some of our academic articles:<\/p>\n<ul>\n<li>Anders Moen Hagalisletto: \u201c<em>Protocol Algebra<\/em>&#8220;, 11th IEEE Symposium on Computers and Communications, 26 &#8211; 29 June 2006, Sardinia, Italy, IEEE Computer Society, pp. 394 &#8211; 401. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.95.4019&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<li>Anders Moen Hagalisletto: \u201c<em>Automated Refinement of Security Protocols<\/em>&#8220;, SSN 2006, Proceedings of the 20th IEEE International Parallel &amp; Distributed Processing Symposium (IEEE IPDPS 2006), April 25-29, 2006, Rhodes Island, Greece. ISBN 1-4244-0054-6. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.104.7342&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<li>Anders Moen Hagalisletto: \u201c<em>Errors in Attacks on Authentication Protocols<\/em>&#8220;, The Second International Conference on Availability, Reliability and Security, IEEE ARES 2007, April 10-13, 2007, Vienna, Austria, pp. 223 &#8211; 229, IEEE Computer Society, ISBN 0-7695-2775-2. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.125.4353&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<li>Anders Moen Hagalisletto: \u201c<em>Attacks are Protocols Too<\/em>&#8220;, First International Workshop on Advances in Information Security, IEEE WAIS 2007, Collocated with ARES 2007, Vienna, Austria IEEE Computer Society, April 10-13, 2007, ISBN 0-7695-2775-2, pp. 1197 &#8211; 1206. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.128.8220&amp;rep=rep1&amp;type=pdf\">here<\/a><\/li>\n<li>Anders Moen Hagalisletto and Arne Rieber: \u201c<em>Using the mobile phone in two-factor authentication<\/em>&#8220;. The First International Workshop on Security for Spontaneous Interaction, IWSSI 2007, 16 September 2007, Innsbruck, Austria, affiliated to UbiComp 2007. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.107.4391&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<li>Anders Moen Hagalisletto and Lars Strand: \u201c<em>Formal modeling of authentication in SIP<\/em>&#8220;, Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France pp. 16-21, IEEE Computer Society Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.188.6778&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<li>Anders Moen Hagalisletto: \u201c<em>Proving Trust Locally<\/em>&#8220;, Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France pp. 80-87, IEEE Computer Society. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.188.7599&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<li>Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven: <em>Analysing Protocol Implementations. Information Security Practice and Experienc<\/em>e, 5th International Conference, ISPEC 2009, Xi&#8217;an, China, April 13-15, 2009, Proceedings : pp. 171-182, Lecture Notes in Computer Science No. 5451, Springer Verlag, ISBN 978-3-642-00842-9. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.188.6450&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<li>Anders Moen Hagalisletto, &#8220;Automated detection of confidentiality <em>goals&#8221;,<\/em> pp. 1-8, 2009 IEEE International Symposium on Parallel and Distributed Processing, IEEE Computer Society, 2009, ISBN 978-1-4244-3751-1. Available <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.188.6899&amp;rep=rep1&amp;type=pdf\">here<\/a>.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PROSA: 12 years of research and development Founded in 2015, our technology was originally derived from our CEO, Anders Moen Hagalisletto, 2007 PhD thesis at the University of Oslo. The technology and methods were first explored and financed through a number of EU and Norwegian Research Council projects, mainly carried out in collaboration with the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-32","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":18,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/32\/revisions"}],"predecessor-version":[{"id":472,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/32\/revisions\/472"}],"wp:attachment":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}