Items where division is "Faculties > Sciences > School of Computing > Security Group"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | X | Y | Z | Č
Number of items at this level: 413.

A

Abdelouahab, Mahdi Amine and Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Achemlal, Mohamed and Laniepce, Sylvie (2008) TCA: Topology change attack in Peer-to-peer networks. In: UNSPECIFIED, APR 09, 2008, Singapore, SINGAPORE. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Agrafiotis, Ioannis and Nurse, Jason R. C. and Buckley, Oliver and Legg, Phil and Creese, Sadie and Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:https://doi.org/10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Agrafiotis, Ioannis and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:https://doi.org/10.1093/cybsec/tyy006) (Full text available)
[img]
Preview
[img]
Preview

Aktypi, Angeliki and Nurse, Jason R. C. and Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: International Workshop on Multimedia Privacy and Security in conjunction with the 24th ACM Conference on Computer and Communication Security (CCS 2017), October 30, 2017, Dallas, Texas, USA. (doi:https://doi.org/10.1145/3137616.3137617) (Full text available)
[img]
Preview

Alahmadi, Bushra A. and Legg, Philip .A. and Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: 17th International Conference on Enterprise Information Systems (ICEIS). (doi:https://doi.org/10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:https://doi.org/10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alhanahnah, Mohannad and Chadwick, David (2016) Boosting usability for Protecting Online Banking Applications Against APTs. In: 2016 Cybersecurity and Cyberforensics Conference (CCC 2016), 2-4 Aug 2016, Amman, Jordan. (doi:https://doi.org/10.1109/CCC.2016.13) (Full text available)
[img]
Preview

Ali, Mohammed Aamir and Arief, Budi and Emms, Martin and van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. (Full text available)
[img]
Preview

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2017), 9-14 July 2017, Vancouver, BC, Canada. (doi:https://doi.org/10.1007/978-3-319-58460-7_13) (Full text available)
[img]
Preview

Alqahtani, Saeed Ibrahim and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: 12th International Conference on Availability, Reliability and Security (ARES 2017), 29 August - 01 September 2017, Reggio Calabria, Italy. (doi:https://doi.org/10.1145/3098954.3098984) (Full text available)
[img]
Preview

Andrianopoulos, Alex and Chadwick, David W. (1993) `Simulating the Global Directory Service with OPNET. In: Proceedings of the IEEE 26th Annual Simulation Symposium, Washington. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: 4th International Conference on Principles of Security and Trust (POST'15), April 2015, London, UK. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2012) Verifying Privacy-Type Properties in a Modular Way. In: Cortier, Véronique and Zdancewic, Steve, eds. 2012 IEEE 25th Computer Security Foundations Symposium. IEEE pp. 95-109. ISBN 978-1-4673-1918-8. E-ISBN 978-0-7695-4718-3. (doi:https://doi.org/10.1109/CSF.2012.16) (Full text available)
[img]
Preview
[img]
Preview

Ardagna, Claudio Agostino and Asal, Rasool and Damiani, Ernesto and El Ioini, Nabil and Pahl, Claus and Dimitrakos, Theo (2016) A Certification Technique for Cloud Security Adaptation. In: IEEE International Conference on Services Computing, SCC 2016, June 27 - July 2, 2016, San Francisco, CA, USA. (doi:https://doi.org/10.1109/SCC.2016.49) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Asghar, Hassan Jameel and Steinfeld, Ron and Li, Shujun and Kaafa, Mohamed Ali and Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: 9th International Conference on Social Media & Society (SM&Society 2017), 18-20 July 2018, Copenhagen, Denmark. (doi:https://doi.org/10.1145/3217804.3217919) (Full text available)
[img]
Preview

Axon, Louise M. and Alahmadi, Bushra and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium, February 18-21, 2018, San Diego, California, USA. (doi:https://doi.org/10.14722/usec.2018.23024) (Full text available)
[img]
Preview

Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. (2016) Reflecting on the Use of Sonification for Network Monitoring. In: Tenth International Conference on Emerging Security Information, Systems and Technologies, July 24 - 28, 2016, Nice, France. (Full text available)
[img]
Preview

Axon, Louise and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (Full text available)
[img]
Preview

B

Bacon, Jean and Evans, David and Eyers, David M. and Migliavacca, Matteo and Pietzuch, Peter and Shand, Brian (2010) Enforcing End-to-End Application Security in the Cloud. In: Middleware 2010. Lecture Notes in Computer Science, 6452. Springer Berlin Heidelberg pp. 293-312. ISBN 978-3-642-16954-0. (doi:https://doi.org/10.1007/978-3-642-16955-7_15) (Full text available)
[img]
Preview

Bacon, Jean and Moody, Ken and Chadwick, David W. and Otenko, Sassa (2003) Session Limited vs. Persistent Role Membership. In: Seventeenth Annual IFIP WG 11.3 Working Conference on Database and Applications Security at Estes Park, Colorado, August 2003, Colorado. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bada, Maria and Sasse, Angela and Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society. (Full text available)
[img]
Preview

Bailey, Christopher J. (2012) Application of Self-Adaptive techniques to federated authorization models. In: 2012 34th International Conference on Software Engineering (ICSE). , 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium pp. 1495-1498. (doi:https://doi.org/10.1109/ICSE.2012.6227053) (Full text available)
[img]
Preview

Bailey, Christopher J. and Chadwick, David W. and de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. (doi:https://doi.org/10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111. (Full text available)
[img]
Preview

Ball, E. and Chadwick, David W. and Basden, Andrew (2003) The Implementation of a System for Evaluating Trust in a PKI Environment. In: Petrovic, Otto and Ksela, Michael and Fallenbock, Markus and Kitti, Christian, eds. Trust in the Network Economy. Springer-Verlag, Austria, pp. 263-279. ISBN 3-211-06853-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ball, E. and Chadwick, David W. and Mundy, Darren (2003) Patient Privacy in Electronic Prescription Transfer. IEEE Security & Privacy magazine, . pp. 77-80. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Hernandez-Castro, Julio C. (2015) On the limits of engine analysis for cheating detection in chess. Computers and Security, 48 . pp. 58-73. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2014.10.002) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Barrero, David and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro and Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra‐lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:https://doi.org/10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Basden, Andrew and Ball, E. and Chadwick, David W. (2001) Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure. Expert Systems, 18 (5). pp. 233-249. ISSN 0266-4720. (doi:https://doi.org/10.1111/1468-0394.00178) (Full text available)
[img]
Preview

Basden, Andrew and Evans, John B. and Chadwick, David W. and Young, Andrew J. (1998) Coping with Poorly Understood Domains: the Example of Internet Trust. In: Research and Development in Expert Systems, 1998, Dec 1998, Cambridge. (Full text available)
[img]
Preview

Bello Orgaz, Gema and Hernandez-Castro, Julio C. and Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bello, Gema and Hernandez-Castro, Julio and Camacho, David (2016) Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems, 66 . pp. 125-136. ISSN 0167-739X. (doi:https://doi.org/10.1016/j.future.2016.06.032) (Full text available)
[img]
Preview

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:https://doi.org/10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and de Fuentes, Jose Maria and Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:https://doi.org/10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bocchi, Laura (2004) Compositional Nested Long Running Transactions. In: Fundamental Approaches to Software Engineering. Lecture Notes in Computer Science, 2984. Springer pp. 194-208. ISBN 978-3-540-21305-5. E-ISBN 978-3-540-24721-0. (doi:https://doi.org/10.1007/978-3-540-24721-0_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2016) Big Data Refinement. Electronic Proceedings in Theoretical Computer Science, 209 . pp. 17-23. ISSN 2075-2180. E-ISSN 2075-2180. (doi:https://doi.org/10.4204/EPTCS.209.2) (Full text available)
[img]
Preview

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2012) Book review: Modeling in Event-B by Jean-Raymond Abrial. Review of: Modeling in Event-B by Abrial, Jean-Raymond. Journal of Functional Programming, 22 (2). pp. 217-221. ISSN 0956-7968. (doi:https://doi.org/10.1017/S0956796812000081) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2014) Cybersecurity czar dodges questions over IT security. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Diversity and Adjudication. Journal of Logical and Algebraic Methods in Programming, . ISSN 2352-2208. (doi:https://doi.org/10.1016/j.jlamp.2015.10.007) (Full text available)
[img]
Preview

Boiten, Eerke Albert (2014) FireChat’s revolutionary use will not be revolutionary for long. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2008) From ABZ to cryptography (abstract). In: ABZ 2008, 16-18 September 2008, London. (doi:https://doi.org/10.1007/978-3-540-87603-8<sub>4</sub>0) (Full text available)
[img]

Boiten, Eerke Albert (2014) Google’s Larry Page wants to save 100,000 lives but big data isn’t a cure all. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Google’s lip service to privacy cannot conceal that its profits rely on your data. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Investigatory Powers bill will remove ISPs' right to protect your privacy. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) It’s possible to write flaw-free software, so why don’t we? . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) NHS care.data still leaks like a sinking ship, but ministers set sail regardless. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) NHS must think like Google to make data project work. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Patients will resist medical record sharing if NHS bosses ignore their privacy fears. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Privacy watchdog takes first step against those undermining right to be forgotten. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Russia and China prepare to fight US internet domination. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2010) Security specification: completeness, feasibility, refinement. In: Extended Abstracts Collection -- Refinement Based Methods for the Construction of Dependable Systems, Dagstuhl, Germany. (Full text available)
[img]
Preview

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) We are right to fear spy ‘database of everything’ if even politicians know little about it. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert and Grundy, Dan (2010) The Logic of Large Enough. In: MPC 2010: Mathematics of Program Construction. (Full text available)
[img]
Preview

Boiten, Eerke Albert and Grundy, Dan (2008) Reduction and refinement. Electronic Notes in Theoretical Computer Science, 201C . pp. 31-44. ISSN 1571-0661. (doi:https://doi.org/10.1016/j.entcs.2008.02.014) (Full text available)
[img]
Preview

Boiten, Eerke Albert and Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert and Hernandez-Castro, Julio C. (2014) Targeted ‘malvertising’ reveals move towards more sophisticated hacks. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert and Jacob, Jeremy (2014) Sealed containers in Z. In: ABZ 2014, June 2-6, 2014, Toulouse. (doi:https://doi.org/10.1007/978-3-662-43652-3_12) (Full text available)
[img]
Preview

Boiten, Eerke Albert and Schneider, Steve A. (2014) Editorial: Special Issue on Cryptography and Formal Methods. Formal Aspects of Computing, 26 (1). pp. 1-2. ISSN 0934-5043 (Print) 1433-299X (Online). (doi:https://doi.org/10.1007/s00165-013-0290-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowles, Stephen and Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Brauer, Jorg and King, Andy (2010) Automatic Abstraction for Intervals using Boolean Formulae. In: Cousot, Radhia and Martel, Matthieu, eds. Static Analysis Symposium. Lecture Notes in Computer Science, 6337 . Springer-Verlag, pp. 182-196. ISBN 978-3-642-15768-4. (Full text available)
[img]
Preview

Brauer, Jorg and King, Andy (2011) Transfer Function Synthesis without Quantifier Elimination. In: Barthe, Gilles, ed. European Symposium on Programming. Lecture Notes in Computer Science, 6602 . Springer-Verlag, pp. 182-196. ISBN 978-3-642-19717-8. (Full text available)
[img]
Preview

Brostoff, Sacha and Sasse, M. Angela and Chadwick, David W. and Cunningham, James and Mbanaso, Uche and Otenko, Sassa (2005) 'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Software: Practice and Experience, 35 (9). pp. 835-856. ISSN 0038-0644. (doi:https://doi.org/10.1002/spe.691) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF). (doi:https://doi.org/10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Burcham, Morgan and Al-Zyoud, Mahran and Carver, Jeffrey C. and Alsaleh, Mohammed and Du, Hongying and Gilani, Fida and Jiang, Jun and Rahman, Akond and Kafalı, Özgür and Al-Shaer, Ehab and Williams, Laurie (2017) Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers. In: Hot Topics in Science of Security: Symposium and Bootcamp, April 04 - 05, 2017, Hanover, MD, USA. (doi:https://doi.org/10.1145/3055305.3055307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

C

Carvalho, Rodrigo and Goldsmith, Michael and Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David (2013) A Trust Model for ABFAB Trust Routers. . Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (1990) The 1992 Directory Standards - implications for earlier implementations of the Directory. In: Colloquium on the Global Directory, London. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2003) An Authorisation Interface for the GRID. In: E-Science All Hands Meeting 2003, Nottingham, 2003, Nottingham. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2005) Authorisation in Grid Computing. Information Security Technical Report, 10 (1). pp. 33-40. ISSN 1363-4127. (Full text available)
[img]
Preview

Chadwick, David W. (2006) Authorisation using Attributes from Multiple Authorities. In: 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 26-28 June 2006, Manchester, United Kingdom. (doi:https://doi.org/10.1109/WETICE.2006.22) (Full text available)
[img]
Preview

Chadwick, David W. (2004) Autonomic Privilege Management - extending PERMIS to contribute to the TrustCOM objectives. In: E-Challenges 2004, OCT 27-29, 2004, Vienna, Austria. (Full text available)
[img]
Preview

Chadwick, David W. (1999) Compound (Families of) Entries. UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2007) Coordinated decision making in distributed applications. Information Security Technical Report, Elsevier, 12 (3). pp. 147-154. ISSN 1363-4127. (doi:https://doi.org/10.1016/j.istr.2007.05.003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2001) Deficiencies in LDAP when used to Support a Public Key Infrastructure. In: Terena Networking Conference, 14-17 May 2001, Antalya, Turkey. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2003) Deficiencies in LDAP when used to support a Public Key Infrastructure. Communications of the ACM, 46 (3). pp. 99-104. ISSN 0001-0782. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2005) Delegation Issuing Service. In: NIST 4th Annual PKI Workshop. , Gaithersberg, USA pp. 62-73. (Full text available)
[img]
Preview

Chadwick, David W. (1989) The Directory - existing services and proposed enhancements. In: Proceedings of the Open Systems 89 Conference (London). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (1990) The Directory and its implications for name registration. In: Proceedings of the Open Systems and Interoperability Conference, London. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (1992) Distributed Aspects of the 1992 Directory Standard. In: Parallel and Distributed Computing in Engineering Systems, North-holland, 1992. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2007) Dynamic Delegation of Authority in Web Services. In: Periorellis, Panayiotis, ed. Securing Web Services: Practical Usage of Standards and Specifications. Premier Reference Source . IGI Global, United States, pp. 111-137. ISBN 978-1-59904-639-6. (Full text available)
[img]
Preview

Chadwick, David W. (1987) FTAM. The Development of a Commercial Product. In: Proceedings of the Open Systems Conference (London). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2009) Federated Identity Management. In: Aldini, Alessandro and Barthe, Gilles and Gorrieri, Roberto, eds. FOSAD 2008/2009. LNCS (5705). Springer-Verlag, Berlin, pp. 182-196. ISBN 978-3-642-03828-0. (doi:https://doi.org/10.1007/978-3-642-03829-7_3) (Full text available)
[img]
Preview

Chadwick, David W. (1996) The ICE-TEL Public Key Infrastructure and Trust Model. In: DIMACS Workshop on Trust Management, New York, USA. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (1996) Important Lessons Derived from X.500 Case Studies. IEEE Network, 10 (2). pp. 22-34. (Full text available)
[img]
Preview

Chadwick, David W. (1996) The Internet Directory is NOT Primarily a Technology Issue. In: INET 96 Conference, Montreal, Canada. (Full text available)
[img]

Chadwick, David W. (2002) Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3. IS Institute, University of Salford Salford England M5 4WT. (Full text available)
[img]

Chadwick, David W. (1986) Issues in the Implementation of Application Layer Standards. In: Proceedings of the Open Systems Conference (London). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2002) LDAPv3 DN strings for use with PKIs. IS Institute, University of Salford, Salford. (Full text available)
[img]

Chadwick, David W. (1996) A Method for Collecting Case Study Information via the Internet. IEEE Network, 10 (2). pp. 36-38. (Full text available)
[img]
Preview

Chadwick, David W. (2000) Network Firewall Technologies. In: Schneider, W.S. and Jerman-Blazic, B. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 149-166. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2007) Operational Models for Reputation Servers. In: Herrmann, Peter and Issarny, Valerie and Shiu, Simon, eds. Trust Management: Third International Conference, iTrust 2005. Lecture Notes in Computer Science, 3477 . Springer, Berlin, pp. 108-115. ISBN 978-3-540-26042-4. (Full text available)
[img]
Preview

Chadwick, David W. (2002) The PERMIS X.509 Based Privilege Management Infrastructure. IS Institute, University of Salford Salford M5 4WT England. (Full text available)
[img]

Chadwick, David W. (2000) Secure Directories. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 123-131. (Full text available)
[img]

Chadwick, David W. (2005) Security and Trust Management Extensions to the PERMIS X.509 Privilege Management Infrastructure. ERCIM News, 63 . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (1999) Smart Cards Aren't Always the Smart Choice. IEEE Computer, 32 (12). pp. 142-143. ISSN 0018-9162. (Full text available)
[img]

Chadwick, David W. (2004) Threat Modelling for Active Directory. In: Proceedings of Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, SEP 15-18, 2004, Windermere, England. (Full text available)
[img]
Preview

Chadwick, David W. (1990) Tutorial on X.500 - The Directory. In: IFIP TCC 3rd Int Conf on Information Network and Data Communication, Lillehammer. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (1996) Understanding X.500 (The Directory). International Thompson Publishing (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2007) Unifying Grid and Organisational Security Mechanisms. In: Xiao, Yang, ed. Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications, CRC Press, United States, pp. 239-254. ISBN 978-0-8493-7921-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2000) Windows 2000: A Threat to Internet Diversity and Open Standards? IEEE Computer, 33 (8). pp. 107-109. ISSN 0018-9162. (doi:https://doi.org/10.1109/2.863989) (Full text available)
[img]

Chadwick, David W. (1991) X.500: 1988 v 1992. In: Proceedings of the Electronic Directories Conference, London. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2003) The X.509 Privilege Management Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, Bled, Slovenia. IOS Press, p. 1525. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2004) The X.509 Privilege Management Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Security and Privacy in Advanced Networking Technologies. NATO Science Series: Computer & Systems Sciences, 193 . IOS Press, Amsterdam, pp. 15-25. ISBN 978-1-58603-430-6. (Full text available)
[img]
Preview

Chadwick, David W. (2005) The X.509 Privilege Management Standard. UPGRADE: The European Journal for the Informatics Professional, VI (4). pp. 41-46. ISSN 1684-5285. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2001) An X.509 Role Based Privilege Management Infrastructure. In: Cooper, E., ed. Briefing - Global InfoSecurity 2002, World Markets Research Centre Ltd. World Markets Research Centre, London. ISBN 1-903150-52-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Anthony, Sean (2007) Using WebDAV for Improved Certificate Revocation and Publication. In: LNCS 4582. Public Key Infrastructure, Proceedings of 4th European PKI Workshop, Palma de Mallorca, Spain, Jun 28-30, 2007, Palma de Mallorca, SPAIN. (Full text available)
[img]
Preview

Chadwick, David W. and Antony, Sean and Bjerk, Rune (2010) Instant certificate revocation and publication using WebDAV. Journal of Computer Security, 18 (3). pp. 475-496. ISSN 1875-8924. (doi:https://doi.org/10.3233/JCS-2009-0372) (Full text available)
[img]
Preview

Chadwick, David W. and Basden, Andrew (2001) Evaluating Trust in a Public Key Certification Authority. Computers and Security, 20 (7). pp. 592-611. ISSN 0167-4080. (doi:https://doi.org/10.1016/S0167-4048(01)00710-6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Basden, Andrew and Evans, J. and Young, Andrew J. (1998) Intelligent Computation of Trust. In: Terena Networking Conference, TNC98, Dresden, Germany, 5-8 October 1998, Dresden, Germany. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Beitis, George and Owen, Gareth (2008) Adding Authorisation to EduRoam. In: TERENA Networking Conference, May, 2008, Brugge, Belgium. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Carroll, C and Harvey, S. and New, John and Young, Andrew J. (2002) Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences 2002 (HICCS 2002), 7-10 January 2002, Big Island, HI USA. (Full text available)
[img]
Preview

Chadwick, David W. and Casenove, Matteo (2011) Security APIs for My Private Cloud-Granting access to anyone, from anywhere at any time. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), November 29th 2011 - December 1st 2011, Athens, Greece. (doi:https://doi.org/10.1109/CloudCom.2011.122) (Full text available)
[img]

Chadwick, David W. and Cook, P.J. and Young, Andrew J. and McDowell, D.M. and New, John (2000) Using the Internet to Access Confidential Patient Records: A Case Study''. British Medical Journal, 321 . pp. 612-614. (Full text available)
[img]

Chadwick, David W. and Fatema, Kaniz (2009) An advanced policy based authorisation infrastructure. In: ACM Computer and Communications Security Conference, 13 Nov 2009, Chicago. (doi:https://doi.org/10.1145/1655028.1655045) (Full text available)
[img]

Chadwick, David W. and Fatema, Kaniz (2012) A privacy preserving authorisation system for the cloud. Journal of Computer and System Sciences, 78 (5). pp. 1359-1373. ISSN 0022-0000. (doi:https://doi.org/10.1016/j.jcss.2011.12.019) (Full text available)
[img]
Preview

Chadwick, David W. and Harvey, S. and New, John and Young, Andrew J. (2000) Initial Experiences of Accessing Patient Confidential Data over the Internet using a Public Key Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 201-209. (Full text available)
[img]
Preview

Chadwick, David W. and Harvey, S. and New, John and Young, Andrew J. (2000) Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet. In: Information Security Solutions Europe (ISSE) 2000, Barcelona. (Full text available)
[img]

Chadwick, David W. and Howes, T. and Wahl, M. (1999) Referrals and Knowledge References in LDAP Directories. UNSPECIFIED. (Full text available)
[img]
Preview

Chadwick, David W. and Inman, George (2009) Attribute Aggregation in Federated Identity Management. IEEE Computer, . pp. 182-196. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Inman, George and Klingenstein, Nate (2010) A Conceptual Model for Attribute Aggregation. Future Generation Computer Systems, 26 (7). pp. 1043-1052. (doi:https://doi.org/10.1016/j.future.2009.12.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Inman, George and Siu, Kristy W.S. and Ferdous, Mohammad Sadek (2011) Leveraging social networks to gain access to organisational resources. In: Proceedings of the 7th ACM workshop on Digital identity management, 21st October 2011, Chicago, Illinois. (doi:https://doi.org/10.1145/2046642.2046653) (Full text available)
[img]

Chadwick, David W. and Legg, S. (2002) Internet X.509 Public Key Infrastructure -- LDAP Schema for PKIs. . Internet Draft (Unpublished) (Full text available)
[img]
Preview

Chadwick, David W. and Lievens, Stijn F and den Hartog, Jerry I and Pashalidis, Andreas and Alhadeff, Joseph (2011) My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. In: Cloud Computing (CLOUD), 2011 IEEE International Conference on, 4-9 July 2011, Washington, DC, USA. (doi:https://doi.org/10.1109/CLOUD.2011.113) (Full text available)
[img]
Preview

Chadwick, David W. and Mullan, S. (2002) Returning Matched Values with LDAPv3. . (Full text available)
[img]

Chadwick, David W. and Mundy, Darren (2003) Policy Based Electronic Transmission of Prescriptions. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks, JUN 04-06, 2003, LAKE COMO, ITALY. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Mundy, Darren (2004) The Secure Electronic Transfer of Prescriptions. In: HC2004, Harrogate, UK, 2004, Harrogate, England. (Full text available)
[img]
Preview

Chadwick, David W. and Mundy, Darren and New, John (2003) Experiences of Using a PKI to Access a Hospital Information System by High Street Opticians. Computer Communications special edition on PKI, 26 (16). pp. 1893-1903. ISSN 0140-3664. (doi:https://doi.org/10.1016/S0140-3664(03)00084-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and New, John and McDowell, D.M. and Mundy, Darren (2001) Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition. In: The International Conference On Internet Computing 2001. (Full text available)
[img]
Preview

Chadwick, David W. and Novikov, A. and Otenko, Alexander (2006) GridShib and PERMIS Integration. Campus-Wide Information Systems, 23 (4). pp. 297-308. ISSN 1065-0741. (Full text available)
[img]
Preview

Chadwick, David W. and Otenko, Alexander (2004) Implementing Role Based Access Controls using X.509 Privilege Management - the PERMIS Authorisation Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Security and Privacy in Advanced Networking Technologies. NATO Science Series, 193 . IOS Press, pp. 26-39. ISBN 1576034308. (Full text available)
[img]
Preview

Chadwick, David W. and Otenko, Alexander (2002) The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proc 7th ACM Symposium On Access Control Models And Technologies (SACMAT 2002), Monterey, USA, June 2002, California, USA. (Full text available)
[img]
Preview

Chadwick, David W. and Otenko, Alexander (2003) The PERMIS X.509 Role Based Privilege Management Infrastructure. Future Generation Computer Systems, 19 (2). pp. 277-289. ISSN 0167-739X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Otenko, Alexander (2002) RBAC Policies in XML for X.509 Based Privilege Management. In: Ghonaimy, Adeeb and El-Hadidi, Mahmoud T. and Aslan, Heba Kamal, eds. Security in the Information Society: Visions and Perspectives. IFIP International Federation for Information Processing S.. Kluwer Academic Publishers, Dordrecht pp. 39-54. ISBN 978-1-4020-7030-3. (Full text available)
[img]

Chadwick, David W. and Otenko, Alexander and Ball, E. (2003) Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing, . pp. 62-69. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Otenko, O. (2003) A Comparison of the Akenti and PERMIS Authorization Infrastructures in Ensuring Security in IT Infrastructures. In: El-Hadidi, Mahmoud T., ed. Proceedings of the ITI First International Conference on Information and Communications Technology (ICICT 2003) Cairo University. pp. 5-26. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Otenko, Olexandre and Hunter, David and Leoni, Cristiano (2002) Privilege Management for E-Construction. In: Proc European Conf on Information and Communication Technology Advances and Innovation in the Knowledge Society, Part B, 2002, University of Salford, UK.. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Otenko, Sassa and Nguyen, Tuan Anh (2006) Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. In: Communications and Multimedia Security. Lecture Notes in Computer Science, 4237 . Springer Berlin/Heidelberg, pp. 67-86. ISBN 978-3-540-47820-1. (doi:https://doi.org/10.1007/11909033) (Full text available)
[img]
Preview

Chadwick, David W. and Otenko, Sassa and Nguyen, Tuan Anh (2009) Adding Support to XACML for Multi-Domain User to User Dynamic Delegation of Authority. International Journal of Information Security, 8 (2). pp. 182-196. (doi:https://doi.org/10.1007/s10207-008-0073-y) (Full text available)
[img]
Preview

Chadwick, David W. and Otenko, Sassa and Welch, Von (2005) Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure. In: Communications and Multimedia Security. (Full text available)
[img]
Preview

Chadwick, David W. and Pope, N. (1994) Interdomain Guardians in a Distributed Directory Service. In: Information Networks and Data Communications - Proceedings of the IFIP TC6 International Conference on Information Networks and Data Communications, Funchal, Madeira Island, Portugal. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Sahalayev, M. and Ball, E. (2003) Modifying LDAP to Support PKIs. In: INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING. KLUWER ACADEMIC PUBLISHERS, 101 PHILIP DRIVE, ASSINIPPI PARK, NORWELL, MA 02061 USA pp. 205-214. ISBN 1-4020-8069-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Sahalayev, M.V. (2003) Internet X.509 Public Key Infrastructure LDAP Schema for X.509 Attribute Certificates. Internet Draft. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Sahalayev, M.V. (2003) Internet X.509 Public Key Infrastructure LDAP Schema for X.509 CRLs. INTERNET-DRAFT. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Sasse, Angela (2006) The Virtuous Circle of Expressing Authorisation Policies. In: Proceedings of the ISWC'06 Workshop on Semantic Web Policy (SWPW'06). (Full text available)
[img]
Preview

Chadwick, David W. and Sette, Ioram S. and Sui, Kristy, W (2015) Opening Up OpenStack’s Identity Service. In: Terena Networking Conference 2015, 14-18 June, 2015, Porto, Portugal. (Unpublished) (Full text available)
[img]
Preview
[img]

Chadwick, David W. and Su, L. and Laborde, Romain (2006) Coordinating access control in grid services. In: 7th International Middleware Conference, November 27th - December 1st 2006, Melbourne, Australia. (doi:https://doi.org/10.1002/cpe.1284) (Full text available)
[img]
Preview

Chadwick, David W. and Su, Linying and Laborde, Romain (2006) Providing Secure Coordinated Access to Grid Services. In: MCG. ACM, New York p. 1. ISBN 1-59593-581-9. (doi:https://doi.org/10.1145/1186675.1186677) (Full text available)
[img]
Preview

Chadwick, David W. and Su, Linying and Otenko, Oleksandr and Laborde, Romain (2006) Co-ordination between Distributed PDPs. In: Burgess, M. and Wijesekera, D., eds. Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, Proceedings. IEE Computer Society, Washington, DC (USA) pp. 163-172. ISBN 0-7695-2598-9. (doi:https://doi.org/10.1109/POLICY.2006.14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Tassabehji, Rana and Young, Andrew J. (2000) Experiences of Using a Public Key Infrastructure for the Preparation of Examination Papers. Computers and Education, 35 (1). pp. 1-20. ISSN 0360-1315. (doi:https://doi.org/10.1016/S0360-1315(99)00040-8) (Full text available)
[img]
Preview

Chadwick, David W. and Xu, Wensheng and Otenko, Sassa and Laborde, Romain and Nasser, Bassem (2007) Multi-Session Separation of Duties (MSoD) for RBAC. In: Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering Workshop. IEEE International Conference on Data Engineering Workshop. I.E.E.E, Computer Soc Press, Istanbul, Turkey pp. 744-753. ISBN 978-1-4244-0831-3. (doi:https://doi.org/10.1109/ICDEW.2007.4401062) (Full text available)
[img]
Preview

Chadwick, David W. and Young, Andrew J. (2000) A Directory Application Level Firewall - the Guardian DSA. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 133-147. (Full text available)
[img]
Preview

Chadwick, David W. and Young, Andrew J. (1998) Enabling the Internet White Pages Service -- the Directory Guardian. In: Internet Society Symposioum on Network and Distributed Systems Security (NDSS 98), San Diego, California. (Full text available)
[img]
Preview

Chadwick, David W. and Young, Andrew J. and Kapidzic Cicovic, Nada (1997) Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model. IEEE Networks Special Publication on Internet Security, 11 (3). pp. 16-24. ISSN 0890-8044. (Full text available)
[img]

Chadwick, David W. and Zhao, Gansen and Otenko, Sassa and Laborde, Romain and Su, Linying and Nguyen, Tuan Anh (2006) Building a Modular Authorization Infrastructure. In: All Hands Meeting. . (Full text available)
[img]

Chadwick, David W. and Zhao, Gansen and Otenko, Sassa and Laborde, Romain and Su, Linying and Nguyen, Tuan Anh (2008) PERMIS: a modular authorization infrastructure. In: 5th UK e-Science All Hands Meeting (AHM 2006), September 8th - 21st 2006, Nottingham, England. (doi:https://doi.org/10.1002/cpe.1313) (Full text available)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2012) F-SAMS: Reliably Identifying Attributes and Their Identity Providers in a Federation. In: On the Move to Meaningful Internet Systems: OTM 2012 Workshops. Springer Berlin Heidelberg, pp. 231-241. (Full text available)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2013) Towards Automated Trust Establishment in Federated Identity Management. In: Trust Management VII. Springer Berlin Heidelberg, pp. 33-48. (Full text available)
[img]
Preview

Chadwick, David W and Inman, George (2013) The Trusted Attribute Aggregation Service (TAAS)-Providing an Attribute Aggregation Layer for Federated Identity Management. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent (2014) APTE: An Algorithm for Proving Trace Equivalence. In: Ábrahám, Erika and Havelund, Klaus, eds. Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science, 8413. Springer-Verlag Berlin, Grenoble, France pp. 587-592. ISBN 978-3-642-54861-1. E-ISBN 978-3-642-54862-8. (doi:https://doi.org/10.1007/978-3-642-54862-8_50) (Full text available)
[img]
Preview

Cheval, Vincent (2012) Automatic verification of cryptographic protocols: privacy-type properties. Doctor of Philosophy (PhD) thesis, ENS-Cachan. (Full text available)
[img]
Preview

Cheval, Vincent and Blanchet, Bruno (2013) Proving More Observational Equivalences with ProVerif. In: Basin, David and Mitchell, John C., eds. Principles of Security and Trust. Lecture Notes in Computer Science, 7796. Springer-Verlag Berlin, Roma, Italy pp. 226-246. ISBN 978-3-642-36829-5. E-ISBN 978-3-642-36830-1. (doi:https://doi.org/10.1007/978-3-642-36830-1_12) (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2010) Automating Security Analysis: Symbolic Equivalence of Constraint Systems. In: Giesl, Jürgen and Hähnle, Reiner, eds. Automated Reasoning. Lecture Notes in Computer Science, 6173. Springer-Verlag Berlin, Edinburgh, Scotland, UK pp. 412-426. ISBN 978-3-642-14202-4. E-ISBN 978-3-642-14203-1. (doi:https://doi.org/10.1007/978-3-642-14203-1_35) (Full text available)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2011) Trace Equivalence Decision: Negative Tests and Non-determinism. In: Chen, Yan and Danezis, George and Shmatikov, Vitaly, eds. Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. ACM Press pp. 321-330. ISBN 978-1-4503-0948-6. (doi:https://doi.org/10.1145/2046707.2046744) (Full text available)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:https://doi.org/10.1016/j.ic.2017.05.004) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: 4th International Conference on Principles of Security and Trust (POST'15), April 2015, London, UK. (doi:https://doi.org/10.1007/978-3-662-46666-7_15) (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Cortier, Véronique and Delaune, Stéphanie (2013) Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492 . pp. 1-39. ISSN 0304-3975. (doi:https://doi.org/10.1016/j.tcs.2013.04.016) (Full text available)
[img]
Preview

Cheval, Vincent and Cortier, Véronique and Plet, Antoine (2013) Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: Shargina, Natasha and Veith, Helmut, eds. Computer Aided Verification. Lecture Notes in Computer Science, 8044. Springer-Verlag Berlin, St Petersburg, Russia pp. 708-723. ISBN 978-3-642-39798-1. E-ISBN 978-3-642-39799-8. (doi:https://doi.org/10.1007/978-3-642-39799-8_50) (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Delaune, Stéphanie and Ryan, Mark (2014) Tests for Establishing Security Properties. In: Maffei, Matteo and Tuosto, Emilio, eds. Trustworthy Global Computing. Lecture Notes in Computer Science, 8902. Springer-Verlag Berlin pp. 82-96. ISBN 978-3-662-45916-4. E-ISBN 978-3-662-45917-1. (doi:https://doi.org/10.1007/978-3-662-45917-1_6) (Full text available)
[img]
Preview

Crawford, Scott and Chadwick, David W. (2004) Experiences of Establishing Trust in a Distributed System Operated by Mutually Distrusting Parties. In: 3rd Annual PKI R&amp;D Workshop, April 12-14, 2004,, NIST, Gaithersburg MD. (Full text available)
[img]

Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R. C. and Pike, Bill and Schultz, Jean (2014) Tools for Understanding Identity. In: IEEE Conference on Technologies for Homeland Security (HST '13). (doi:https://doi.org/10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). (doi:https://doi.org/10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

D

Damsgaard Jensen, Christian and Marsh, Stephen and Dimitrakos, Theo and Murayama, Yuko, eds. (2015) Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology, 454 . Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua and El-Moussa, Fadi and Ducatel, Géry and Pawar, Pramod and Sajjad, Ali and Rowlingson, Robert and Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology, 454. Springer pp. 226-239. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chadwick, David W. and de Decker, Bart, eds. (2012) Communications and Multimedia Security: Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security. Springer-Verlag ISBN 3-642-32804-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Devlin, Matthieu and Nurse, Jason R. C. and Hodges, Duncan and Goldsmith, Michael and Creese, Sadie (2015) Predicting Graphical Passwords. In: International Conference on Human Aspects of Information Security, Privacy and Trust at the 17th International Conference on Human-Computer Interaction (HCI). (doi:https://doi.org/10.1007/978-3-319-20376-8_3) (Full text available)
[img]
Preview

Dimitrakos, Theo (2014) Context-Aware Multifactor Authentication Based on Dynamic Pin. In: IFIP SEC 2015. (doi:https://doi.org/10.1007/978-3-642-55415-5_27) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Carlos Eduardo and Diniz, Thomas and Cacho, Nelio and de Lemos, Rogerio (2018) Self-adaptive Authorisation in OpenStack Cloud Platform. Journal of Internet Services and Applications, 9 (19). ISSN 1867-4828. E-ISSN 1869-0238. (doi:https://doi.org/10.1186/s13174-018-0090-7) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

de Balthasar, Thibault and Hernandez-Castro, Julio C. (2017) An Analysis of Bitcoin Laundry Services. In: NordSec2017 - Nordic Conference on Secure IT Systems, 8-10 Nov 2017, Tartu, Estonia. (doi:https://doi.org/10.1007/978-3-319-70290-2_18) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogerio and Bailey, Christopher (2018) Evaluating Self-Adaptive Authorisation Infrastructures through Gamification. In: DSN 2018: 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 2018, Luxembourg. (doi:https://doi.org/10.1109/DSN.2018.00058) (Full text available)
[img]
Preview

de Lemos, Rogerio and Sedgewick, Peter (2018) Self-adaptation made easy with Blockchains. In: SEAMS 2018: 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 28 - 29 May 2018, Gothenburg, Sweden. (doi:https://doi.org/10.1145/3194133.3194150) (Full text available)
[img]
Preview

E

Eggenschwiler, Jacqueline and Agrafiotis, Ioannis and Nurse, Jason R. C. (2016) Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, . ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(16)30091-4) (Full text available)
[img]
Preview

Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Alcaide, Almudena and Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Everett, Richard and Nurse, Jason R. C. and Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:https://doi.org/10.1145/2851613.2851813) (Full text available)
[img]
Preview

Eze, Chika and Nurse, Jason R. C. and Happa, Jassim (2016) Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 7 (1). ISSN 2093-5382. (doi:https://doi.org/10.22667/JOWUA.2016.03.31.039) (Full text available)
[img]
Preview

F

Farnan, Oliver and Nurse, Jason R. C. (2016) Exploring a Controls-Based Assessment of Infrastructure Vulnerability. In: 10th Risks and Security of Internet and Systems. CRiSIS 2015, July 20-22 2015, Greece. (doi:https://doi.org/10.1007/978-3-319-31811-0_9) (Full text available)
[img]
Preview

Farrell, S. and Chadwick, David W. (2000) Limited Attribute Certificate Acquisition Protocol. University of Salford. (Full text available)
[img] [img]
Preview

Fatema, Kaniz and Chadwick, David (2014) Resolving Policy Conflicts-Integrating Policies from Multiple Authors. In: Advanced Information Systems Engineering Workshops. Springer International Publishing pp. 310-321. (Full text available)
[img]
Preview

Fatema, Kaniz and Chadwick, David W. and van Alsenoy, Brendan (2012) Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. In: Camenisch, Jan and Crispo, Bruno and Fischer-Hübner, Simone and Leenes, Ronald and Russello, Giovanni, eds. Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology, 375 . Springer Boston, pp. 59-72. ISBN 978-3-642-31667-8. (doi:https://doi.org/10.1007/978-3-642-31668-5_5) (Full text available)
[img]
Preview

Ferreira, Ana (2010) Modelling Access Control for Healthcare Information Systems:How to control access through policies, human processes and legislation. Doctor of Philosophy (PhD) thesis, Computing. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ferreira, Ana and Antunes, Luis and Chadwick, David W. and Correi, Ricardo (2010) Grounding Information Security in Healthcare. International Journal of Medical Informatics, 79 (4). pp. 182-196. (doi:https://doi.org/10.1016/j.ijmedinf.2010.01.009) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ferreira, Ana and Chadwick, David W. and Antunes, Luis (2007) Modelling Access Control For Healthcare Information Systems. In: Doctoral consortium at 9th International Conference on Enterprise Information Systems (ICEIS2007), 12th-16th June 2007, Funchal, Madeira - Portugal. (Full text available)
[img]
Preview

Ferreira, Ana and Chadwick, David W. and Farinha, P and Cruz-Correia, Ricardo and Zhao, Gansen and Chilro, R and Antunes, Luis (2009) How to securely break into RBAC: the BTG-RBAC model. In: Computer Security Applications Conference, 2009. ACSAC'09. Annual, December 7–11, 2009, Honolulu, Hawaii, USA. (doi:https://doi.org/10.1109/ACSAC.2009.12) (Full text available)
[img]
Preview

Ferreira, Ana and Correia, Ricardo and Chadwick, David W. and Santos, Henrique and Gomes, Rut and Reis, Diogo and Antunes, Luis (2010) Password Sharing and How to Reduce It. In: Chryssanthou, Anargyros and Apostolakis, Ioannis and Varlamis, Iraklis, eds. Certification and Security in Health-Related Web Applications: Concepts and Solutions. Premier Reference Source . Medical Information Science Reference, New York, pp. 243-263. ISBN 978-1-61692-897-1. (Full text available)
[img]
Preview

Ferreira, Ana and Cruz-Correia, Ricardo and Antunes, Luis and Chadwick, David W. (2007) Access Control: how can it improve patients' healthcare? In: Bos, Lodewijk and Blobel, Bernd, eds. Medical and Care Compunetics 4. Studies in Health Technology and Informatics (Volume). IOS Press, Netherlands, pp. 65-76. ISBN 978-1-58603-751-2. (Full text available)
[img]
Preview

Ferreira, Ana and Cruz-Correia, Ricardo and Antunes, Luis and Farinha, P and Oliveira-Palhares, E. and Chadwick, David W. and Costa-Pereira, A. (2006) How to break access control in a controlled manner. In: 19th IEEE International Symposium on Computer-Based Medical Systems, 22-23 June 2006, Salt Lake City, Utah (USA). (Full text available)
[img]
Preview

G

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Giasemidis, Georgios and Kaplis, Nikolaos and Agrafiotis, Ioannis and Nurse, Jason R. C. (2018) A semi-supervised approach to message stance classification. IEEE Transactions on Knowledge and Data Engineering, . ISSN 1041-4347. E-ISSN 1558-2191. (doi:https://doi.org/10.1109/TKDE.2018.2880192) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Giasemidis, Georgios and Singleton, Colin and Agrafiotis, Ioannis and Nurse, Jason R. C. and Pilgrim, Alan and Willis, Chris (2016) Determining the veracity of rumours on Twitter. In: 8th International Conference on Social Informatics (SocInfo 2016), November 11-14, 2016, Bellevue, WA, USA. (doi:https://doi.org/10.1007/978-3-319-47880-7_12) (Full text available)
[img]
Preview

Guo, Hui and Kafalı, Özgür and Jeukeng, Anne-Liz and Williams, Laurie and Singh, Munindar P. (2018) Poster: Extraction of Security Requirements from Textual Artifacts. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS). (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guo, Hui and Kafalı, Özgür and Singh, Munindar P. (2018) Extraction and Formal Representation of Natural Language Requirements from Breach Reports. In: Fifth International Workshop on Artificial Intelligence for Requirements Engineering, 2018, Banff, Canada. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

H

Hajdusek, Michal and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. arXiv preprint arXiv:1502.02563, . (Unpublished) (Full text available)
[img]
Preview

Happa, Jassim and Fairclough, Graham and Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy, 19-21 february, Rome, Italy. (Full text available)
[img]
Preview

Happa, Jassim and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 28-29 March 2018, London, UK. (doi:https://doi.org/10.1049/cp.2018.0026) (Full text available)
[img]
Preview

Harrison, Joe and Roberts, David L. and Hernandez-Castro, Julio (2016) Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology, 30 (4). pp. 900-904. ISSN 0888-8892. (doi:https://doi.org/10.1111/cobi.12707) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Bettahar, H. (2007) A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. In: Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on. AINAW, 1. IEEE pp. 551-556. ISBN 978-0-7695-2847-2. (doi:https://doi.org/10.1109/AINAW.2007.32) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Bettahar, H. and Challal, Y. (2005) Gestion de Clés dans la communication de Groupes Hiérarchiques. In: 4ème Rencontre Francophone sur Sécurité et Architectures Réseaux 2005, June 2005, Batz sur Mer, France. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Bettahar, H. and Challal, Y. (2005) Hi-KD : Hash-based hierarchical Key Distribution for Group Communication. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Bettahar, H. and Challal, Y. (2005) Hi-KD: An Efficient Key Management Algorithm for Hierarchical Group. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks: Securecomm 2005, Proceedings. Institute of Electrical & Electronics Enginee, pp. 270-276. ISBN 978-0-7695-2369-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Bettahar, H. and Challal, Y. (2007) Key management for content access control in a hierarchy. Computer Networks: The International Journal of Computer and Telecommunications Networking, 51 (11). pp. 3197-3219. ISSN 1389-1286. (doi:https://doi.org/10.1016/j.comnet.2006.12.011) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hassan, H. Ragab and Challal, Y. (2005) EnhancedWEP : An efficient solution to WEP threats. In: UNSPECIFIED. (doi:https://doi.org/10.1109/WOCN.2005.1436095) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(14)70461-0) (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only. (Full text available)
[img]

Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Peris-Lopez, Pedro and Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Estévez-Tapiador, Juan M. and Peris-Lopez, Pedro and Clark, John A. and Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:https://doi.org/10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:https://doi.org/10.7717/peerj-cs.10) (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Tapiador, Juan E. and Palomar, Esther and Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hirano, Manabu and Chadwick, David W and Yamaguchi, Suguru (2013) Use of Role Based Access Control for Security-Purpose Hypervisors. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, July, 2013, Melbourne, Australia. (Full text available)
[img]
Preview

Hodges, D. and Nurse, Jason R. C. and Goldsmith, M. and Creese, S. (2012) Identity attribution across CyberSpace and the Natural Space. In: The International Crime and Intelligence Analysis Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hosek, Petr and Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Evans, David and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2011) SafeWeb: A Middleware for Securing Ruby-Based Web Applications. In: Middleware 2011. Springer-Verlag Berlin pp. 491-511. (doi:https://doi.org/10.1007/978-3-642-25821-3_25) (Full text available)
[img]
Preview

Hosu, Vlad and Hahn, Franz and Jenadeleh, Mohsen and Lin, Hanhe and Men, Hui and Szirányi, Tamás and Li, Shujun and Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 9th International Conference on Quality of Multimedia Experience (QoMEX 2017), 31 May - 2 June 2017, Erfurt, Germany. (doi:https://doi.org/10.1109/QoMEX.2017.7965673) (Full text available)
[img]
Preview

Hou, Peixin and Petrou, Maria and Underwood, Craig Ian and Hojjatoleslami, Ali (2000) Improved JPEG performance in conjunction with cloud editing for Remote Sensing applications. IEEE Transactions: Geoscience and Remote Sensing, 38 (1). 515 -524. ISSN 0196-2892. (doi:https://doi.org/10.1109/TGRS.2011.2131971) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howe, Jacob M. and King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (doi:https://doi.org/10.1016/S0020-0190(00)00081-8) (Full text available)
[img]
Preview
[img]

Hull, Gavin and John, Henna and Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, . (doi:http://dx.doi.org/) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hurley-Smith, Darren and Hernandez-Castro, Julio (2018) Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security, 13 (4). pp. 1031-1041. ISSN 1556-6013. E-ISSN 1556-6021. (doi:https://doi.org/10.1109/TIFS.2017.2777342) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

I

Inglesant, Philip and Sasse, M. Angela and Chadwick, David W. and Shi, Lei Lei (2008) Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification. In: UNSPECIFIED. (Full text available)
[img]
Preview

Inman, George and Chadwick, David W. (2010) A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements Systems. Upgrade, XI (1). pp. 182-196. (Full text available)
[img]

Inman, George and Chadwick, David W. and Klingenstein, Nate (2007) Authorisation using Attribute from Multiple Authorities - A Study of Requirements. In: Proceedings of HCSIT Summit - ePortfolio International Conference, October 2007, Maastricht, Netherlands. (Full text available)
[img]
Preview

Iuga, Cristian and Nurse, Jason R. C. and Erola, Arnau (2016) Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks. Journal of Human-centric Computing and Information Sciences, 6 (8). ISSN 2192-1962. (doi:https://doi.org/10.1186/s13673-016-0065-2) (Full text available)
[img]
Preview

J

Jin, Ruji and Lin, Chen and Su, Linying (1997) The basic of multi-media computer. The people's press of Inner Mogolia, Hohhot, China ISBN 7-204-04135-6/G.899. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

K

Kafalı, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2017) Formal Understanding of Tradeoffs among Liveness and Safety Requirements. In: 24th International Requirements Engineering Conference Workshops: Third International Workshop on Artificial Intelligence for Requirements Engineering (AIRE), 12–16 September 2016, Beijing, China. (doi:https://doi.org/10.1109/REW.2016.017) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2017) Kont: Computing tradeoffs in normative multiagent systems. In: 31st Conference on Artificial Intelligence (AAAI), February 4 – 10, 2017, San Francisco, California, USA. (Full text available)
[img]
Preview

Kafalı, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2017) Normative Requirements in Sociotechnical Systems. In: 9th International Workshop on Requirements Engineering and Law (RELAW), 12–16 September 2016, Beijing, China. (doi:https://doi.org/10.1109/REW.2016.049) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2016) Revani: Revising and Verifying Normative Specifications for Privacy. IEEE Intelligent Systems, 31 (5). pp. 8-15. ISSN 1541-1672. (doi:https://doi.org/10.1109/MIS.2016.89) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Kafalı, Özgür and Criado, Natalia and Rehak, Martin and Such, Jose M. and Yolum, Pınar (2018) Guest Editors' Introduction - Artificial Intelligence for Security and Privacy. ACM Transactions on Internet Technology, 18 (3). ISSN 1533-5399. (doi:https://doi.org/10.1145/3177884) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgür and Günay, Akın and Yolum, Pınar (2013) Protoss: A run time tool for detecting privacy violations in online social networks: Short Paper. In: Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 26-29 August 2012, Istanbul, Turkey. (doi:https://doi.org/10.1109/ASONAM.2012.76) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgür and Jones, Jasmine and Petruso, Megan and Williams, Laurie and Singh, Munindar P. (2017) How Good is a Security Policy against Real Breaches? A HIPAA Case Study. In: 39th International Conference on Software Engineering (ICSE), 20–28 May 2017, Buenos Aires, Argentina. (doi:https://doi.org/10.1109/ICSE.2017.55) (Full text available)
[img]
Preview

Kafalı, Özgür and Singh, Munindar P. (2017) Improving Cybersecurity: User Accountability and Sociotechnical Systems. . IEEE Online. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgür and Singh, Munindar P. and Williams, Laurie (2016) Nane: Identifying misuse cases using temporal norm enactments. In: 24th International Requirements Engineering Conference (RE), 12–16 September 2016, Beijing, China. (doi:https://doi.org/10.1109/RE.2016.34) (Full text available)
[img]
Preview

Kafalı, Özgür and Singh, Munindar P. and Williams, Laurie (2016) Toward a normative approach for forensicability: Extended Abstract. In: Symposium and Bootcamp on the Science of Security, April 19 - 21, 2016, Pittsburgh, Pennsylvania. (doi:https://doi.org/10.1145/2898375.2898386) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kammüller, Florian and Nurse, Jason R. C. and Probst, Christian W. (2016) Attack Tree Analysis for Insider Threats on the IoT using Isabelle. In: Human Aspects of Information Security, Privacy, and Trust. HAS 2016.. (doi:https://doi.org/10.1007/978-3-319-39381-0_21) (Full text available)
[img]
Preview

Khalil, Omar and Hernandez-Castro, Julio C. and Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:https://doi.org/10.1016/j.diin.2013.01.004) (Full text available)
[img]
Preview

King, Andy and Sondergaard, Harald (2010) Automatic Abstraction for Congruences. In: Barthe, Gilles and Hermenegildo, Manuel V., eds. Verification, Model Checking, and Abstract Interpretation. Lecture Notes in Computer Science (5944). Springer-Verlag, pp. 182-196. ISBN 978-3-642-11318-5. (Full text available)
[img]
Preview

Kingston, Charlie and Nurse, Jason R. C. and Agrafiotis, Ioannis and Milich, Andrew (2018) Using semantic clustering to support situation awareness on Twitter: The case of World Views. Human-centric Computing and Information Sciences, . ISSN 2192-1962. E-ISSN 2192-1962. (doi:https://doi.org/10.1186/s13673-018-0145-6) (Full text available)
[img]
Preview
[img]
Preview

Kittler, Josef and Hojjatoleslami, Ali (1998) A weighted Combination of Classifiers Employing Shared and Distinct Representation. In: IEEE Computer Society Conference, 23 Jun 1998 - 25 Jun 1998, Santa Barbara. (doi:https://doi.org/10.1109/CVPR.1998.698715) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kritzinger, Elmarie and Bada, Maria and Nurse, Jason R. C. (2017) A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In: IFIP World Conference on Information Security Education, May 29-31, 2017, Rome, Italy. (doi:https://doi.org/10.1007/978-3-319-58553-6_10) (Full text available)
[img]
Preview

L

Lan, Chunsheng and Ting, Fang and Su, Linying (1993) The introduction to Hospital Office System. Processing and Research of Medical Iinformation, 1 (1). pp. 26-28. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Legg, Philip A. and Moffat, Nick and Nurse, Jason R. C. and Happa, Jassim and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:https://doi.org/10.22667/JOWUA.2013.12.31.020) (Full text available)
[img]
Preview

Li, Chengqing and Feng, Bingbing and Li, Shujun and Chen, Guanrong (2018) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, . ISSN 1549-8328. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Li, Shujun and Ho, Anthony TS and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: MPS 2018 (2nd International Workshop on Multimedia Privacy and Security), 15 October, 2018, Toronto, Canada. (doi:https://doi.org/10.1145/3267357.3267365) (Full text available)
[img]
Preview

Liu, Shi and Gao, Guanglai and Su, Linying and Wang, Junyi and Hou, Hongxu and Li, Ping (1997) Chinese Windows and general applications. Inner Mongolia University Press, Hohhot, China ISBN 7-81015-754-X/TP.21. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Liu, Ximing and Li, Yingjiu and Deng, Robert H. and Chang, Bing and Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2018.09.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Lopez, Gabriel and Canovas, Oscar and Gomez-Skarmeta, Antonio F. and Otenko, Sassa and Chadwick, David W. (2005) A Heterogeneous Network Access Service based on PERMIS and SAML. In: 2nd EuroPKI Workshop, 30 June - 1 July 2005, Canterbury, United Kingdom. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

M

Ma, Y. and Chadwick, David W. (1996) Implementation of a Mechanism in the OSI Directory. Minimicro Systems (China), 17 (7). pp. 5-10. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mbanaso, Uche and Cooper, G.S. and Chadwick, David W. and Anderson, Anne (2007) Obligations for Privacy and Confidentiality in Distributed Transactions. In: Denko, Mieso K, ed. Emerging Directions in Embedded and Ubiquitous Computing. Lecture Notes In Computer Science, 4809. Springer pp. 69-81. ISBN 978-3-540-77089-3. (Full text available)
[img]
Preview

Mbanaso, Uche and Cooper, G.S. and Chadwick, David W. and Anderson, Anne (2009) Obligations of Trust for Privacy and Confidentiality in Distributed Transactions. Internet Research, 19 (2). pp. 182-196. (doi:https://doi.org/10.1108/10662240910952328) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mbanaso, Uche and Cooper, G.S. and Chadwick, David W. and Proctor, S. (2006) Privacy Preserving Trust Authorization Framework Using XACML. In: International Workshop on Wireless Mobile Multimedia. IEEE Computer Society, Washington, DC (USA) pp. 673-678. ISBN 0-7695-2593-8. (Full text available)
[img]
Preview

Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) DEFCON: high-performance event processing with information security. In: USENIX ATC'10: 2010 USENIX Annual Technical Conference, June 23rd-25th, 2010, Boston, Massachusetts, USA. (Full text available)
[img]
Preview

Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) Distributed Middleware Enforcement of Event Flow Security Policy. In: Gupta, Indrani and Mascolo, Cecilia, eds. Middleware 2010. Lecture Notes in Computer Science, 6452. Springer Berlin Heidelberg pp. 334-354. ISBN 978-3-642-16954-0. (doi:https://doi.org/10.1007/978-3-642-16955-7_17) (Full text available)
[img]
Preview

Mitrokotsa, Aikaterini and Dimitrakakis, Christos and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:https://doi.org/10.1109/LCOMM.2010.02.091946) (Full text available)
[img]
Preview

Montrieux, Lionel and de Lemos, Rogerio and Bailey, Christopher (2018) Challenges in Engineering Self-adaptive Authorisation Infrastructures. In: Yu, Yijun, ed. Engineering Adaptive Software Systems. Springer, pp. 1-40. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Mundy, Darren (2003) Providing a Secure Solution for the Integration of Electronic Prescription Transfer within the United Kingdom National Health Service. In: UKAIS PhD Symposium 2003, University of Warwick, UK, 8th-9th April 2003., University of Warwick,. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mundy, Darren and Chadwick, David W. (2003) The Benefits in and Barriers towards the Implementation of Electronic Transfer of Prescriptions within the United Kingdom National Health Service. In: 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick, UK, September 2003, Warwick, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mundy, Darren and Chadwick, David W. (2003) Comparing the Performance of Abstract Syntax Notation One (ASN.1) vs eXtensible Markup Language (XML). In: Terena Networking Conference, Zagreb. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mundy, Darren and Chadwick, David W. (2004) Electronic Transmission of Prescriptions - Towards Realising the Dream. International Journal of Electronic Healthcare, 1 (1). pp. 112-125. ISSN 1741-8453. (doi:https://doi.org/10.1504/IJEH.2004.004659) (Full text available)
[img]
Preview

Mundy, Darren and Chadwick, David W. (2004) Secure Knowledge Management. In: Wickramasinghe, Nilmini and Gupta, Jatinder N. D. and Sharma, Sushil K., eds. Creating Knowledge Based Health Care Organizations. Idea Publishing Group, pp. 321-337. (Full text available)
[img]
Preview

Mundy, Darren and Chadwick, David W. (2003) Security issues in the electronic transfer of prescriptions. Medical Informatics and the Internet in Medicine, 28 (4). pp. 253-277. ISSN 1463-9238. (doi:https://doi.org/10.1080/14639230310001621675) (Full text available)
[img]
Preview

Mundy, Darren and Chadwick, David W. (2002) A System for Secure Electronic Prescription Handling. In: Proc of The Hospital of the Future, Second International Conference On The Management Of Healthcare And Medical Technology, Illinois Institute of Technology, Chicago, Illinois, USA, July 2002, Chicago, Illinois. (Full text available)
[img]
Preview

Mundy, Darren and Chadwick, David W. (2004) An XML Alternative for Performance and Security: ASN.1. IEEE IT Professional, 6 (1). pp. 30-36. ISSN 1520-9202. (doi:https://doi.org/10.1109/MITP.2004.1265540) (Full text available)
[img]
Preview

Mundy, Darren and Chadwick, David W. and Ball, E. (2003) An Application Programming Interface for the Electronic Transmission of Prescriptions. In: Proceedings of the International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmeaunu, Germany, May 22-24 2003, May 22-24 2003,, Ilmeaunu, Germany, May 22-24 2003,. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mundy, Darren and Chadwick, David W. and Ball, E. (2004) Some expectations and perceptions of electronic transfer of prescription systems. British Journal of Health Care Computing and Information Management, March 2004, 22 (2). pp. 34-38. (Full text available)
[img]
Preview

Mundy, Darren and Chadwick, David W. and Ball, E. and Marsden, Paul K. and Bell, C. and Whatley, J.E and Sobreperez, P. and New, John (2003) Towards Electronic Transfer of Prescriptions (ETP) in the United Kingdom National Health Service - Stakeholder Evaluation of ETP Pilots. In: 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

N

Nguyen, Tuan Anh and Chadwick, David W. and Nasser, Bassem (2007) Recognition of Authority in Virtual Organisations. In: The 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus07). Lecture Notes In Computer Science, 4657. Springer pp. 3-13. ISBN 978-3-540-74408-5. (doi:https://doi.org/10.1007/978-3-540-74409-2_3) (Full text available)
[img]
Preview

Nguyen, Tuan Anh and Su, Linying and Inman, George and Chadwick, David W. (2007) Flexible and Manageable Delegation of Authority in RBAC. In: AINAW archive Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02. I.E.E.E, Computer Soc Press pp. 453-458. ISBN 0-7695-2847-3. (Full text available)
[img]

Nouh, Mariam and Nurse, Jason R. C. and Goldsmith, Michael (2015) Identifying Key-Players in Online Activist Groups on Facebook Social Network. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 14-17 November 2015, Atlantic City, NJ, USA. (doi:https://doi.org/10.1109/ICDMW.2015.88) (Full text available)
[img]
Preview
[img]
Preview

Nouh, Mariam and Nurse, Jason R. C. and Goldsmith, Michael (2017) Towards Designing a Multipurpose Cybercrime Intelligence Framework. In: European Intelligence and Security Informatics Conference (EISIC), 17-19 August 2016, Uppsala, Sweden. (doi:https://doi.org/10.1109/EISIC.2016.018) (Full text available)
[img]
Preview

Nouh, Mariam and Nurse, Jason R. C. and Webb, Helena and Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Workshop on Usable Security (USEC) at the Network and Distributed System Security (NDSS) Symposium, February 24-27, 2019, CA, USA. (In press) (Full text available)
[img]
Preview

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:https://doi.org/10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. (2013) Effective Communication of Cyber Security Risks. In: 7th International Scientific Conference on Security and Protection of Information (SPI 2013). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. (2015) Exploring the risks to identity security and privacy in cyberspace. XRDS: Crossroads, The ACM Magazine, 21 (3). pp. 42-47. ISSN 1528-4972. E-ISSN 1528-4980. (doi:https://doi.org/10.1145/2730912) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2013) Building Confidence in Information-Trustworthiness Metrics for Decision Support. In: The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). (doi:https://doi.org/10.1109/TrustCom.2013.6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2013) Communicating Trustworthiness using Radar Graphs: A Detailed Look. In: The 11th International Conference on Privacy, Security and Trust (PST). (doi:https://doi.org/10.1109/PST.2013.6596085) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2017) An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. In: International Conference on Human Aspects of Information Security‚ Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, July 9-14, 2017, Vancouver, BC, Canada. (doi:https://doi.org/10.1007/978-3-319-58460-7_26) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. Working paper. University of Oxford (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2015) Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness. Journal of Trust Management, 2 (10). E-ISSN 2196-064X. (doi:https://doi.org/10.1186/s40493-015-0021-5) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2014) Two sides of the coin: measuring and communicating the trustworthiness of online information. Journal of Trust Management, 1 (5). E-ISSN 2196-064X. (doi:https://doi.org/10.1186/2196-064X-1-5) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn (2015) Information trustworthiness as a solution to the misinformation problems in social media. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen and Price, Darren and Jones, Glyn (2014) Managing the influence of social media using information trust. In: Social Influence in the Information Age Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Atamli, Ahmad and Martin, Andrew (2016) Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. In: International Conference on Human Aspects of Information Security, Privacy and Trust at the 18th International Conference on Human-Computer Interaction (HCI), Held as Part of HCI International 2016, Toronto, ON, Canada,. (doi:https://doi.org/10.1007/978-3-319-39381-0_23) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:https://doi.org/10.1093/oxfordhb/9780198812746.013.36) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:https://doi.org/10.22667/JOWUA.2017.03.31.001) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Buckley, Oliver and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie and Wright, Gordon R.T. and Whitty, Monica (2014) Understanding Insider Threat: A Framework for Characterising Attacks. In: Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14), in conjunction with the IEEE Symposium on Security and Privacy (SP).. (doi:https://doi.org/10.1109/SPW.2014.38) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and De Roure, David (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional (IT Pro), 19 (5). pp. 20-26. ISSN 1520-9202. E-ISSN 1941-045X. (doi:https://doi.org/10.1109/MITP.2017.3680959) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael (2013) At the Crossroads: Cybersecurity and Psychology. In: Annual Cyberpsychology Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Craddock, Rachel and Jones, Glyn (2012) An Initial Usability Evaluation of the Secure Situation Awareness System. In: The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Guidelines for Usable Cybersecurity: Past and Present. In: The 3rd International Workshop on Cyberspace Safety and Security (CSS 2011) at The 5th International Conference on Network and System Security (NSS 2011). (doi:https://doi.org/10.1109/CSS.2011.6058566) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Trustworthy and Effective Communication of Cybersecurity Risks: A Review. In: The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). (doi:https://doi.org/10.1109/STAST.2011.6059257) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2012) Using Information Trustworthiness Advice in Decision-Making. In: The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). (doi:https://doi.org/10.1109/STAST.2012.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Creese, Sadie and Goldsmith, Michael and Rahman, Syed S. (2013) Supporting Human Decision-Making Online using Information Trustworthiness Metrics. In: International Conference on Human Aspects of Information Security, Privacy and Trust at the 15th International Conference on Human-Computer Interaction (HCII). (doi:https://doi.org/10.1007/978-3-642-39345-7_33) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Erola, Arnau and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2016) Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. In: International Workshop on Secure Internet of Things at European Symposium on Research in Computer Security (ESORICS 2015), 21-25 Sept. 2015, Vienna, Austria. (doi:https://doi.org/10.1109/SIOT.2015.10) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Erola, Arnau and Gibson-Robinson, Thomas and Goldsmith, Michael and Creese, Sadie (2016) Analytics for characterising and measuring the naturalness of online personae. Security Informatics Journal, 5 (3). ISSN 2190-8532. (doi:https://doi.org/10.1186/s13388-016-0028-1) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Erola, Arnau and Goldsmith, Michael and Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:https://doi.org/10.22667/JISIS.2015.02.31.070) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Lamberts, Koen (2015) Technology and information trust for supporting risky decisions based on social-media content. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. (doi:https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.66) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie (2014) A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches. In: International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI). (doi:https://doi.org/10.1007/978-3-319-07620-1_24) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Pumphrey, Jess and Gibson-Robinson, Thomas and Goldsmith, Michael and Creese, Sadie (2014) Inferring Social Relationships from Technology-Level Device Connections. In: 12th International Conference on Privacy, Security and Trust (PST). (doi:https://doi.org/10.1109/PST.2014.6890922) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Radanliev, Petar and Creese, Sadie and Roure, David De (2018) If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 28-29 March 2018, London, UK. (doi:https://doi.org/10.1049/cp.2018.0001) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Rahman, Syed Sadiqur and Creese, Sadie and Goldsmith, Michael and Lamberts, Koen (2011) Information Quality and Trustworthiness: A Topical State-of-the-Art Review. In: The International Conference on Computer Applications and Network Security (ICCANS) 2011. (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business. In: 4th International Conference on Internet and Web Applications and Services (ICIW 2009). (doi:https://doi.org/10.1109/ICIW.2009.48) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Sinclair, Jane E. (2011) A Case Study Analysis of an E-Business Security Negotiations Support Tool. In: Electrical Engineering and Applied Computing. Lecture Notes in Electrical Engineering, 90 . Springer. (doi:https://doi.org/10.1007/978-94-007-1192-1_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Sinclair, Jane E. (2010) Evaluating the Compatibility of a Tool to Support E-Businesses' Security Negotiations. In: International Conference of Information Security and Internet Engineering, under World Congress on Engineering (WCE 2010). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2010) An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it. International Journal On Advances in Security, 3 (3&amp;). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) Securing e-Businesses that use Web Services - a Guided Tour Through BOF4WSS. International Journal on Advances in Internet Technology, 2 (4). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2010) A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations. In: 5th International Conference on Internet and Web Applications and Services (ICIW 2010). (doi:https://doi.org/10.1109/ICIW.2010.10) (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development. In: Business Information Systems. Lecture Notes in Business Information Processing, 21 . Springer-Verlag. (doi:https://doi.org/10.1007/978-3-642-01190-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Sinclair, Jane E. (2010) A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool. International Journal of Computer Science, 37 (4). (Full text available)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2012) Towards A Model to Support the Reconciliation of Security Actions across Enterprises. In: The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). (doi:https://doi.org/10.1109/STAST.2012.11) (Full text available)
[img]
Preview

O

Ong, SimYing and Li, Shujun and Wong, KokSheik and Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:https://doi.org/10.1016/j.image.2017.06.002) (Full text available)
[img]
Preview

Onions, Robert and Chadwick, David W. (2004) Small and medium enterprises at risk in the United Kingdom. In: Digital Accounting Research Conference, Facultad De Ciencias Empresariales, University Of Huelva, 11 Plaza De La Merced, Huelva (Spain). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Owen, Gareth (2007) A Self-Organising Distributed Location Server for Ad Hoc Networks. Doctor of Philosophy (PhD) thesis, University of Portsmouth. (Full text available)
[img]
Preview

Owen, Gareth and Adda, Mo (2008) Storing Data in Ad Hoc Networks. In: International Conference on Challenges in Higher Education and Research in the 21st Century. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

P

Palomar, Esther and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:https://doi.org/10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Papagiannis, Ioannis and Migliavacca, Matteo and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) Enforcing user privacy in web applications using Erlang. In: W2SP 2010: Web 2.0 security and privacy 2010, May 20th, 2010, The Claremont Resort, Oakland, California. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Papagiannis, Ioannis and Migliavacca, Matteo and Pietzuch, Peter (2011) PHP Aspis: using partial taint tracking to protect against injection attacks. In: WebApps '11: Proceedings of the 2nd USENIX conference on Web application development, June 15-16, 2011, Portland, Oregon, USA.. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Pawar, Pramod and Sajjad, Ali and Chadwick, David W. and Dimitrakos, Theo (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments. In: Trust Management IX. IFIP Advances in Information and Communication Technology . Springer International Publishing, Hamburg, Germany, pp. 251-261. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3_21) (Full text available)
[img]
Preview

Pawar, Pramod and Sajjad, Ali and Dimitrakos, Theo and Chadwick, David W. (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. In: Trust Management IX. IFIP Advances in Information and Communication Technology (1). Springer International Publishing, pp. 251-261. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3) (Full text available)
[img]
Preview

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:https://doi.org/10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:https://doi.org/10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Li, Tieyan and Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:https://doi.org/10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:https://doi.org/10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:https://doi.org/10.1587/transinf.E93.D.518) (Full text available)
[img]

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. and Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:https://doi.org/10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Hernandez-Castro, Julio C. and van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:https://doi.org/10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Palomar, Esther and Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:https://doi.org/10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Phillips, Elizabeth and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Phillips, Elizabeth and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2015) Extracting Social Structure from DarkWeb Forums. In: 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Picazo Sanchez, Pablo and Martin, Lara and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:https://doi.org/10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Polimon, Javier and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (Full text available)
[img]
Preview

Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2015) Iterated gate teleportation and blind quantum computation. Physical Review Letters: Moving Physics Forward, 114 (22). p. 220502. ISSN 0031-9007. E-ISSN 1079-7114. (doi:https://doi.org/10.1103/PhysRevLett.114.220502) (Full text available)
[img]
Preview

R

Radanliev, Petar and De Roure, David and Nurse, Jason R. C. and Nicolescu, Razvan and Huth, Michael and Cannady, C and Montalvo, RM (2018) Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 28-29 March 2018, London, UK. (doi:https://doi.org/10.1049/cp.2018.0041) (Full text available)
[img]
Preview

Rashid, Tabish and Agrafiotis, Ioannis and Nurse, Jason R. C. (2016) A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models. In: 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), October 28, 2016, Vienna, Austria. (doi:https://doi.org/10.1145/2995959.2995964) (Full text available)
[img]
Preview

Roberts, David L. and Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:https://doi.org/10.1017/S0030605317000679) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

S

Safkhani, Masoumeh and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Bagheri, Nasour (2014) Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics, 259 (Pt B). pp. 571-577. ISSN 0377-0427. (doi:https://doi.org/10.1016/j.cam.2013.09.073) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sajjad, Ali and Rajarajan, Muttukrishnan and Zisman, Andrea and Dimitrakos, Theo (2015) A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Generation Computer Systems, 48 . pp. 19-27. ISSN 0167-739X. (doi:https://doi.org/10.1016/j.future.2015.01.018) (Full text available)
[img]
Preview

Sandoval Orozco, A.L. and Arenas Gonzalez, David Manuel and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:https://doi.org/10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sandoval Orozco, A.L. and Arenas, Gonzalez and Rosales, Corripio and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:https://doi.org/10.1007/s00607-013-0313-5) (Full text available)
[img]
Preview

Sette, Ioram S. and Chadwick, David W. and Ferraz, Carlos A. G. (2017) Authorization Policy Federation in Heterogeneous Multicloud Environments. IEEE Cloud Computing, 4 (4). pp. 38-47. ISSN 2325-6095. (doi:https://doi.org/10.1109/MCC.2017.3791018) (Full text available)
[img]
Preview

Shi, Lei Lei and Chadwick, David W. (2011) A controlled natural language interface for authoring access control policies. In: SAC Symposium on Applied Computing, Monday March 21 to Thursday March 24, 2011, Tunghai University, Taichung, Taiwan. (doi:https://doi.org/10.1145/1982185.1982510) (Full text available)
[img]

Sinnott, Richard O. and Chadwick, David W. (2004) Experiences of Using the GGF SAML AuthZ Interface. In: Proceedings of the UK e-Science All Hands Meeting. (Full text available)
[img]
Preview

Sinnott, Richard O. and Chadwick, David W. and Doherty, T. and Martin, D. and Stell, A.J. and Stewart, G. and Su, Linying and Watt, J. (2008) Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models. In: Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 08), May 19-22, 2008, Lyon, France. (doi:https://doi.org/10.1109/CCGRID.2008.67) (Full text available)
[img]
Preview

Sinnott, Richard O. and Chadwick, David W. and Koetsier, J. and Otenko, O. and Watt, J. and Nguyen, Tuan Anh (2006) Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid. In: e-Science and Grid Computing, 2006. e-Science '06. Second IEEE International Conference on. IEEE Computer Society, Washington DC p. 22. ISBN 0-7695-2734-5. (doi:https://doi.org/10.1109/E-SCIENCE.2006.261106) (Full text available)
[img]

Sinnott, Richard O. and Stell, A.J. and Chadwick, David W. and Otenko, O. (2005) Experiences of Applying Advanced Grid Authorisation Infrastructures. In: Proceedings of European Grid Conference (EGC). (Full text available)
[img]
Preview

Sinnott, Richard O. and Stell, A.J. and Watt, J. and Chadwick, David W. (2006) Advanced Security Infrastructures for Grid Education. In: 10th World Multi-Conference on Systemics,Cybernetics and Informatics (WMSCI 2006), 16-19 July 2006, Orlando, Florida (USA). (Full text available)
[img]
Preview

Sirur, Sean and Nurse, Jason R. C. and Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS), October 15, 2018, Toronto, Canada. (doi:https://doi.org/10.1145/3267357.3267368) (Full text available)
[img]
Preview

Sloan, Tom and Hernandez-Castro, Julio (2018) Dismantling OpenPuff PDF steganography. Digital Investigation, 25 . pp. 90-96. ISSN 1742-2876. (doi:https://doi.org/10.1016/j.diin.2018.03.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sturgess, Jack and Nurse, Jason R. C. and Zhao, Jun (2018) A capability-oriented approach to assessing privacy risk in smart home ecosystems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 28-29 March 2018, London, UK. (doi:https://doi.org/10.1049/cp.2018.0037) (Full text available)
[img]
Preview

Su, Linying (1996) Adaptiveimage retrieve based on coocurrence matrix. Journal of Inner Mongolia University, 27 (1). pp. 123-128. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying (1989) Test-questions Data base and Automatic Assembling and Composing. Journal of Inner Mongolia University, 20 (2). pp. 284-288. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying (1993) An interface to dBASE-III in Natural Language. Journal of Inner Mongoliar University, 24 (2). pp. 213-224. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying (1999) The plane footprints inspection in computer. Journal of Inner Mongolia University, 29 (3). pp. 434-438. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying and Chadwick, David W. and Basden, Andrew and Cunningham, James (2005) Automated Decomposition of Access Control Policies. In: Proceeds of 6th IEEE International Workshop on Policies for Distributed Systems and Networks. IEEE Computer Society, Washington, DC, USA pp. 3-13. ISBN 0-7695-2265-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying and Ji, Xiulan and Guo, Liling and Lu, Xiaoling (1993) The implementation of Computer Based Nursing System. Processing and Research of Medical Iinformation, 1 (1). pp. 24-26. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying and Sharp, Bernadette and Chibelushi, Claude (2002) Knowledge-based image understanding: A rule-based production system for X-ray segmentation. In: Proceedings of Fourth International Conference on Enterprise Information System, 3-6, April 2002, Ciudad Real - Spain. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying and Sharp, Bernadette and Chibelushi, Claude (2003) Spatial reasoning with mutiple knowledge sources in image understaning. In: Recent Trends in Mutimedia Information Processing-Proceedings of the 10th International Workshop on Systems, Signals and Image Processing, September 2003, Sdelovaci Technika Spol. s.r.o.. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Linying and Sharp, Bernadette and Davis, Darryl N. (1999) Neural Networks for X-ray image segmentation. In: Proceedings of First International Conference on Enterprise Information System, March 1999, Setubal, Portugal. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

T

Tapiador, Juan E. and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:https://doi.org/10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Tripp, Gerald (2010) Regular expression matching using associative memory. Technical report. , Canterbury, Kent. CT2 7NF. UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tussyadiah, Iis and Li, Shujun and Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: International Conference on Information and Communication Technologies in Tourism 2019 (ENTER 2019), January 30–February 1, 2019, Nicosia, Cyprus. (doi:https://doi.org/10.1007/978-3-030-05940-8_22) (Full text available)
[img]
Preview

V

Vu, Quang and Colombo, Maurizio and Asal, Rasool and Sajjad, Ali and El-Moussa, Fadi Ali and Dimitrakos, Theo (2015) Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. In: IEEE Conference on Communications and Network Security (CNS), 28-30 September, 2015, Florence, Italy. (doi:https://doi.org/10.1109/CNS.2015.7346879) (Full text available)
[img]
Preview

van Rensburg, Alastair Janse and Nurse, Jason R. C. and Goldsmith, Michael (2016) Attacker-Parametrised Attack Graphs. In: The Tenth International Conference on Emerging Security Information, Systems and Technologies, July 24th-28th 2016, France Nice. (Full text available)
[img]
Preview

W

Wang, Xinming and Zhao, Gansen and Zhang, Xin and Jin, Beihong (2005) An Agent-Based Model For Web Services Transaction Processing. In: 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05). (doi:https://doi.org/10.1109/EEE.2005.30) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Watt, John P. and Sinnott, Richard O. and Inman, George and Chadwick, David W. (2011) Federated Authentication and Authorisation in the Social Science Domain. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES 2011), 22-26 Aug 2011, Vienna. (doi:https://doi.org/10.1109/ARES.2011.83) (Full text available)
[img]
Preview

Wazan, Ahmad Samer and Laborde, Romain and Barrere, Fran\cois and Benzekri, Abdelmalek and Chadwick, David W (2013) PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm. In: Information Assurance and Security Education and Training. Springer Berlin Heidelberg, pp. 68-82. (Full text available)
[img]
Preview

Wazan, Ahmad Samer and Laborde, Romain and Chadwick, David W. and Barrere, Francois and Benzekri, Abdelmalek (2016) How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN). Institute of Electrical and Electronics Engineers pp. 531-534. ISBN 978-1-5090-2055-3. E-ISBN 978-1-5090-2054-6. (doi:https://doi.org/10.1109/LCN.2016.85) (Full text available)
[img]
Preview

Wazan, Ahmad Samer and Laborde, Romain and Chadwick, David W. and Barrere, Francois and Benzekri, Abdelmalek (2017) TLS Connection Validation by Web Browsers: Why do Web Browsers still not agree? In: COMPSAC 2017, Building Digital Autonomy for a Sustainable World, 04-08 Jul 2017, Turin, Italy. (doi:https://doi.org/10.1109/COMPSAC.2017.240) (Full text available)
[img]
Preview

Wazan, Ahmad Samer and Laborde, Romain and Chadwick, David W. and Barrere, Francois and Benzekri, Abdelmalek and Habbal, Abid M.M. and Kaiiali, Mustafa (2017) Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Security and Communication Networks, 2017 (690714). pp. 1-23. ISSN 1939-0114. E-ISSN 1939-0122. (doi:https://doi.org/10.1155/2017/6907146) (Full text available)
[img]
Preview

Williams, Meredydd and Axon, Louise and Nurse, Jason R. C. and Creese, Sadie (2016) Future scenarios and challenges for security and privacy. In: IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy. (doi:https://doi.org/10.1109/RTSI.2016.7740625) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. (2016) Optional data disclosure and the online privacy paradox: A UK perspective. In: Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human−Computer Interaction (HCI)., July 17-22, Toronto, ON, Canada,. (doi:https://doi.org/10.1007/978-3-319-39381-0_17) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. (2016) Perspectives on privacy in the use of online systems. In: 30th International BCS Human Computer Interaction Conference (HCI 2016), 11 - 15 July 2016, Poole, UK. (Full text available)
[img]
Preview
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things. In: 15th International Conference on Privacy‚ Security and Trust (PST), August 28-30, 2017, Calgary, canada. (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy salience: Taxonomies and research opportunities. Privacy and Identity Management – Facing Up To Next Steps, IFIP Advances in Information and Communication Technology, . (doi:https://doi.org/10.1007/978-3-319-55783-0_18) (Full text available)
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2016) The perfect storm: The privacy paradox and the Internet-of-Things. In: 11th International Conference on Availability‚ Reliability and Security (ARES 2016), 31 Aug.-2 Sept. 2016, Salzburg, Austria. (doi:https://doi.org/10.1109/ARES.2016.25) (Full text available)
[img]
Preview

Williams, Meredydd and Yao, Kelvin and Nurse, Jason R. C. (2017) ToARist: An Augmented Reality Tourism App created through User-Centred Design. In: 31st International BCS Human Computer Interaction Conference (HCI 2017), 3 - 6 July 2017, Sunderland, UK. (doi:https://doi.org/10.14236/ewic/HCI2017.1) (Full text available)
[img]
Preview

Wilson, Michael and Arenas, Alvaro and Chadwick, David W. and Dimitrakos, Theo and Doser, Jurgen and Giambiagi, Pablo and Golby, David and Geuer-Pollman, Christian and Haller, Jochen and Ketil, Stølen (2006) The TrustCoM approach to enforcing agreements between interoperating enterprises. In: 2nd International Conference on Interoperability for Enterprise Software and Applications, Mar 20-24, 2006, Bordeaux, France,. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Woods, Daniel and Agrafiotis, Ioannis and Nurse, Jason R. C. and Creese, Sadie (2017) Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms. Journal of Internet Services and Applications, 8 (8). ISSN 1867-4828. (doi:https://doi.org/10.1186/s13174-017-0059-y) (Full text available)
[img]
Preview

Wu, Tina and Nurse, Jason R. C. (2015) Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. Journal of Digital Forensics, Security and Law, 10 (4). pp. 79-96. ISSN 1558-7215. (Full text available)
[img]
Preview

X

Xu, Wensheng and Chadwick, David W. and Otenko, Sassa (2005) Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. In: 2nd EuroPKI Workshop, 30 June - 1 July 2005, Canterbury, United Kingdom. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Xu, Wensheng and Chadwick, David W. and Otenko, Sassa (2005) A PKI Based Secure Audit Web Server. In: IASTED Communications, Network and Information and CNIS. , Phoenix, USA (Full text available)
[img]
Preview

Y

Yang, Shanshan and Joy, Mike S. and Nurse, Jason R. C. (2011) Experiences on Sharing E-Learning Resources using Service Technologies. In: 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011). (doi:https://doi.org/10.2316/P.2011.734-060) (Full text available)
[img]
Preview

Young, Andrew J. and Chadwick, David W. and New, John (2001) Providing secure remote access to legacy applications. IEE Computing and Control Engineering Journal, 12 (4). pp. 148-156. ISSN 0956-3385. (Full text available)
[img]
Preview

Young, Andrew J. and Kapidzic Cicovic, Nada and Chadwick, David W. (1997) Trust Models in ICE-TEL. In: Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on. IEEE pp. 122-133. ISBN 0-8186-7767-8. (doi:https://doi.org/10.1109/NDSS.1997.579230) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Yu, Li and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2014) Limitations on information-theoretically-secure quantum homomorphic encryption. Physical Review A, 90 (5). 050303. (doi:https://doi.org/10.1103/PhysRevA.90.050303) (Full text available)
[img]
Preview

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2017), 9-14 July 2017, Vancouver, BC, Canada. (doi:https://doi.org/10.1007/978-3-319-58460-7_17) (Full text available)
[img]
Preview

Z

Zhang, Nien Fan and Yao, L. and Nenadic, A. and Chin, J. and Goble, C. and Rector, A. and Chadwick, David W. and Otenko, Sassa and Shi, Q. (2007) Achieving Fine-grained Access Control in Virtual Organisations. Concurrency and Computation: Practice and Experience, 19 (9). pp. 1333-1352. ISSN 1532-0626. (doi:https://doi.org/10.1002/cpe.1099) (Full text available)
[img]
Preview

Zhao, Gansen and Chadwick, David W. (2005) Evolving Messaging Systems for Secure Role Based Messaging. In: 10th IEEE International Conference on Engineering of Complex Computer Systems, 16-20 June 2005, Shanghai, China. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Zhao, Gansen and Chadwick, David W. (2008) On the Modeling of Bell-LaPadula Security Policies using RBAC. In: Proceedings of 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, June 23-25, 2008, Rome, Italy. (Full text available)
[img]
Preview

Zhao, Gansen and Chadwick, David W. and Otenko, Sassa (2007) Obligation for Role Based Access Control. In: IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS07). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Zhao, Gansen and Otenko, Sassa and Chadwick, David W. (2006) Distributed Key Management for Secure Role Based Messaging. In: Proceeding of The IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Apr 18-20, 2006, Vienna, Austria,. (doi:https://doi.org/10.1109/AINA.2006.146) (Full text available)
[img]
Preview

Zhao, Liming and Perez-Delgado, Carlos and Fitzsimons, Joseph and Benjamin, Simon (2017) A measurement driven analog of adiabatic quantum computation for frustration-free Hamiltonians. arXiv, . (Submitted) (Full text available)
[img]
Preview

Zhao, Liming and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2016) Fast graph operations in quantum computation. Physical Review A, 93 (3). 032314. (doi:https://doi.org/10.1103/PhysRevA.93.032314) (Full text available)
[img]
Preview

Č

Čagalj, Mario and Perković, Toni and Bugarić, Marin and Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:https://doi.org/10.1016/j.pmcj.2014.09.002) (Full text available)
[img]
Preview

This list was generated on Sat Jan 19 08:48:44 2019 GMT.