Skip to main content

Items where division is "Faculties > Sciences > School of Computing > Security Group"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | X | Y | Z | Č
Number of items at this level: 525.

A

Abdelouahab, Mahdi Amine, Hassan, H. Ragab, Bouabdallah, Abdelmadjid, Achemlal, Mohamed, Laniepce, Sylvie (2008) TCA: Topology change attack in Peer-to-peer networks. In: UNSPECIFIED, APR 09, 2008, Singapore, SINGAPORE. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:23967)

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67479)
[img]

Agrafiotis, Ioannis, Nurse, Jason R. C., Buckley, Oliver, Legg, Phil, Creese, Sadie, Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67505)

Agrafiotis, Ioannis, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyy006) (KAR id:69076)
[img]
Preview
[img]
Preview

Ahmad, Farhan, Adnane, Asma, Franqueira, Virginia N.L. (2016) A Systematic Approach for Cyber Security in Vehicular Networks. Journal of Computer and Communications, 4 (16). pp. 38-62. ISSN 2327-5219. (doi:10.4236/jcc.2016.416004) (KAR id:77182)
[img]
Preview

Ahmad, Farhan, Adnane, Asma, Franqueira, Virginia N.L., Kurugollu, Fatih, Liu, Lu (2018) Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies. Sensors, 18 (11). pp. 1-19. ISSN 1424-8220. (doi:10.3390/s18114040) (KAR id:77171)
[img]
Preview

Ahmad, Farhan and Adnane, Asma and Kerrache, Chaker Abdelaziz and Franqueira, Virginia N. L. and Kurugollu, Fatih (2020) Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles: Current Trends and Future Research Directions. In: Global Advancements in Connected and Intelligent Mobility: Emerging Research and Opportunities. IGI Global, pp. 135-165. ISBN 978-1-5225-9020-0. (doi:10.4018/978-1-5225-9019-4.ch004) (KAR id:77167)
[img]
Preview
[img]

Ahmad, Farhan, Franqueira, Virginia N.L., Adnane, Asma (2018) TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks. IEEE Access, 6 . pp. 28643-28660. E-ISSN 2169-3536. (doi:10.1109/access.2018.2837887) (KAR id:77177)
[img]
Preview

Ahmad, Farhan and Hall, Jordan and Adnane, Asma and Franqueira, Virginia N.L. (2018) Faith in Vehicles: A Set of Evaluation Criteria for Trust Management in Vehicular Ad-Hoc Network. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 44-52. ISBN 978-1-5386-3067-9. E-ISBN 978-1-5386-3066-2. (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.13) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77175)
[img]

Akinrolabu, Olusola, Nurse, Jason R. C., Martin, Andrew, New, Steve (2019) Cyber risk assessment in cloud provider environments: Current models and future needs. Computers & Security, 87 . Article Number 101600. ISSN 0167-4048. (doi:10.1016/j.cose.2019.101600) (KAR id:75979)
[img]
Preview

Aktypi, Angeliki, Nurse, Jason R. C., Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: Proceedings of the 2017 International Workshop on Multimedia Privacy and Security. CCS Computer and Communications Security . ACM, New York, USA ISBN 978-1-4503-5206-2. (doi:10.1145/3137616.3137617) (KAR id:67470)
[img]
Preview

Al Mutawa, Noora, Bryce, Joanne, Franqueira, Virginia N. L., Marrington, Andrew (2015) Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks. In: Proceedings: 10th International Conference on Availability, Reliability and Security (ARES 2015). . pp. 293-302. IEEE ISBN 978-1-4673-6590-1. (doi:10.1109/ares.2015.49) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:77185)

Alahmadi, Bushra A., Legg, Philip .A., Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: Proceedings of the 17th International Conference on Enterprise Information Systems - (Volume 2). 2. pp. 709-720. SciTePress ISBN 978-989-758-097-0. (doi:10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67508)
[img]

Alawadhi, Ibtesam, Read, Janet C., Marrington, Andrew, Franqueira, Virginia N. L. (2015) Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases. Journal of Digital Forensics, Security and Law, 10 (4). pp. 7-16. ISSN 1558-7215. (doi:10.15394/jdfsl.2015.1207) (KAR id:77187)
[img]
Preview

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31958)
[img]

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31956)
[img]

Alhanahnah, Mohannad and Chadwick, David (2016) Boosting usability for Protecting Online Banking Applications Against APTs. In: Amman, Jordan, ed. 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, pp. 70-76. ISBN 978-1-5090-2658-6. (doi:10.1109/CCC.2016.13) (KAR id:59903)
[img]
Preview

Ali, Mohammed Aamir, Arief, Budi, Emms, Martin, van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. E-ISSN 1558-4046. (doi:10.1109/MSP.2017.27) (KAR id:58364)
[img]
Preview

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13) (KAR id:69560)
[img]
Preview

Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984) (KAR id:69561)
[img]
Preview

Alqahtani, Saeed Ibrahim, Li, Shujun, Yuan, Haiyue, Rusconi, Patrice (2020) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety, 18 (e1). ISSN 2032-9393. (doi:10.4108/eai.13-7-2018.162797) (KAR id:79945)
[img]
Preview

Andrianopoulos, Alex and Chadwick, David W. (1993) Simulating the Global Directory Service with OPNET. In: Proceedings 26th Annual Simulation Symposium. IEEE, pp. 162-172. ISBN 0-8186-3620-3. (doi:10.1109/SIMSYM.1993.639126) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21126)

Ani, Uchenna D., Watson, Jeremy D. McK., Green, Benjamin, Craggs, Barnaby, Nurse, Jason R. C. (2020) Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases. Journal of Cyber Security Technology, . ISSN 2374-2917. E-ISSN 2374-2925. (doi:10.1080/23742917.2020.1843822) (KAR id:84063)
[img]
Preview

Ani, Uchenna D., Watson, Jeremy D. McK., Nurse, Jason R. C., Cook, Al, Maple, Carsten (2019) A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape. In: Living in the Internet of Things (IoT 2019). . IET ISBN 978-1-83953-089-0. (doi:10.1049/cp.2019.0131) (KAR id:73330)
[img]
Preview

Ani, Uchenna Daniel, Watson, Jeremy McKendrick, Carr, Madeline, Cook, Al, Nurse, Jason R. C. (2020) A Review of the Use and Utility of Industrial Network-Based Open Source Simulators: Functionality, Security, and Policy Viewpoints. Journal of Defense Modeling and Simulation, . ISSN 1548-5129. E-ISSN 1557-380X. (doi:10.1177/1548512920953499) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:82405)
[img]

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: Focardi, Ricardo and Myers, Andrew, eds. Principles of Security and Trust 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 324-343. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_17) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:46880)
[img] [img]

Arapinis, Myrto, Cheval, Vincent, Delaune, Stéphanie (2012) Verifying Privacy-Type Properties in a Modular Way. In: 25th IEEE Computer Security Foundations Symposium (CSF'12), June 2012, Cambridge Massachusetts, USA. (doi:10.1109/CSF.2012.16) (KAR id:46728)
[img]
Preview
[img]
Preview

Ardagna, Claudio Agostino, Asal, Rasool, Damiani, Ernesto, El Ioini, Nabil, Pahl, Claus, Dimitrakos, Theo (2016) A Certification Technique for Cloud Security Adaptation. In: Services Computing (SCC), 2016 IEEE International Conference on. 2016 IEEE International Conference on Services Computing. . pp. 324-331. IEEE, San Francisco, USA ISBN 978-1-5090-2629-6. E-ISBN 978-1-5090-2628-9. (doi:10.1109/SCC.2016.49) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58307)
[img]

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555)
[img]

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919) (KAR id:66861)
[img]
Preview

Aslan, Çaǧri Burak, Li, Shujun, Çelebi, Fatih V., Tian, Hao (2020) The World of Defacers: Looking through the Lens of Their Activities on Twitter. IEEE Access, 8 . pp. 204132-204143. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2020.3037015) (KAR id:84855)
[img]
Preview

Axon, Louise M., Alahmadi, Bushra, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society E-ISBN 1-891562-53-3. (doi:10.14722/usec.2018.23024) (KAR id:67468)
[img]
Preview

Axon, Louise, Alahmadi, Bushra, Nurse, Jason R.C., Goldsmith, Michael, Creese, Sadie (2020) Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice. Journal of Cybersecurity, 6 (1). ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyaa004) (KAR id:79587)
[img]
Preview
[img]

Axon, Louise, Creese, Sadie, Goldsmith, Michael, Nurse, Jason R. C. (2016) Reflecting on the Use of Sonification for Network Monitoring. In: ThinkMind. . pp. 254-261. IARIA ISBN 978-1-61208-493-0. (KAR id:67489)
[img]
Preview

Axon, Louise, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (KAR id:67474)
[img]
Preview

B

Bacon, Jean and Evans, David and Eyers, David M. and Migliavacca, Matteo and Pietzuch, Peter and Shand, Brian (2010) Enforcing End-to-End Application Security in the Cloud. In: Middleware 2010 ACM/IFIP/USENIX 11th International Middleware Conference. Lecture Notes in Computer Science, 6452 . Springer, Berlin, Germany, pp. 293-312. ISBN 978-3-642-16954-0. E-ISBN 978-3-642-16955-7. (doi:10.1007/978-3-642-16955-7_15) (KAR id:31863)
[img]
Preview

Bacon, Jean, Moody, Ken, Chadwick, David W., Otenko, Sassa (2003) Session Limited vs. Persistent Role Membership. In: Seventeenth Annual IFIP WG 11.3 Working Conference on Database and Applications Security at Estes Park, Colorado. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13938)

Bada, Maria, Nurse, Jason R. C. (2019) Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information and Computer Security, 27 (3). pp. 393-410. ISSN 2056-4961. (doi:10.1108/ICS-07-2018-0080) (KAR id:73481)
[img]
Preview

Bada, Maria and Nurse, Jason R. C. (2019) The Social and Psychological Impact of Cyberattacks. In: Benson, Vladlena and McAlaney, John, eds. Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press, London, pp. 73-92. ISBN 978-0-12-816203-3. E-ISBN 978-0-12-816594-2. (doi:10.1016/B978-0-12-816203-3.00004-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76899)
[img]

Bada, Maria, Sasse, Angela, Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society. (KAR id:67511)
[img]
Preview

Bailey, Christopher J. (2012) Application of Self-Adaptive techniques to federated authorization models. In: 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium. . pp. 1495-1498. , 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium (doi:10.1109/ICSE.2012.6227053) (KAR id:38730)
[img]
Preview

Bailey, Christopher J., Chadwick, David W., de Lemos, Rogerio (2011) Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models. In: Proceedings of the 9th IEEE conference on Dependable, Autonomic and Secure Computing. . pp. 182-196. IEEE (doi:10.1109/DASC.2011.31) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:30711)
[img]

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111. (KAR id:43208)
[img]
Preview

Bailey, Christopher, de Lemos, Rogerio (2018) Evaluating Self-Adaptive Authorisation Infrastructures through Gamification. In: International Conference on Dependable Systems and Networks Proceedings. Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018). . IEEE ISBN 978-1-5386-5597-9. E-ISBN 978-1-5386-5596-2. (doi:10.1109/DSN.2018.00058) (KAR id:66570)
[img]
Preview

Bailey, Christopher, de Lemos, Rogério (2020) Malicious Changeload for the Resilience Evaluation of Self-adaptive Authorisation Infrastructures. Future Generation Computer Systems, 113 . pp. 113-131. ISSN 0167-739X. (doi:10.1016/j.future.2020.06.045) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81860)
[img]

Balaskas, Anastasios, Franqueira, Virginia N. L. (2018) Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges. In: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). . pp. 1-8. IEEE ISBN 978-1-5386-4683-0. (doi:10.1109/cybersecpods.2018.8560672) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77172)
[img]

Ball, E. and Chadwick, David W. and Basden, Andrew (2003) The Implementation of a System for Evaluating Trust in a PKI Environment. In: Petrovic, Otto and Ksela, Michael and Fallenbock, Markus and Kitti, Christian, eds. Trust in the Network Economy. Springer-Verlag, Austria, pp. 263-279. ISBN 3-211-06853-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13846)

Ball, E., Chadwick, David W., Mundy, Darren (2003) Patient Privacy in Electronic Prescription Transfer. IEEE Security & Privacy magazine, . pp. 77-80. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14004)

Barnes, David J., Hernandez-Castro, Julio C. (2015) On the limits of engine analysis for cheating detection in chess. Computers and Security, 48 . pp. 58-73. ISSN 0167-4048. (doi:10.1016/j.cose.2014.10.002) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:44719)
[img]

Barrero, David, Hernandez-Castro, Julio C., Peris-Lopez, Pedro, Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45299)
[img]

Basden, Andrew, Ball, E., Chadwick, David W. (2001) Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure. Expert Systems, 18 (5). pp. 233-249. ISSN 0266-4720. (doi:10.1111/1468-0394.00178) (KAR id:13528)
[img]
Preview

Basden, Andrew and Evans, John B. and Chadwick, David W. and Young, Andrew J. (1998) Coping with Poorly Understood Domains: the Example of Internet Trust. In: Research and Development in Expert Systems XV Proceedings of ES98, the Eighteenth Annual International Conference of the British Computer Society Specialist Group on Expert Systems. Springer, London, UK, pp. 114-132. ISBN 978-1-85233-086-6. E-ISBN 978-1-4471-0835-1. (doi:10.1007/978-1-4471-0835-1_8) (KAR id:21578)
[img]
Preview

Becker, Ingolf, Posner, Rebecca, Islam, Tasmina, Ekblom, Paul, Borrion, Hervé, McGuire, Michael, Li, Shujun (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. In: Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021). . pp. 5347-5356. University of Hawaiʻi at Mānoa, Mānoa, Hawaiʻi, USA E-ISBN 978-0-9981331-3-3. (doi:10125/71270) (KAR id:84858)
[img]
Preview

Belen Sağlam, Rahime, Nurse, Jason R. C. (2020) Is your chatbot GDPR compliant? Open issues in agent design. In: 2020 International Conference on Conversational User Interfaces (CUI). . ACM (In press) (doi:10.1145/3405755.3406131) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81313)
[img]

Bello Orgaz, Gema, Hernandez-Castro, Julio C., Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:45297)

Bello, Gema, Hernandez-Castro, Julio, Camacho, David (2016) Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems, 66 . pp. 125-136. ISSN 0167-739X. (doi:10.1016/j.future.2016.06.032) (KAR id:58380)
[img]
Preview

Bhattacherjee, Sanjay, Sarkar, Palash (2015) Tree Based Symmetric Key Broadcast Encryption. Journal of Discrete Algorithms, 34 . pp. 78-107. ISSN 1570-8667. (doi:10.1016/j.jda.2015.05.010) (KAR id:83842)
[img]
Preview

Bhattacherjee, Sanjay, Sarkar, Palash (2021) Weighted Voting Procedure having a Unique Blocker. International Journal of Game Theory, . ISSN 0020-7276. E-ISSN 1432-1270. (doi:10.1007/s00182-020-00751-z) (KAR id:83677)
[img]
Preview
[img]

Blasco Alis, Jorge, Hernandez-Castro, Julio C., Tapiador, Juan E., Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31937)
[img]

Blasco Alis, Jorge, Hernandez-Castro, Julio C., de Fuentes, Jose Maria, Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31941)
[img]

Boakes, Matthew, Guest, Richard, Deravi, Farzin (2020) Adapting to Movement Patterns for Face Recognition on Mobile Devices. In: ICPR 2020 Workshop Proceedings. . Springer (In press) (KAR id:84439)
[img]
Preview

Boakes, Matthew, Guest, Richard, Deravi, Farzin, Corsetti, Barbara (2019) Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1 (4). pp. 278-291. ISSN 2637-6407. E-ISSN 2637-6407. (doi:10.1109/TBIOM.2019.2941728) (KAR id:76574)
[img]
Preview

Bocchi, Laura (2004) Compositional Nested Long Running Transactions. In: Fundamental Approaches to Software Engineering. 7th International Conference, FASE 2004. Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004. Proceedings. Lecture Notes in Computer Science , 2984. pp. 194-208. Springer ISBN 978-3-540-21305-5. E-ISBN 978-3-540-24721-0. (doi:10.1007/978-3-540-24721-0_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:59175)

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (KAR id:52756)
[img]

Boiten, Eerke Albert (2016) Big Data Refinement. Electronic Proceedings in Theoretical Computer Science, 209 . pp. 17-23. ISSN 2075-2180. E-ISSN 2075-2180. (doi:10.4204/EPTCS.209.2) (KAR id:51635)
[img]
Preview

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (KAR id:52759)
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (KAR id:52760)
[img]

Boiten, Eerke Albert (2012) Book review: Modeling in Event-B by Jean-Raymond Abrial. Review of: Modeling in Event-B by Abrial, Jean-Raymond. Journal of Functional Programming, 22 (2). pp. 217-221. ISSN 0956-7968. (doi:10.1017/S0956796812000081) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30820)

Boiten, Eerke Albert (2014) Cybersecurity czar dodges questions over IT security. . The Conversation UK Internet only. (KAR id:45261)
[img]

Boiten, Eerke Albert (2015) Diversity and Adjudication. Journal of Logical and Algebraic Methods in Programming, . ISSN 2352-2208. (doi:10.1016/j.jlamp.2015.10.007) (KAR id:51066)
[img]
Preview

Boiten, Eerke Albert (2014) FireChat’s revolutionary use will not be revolutionary for long. . The Conversation UK Internet only. (KAR id:45257)
[img]

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (KAR id:52726)
[img]

Boiten, Eerke Albert (2008) From ABZ to cryptography (abstract). In: Börger, Egon and Butler, Michael and Bowen, Jonathan P. and Boca, Paul, eds. UNSPECIFIED Lecture Notes in Computer Science . Springer, Berlin, Germany. ISBN 978-3-540-87602-1. E-ISBN 978-3-540-87603-8. (doi:10.1007/978-3-540-87603-8_40) (KAR id:23976)
[img]
Preview

Boiten, Eerke Albert (2014) Google’s Larry Page wants to save 100,000 lives but big data isn’t a cure all. . The Conversation UK Internet only. (KAR id:45259)
[img]

Boiten, Eerke Albert (2015) Google’s lip service to privacy cannot conceal that its profits rely on your data. . The Conversation Internet only. (KAR id:51072)
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (KAR id:52761)
[img]

Boiten, Eerke Albert (2015) Investigatory Powers bill will remove ISPs' right to protect your privacy. . The Conversation Internet only. (KAR id:51619)
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (KAR id:52758)
[img]

Boiten, Eerke Albert (2014) It’s possible to write flaw-free software, so why don’t we? . The Conversation UK Internet only. (KAR id:45254)
[img]

Boiten, Eerke Albert (2015) NHS care.data still leaks like a sinking ship, but ministers set sail regardless. . The Conversation Internet only. (KAR id:51069)
[img]

Boiten, Eerke Albert (2014) NHS must think like Google to make data project work. . The Conversation UK Internet only. (KAR id:45260)
[img]

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (KAR id:52729)
[img]

Boiten, Eerke Albert (2015) Patients will resist medical record sharing if NHS bosses ignore their privacy fears. . The Conversation Internet only. (KAR id:51068)
[img]

Boiten, Eerke Albert (2015) Privacy watchdog takes first step against those undermining right to be forgotten. . The Conversation Internet only. (KAR id:51067)
[img]

Boiten, Eerke Albert (2014) Russia and China prepare to fight US internet domination. . The Conversation UK Internet only. (KAR id:45253)
[img]

Boiten, Eerke Albert (2010) Security specification: completeness, feasibility, refinement. In: Extended Abstracts Collection -- Refinement Based Methods for the Construction of Dependable Systems, Dagstuhl, Germany. (KAR id:30692)
[img]
Preview

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52727)

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only. (KAR id:52757)
[img]

Boiten, Eerke Albert (2015) We are right to fear spy ‘database of everything’ if even politicians know little about it. . The Conversation Internet only. (KAR id:51070)
[img]

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (KAR id:52728)
[img]

Boiten, Eerke Albert, Grundy, Dan (2008) Reduction and refinement. Electronic Notes in Theoretical Computer Science, 201 . pp. 31-44. ISSN 1571-0661. (doi:10.1016/j.entcs.2008.02.014) (KAR id:23963)
[img]
Preview

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (KAR id:45256)
[img]

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Targeted ‘malvertising’ reveals move towards more sophisticated hacks. . The Conversation UK Internet only. (KAR id:45255)
[img]

Boiten, Eerke Albert and Jacob, Jeremy (2014) Sealed containers in Z. In: Ait Ameur, Y. and Schewe, K.-D., eds. Abstract State Machines, Alloy, B, TLA, VDM, and Z 4th International Conference. Lecture Notes in Computer Science, 8477 . Springer, Berlin, Germany, pp. 136-141. ISBN 978-3-662-43651-6. E-ISBN 978-3-662-43652-3. (doi:10.1007/978-3-662-43652-3_12) (KAR id:40790)
[img]
Preview

Boiten, Eerke Albert, Schneider, Steve A. (2014) Editorial: Special Issue on Cryptography and Formal Methods. Formal Aspects of Computing, 26 (1). pp. 1-2. ISSN 0934-5043 (Print) 1433-299X (Online). (doi:10.1007/s00165-013-0290-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:37394)

Boiten, Eerke and Grundy, Dan (2010) The Logic of Large Enough. In: Bolduc, Claude and Desharnais, Jules and Ktari, Béchir, eds. Mathematics of Program Construction 10th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 182-196. ISBN 978-3-642-13320-6. E-ISBN 978-3-642-13321-3. (doi:10.1007/978-3-642-13321-3_5) (KAR id:30665)
[img]
Preview

Bowles, Stephen, Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58386)
[img]

Brauer, Jorg and King, Andy (2010) Automatic Abstraction for Intervals using Boolean Formulae. In: Cousot, Radhia and Martel, Matthieu, eds. Static Analysis Symposium. Lecture Notes in Computer Science, 6337 . Springer-Verlag, pp. 182-196. ISBN 978-3-642-15768-4. (KAR id:30633)
[img]
Preview

Brauer, Jorg and King, Andy (2011) Transfer Function Synthesis without Quantifier Elimination. In: Barthe, Gilles, ed. European Symposium on Programming. Lecture Notes in Computer Science, 6602 . Springer-Verlag, pp. 182-196. ISBN 978-3-642-19717-8. (KAR id:30765)
[img]
Preview

Brierley, Calvin, Pont, Jamie, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2020) Persistence in Linux-Based IoT Malware. In: 25th Nordic Conference on Secure IT Systems (Nordsec), 2020, Linköping, Sweden. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:84209)
[img]

Brostoff, Sacha, Sasse, M. Angela, Chadwick, David W., Cunningham, James, Mbanaso, Uche, Otenko, Sassa (2005) 'R-What?' Development of a role-based access control policy-writing tool for e-Scientists. Software: Practice and Experience, 35 (9). pp. 835-856. ISSN 0038-0644. (doi:10.1002/spe.691) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14303)

Bryce, Joanne and Franqueira, Virginia N.L. and Marrington, Andrew, eds. (2016) Special Issue on Cyberharassment Investigation: Advances and Trends. Journal of Digital Forensics, Security and Law, 11 (3). (doi:10.15394/jdfsl.2016.1416) (KAR id:77183)
[img]
Preview

Bryce, Joanne, Franqueira, Virginia N. L., Marrington, Andrew (2016) Special Issue on Cyberharassment Investigation: Advances and Trends. Journal of Digital Forensics, Security and Law, 11 (3). Article Number 4. ISSN 1558-7215. (doi:10.15394/jdfsl.2016.1416) (KAR id:79543)
[img]
Preview

Buckley, Oliver, Nurse, Jason R. C. (2019) The Language of Biometrics: Analysing Public Perceptions. Journal of Information Security and Applications, 47 . pp. 112-119. E-ISSN 2214-2126. (doi:10.1016/j.jisa.2019.05.001) (KAR id:73743)
[img]
Preview

Buckley, Oliver, Nurse, Jason R. C., Legg, Philip A., Goldsmith, Michael, Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. . IEEE E-ISBN 978-1-4799-7901-1. (doi:10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67514)
[img]

Burcham, Morgan and Al-Zyoud, Mahran and Carver, Jeffrey C. and Alsaleh, Mohammed and Du, Hongying and Gilani, Fida and Jiang, Jun and Rahman, Akond and Kafalı, Özgur and Al-Shaer, Ehab and Williams, Laurie (2017) Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA, pp. 13-23. ISBN 978-1-4503-5274-1. (doi:10.1145/3055305.3055307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:65876)

C

Carvalho, Rodrigo, Goldsmith, Michael, Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67513)

Chadwick, D.W. and Carroll, C. and Harvey, S. and New, J. and Young, A.J. (2002) Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. In: Sprague Jr, Ralph H., ed. Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE. ISBN 0-7695-1435-9. (doi:10.1109/HICSS.2002.994127) (KAR id:13648)
[img]
Preview

Chadwick, D.W. and Otenko, A. (2002) RBAC Policies in XML for X.509 Based Privilege Management. In: Ghonaimy, Adeeb and El-Hadidi, Mahmoud T. and Aslan, Heba Kamal, eds. Security in the Information Society: Visions and Perspectives. IFIP Advances in Information and Communication Technology . Springer, Boston, Massachusetts, USA, pp. 39-54. ISBN 978-1-4757-1026-7. E-ISBN 978-0-387-35586-3. (doi:10.1007/978-0-387-35586-3_3) (KAR id:13791)
[img]
Preview

Chadwick, D.W. and Pope, Nick (1994) Interdomain Guardians in a Distributed Directory Service. In: Veiga, P. and Khakhar, D., eds. Proceedings of the IFIP TC6 International Conference on Information Networks and Data Communication. North-Holland Publishing Co., Amsterdam, Netherlands, pp. 347-365. ISBN 0-444-81869-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21149)

Chadwick, David (2005) Threat Modelling for Active Directory. In: Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. IFIP - The International Federation for Information Processing . Springer, Boston, Massachusetts, USA, pp. 173-182. ISBN 978-0-387-24485-3. E-ISBN 978-0-387-24486-0. (doi:10.1007/0-387-24486-7_13) (KAR id:14086)
[img]
Preview

Chadwick, David (2013) A Trust Model for ABFAB Trust Routers. . Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:43207)

Chadwick, David W. (1990) The 1992 Directory Standards - implications for earlier implementations of the Directory. In: Colloquium on the Global Directory, London. . IEE (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20970)

Chadwick, David W. (2003) An Authorisation Interface for the GRID. In: E-Science All Hands Meeting 2003, Nottingham. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13915)

Chadwick, David W. (2005) Authorisation in Grid Computing. Information Security Technical Report, 10 (1). pp. 33-40. ISSN 1363-4127. (KAR id:14223)
[img]
Preview

Chadwick, David W. (2006) Authorisation using Attributes from Multiple Authorities. In: Reddy, Sumitra Mitra, ed. 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06). International Workshops on Enabling Technologies . IEEE, pp. 326-331. ISBN 0-7695-2623-3. (doi:10.1109/WETICE.2006.22) (KAR id:14469)
[img]
Preview

Chadwick, David W. (2004) Autonomic Privilege Management - extending PERMIS to contribute to the TrustCOM objectives. In: E-Challenges 2004. 1. pp. 1216-1222. IOS Press, Vienna, Austria (KAR id:14069)
[img]
Preview

Chadwick, David W. (1999) Compound (Families of) Entries. UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21815)

Chadwick, David W. (2007) Coordinated decision making in distributed applications. Information Security Technical Report, Elsevier, 12 (3). pp. 147-154. ISSN 1363-4127. (doi:10.1016/j.istr.2007.05.003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14612)

Chadwick, David W. (2001) Deficiencies in LDAP when used to Support a Public Key Infrastructure. In: Terena Networking Conference, Antalya. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13613)

Chadwick, David W. (2003) Deficiencies in LDAP when used to support a Public Key Infrastructure. Communications of the ACM, 46 (3). pp. 99-104. ISSN 0001-0782. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13999)

Chadwick, David W. (2005) Delegation Issuing Service. In: NIST 4th Annual PKI Workshop. . pp. 62-73. , Gaithersberg, USA (KAR id:14342)
[img]
Preview

Chadwick, David W. (1989) The Directory - existing services and proposed enhancements. In: Proceedings of the Open Systems 89 Conference (London). . pp. 107-132. Blenheim Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20954)

Chadwick, David W. (1990) The Directory and its implications for name registration. In: Proceedings of the Open Systems and Interoperability Conference, London. . Blenheim Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20972)

Chadwick, David W. (1992) Distributed Aspects of the 1992 Directory Standard. In: Tzafestas, S. and Borne, P. and Grandinetti, L., eds. Parallel and Distributed Computing in Engineering Systems: Proceedings of the IMACS/IFAC International Symposium on Parallel and Distributed Computing in Engineering Systems. Elsevier, pp. 471-476. ISBN 0-444-89276-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21047)

Chadwick, David W. (2007) Dynamic Delegation of Authority in Web Services. In: Periorellis, Panayiotis, ed. Securing Web Services: Practical Usage of Standards and Specifications. Premier Reference Source . IGI Global, United States, pp. 111-137. ISBN 978-1-59904-639-6. (KAR id:14534)
[img]
Preview

Chadwick, David W. (1987) FTAM. The Development of a Commercial Product. In: Proceedings of the Open Systems Conference (London). . Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20932)

Chadwick, David W. (2009) Federated Identity Management. In: Aldini, Alessandro and Barthe, Gilles and Gorrieri, Roberto, eds. FOSAD 2008/2009. LNCS (5705). Springer-Verlag, Berlin, pp. 182-196. ISBN 978-3-642-03828-0. (doi:10.1007/978-3-642-03829-7_3) (KAR id:30609)
[img]
Preview

Chadwick, David W. (1996) The ICE-TEL Public Key Infrastructure and Trust Model. In: DIMACS Workshop on Trust Management, New York, USA. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21301)

Chadwick, David W. (1996) Important Lessons Derived from X.500 Case Studies. IEEE Network, 10 (2). pp. 22-34. (KAR id:21380)
[img]
Preview

Chadwick, David W. (1996) The Internet Directory is NOT Primarily a Technology Issue. In: INET 96 Conference, Montreal, Canada. . (KAR id:21302)
[img]
Preview

Chadwick, David W. (2002) Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3. IS Institute, University of Salford Salford England M5 4WT. (KAR id:13831)
[img]
Preview

Chadwick, David W. (1986) Issues in the Implementation of Application Layer Standards. In: Proceedings of the Open Systems Conference (London). . Online Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20920)

Chadwick, David W. (2002) LDAPv3 DN strings for use with PKIs. IS Institute, University of Salford, Salford. (KAR id:13810)
[img]
Preview

Chadwick, David W. (1996) A Method for Collecting Case Study Information via the Internet. IEEE Network, 10 (2). pp. 36-38. (KAR id:21383)
[img]
Preview

Chadwick, David W. (2000) Network Firewall Technologies. In: Schneider, W.S. and Jerman-Blazic, B. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 149-166. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21922)

Chadwick, David W. (2007) Operational Models for Reputation Servers. In: Herrmann, Peter and Issarny, Valerie and Shiu, Simon, eds. Trust Management: Third International Conference, iTrust 2005. Lecture Notes in Computer Science, 3477 . Springer, Berlin, pp. 108-115. ISBN 978-3-540-26042-4. (KAR id:14329)
[img]
Preview

Chadwick, David W. (2002) The PERMIS X.509 Based Privilege Management Infrastructure. IS Institute, University of Salford Salford M5 4WT England. (KAR id:13813)
[img]
Preview

Chadwick, David W. (2000) Secure Directories. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 123-131. (KAR id:22015)
[img]
Preview

Chadwick, David W. (2005) Security and Trust Management Extensions to the PERMIS X.509 Privilege Management Infrastructure. ERCIM News, 63 . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14250)

Chadwick, David W. (1999) Smart Cards Aren't Always the Smart Choice. IEEE Computer, 32 (12). pp. 142-143. ISSN 0018-9162. (KAR id:21728)
[img]
Preview

Chadwick, David W. (1990) Tutorial on X.500 - The Directory. In: IFIP TCC 3rd Int Conf on Information Network and Data Communication, Lillehammer. . T3-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20973)

Chadwick, David W. (1996) Understanding X.500 (The Directory). International Thompson Publishing (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21300)

Chadwick, David W. (2007) Unifying Grid and Organisational Security Mechanisms. In: Xiao, Yang, ed. Security in Distributed, Grid, and Pervasive Computing. Auerbach Publications, CRC Press, United States, pp. 239-254. ISBN 978-0-8493-7921-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14596)

Chadwick, David W. (2000) Windows 2000: A Threat to Internet Diversity and Open Standards? IEEE Computer, 33 (8). pp. 107-109. ISSN 0018-9162. (doi:10.1109/2.863989) (KAR id:21988)
[img]
Preview

Chadwick, David W. (1991) X.500: 1988 v 1992. In: Proceedings of the Electronic Directories Conference, London. . pp. 23-29. Pinner:Blenheim Publications (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21004)

Chadwick, David W. (2003) The X.509 Privilege Management Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking, Bled, Slovenia. IOS Press, p. 1525. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13972)

Chadwick, David W. (2004) The X.509 Privilege Management Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Security and Privacy in Advanced Networking Technologies. NATO Science Series: Computer & Systems Sciences, 193 . IOS Press, Amsterdam, pp. 15-25. ISBN 978-1-58603-430-6. (KAR id:14042)
[img]
Preview

Chadwick, David W. (2005) The X.509 Privilege Management Standard. UPGRADE: The European Journal for the Informatics Professional, VI (4). pp. 41-46. ISSN 1684-5285. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14282)

Chadwick, David W. (2001) An X.509 Role Based Privilege Management Infrastructure. In: Cooper, E., ed. Briefing - Global InfoSecurity 2002, World Markets Research Centre Ltd. World Markets Research Centre, London. ISBN 1-903150-52-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13538)

Chadwick, David W. and Anthony, Sean (2007) Using WebDAV for Improved Certificate Revocation and Publication. In: Public Key Infrastructure 4th European PKI Workshop. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 265-279. ISBN 978-3-540-73407-9. E-ISBN 978-3-540-73408-6. (doi:10.1007/978-3-540-73408-6_19) (KAR id:23995)
[img]
Preview

Chadwick, David W., Antony, Sean, Bjerk, Rune (2010) Instant certificate revocation and publication using WebDAV. Journal of Computer Security, 18 (3). pp. 475-496. ISSN 1875-8924. (doi:10.3233/JCS-2009-0372) (KAR id:31987)
[img]
Preview

Chadwick, David W., Basden, Andrew (2001) Evaluating Trust in a Public Key Certification Authority. Computers and Security, 20 (7). pp. 592-611. ISSN 0167-4080. (doi:10.1016/S0167-4048(01)00710-6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13520)

Chadwick, David W., Basden, Andrew, Evans, J., Young, Andrew J. (1998) Intelligent Computation of Trust. In: Terena Networking Conference, TNC98, Dresden, Germany. . pp. 114-132. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21571)

Chadwick, David W., Beitis, George, Owen, Gareth (2008) Adding Authorisation to EduRoam. In: TERENA Networking Conference. . , Brugge, Belgium (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:23981)

Chadwick, David W. and Casenove, Matteo (2011) Security APIs for My Private Cloud-Granting access to anyone, from anywhere at any time. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science. IEEE, pp. 792-798. ISBN 978-1-4673-0090-2. (doi:10.1109/CloudCom.2011.122) (KAR id:31976)
[img]

Chadwick, David W., Cook, P.J., Young, Andrew J., McDowell, D.M., New, John (2000) Using the Internet to Access Confidential Patient Records: A Case Study''. British Medical Journal, 321 . pp. 612-614. (KAR id:21972)
[img]
Preview

Chadwick, David W., Fan, Wenjun, Constantino, Gianpiero, De Lemos, Rogério, Di Cerbo, Francesco, Herwono, Ian, Mori, Paolo, Sajjad, Ali, Wang, Xiao-Si, Manera, Mirko and others. (2019) A cloud-edge based data security architecture for sharing and analyzing cyber threat information. Future Generation Computer Systems, 102 . pp. 710-722. ISSN 0167-739X. (doi:10.1016/j.future.2019.06.026) (KAR id:76431)
[img]
Preview

Chadwick, David W. and Fatema, Kaniz (2009) An advanced policy based authorisation infrastructure. In: DIM '09 Proceedings of the 5th ACM workshop on Digital identity management. CCS Computer and Communications Security . ACM, New York, USA, pp. 81-84. ISBN 978-1-60558-786-8. (doi:10.1145/1655028.1655045) (KAR id:31990)
[img]
Preview

Chadwick, David W., Fatema, Kaniz (2012) A privacy preserving authorisation system for the cloud. Journal of Computer and System Sciences, 78 (5). pp. 1359-1373. ISSN 0022-0000. (doi:10.1016/j.jcss.2011.12.019) (KAR id:31975)
[img]
Preview

Chadwick, David W. and Harvey, S. and New, John and Young, Andrew J. (2000) Initial Experiences of Accessing Patient Confidential Data over the Internet using a Public Key Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 201-209. (KAR id:21925)
[img]
Preview

Chadwick, David W., Harvey, S., New, John, Young, Andrew J. (2000) Initial Experiences of Building Secure Access to Patient Confidential Data via the Internet. In: Information Security Solutions Europe (ISSE) 2000, Barcelona. . (KAR id:21974)
[img]
Preview

Chadwick, David W. and Howes, T. and Wahl, M. (1999) Referrals and Knowledge References in LDAP Directories. UNSPECIFIED. (KAR id:21812)
[img]
Preview

Chadwick, David W., Inman, George (2009) Attribute Aggregation in Federated Identity Management. IEEE Computer, . pp. 182-196. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30603)

Chadwick, David W., Inman, George, Klingenstein, Nate (2010) A Conceptual Model for Attribute Aggregation. Future Generation Computer Systems, 26 (7). pp. 1043-1052. (doi:10.1016/j.future.2009.12.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30572)

Chadwick, David W. and Inman, George and Siu, Kristy W.S. and Ferdous, Mohammad Sadek (2011) Leveraging social networks to gain access to organisational resources. In: Proceedings of the 7th ACM workshop on Digital identity management. ACM, New York, USA, pp. 43-51. ISBN 978-1-4503-1006-2. (doi:10.1145/2046642.2046653) (KAR id:31977)
[img]
Preview

Chadwick, David W., Laborde, Romain, Oglaza, Arnaud, Venant, Remi, Wazan, Ahmad Samer, Nijjar, Manreet (2019) Improved Identity Management with Verifiable Credentials and FIDO. IEEE Communications Standards, 3 (4). pp. 14-20. ISSN 2471-2825. (doi:10.1109/MCOMSTD.001.1900020) (KAR id:80304)
[img]
Preview

Chadwick, David W., Legg, S. (2002) Internet X.509 Public Key Infrastructure -- LDAP Schema for PKIs. . Internet Draft (Unpublished) (KAR id:13771)
[img]
Preview

Chadwick, David W. and Lievens, Stijn F. and den Hartog, Jerry I. and Pashalidis, Andreas and Alhadeff, Joseph (2011) My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. In: 2011 IEEE 4th International Conference on Cloud Computing. IEEE, pp. 752-753. ISBN 978-1-4577-0836-7. E-ISBN 978-0-7695-4460-1. (doi:10.1109/CLOUD.2011.113) (KAR id:43198)
[img]
Preview

Chadwick, David W., Mullan, S. (2002) Returning Matched Values with LDAPv3. . (KAR id:13780)
[img]
Preview

Chadwick, David W. and Mundy, Darren (2003) Policy Based Electronic Transmission of Prescriptions. In: Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks. IEEE, pp. 197-206. ISBN 0-7695-1933-4. (doi:10.1109/POLICY.2003.1206974) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13957)

Chadwick, David W. and Mundy, Darren (2004) The Secure Electronic Transfer of Prescriptions. In: Bryant, Jacqueline, ed. Current Perspectives in Healthcare Computing Conference. BCS HIC, pp. 11-28. ISBN 978-0-9546971-0-5. (KAR id:14205)
[img]
Preview

Chadwick, David W., Mundy, Darren, New, John (2003) Experiences of Using a PKI to Access a Hospital Information System by High Street Opticians. Computer Communications special edition on PKI, 26 (16). pp. 1893-1903. ISSN 0140-3664. (doi:10.1016/S0140-3664(03)00084-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13892)

Chadwick, David W., New, John, McDowell, D.M., Mundy, Darren (2001) Providing Secure Access to Confidential Patient Information Detailing Diabetic Condition. In: Graham, P. and Maheswaran, M. and Eskicioglu, R., eds. The International Conference On Internet Computing 2001. I. pp. 535-541. CSREA Press (KAR id:13488)
[img]
Preview

Chadwick, David W., Novikov, A., Otenko, Alexander (2006) GridShib and PERMIS Integration. Campus-Wide Information Systems, 23 (4). pp. 297-308. ISSN 1065-0741. (KAR id:14402)
[img]
Preview

Chadwick, David W. and Otenko, Alexander (2004) Implementing Role Based Access Controls using X.509 Privilege Management - the PERMIS Authorisation Infrastructure. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Security and Privacy in Advanced Networking Technologies. NATO Science Series, 193 . IOS Press, pp. 26-39. ISBN 1576034308. (KAR id:14043)
[img]
Preview

Chadwick, David W., Otenko, Alexander (2002) The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proc 7th ACM Symposium On Access Control Models And Technologies (SACMAT 2002), Monterey, USA. . pp. 135-140. (KAR id:13778)
[img]
Preview

Chadwick, David W., Otenko, Alexander (2003) The PERMIS X.509 Role Based Privilege Management Infrastructure. Future Generation Computer Systems, 19 (2). pp. 277-289. ISSN 0167-739X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14008)

Chadwick, David W., Otenko, Alexander, Ball, E. (2003) Implementing Role Based Access Controls Using X.509 Attribute Certificates. IEEE Internet Computing, . pp. 62-69. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14000)

Chadwick, David W., Otenko, O. (2003) A Comparison of the Akenti and PERMIS Authorization Infrastructures in Ensuring Security in IT Infrastructures. In: El-Hadidi, Mahmoud T., ed. Proceedings of the ITI First International Conference on Information and Communications Technology (ICICT 2003) Cairo University. . pp. 5-26. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13847)

Chadwick, David W., Otenko, Olexandre, Hunter, David, Leoni, Cristiano (2002) Privilege Management for E-Construction. In: Rezgui, Yacine and Ingirige, Bingunath and Aouad, Ghassan, eds. Proc European Conf on Information and Communication Technology Advances and Innovation in the Knowledge Society, Part B, University of Salford, UK. 2002. . pp. 91-102. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13682)

Chadwick, David W. and Otenko, Sassa and Nguyen, Tuan Anh (2006) Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. In: Communications and Multimedia Security. Lecture Notes in Computer Science, 4237 . Springer Berlin/Heidelberg, pp. 67-86. ISBN 978-3-540-47820-1. (doi:10.1007/11909033) (KAR id:14405)
[img]
Preview

Chadwick, David W., Otenko, Sassa, Nguyen, Tuan Anh (2009) Adding Support to XACML for Multi-Domain User to User Dynamic Delegation of Authority. International Journal of Information Security, 8 (2). pp. 182-196. (doi:10.1007/s10207-008-0073-y) (KAR id:30605)
[img]
Preview

Chadwick, David W. and Sahalayev, M. and Ball, E. (2003) Modifying LDAP to Support PKIs. In: Data and Applications Security XVII Status and Prospects. IFIP - The International Federation for Information Processing, 142 . Springer, Boston, Massachusetts, USA, pp. 205-214. ISBN 978-1-4020-8069-2. E-ISBN 978-1-4020-8070-8. (doi:10.1007/1-4020-8070-0_15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13935)

Chadwick, David W. and Sahalayev, M.V. (2003) Internet X.509 Public Key Infrastructure LDAP Schema for X.509 Attribute Certificates. Internet Draft. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13958)

Chadwick, David W. and Sahalayev, M.V. (2003) Internet X.509 Public Key Infrastructure LDAP Schema for X.509 CRLs. INTERNET-DRAFT. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13959)

Chadwick, David W., Sasse, Angela (2006) The Virtuous Circle of Expressing Authorisation Policies. In: Proceedings of the ISWC'06 Workshop on Semantic Web Policy (SWPW'06). 207. , Georgia, USA (KAR id:14396)
[img]
Preview

Chadwick, David W., Sette, Ioram S., Sui, Kristy, W (2015) Opening Up OpenStack’s Identity Service. In: Terena Networking Conference 2015, 14-18 June, 2015, Porto, Portugal. (Unpublished) (KAR id:52931)
[img]
Preview
[img]

Chadwick, David W., Su, L., Laborde, Romain (2008) Coordinating access control in grid services. Concurrency and Computation: Practice and Experience, 20 (9). pp. 1071-1094. ISSN 1532-0626. (doi:10.1002/cpe.1284) (KAR id:14878)
[img]
Preview

Chadwick, David W. and Su, Linying and Laborde, Romain (2006) Providing Secure Coordinated Access to Grid Services. In: Proceedings of the 4th international workshop on Middleware for grid computing. ACM, New York, USA, p. 1. ISBN 1-59593-581-9. (doi:10.1145/1186675.1186677) (KAR id:14395)
[img]
Preview

Chadwick, David W. and Su, Linying and Otenko, Oleksandr and Laborde, Romain (2006) Co-ordination between Distributed PDPs. In: Burgess, M. and Wijesekera, D., eds. Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06). International Workshop on Policies for Distributed Systems and Networks . IEEE, pp. 163-172. ISBN 0-7695-2598-9. (doi:10.1109/POLICY.2006.14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14475)

Chadwick, David W., Tassabehji, Rana, Young, Andrew J. (2000) Experiences of Using a Public Key Infrastructure for the Preparation of Examination Papers. Computers and Education, 35 (1). pp. 1-20. ISSN 0360-1315. (doi:10.1016/S0360-1315(99)00040-8) (KAR id:21913)
[img]
Preview

Chadwick, David W. and Xu, Wensheng and Otenko, Sassa and Laborde, Romain and Nasser, Bassem (2007) Multi-Session Separation of Duties (MSoD) for RBAC. In: 2007 IEEE 23rd International Conference on Data Engineering Workshop. IEEE, pp. 744-753. ISBN 978-1-4244-0831-3. (doi:10.1109/ICDEW.2007.4401062) (KAR id:14595)
[img]
Preview

Chadwick, David W. and Young, Andrew J. (2000) A Directory Application Level Firewall - the Guardian DSA. In: Jerman-Blazic, B. and Schneider, W.S. and Klobucar, T., eds. Advanced Security Technologies for Insecure Networks. IOS Press, Amsterdam, pp. 133-147. (KAR id:21924)
[img]
Preview

Chadwick, David W., Young, Andrew J. (1998) Enabling the Internet White Pages Service -- the Directory Guardian. In: Internet Society Symposioum on Network and Distributed Systems Security (NDSS 98), San Diego, California. . (KAR id:21566)
[img]
Preview

Chadwick, David W., Young, Andrew J., Kapidzic Cicovic, Nada (1997) Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model. IEEE Networks Special Publication on Internet Security, 11 (3). pp. 16-24. ISSN 0890-8044. (KAR id:21507)
[img]
Preview

Chadwick, David W. and Zhao, Gansen and Otenko, Sassa and Laborde, Romain and Su, Linying and Nguyen, Tuan Anh (2006) Building a Modular Authorization Infrastructure. In: All Hands Meeting. . (KAR id:14430)
[img]
Preview

Chadwick, David W., Zhao, Gansen, Otenko, Sassa, Laborde, Romain, Su, Linying, Nguyen, Tuan Anh (2008) PERMIS: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience, 20 (11). pp. 1341-1357. ISSN 1532-0626. (doi:10.1002/cpe.1313) (KAR id:14877)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2012) F-SAMS: Reliably Identifying Attributes and Their Identity Providers in a Federation. In: On the Move to Meaningful Internet Systems: OTM 2012 Workshops. Springer Berlin Heidelberg, pp. 231-241. (KAR id:43205)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2013) Towards Automated Trust Establishment in Federated Identity Management. In: Trust Management VII. Springer Berlin Heidelberg, pp. 33-48. (KAR id:43206)
[img]
Preview

Chadwick, David W, Inman, George (2013) The Trusted Attribute Aggregation Service (TAAS)-Providing an Attribute Aggregation Layer for Federated Identity Management. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. (KAR id:43210)
[img]
Preview
[img]
Preview

Chadwick, David and Otenko, Sassa and Welch, Von (2005) Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure. In: Chadwick, David W. and Preneel, Bart, eds. Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. IFIP - The International Federation for Information Processing . Springer, Boston, Massachusetts, USA, pp. 251-261. ISBN 978-0-387-24485-3. E-ISBN 978-0-387-24486-0. (doi:10.1007/0-387-24486-7_19) (KAR id:14380)
[img]
Preview

Cheval, Vincent (2014) APTE: An Algorithm for Proving Trace Equivalence. In: 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), Avril 2014, Grenoble, France. (doi:10.1007/978-3-642-54862-8_50) (KAR id:46724)
[img]
Preview

Cheval, Vincent (2012) Automatic verification of cryptographic protocols: privacy-type properties. Doctor of Philosophy (PhD) thesis, ENS-Cachan. (KAR id:46883)
[img]
Preview

Cheval, Vincent, Blanchet, Bruno (2013) Proving More Observational Equivalences with ProVerif. In: Basin, David and Mitchell, John C., eds. Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Lecture Notes in Computer Science , 7796. pp. 226-246. Springer-Verlag Berlin, Roma, Italy ISBN 978-3-642-36829-5. E-ISBN 978-3-642-36830-1. (doi:10.1007/978-3-642-36830-1_12) (KAR id:46727)
[img]
Preview
[img]
Preview

Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2010) Automating Security Analysis: Symbolic Equivalence of Constraint Systems. In: Giesl, Jürgen and Hähnle, Reiner, eds. Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10). Lecture Notes in Computer Science , 6173. pp. 412-426. Springer-Verlag Berlin, Edinburgh, Scotland, UK ISBN 978-3-642-14202-4. E-ISBN 978-3-642-14203-1. (doi:10.1007/978-3-642-14203-1_35) (KAR id:46730)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2011) Trace Equivalence Decision: Negative Tests and Non-determinism. In: Chen, Yan and Danezis, George and Shmatikov, Vitaly, eds. Proceedings of the 18th ACM conference on Computer and communications security. ACM, New York, USA, pp. 321-330. ISBN 978-1-4503-0948-6. (doi:10.1145/2046707.2046744) (KAR id:46878)
[img]
Preview

Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:10.1016/j.ic.2017.05.004) (KAR id:46882)
[img]
Preview

Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Principles of Security and Trust 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 280-299. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_15) (KAR id:46881)
[img]
Preview
[img]
Preview

Cheval, Vincent, Cortier, Véronique, Delaune, Stéphanie (2013) Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492 . pp. 1-39. ISSN 0304-3975. (doi:10.1016/j.tcs.2013.04.016) (KAR id:46725)
[img]
Preview

Cheval, Vincent, Cortier, Véronique, Plet, Antoine (2013) Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: 25th International Conference on Computer Aided Verification (CAV'13), July 2013, St Petersburg, Russia. (doi:10.1007/978-3-642-39799-8_50) (KAR id:46726)
[img]
Preview
[img]
Preview

Cheval, Vincent, Delaune, Stéphanie, Ryan, Mark (2014) Tests for Establishing Security Properties. In: 9th International Symposium on Trustworthy Global Computing (TGC'14), September 2014, Roma, Italy. (doi:10.1007/978-3-662-45917-1_6) (KAR id:46879)
[img]
Preview

Condori-Fernandez, Nelly and Franqueira, Virginia N. L. and Wieringa, Roel (2012) Report on the Survey of Role-Based Access Control (RBAC) in Practice. Technical report. University of Twente, Netherlands (KAR id:77545)
[img]
Preview

Crawford, Scott, Chadwick, David W. (2004) Experiences of Establishing Trust in a Distributed System Operated by Mutually Distrusting Parties. In: 3rd Annual PKI R&D Workshop. . , NIST, Gaithersburg MD (KAR id:14183)
[img]

Creese, Sadie, Gibson-Robinson, Thomas, Goldsmith, Michael, Hodges, Duncan, Kim, Dee, Love, Oriana, Nurse, Jason R. C., Pike, Bill, Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). . IEEE E-ISBN 978-1-4799-1535-4. (doi:10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67520)

Creese, Sadie, Goldsmith, Michael, Nurse, Jason R. C., Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. . pp. 1124-1131. IEEE ISBN 978-1-4673-2172-3. (doi:10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67528)
[img]

D

Damsgaard Jensen, Christian and Marsh, Stephen and Dimitrakos, Theo and Murayama, Yuko, eds. (2015) Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology, 454 . Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:48980)

Daniel, Joshua, El-Moussa, Fadi, Ducatel, Géry, Pawar, Pramod, Sajjad, Ali, Rowlingson, Robert, Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology. Trust Management IX. IFIP Advances in Information and Communication Technology , 454. pp. 226-239. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:48978)
[img]

Chadwick, David W. and de Decker, Bart, eds. (2012) Communications and Multimedia Security: Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security. Springer-Verlag ISBN 3-642-32804-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:43202)

Devlin, Matthieu, Nurse, Jason R. C., Hodges, Duncan, Goldsmith, Michael, Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190 . pp. 23-35. Springer ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:10.1007/978-3-319-20376-8_3) (KAR id:67509)
[img]
Preview

Dimitrakos, Theo (2014) Context-Aware Multifactor Authentication Based on Dynamic Pin. In: ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference. IFIP Advances in Information and Communication Technology . Springer, Berlin, Germany, pp. 330-338. ISBN 978-3-642-55414-8. E-ISBN 978-3-642-55415-5. (doi:10.1007/978-3-642-55415-5_27) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:51351)

da Silva, Carlos Eduardo, Diniz, Thomas, Cacho, Nelio, de Lemos, Rogerio (2018) Self-adaptive Authorisation in OpenStack Cloud Platform. Journal of Internet Services and Applications, 9 (19). ISSN 1867-4828. E-ISSN 1869-0238. (doi:10.1186/s13174-018-0090-7) (KAR id:67437)
[img]
Preview
[img]

de Balthasar, Thibault, Hernandez-Castro, Julio C. (2017) An Analysis of Bitcoin Laundry Services. In: Lecture Notes in Computer Science. . pp. 297-312. Springer-Verlag Berlin ISBN 978-3-319-70289-6. E-ISBN 978-3-319-70290-2. (doi:10.1007/978-3-319-70290-2_18) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:64334)
[img]

de Lemos, Rogerio, Grzes, Marek (2019) Self-adaptive Artificial Intelligence. In: 2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS). . IEEE, New York, NY, USA ISBN 978-1-72813-368-3. (doi:10.1109/SEAMS.2019.00028) (KAR id:73259)
[img]
Preview

de Lemos, Rogério (2020) Human in the Loop: What is the Point of no Return? In: 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2020). . ACM, New York, USA ISBN 978-1-4503-7962-5. (doi:10.1145/3387939.3391597) (KAR id:80988)
[img]
Preview

E

Eggenschwiler, Jacqueline, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, 2016 (11). pp. 12-19. ISSN 1361-3723. (doi:10.1016/S1361-3723(16)30091-4) (KAR id:67480)
[img]
Preview

Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Alcaide, Almudena, Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31957)
[img]

Everett, Richard, Nurse, Jason R. C., Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:10.1145/2851613.2851813) (KAR id:67493)
[img]
Preview

Eze, Chika, Nurse, Jason R. C., Happa, Jassim (2016) Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 7 (1). ISSN 2093-5382. (doi:10.22667/JOWUA.2016.03.31.039) (KAR id:67495)
[img]
Preview

F

Farnan, Oliver, Nurse, Jason R. C. (2016) Exploring a Controls-Based Assessment of Infrastructure Vulnerability. In: 10th Risks and Security of Internet and Systems. CRiSIS 2015, July 20-22 2015, Greece. (doi:10.1007/978-3-319-31811-0_9) (KAR id:67498)
[img]
Preview

Farrell, S. and Chadwick, David W. (2000) Limited Attribute Certificate Acquisition Protocol. University of Salford. (KAR id:22008)
[img] [img]
Preview

Fatema, Kaniz, Chadwick, David (2014) Resolving Policy Conflicts-Integrating Policies from Multiple Authors. In: UNSPECIFIED. (KAR id:43215)
[img]
Preview

Fatema, Kaniz and Chadwick, David W. and van Alsenoy, Brendan (2012) Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. In: Camenisch, Jan and Crispo, Bruno and Fischer-Hübner, Simone and Leenes, Ronald and Russello, Giovanni, eds. Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology, 375 . Springer Boston, pp. 59-72. ISBN 978-3-642-31667-8. (doi:10.1007/978-3-642-31668-5_5) (KAR id:31974)
[img]
Preview

Ferreira, Ana (2010) Modelling Access Control for Healthcare Information Systems:How to control access through policies, human processes and legislation. Doctor of Philosophy (PhD) thesis, Computing. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30622)

Ferreira, Ana, Antunes, Luis, Chadwick, David W., Correi, Ricardo (2010) Grounding Information Security in Healthcare. International Journal of Medical Informatics, 79 (4). pp. 182-196. (doi:10.1016/j.ijmedinf.2010.01.009) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30670)

Ferreira, Ana, Chadwick, David W., Antunes, Luis (2007) Modelling Access Control For Healthcare Information Systems. In: Doctoral consortium at 9th International Conference on Enterprise Information Systems (ICEIS2007), 12th-16th June 2007, Funchal, Madeira - Portugal. (KAR id:14579)
[img]
Preview

Ferreira, Ana and Chadwick, David W. and Farinha, Pedro and Cruz-Correia, Ricardo and Zhao, Gansen and Chilro, Rui and Antunes, Luis (2009) How to securely break into RBAC: the BTG-RBAC model. In: 2009 Annual Computer Security Applications Conference. IEEE, pp. 23-31. ISBN 978-0-7695-3919-5. (doi:10.1109/ACSAC.2009.12) (KAR id:31989)
[img]
Preview

Ferreira, Ana and Correia, Ricardo and Chadwick, David W. and Santos, Henrique and Gomes, Rut and Reis, Diogo and Antunes, Luis (2010) Password Sharing and How to Reduce It. In: Chryssanthou, Anargyros and Apostolakis, Ioannis and Varlamis, Iraklis, eds. Certification and Security in Health-Related Web Applications: Concepts and Solutions. Premier Reference Source . Medical Information Science Reference, New York, pp. 243-263. ISBN 978-1-61692-897-1. (KAR id:31988)
[img]
Preview

Ferreira, Ana and Cruz-Correia, Ricardo and Antunes, Luis and Chadwick, David W. (2007) Access Control: how can it improve patients' healthcare? In: Bos, Lodewijk and Blobel, Bernd, eds. Medical and Care Compunetics 4. Studies in Health Technology and Informatics (Volume). IOS Press, Netherlands, pp. 65-76. ISBN 978-1-58603-751-2. (KAR id:14578)
[img]
Preview

Ferreira, Ana and Cruz-Correia, Ricardo and Antunes, Luis and Farinha, P and Oliveira-Palhares, E. and Chadwick, David W. and Costa-Pereira, A. (2006) How to break access control in a controlled manner. In: 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06). Symposium on Computer-Based Medical Systems . IEEE, pp. 847-851. ISBN 978-0-7695-2517-4. (doi:10.1109/CBMS.2006.95) (KAR id:14476)
[img]
Preview

Franqueira, Virginia N. L. and Inácio, Pedro Ricardo Morais and Mileva, Aleksandra and Conti, Mauro and Leppänen, Ville and Lopes, Raul H.C., eds. (2019) Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions. IEEE Internet of Things Journal, 6 (4). ISSN 2327-4662. (doi:10.1109/jiot.2019.2926635) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77166)
[img]

Franqueira, Virginia N. L., Bakalova, Zornitza, Tun, Thein Than, Daneva, Maya (2011) Towards Agile Security Risk Management in RE and Beyond. In: Proceedings of the Workshop on Empirical Requirements Engineering (EmpiRE 2011). . pp. 33-36. IEEE (doi:10.1109/empire.2011.6046253) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77196)
[img]

Franqueira, Virginia N. L., Bryce, Joanne, Mutawa, Noora Al, Marrington, Andrew (2018) Investigation of Indecent Images of Children cases: Challenges and Suggestions Collected from the Trenches. Digital Investigation, 24 . pp. 95-105. (doi:10.1016/j.diin.2017.11.002) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77174)
[img] [img]

Franqueira, Virginia N. L., Inácio, Pedro Ricardo Morais, Mileva, Aleksandra, Conti, Mauro, Leppänen, Ville, Lopes, Raul H.C. (2019) Guest Editorial Special Issue on Security and Forensics of Internet of Things: Problems and Solutions. IEEE Internet of Things Journal, 6 (4). pp. 6363-6367. ISSN 2327-4662. (doi:10.1109/jiot.2019.2926635) (KAR id:79542)
[img]
Preview

Franqueira, Virginia N. L., Lopes, Raul H. C. (2007) Vulnerability Assessment by Learning Attack Specifications in Graphs. In: Proceedings IAS 2007: Third International Symposium on Information Assurance and Security. . pp. 161-164. IEEE ISBN 978-0-7695-2876-2. (doi:10.1109/isias.2007.4299768) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:77203)

Franqueira, Virginia N. L., Lopes, Raul H. C., van Eck, Pascal (2009) Multi-step Attack Modelling and Simulation (MsAMS) Framework Based on Mobile Ambients. In: Proceedings of the 2009 ACM symposium on Applied Computing (SAC 09). . pp. 66-73. ACM Press ISBN 978-1-60558-166-8. (doi:10.1145/1529282.1529294) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77202)
[img]

Franqueira, Virginia N. L., Van Eck, Pascal (2008) Defense Against Insider Threat: A framework for Gathering Goal-based Requirements. In: CEUR Workshop Proceedings. CEUR Workshop Proceedings. . pp. 183-192. (KAR id:77204)
[img]
Preview

Franqueira, Virginia N. L. and van Cleeff, Andre' and van Eck, Pascal and Wieringa, Roel (2012) Securing the Extended Enterprise: A Method for Analyzing External Insider Threat. In: Strategic and Practical Approaches for Information Security Governance. IGI Global, pp. 195-222. (doi:10.4018/978-1-4666-0197-0.ch012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77193)
[img]

Franqueira, Virginia N. L., van Cleeff, Andre', van Eck, Pascal, Wieringa, Roel J. (2013) Engineering Security Agreements Against External Insider Threat. Information Resources Management Journal, 26 (4). pp. 66-91. (doi:10.4018/irmj.2013100104) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77191)
[img] [img]

Franqueira, Virginia N. L., van Cleeff, Andre, van Eck, Pascal, Wieringa, Roel (2010) External Insider Threat: A Real Security Challenge in Enterprise Value Webs. In: The Fifth International Conference on Availability, Reliability, and Security (ARES 2010). . pp. 446-453. IEEE ISBN 978-0-7695-3965-2. (doi:10.1109/ares.2010.40) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:77198)

Franqueira, Virginia N. L., van Eck, Pascal, Wieringa, Roel, Lopes, Raul H. C. (2009) A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. In: Proceedings: International Conference on Availability, Reliability and Security (ARES 2009). . pp. 546-553. IEEE ISBN 978-0-7695-3564-7. (doi:10.1109/ares.2009.125) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:77200)

Franqueira, Virginia N. L. and van Keulen, Maurice (2008) Analysis of the NIST database towards the composition of vulnerabilities in attack scenarios. Technical report. Centre for Telematics and Information Technology, University of Twente, Netherlands (KAR id:77544)
[img]
Preview

Franqueira, Virginia N.L. (2003) Single Vehicle Routing in Port Container Terminals. Master of Science (MSc) thesis, Universidade Federal do Espirito Santo. (doi:10.13140/RG.2.1.1827.2241) (KAR id:77541)
[img]
Preview

Franqueira, Virginia N.L., Horsman, Graeme (2020) Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice. Forensic Science International: Digital Investigation, 32 (Suppl.). p. 300923. ISSN 1742-2876. (doi:10.1016/j.fsidi.2020.300923) (KAR id:79313)
[img]
Preview
[img]

Franqueira, Virginia N.L., Tun, Thein Than, Yu, Yijun, Wieringa, Roel, Nuseibeh, Bashar (2011) Risk and Argument: A risk-based Argumentation Method for Practical Security. In: 2011 IEEE 19th International Requirements Engineering Conference. 2011 IEEE 19th International Requirements Engineering Conference. . pp. 239-248. IEEE ISBN 978-1-4577-0921-0. E-ISBN 978-1-4577-0924-1. (doi:10.1109/re.2011.6051659) (KAR id:77195)
[img]
Preview
[img]

Franqueira, Virginia N.L. and Tunnicliffe, Peter (2015) To Flip or Not to Flip: A Critical Interpretive Synthesis of Flipped Teaching. In: Smart Education and Smart e-Learning. Smart Innovation, Systems and Technologies . Springer, Cham, Switzerland, pp. 57-67. ISBN 978-3-319-19874-3. E-ISBN 978-3-319-19875-0. (doi:10.1007/978-3-319-19875-0_6) (KAR id:77188)
[img]
Preview
[img]

Franqueira, Virginia N.L., Wieringa, Roel (2012) Role-Based Access Control in Retrospect. Computer, 45 (6). pp. 81-88. ISSN 0018-9162. E-ISSN 1558-0814. (doi:10.1109/mc.2012.38) (KAR id:77192)
[img]
Preview
[img]

Franqueira, Virginia Nunes Leal Franqueira (2009) Finding Multi-step Attacks in Computer Networks Using Heuristic Search and Mobile Ambients. Doctor of Philosophy (PhD) thesis, University of Twente. (doi:10.3990/1.9789036529235) (KAR id:77205)
[img]
Preview

Franqueira, Virginia. N. L., Houmb, Siv Hilde, Daneva, Maya (2010) Using Real Option Thinking to Improve Decision Making in Security Investment. In: Lecture Notes in Computer Science. On the Move to Meaningful Internet Systems: OTM 2010. 6426. pp. 619-638. Springer ISBN 978-3-642-16933-5. (doi:10.1007/978-3-642-16934-2_46) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77199)
[img]

G

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:52889)

Giasemidis, Georgios, Kaplis, Nikolaos, Agrafiotis, Ioannis, Nurse, Jason R.C. (2018) A semi-supervised approach to message stance classification. IEEE Transactions on Knowledge and Data Engineering, 32 (1). pp. 1-11. ISSN 1041-4347. E-ISSN 1558-2191. (doi:10.1109/TKDE.2018.2880192) (KAR id:69952)
[img]
Preview

Giasemidis, Georgios, Singleton, Colin, Agrafiotis, Ioannis, Nurse, Jason R. C., Pilgrim, Alan, Willis, Chris (2016) Determining the veracity of rumours on Twitter. In: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part I. Part of the Lecture Notes in Computer Science book series . pp. 185-205. Springer, Germany ISBN 978-3-319-47879-1. (doi:10.1007/978-3-319-47880-7_12) (KAR id:67488)
[img]
Preview

Gray, Joshua and Franqueira, Virginia N.L. and Yu, Yijun (2017) Forensically-sound Analysis of Security Risks of Using Local Password Managers. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW). IEEE, pp. 114-121. ISBN 978-1-5090-3694-3. E-ISBN 978-1-5090-3694-3. (doi:10.1109/REW.2016.034) (KAR id:77179)
[img]
Preview
[img]

Guo, Hui, Kafalı, Özgur, Jeukeng, Anne-Liz, Williams, Laurie, Singh, Munindar P. (2019) Corba: Crowdsourcing to Obtain Requirements from Regulations and Breaches. Empirical Software Engineering, 25 . pp. 532-561. ISSN 1382-3256. (doi:10.1007/s10664-019-09753-2) (KAR id:75141)
[img]
Preview

Guo, Hui, Kafalı, Özgur, Jeukeng, Anne-Liz, Williams, Laurie, Singh, Munindar P. (2018) Poster: Extraction of Security Requirements from Textual Artifacts. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS). (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:66201)

H

Hajdusek, Michal, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. arXiv preprint arXiv:1502.02563, . (Unpublished) (KAR id:58189)
[img]
Preview

Halgas, Lukas, Agrafiotis, Ioannis, Nurse, Jason R. C. (2020) Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). In: Lecture Notes in Computer Science. Information Security Applications: 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers. 11897. Springer ISBN 978-3-030-39302-1. (doi:10.1007/978-3-030-39303-8_17) (KAR id:75746)
[img]
Preview

Happa, Jassim, Fairclough, Graham, Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. . (KAR id:67494)
[img]
Preview

Happa, Jassim and Nurse, Jason R.C. and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0026) (KAR id:67467)
[img]
Preview

Harrison, Joe, Roberts, David L., Hernandez-Castro, Julio (2016) Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology, 30 (4). pp. 900-904. ISSN 0888-8892. (doi:10.1111/cobi.12707) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58382)
[img]

Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Bettahar, H. (2007) A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. In: 21st International Conference on Advanced Information Networking and Applications Workshops. IEEE, pp. 551-556. ISBN 978-0-7695-2847-2. (doi:10.1109/AINAW.2007.32) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14590)

Hassan, H. Ragab, Bouabdallah, Abdelmadjid, Bettahar, H., Challal, Y. (2005) Gestion de Clés dans la communication de Groupes Hiérarchiques. In: 4ème Rencontre Francophone sur Sécurité et Architectures Réseaux 2005, June 2005, Batz sur Mer, France. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14319)

Hassan, H. Ragab, Bouabdallah, Abdelmadjid, Bettahar, H., Challal, Y. (2005) Hi-KD : Hash-based hierarchical Key Distribution for Group Communication. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14354)

Hassan, H. Ragab and Bouabdallah, Abdelmadjid and Bettahar, H. and Challal, Y. (2005) Hi-KD: An Efficient Key Management Algorithm for Hierarchical Group. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks: Securecomm 2005, Proceedings. Institute of Electrical & Electronics Enginee, pp. 270-276. ISBN 978-0-7695-2369-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14280)

Hassan, H. Ragab, Bouabdallah, Abdelmadjid, Bettahar, H., Challal, Y. (2007) Key management for content access control in a hierarchy. Computer Networks: The International Journal of Computer and Telecommunications Networking, 51 (11). pp. 3197-3219. ISSN 1389-1286. (doi:10.1016/j.comnet.2006.12.011) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14561)

Hassan, H. Ragab and Challal, Y. (2005) Enhanced WEP : An efficient solution to WEP threats. In: Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005. IEEE, pp. 594-599. ISBN 0-7803-9019-9. (doi:10.1109/WOCN.2005.1436095) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14355)

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0) (KAR id:38400)
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only. (KAR id:51071)
[img]

Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Peris-Lopez, Pedro, Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31959)
[img]

Hernandez-Castro, Julio C., Estévez-Tapiador, Juan M., Peris-Lopez, Pedro, Clark, John A., Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31940)
[img]

Hernandez-Castro, Julio C., Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:10.7717/peerj-cs.10) (KAR id:49885)
[img]
Preview

Hernandez-Castro, Julio C., Tapiador, Juan E., Palomar, Esther, Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31949)
[img]

Hernández-Castro, Carlos Javier, Li, Shujun, R-Moreno, María D. (2020) All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Computers & Security, 92 . Article Number 101758. ISSN 0167-4048. (doi:10.1016/j.cose.2020.101758) (KAR id:80266)
[img]
Preview

Hirano, Manabu, Chadwick, David W, Yamaguchi, Suguru (2013) Use of Role Based Access Control for Security-Purpose Hypervisors. In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, July, 2013, Melbourne, Australia. (KAR id:43213)
[img]
Preview

Hodges, D., Nurse, Jason R. C., Goldsmith, M., Creese, S. (2012) Identity attribution across CyberSpace and the Natural Space. In: The International Crime and Intelligence Analysis Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67527)

Hosek, Petr and Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Evans, David and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2011) SafeWeb: A Middleware for Securing Ruby-Based Web Applications. In: Middleware 2011 ACM/IFIP/USENIX 12th International Middleware Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 491-511. ISBN 978-3-642-25820-6. E-ISBN 978-3-642-25821-3. (doi:10.1007/978-3-642-25821-3_25) (KAR id:31860)
[img]
Preview

Hosu, Vlad, Hahn, Franz, Jenadeleh, Mohsen, Lin, Hanhe, Men, Hui, Szirányi, Tamás, Li, Shujun, Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. . IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:10.1109/QoMEX.2017.7965673) (KAR id:69606)
[img]
Preview

Hou, Peixin, Petrou, Maria, Underwood, Craig Ian, Hojjatoleslami, Ali (2000) Improved JPEG performance in conjunction with cloud editing for Remote Sensing applications. IEEE Transactions: Geoscience and Remote Sensing, 38 (1). 515 -524. ISSN 0196-2892. (doi:10.1109/TGRS.2011.2131971) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:27605)

Houmb, Siv Hilde, Franqueira, Virginia N. L. (2009) Estimating ToE Risk Level Using CVSS. In: Proceedings: International Conference on Availability, Reliability and Security (ARES 2009). . pp. 718-725. IEEE ISBN 978-0-7695-3564-7. (doi:10.1109/ares.2009.151) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:77201)

Houmb, Siv Hilde, Franqueira, Virginia N. L., Engum, Erlend A. (2010) Quantifying security risk level from CVSS estimates of frequency and impact. Journal of Systems and Software, 83 (9). pp. 1622-1634. ISSN 0164-1212. (doi:10.1016/j.jss.2009.08.023) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77197)
[img]

Howe, Jacob M., King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (doi:10.1016/S0020-0190(00)00081-8) (KAR id:16241)
[img]
Preview
[img]

Hull, Gavin, John, Henna, Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8 . Article Number 2. ISSN 2193-7680. (doi:10.1186/s40163-019-0097-9) (KAR id:71720)
[img]
Preview
[img]
Preview

Hurley-Smith, Darren, Hernandez-Castro, Julio (2018) Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security, 13 (4). pp. 1031-1041. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2017.2777342) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67241)
[img]

I

Inglesant, Philip, Sasse, M. Angela, Chadwick, David W., Shi, Lei Lei (2008) Expressions of Expertness: The Virtuous Circle of Natural Language for Access Control Policy Specification. In: UNSPECIFIED. (KAR id:24031)
[img]
Preview

Inman, George, Chadwick, David W. (2010) A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements Systems. Upgrade, XI (1). pp. 182-196. (KAR id:30688)
[img]

Inman, George, Chadwick, David W., Klingenstein, Nate (2007) Authorisation using Attribute from Multiple Authorities - A Study of Requirements. In: Proceedings of HCSIT Summit - ePortfolio International Conference. . , Maastricht, The Netherlands (KAR id:14533)
[img]
Preview

Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 277-293. Springer, Singapore ISBN 978-981-1513-03-9. E-ISBN 978-981-1513-04-6. (doi:10.1007/978-981-15-1304-6_22) (KAR id:76678)
[img]
Preview
[img]

Iuga, Cristian, Nurse, Jason R. C., Erola, Arnau (2016) Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks. Journal of Human-centric Computing and Information Sciences, 6 (8). ISSN 2192-1962. (doi:10.1186/s13673-016-0065-2) (KAR id:67492)
[img]
Preview

J

Jin, Ruji, Lin, Chen, Su, Linying (1997) The basic of multi-media computer. The people's press of Inner Mogolia, Hohhot, China ISBN 7-204-04135-6/G.899. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21549)

Jones, Keenan, Nurse, Jason R. C., Li, Shujun (2020) Behind the Mask: A Computational Study of Anonymous' Presence on Twitter. In: 14th International AAAI Conference on Web and Social Media (ICWSM). . (KAR id:80660)
[img]
Preview

K

Kabi, Oliver R. and Franqueira, Virginia N. L. (2019) Blockchain-Based Distributed Marketplace. In: Abramowicz, Witolf and Paschke, Adrian, eds. Business Information Systems Workshops. BIS 2018. Lecture Notes in Business Information Processing . Springer Nature, Cham, Switzerland, pp. 197-210. ISBN 978-3-030-04848-8. E-ISBN 978-3-030-04849-5. (doi:10.1007/978-3-030-04849-5_17) (KAR id:79533)
[img]
Preview

Kafalı, Özgur, Ajmeri, Nirav, Singh, Munindar P. (2019) Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control. ACM Transactions on Software Engineering and Methodology, 29 (1). Article Number 7. ISSN 1049-331X. (doi:10.1145/3365664) (KAR id:77232)
[img]
Preview

Kafalı, Özgur and Ajmeri, Nirav and Singh, Munindar P. (2017) Formal Understanding of Tradeoffs among Liveness and Safety Requirements. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW). IEEE, pp. 17-18. ISBN 978-1-5090-3695-0. E-ISBN 978-1-5090-3694-3. (doi:10.1109/REW.2016.017) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:65879)

Kafalı, Özgur, Ajmeri, Nirav, Singh, Munindar P. (2017) Kont: Computing tradeoffs in normative multiagent systems. In: Proceedings of the 31st Conference on Artificial Intelligence (AAAI). . pp. 3006-3012. (KAR id:65868)
[img]
Preview

Kafalı, Özgur and Ajmeri, Nirav and Singh, Munindar P. (2017) Normative Requirements in Sociotechnical Systems. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW). IEEE, pp. 259-260. ISBN 978-1-5090-3695-0. E-ISBN 978-1-5090-3694-3. (doi:10.1109/REW.2016.049) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:65878)

Kafalı, Özgur, Ajmeri, Nirav, Singh, Munindar P. (2016) Revani: Revising and Verifying Normative Specifications for Privacy. IEEE Intelligent Systems, 31 (5). pp. 8-15. ISSN 1541-1672. (doi:10.1109/MIS.2016.89) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:65853)
[img]

Kafalı, Özgur and Günay, Akin and Yolum, Pinar (2013) Protoss: A run time tool for detecting privacy violations in online social networks: Short Paper. In: 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE, pp. 429-433. ISBN 978-1-4673-2497-7. (doi:10.1109/ASONAM.2012.76) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:65887)

Kafalı, Özgur, Jones, Jasmine, Petruso, Megan, Williams, Laurie, Singh, Munindar P. (2017) How Good is a Security Policy against Real Breaches? A HIPAA Case Study. In: 2017 IEEE/ACM 39th International Conference on Software Engineering. . pp. 530-540. IEEE ISBN 978-1-5386-3868-2. (doi:10.1109/ICSE.2017.55) (KAR id:65867)
[img]
Preview

Kafalı, Özgur, Singh, Munindar P. (2017) Improving Cybersecurity: User Accountability and Sociotechnical Systems. . IEEE Online. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:66529)

Kafalı, Özgur and Singh, Munindar P. and Williams, Laurie (2016) Nane: Identifying misuse cases using temporal norm enactments. In: 2016 IEEE 24th International Requirements Engineering Conference (RE). IEEE, pp. 136-145. ISBN 978-1-5090-4122-0. E-ISBN 978-1-5090-4121-3. (doi:10.1109/RE.2016.34) (KAR id:65869)
[img]
Preview

Kafalı, Özgür, Criado, Natalia, Rehak, Martin, Such, Jose M., Yolum, Pinar (2018) Guest Editors' Introduction - Artificial Intelligence for Security and Privacy. ACM Transactions on Internet Technology, 18 (3). Article Number 26. ISSN 1533-5399. (doi:10.1145/3177884) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:66530)

Kafalı, Özgür and Singh, Munindar P. and Williams, Laurie (2016) Toward a normative approach for forensicability: Extended Abstract. In: Proceedings of the Symposium and Bootcamp on the Science of Security. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA, pp. 65-67. ISBN 978-1-4503-4277-3. (doi:10.1145/2898375.2898386) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:65877)

Kammüller, Florian, Nurse, Jason R. C., Probst, Christian W. (2016) Attack Tree Analysis for Insider Threats on the IoT using Isabelle. In: Lecture Notes in Computer Science 9750. Lecture Notes in Computer Science . pp. 234-246. Springer, Switzerland ISBN 978-3-319-39380-3. (doi:10.1007/978-3-319-39381-0_21) (KAR id:67496)
[img]
Preview

Katilu, Victoria M., Franqueira, Virginia N. L., Angelopoulou, Olga (2015) Challenges of Data Provenance for Cloud Forensic Investigations. In: Proceedings: 10th International Conference on Availability, Reliability and Security (ARES 2015). . pp. 312-317. IEEE ISBN 978-1-4673-6590-1. (doi:10.1109/ares.2015.54) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:77186)

Khalil, Omar, Hernandez-Castro, Julio C., Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:10.1016/j.diin.2013.01.004) (KAR id:45303)
[img]
Preview

King, Andy and Sondergaard, Harald (2010) Automatic Abstraction for Congruences. In: Barthe, Gilles and Hermenegildo, Manuel V., eds. Verification, Model Checking, and Abstract Interpretation. Lecture Notes in Computer Science (5944). Springer-Verlag, pp. 182-196. ISBN 978-3-642-11318-5. (KAR id:30704)
[img]
Preview

Kingston, Charlie, Nurse, Jason R. C., Agrafiotis, Ioannis, Milich, Andrew (2018) Using semantic clustering to support situation awareness on Twitter: The case of World Views. Human-centric Computing and Information Sciences, . ISSN 2192-1962. E-ISSN 2192-1962. (doi:10.1186/s13673-018-0145-6) (KAR id:67656)
[img]
Preview
[img]
Preview

Kittler, Josef and Hojjatoleslami, Ali (1998) A weighted Combination of Classifiers Employing Shared and Distinct Representation. In: 1998 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE. ISBN 0-8186-8497-6. (doi:10.1109/CVPR.1998.698715) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:27749)

Knight, Edward, Lord, Sam, Arief, Budi (2019) Lock Picking in the Era of Internet of Things. In: Proceedings: 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 835-842. IEEE ISBN 978-1-72812-776-7. (doi:10.1109/TrustCom/BigDataSE.2019.00121) (KAR id:75142)
[img]
Preview

Knight, Richard, Nurse, Jason R. C. (2020) A Framework for Effective Corporate Communication after Cyber Security Incidents. Computers & Security, . ISSN 0167-4048. (doi:10.1016/j.cose.2020.102036) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:82836)
[img]

Kritzinger, Elmarie, Bada, Maria, Nurse, Jason R. C. (2017) A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In: Bishop, Matt and Futcher, Lynn and Miloslavskaya, Natalia and Theocharidou, Marianthi, eds. IFIP Advances in Information and Communication Technology. Information Security Education for a Global Digital Society. 503. pp. 110-120. Springer ISBN 978-3-319-58552-9. (doi:10.1007/978-3-319-58553-6_10) (KAR id:67471)
[img]
Preview

L

Laborde, Romain, Oglaza, Arnaud, Wazan, Ahmad Samer, Barrere, Francois, Benzekri, Abdelmalek, Chadwick, David W., Venant, Remi (2020) A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). . IEEE ISBN 978-1-72813-893-0. E-ISBN 978-1-72813-894-7. (doi:10.1109/CCNC46108.2020.9045440) (KAR id:81365)
[img]
Preview

Laborde, Romain, Oglaza, Arnaud, Wazan, Ahmad Samer, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek, Venant, Remi (2020) Know Your Customer: Opening a new bank account online using UAAF. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). . IEEE ISBN 978-1-72813-893-0. E-ISBN 978-1-72813-893-0. (doi:10.1109/CCNC46108.2020.9045148) (KAR id:80303)
[img]
Preview

Lan, Chunsheng, Ting, Fang, Su, Linying (1993) The introduction to Hospital Office System. Processing and Research of Medical Iinformation, 1 (1). pp. 26-28. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21101)

Legg, Philip A., Moffat, Nick, Nurse, Jason R. C., Happa, Jassim, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:10.22667/JOWUA.2013.12.31.020) (KAR id:67521)
[img]
Preview

Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:71415)
[img]

Li, Shujun and Ho, Anthony T.S. and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. Proceedings of the 2nd International Workshop on Multimedia Privacy and Security. CCS Computer and Communications Security . ACM, New York, USA, pp. 27-37. ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008)
[img]
Preview

Liu, Junjie and Aljaffan, Nouf and Li, Shujun (2018) PassInfinity: A software prototype system. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80287)
[img]

Liu, Shi, Gao, Guanglai, Su, Linying, Wang, Junyi, Hou, Hongxu, Li, Ping (1997) Chinese Windows and general applications. Inner Mongolia University Press, Hohhot, China ISBN 7-81015-754-X/TP.21. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21550)

Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003) (KAR id:69553)
[img]
Preview

Lopes, Raul H. C., Franqueira, Virginia N. L., Hobson, Peter R. (2014) Efficient Computation of Hashes. Journal of Physics: Conference Series, 513 (3). pp. 1-6. (doi:10.1088/1742-6596/513/3/032042) (KAR id:77189)
[img]
Preview

Lopes, Raul H.C., Franqueira, Virginia N.L., Rand, Duncan (2019) Integration and Evaluation of QUIC and TCP-BBR in longhaul Science Data Transfers. EPJ Web Conferences, 214 . Article Number 08026. ISSN 2100-014X. (doi:10.1051/epjconf/201921408026) (KAR id:77164)
[img]
Preview

Lopes, Raul H.C., Franqueira, Virginia N.L., Reid, Ivan D., Hobson, Peter R. (2017) Parallel Monte Carlo Search for Hough Transform. Journal of Physics: Conference Series, 898 . Article Number 72052. ISSN 1742-6588. E-ISSN 1742-6596. (doi:10.1088/1742-6596/898/7/072052) (KAR id:77178)
[img]
Preview

Lopez, Gabriel, Canovas, Oscar, Gomez-Skarmeta, Antonio F., Otenko, Sassa, Chadwick, David W. (2005) A Heterogeneous Network Access Service based on PERMIS and SAML. In: 2nd EuroPKI Workshop, 30 June - 1 July 2005, Canterbury, United Kingdom. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14293)

Lu, Yang, Ioannou, Athina, Tussyadiah, Iis, Li, Shujun (2019) Segmenting travelers based on responses to nudging for information disclosure. e-Review of Tourism Research, 17 (3). pp. 394-406. ISSN 1941-5842. (KAR id:79517)
[img]
Preview

Lu, Yang, Li, Shujun (2020) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Scholar Space. Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA ISBN 978-0-9981331-3-3. (doi:10.24251/HICSS.2020.799) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76648)
[img] [img]

Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 262-276. Springer, Singapore ISBN 978-981-1513-03-9. E-ISBN 978-981-1513-04-6. (doi:10.1007/978-981-15-1304-6_21) (KAR id:76677)
[img]
Preview
[img]

Lu, Yang, Sinnott, Richard O. (2016) Semantic Security for E-Health: A Case Study in Enhanced Access Control. In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). . pp. 407-414. IEEE ISBN 978-1-4673-7212-1. E-ISBN 978-1-4673-7211-4. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.90) (KAR id:80963)
[img]
Preview

Lu, Yang, Sinnott, Richard O. (2016) Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. In: 2016 IEEE Trustcom/BigDataSE/ISPA. . pp. 519-526. IEEE ISBN 978-1-5090-3206-8. E-ISBN 978-1-5090-3205-1. (doi:10.1109/TrustCom.2016.0105) (KAR id:80962)
[img]
Preview

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2017) A Semantic-Based K-Anonymity Scheme for Health Record Linkage. Studies in Health Technology and Informatics, 239 . pp. 84-90. ISSN 0926-9630. (doi:10.3233/978-1-61499-783-2-84) (KAR id:80964)
[img]
Preview

Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2018) Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 348-359. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00060) (KAR id:80961)
[img]
Preview

Lu, Yang, Sinnott, Richard O., Verspoor, Karin, Parampalli, Udaya (2018) Privacy-Preserving Access Control in Electronic Health Record Linkage. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 1079-1090. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00151) (KAR id:80959)
[img]
Preview

M

Ma, Y., Chadwick, David W. (1996) Implementation of a Mechanism in the OSI Directory. Minimicro Systems (China), 17 (7). pp. 5-10. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21305)

MacRae, John and Franqueira, Virginia N.L. (2018) On Locky Ransomware, Al Capone and Brexit. In: Digital Forensics and Cyber Crime 9th International Conference. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications . Springer, Cham, Switzerland, pp. 33-45. ISBN 978-3-319-73696-9. E-ISBN 978-3-319-73697-6. (doi:10.1007/978-3-319-73697-6_3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77176)
[img]

Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253)
[img]
Preview

Mbanaso, Uche and Cooper, G.S. and Chadwick, David W. and Anderson, Anne (2007) Obligations for Privacy and Confidentiality in Distributed Transactions. In: Denko, Mieso K., ed. Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops. Lecture Notes In Computer Science . Springer, Berlin, Germany, pp. 69-81. ISBN 978-3-540-77089-3. E-ISBN 978-3-540-77090-9. (doi:10.1007/978-3-540-77090-9_7) (KAR id:14525)
[img]
Preview

Mbanaso, Uche, Cooper, G.S., Chadwick, David W., Anderson, Anne (2009) Obligations of Trust for Privacy and Confidentiality in Distributed Transactions. Internet Research, 19 (2). pp. 182-196. (doi:10.1108/10662240910952328) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30610)

Mbanaso, Uche and Cooper, G.S. and Chadwick, David W. and Proctor, S. (2006) Privacy Preserving Trust Authorization Framework Using XACML. In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06). IEEE, pp. 673-678. ISBN 0-7695-2593-8. (doi:10.1109/WOWMOM.2006.92) (KAR id:14477)
[img]
Preview

Meruje, Manuel and Samaila, Musa Gwani and Franqueira, Virginia N. L. and Freire, Mario Marques and Inacio, Pedro Ricardo Morais (2018) A Tutorial Introduction to IoT Design and Prototyping with Examples. In: Internet of Things A to Z. John Wiley & Sons, Inc., pp. 153-190. ISBN 978-1-119-45674-2. (doi:10.1002/9781119456735.ch6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77173)
[img]

Migliavacca, Matteo, Papagiannis, Ioannis, Eyers, David M., Shand, Brian, Bacon, Jean, Pietzuch, Peter (2010) DEFCON: high-performance event processing with information security. In: USENIX ATC'10: Proceedings of the 2010 USENIX Annual Technical Conference. . pp. 1-15. USENIX Association, Berkeley, CA, USA (KAR id:31864)
[img]
Preview

Migliavacca, Matteo and Papagiannis, Ioannis and Eyers, David M. and Shand, Brian and Bacon, Jean and Pietzuch, Peter (2010) Distributed Middleware Enforcement of Event Flow Security Policy. In: Gupta, Indrani and Mascolo, Cecilia, eds. Middleware 2010 ACM/IFIP/USENIX 11th International Middleware Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 334-354. ISBN 978-3-642-16954-0. E-ISBN 978-3-642-16955-7. (doi:10.1007/978-3-642-16955-7_17) (KAR id:31862)
[img]
Preview

Mitrokotsa, Aikaterini, Dimitrakakis, Christos, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:10.1109/LCOMM.2010.02.091946) (KAR id:31946)
[img]
Preview

Montrieux, Lionel and de Lemos, Rogerio and Bailey, Christopher (2019) Challenges in Engineering Self-adaptive Authorisation Infrastructures. In: Yu, Y. and Bandara, A. and Honiden, S. and Hu, Z. and Tamai, T. and Muller, H. and Mylopoulos, J. and Nuseibeh, B., eds. Engineering Adaptive Software Systems: Communications of NII Shonan Meetings. Springer, pp. 57-94. ISBN 978-981-1321-85-6. (doi:10.1007/978-981-13-2185-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67031)
[img]

Moura, Ralf, Gonzalez, Alexandre, Franqueira, Virginia N. L., Neto, Antonio, Pessin, Gustavo (2020) A Cyber-Security Strategy for Internationally-dispersed Industrial Networks. In: Proceedings of the 2020 International Conference on Computational Science and Computational Intelligence (CSCI). . IEEE (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:84285)
[img]

Mundy, Darren (2003) Providing a Secure Solution for the Integration of Electronic Prescription Transfer within the United Kingdom National Health Service. In: UKAIS PhD Symposium 2003, University of Warwick, UK. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13997)

Mundy, Darren, Chadwick, David W. (2003) The Benefits in and Barriers towards the Implementation of Electronic Transfer of Prescriptions within the United Kingdom National Health Service. In: 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick, UK. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13900)

Mundy, Darren, Chadwick, David W. (2003) Comparing the Performance of Abstract Syntax Notation One (ASN.1) vs eXtensible Markup Language (XML). In: Terena Networking Conference, Zagreb. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13983)

Mundy, Darren, Chadwick, David W. (2004) Electronic Transmission of Prescriptions - Towards Realising the Dream. International Journal of Electronic Healthcare, 1 (1). pp. 112-125. ISSN 1741-8453. (doi:10.1504/IJEH.2004.004659) (KAR id:14027)
[img]
Preview

Mundy, Darren and Chadwick, David W. (2004) Secure Knowledge Management. In: Wickramasinghe, Nilmini and Gupta, Jatinder N. D. and Sharma, Sushil K., eds. Creating Knowledge Based Health Care Organizations. Idea Publishing Group, pp. 321-337. (KAR id:14208)
[img]
Preview

Mundy, Darren, Chadwick, David W. (2003) Security issues in the electronic transfer of prescriptions. Medical Informatics and the Internet in Medicine, 28 (4). pp. 253-277. ISSN 1463-9238. (doi:10.1080/14639230310001621675) (KAR id:13834)
[img]
Preview

Mundy, Darren, Chadwick, David W. (2002) A System for Secure Electronic Prescription Handling. In: Proc of The Hospital of the Future, Second International Conference On The Management Of Healthcare And Medical Technology, Illinois Institute of Technology, Chicago, Illinois, USA. . (KAR id:13770)
[img]
Preview

Mundy, Darren, Chadwick, David W. (2004) An XML Alternative for Performance and Security: ASN.1. IEEE IT Professional, 6 (1). pp. 30-36. ISSN 1520-9202. (doi:10.1109/MITP.2004.1265540) (KAR id:14031)
[img]
Preview

Mundy, Darren, Chadwick, David W., Ball, E. (2003) An Application Programming Interface for the Electronic Transmission of Prescriptions. In: Proceedings of the International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmeaunu, Germany, May 22-24 2003. . pp. 27-38. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13975)

Mundy, Darren, Chadwick, David W., Ball, E. (2004) Some expectations and perceptions of electronic transfer of prescription systems. British Journal of Health Care Computing and Information Management, March 2004, 22 (2). pp. 34-38. (KAR id:14198)
[img]
Preview

Mundy, Darren, Chadwick, David W., Ball, E., Marsden, Paul K., Bell, C., Whatley, J.E, Sobreperez, P., New, John (2003) Towards Electronic Transfer of Prescriptions (ETP) in the United Kingdom National Health Service - Stakeholder Evaluation of ETP Pilots. In: 3rd International Conference on The Management of Healthcare and Medical Technology, Warwick. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13909)

Mutawa, Noora Al, Bryce, Joanne, Franqueira, Virginia N.L., Marrington, Andrew (2016) Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis. Digital Investigation, 16 . S96-S103. ISSN 1742-2876. (doi:10.1016/j.diin.2016.01.012) (KAR id:77181)
[img]
Preview

Mutawa, Noora Al, Bryce, Joanne, Franqueira, Virginia N.L., Marrington, Andrew, Read, Janet C. (2019) Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes. Digital Investigation, 28 . pp. 70-82. ISSN 1742-2876. (doi:10.1016/j.diin.2018.12.003) (KAR id:77169)
[img]
Preview
[img]

N

Nadeem, Muhammad Shahroz, Franqueira, Virginia N. L., Kurugollu, Fatih, Zhai, Xiaojun (2019) WVD: A New Synthetic Dataset for Video-based Violence Detection. In: Bramer, Max and Petridis, Miltos, eds. Lecture Notes in Artificial Intelligence. Artificial Intelligence XXXVI: 39th SGAI International Conference on Artificial Intelligence, AI 2019, Cambridge, UK, December 17–19, 2019, Proceedings. 11927. pp. 158-164. Springer ISBN 978-3-030-34884-7. (doi:10.1007/978-3-030-34885-4_13) (KAR id:77170)
[img]
Preview

Nadeem, Muhammad Shahroz and Franqueira, Virginia N. L. and Zhai, Xiaojun (2019) Privacy Verification of PhotoDNA Based on Machine Learning. In: Security and Privacy for Big Data, Cloud Computing and Applications. IET, pp. 263-280. E-ISBN 978-1-78561-748-5. (doi:10.1049/PBPC028E_ch12) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77165)
[img]

Nadeem, Muhammad Shahroz, Franqueira, Virginia N.L., Zhai, Xiaojun, Kurugollu, Fatih (2019) A Survey of Deep Learning Solutions for Multimedia Visual Content Analysis. IEEE Access, 7 . pp. 84003-84019. ISSN 2169-3536. (doi:10.1109/access.2019.2924733) (KAR id:77168)
[img]
Preview

Nguyen, Tuan Anh and Chadwick, David W. and Nasser, Bassem (2007) Recognition of Authority in Virtual Organisations. In: Trust, Privacy and Security in Digital Business 4th International Conference. Lecture Notes In Computer Science . Springer, Berlin, Germany, pp. 3-13. ISBN 978-3-540-74408-5. E-ISBN 978-3-540-74409-2. (doi:10.1007/978-3-540-74409-2_3) (KAR id:14542)
[img]
Preview

Nguyen, Tuan Anh and Su, Linying and Inman, George and Chadwick, David W. (2007) Flexible and Manageable Delegation of Authority in RBAC. In: 21st International Conference on Advanced Information Networking and Applications Workshops. IEEE, pp. 453-458. ISBN 978-0-7695-2847-2. (doi:10.1109/AINAW.2007.187) (KAR id:14589)
[img]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2015) Identifying Key-Players in Online Activist Groups on Facebook Social Network. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 14-17 November 2015, Atlantic City, NJ, USA. (doi:10.1109/ICDMW.2015.88) (KAR id:67500)
[img]
Preview
[img]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2017) Towards Designing a Multipurpose Cybercrime Intelligence Framework. In: Brynielsson, Joel and Johansson, Fredrik, eds. 2016 European Intelligence and Security Informatics Conference (EISIC 2016). . IEEE ISBN 978-1-5090-2858-0. E-ISBN 978-1-5090-2857-3. (doi:10.1109/EISIC.2016.018) (KAR id:67483)
[img]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2019) Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. In: 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). 17th IEEE International Conference on Intelligence and Security Informatics (ISI). . IEEE (doi:10.1109/ISI.2019.8823548) (KAR id:73926)
[img]
Preview

Nouh, Mariam, Nurse, Jason R. C., Webb, Helena, Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society (KAR id:71674)
[img]
Preview

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69500)
[img]

Nurse, Jason R. C. (2013) Effective Communication of Cyber Security Risks. In: 7th International Scientific Conference on Security and Protection of Information (SPI 2013). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67525)

Nurse, Jason R. C. (2015) Exploring the risks to identity security and privacy in cyberspace. XRDS: Crossroads, The ACM Magazine, 21 (3). pp. 42-47. ISSN 1528-4972. E-ISSN 1528-4980. (doi:10.1145/2730912) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67507)
[img]

Nurse, Jason R. C., Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2013) Building Confidence in Information-Trustworthiness Metrics for Decision Support. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. . IEEE E-ISBN 978-0-7695-5022-0. (doi:10.1109/TrustCom.2013.6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67524)
[img]

Nurse, Jason R. C., Agrafiotis, Ioannis, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2013) Communicating Trustworthiness using Radar Graphs: A Detailed Look. In: 2013 Eleventh Annual Conference on Privacy, Security and Trust. . IEEE E-ISBN 978-1-4673-5839-2. (doi:10.1109/PST.2013.6596085) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67523)
[img]

Nurse, Jason R. C., Agrafiotis, Ioannis, Erola, Arnau, Bada, Maria, Roberts, Taylor, Williams, Meredydd, Goldsmith, Michael, Creese, Sadie (2017) An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. In: Tryfonas, Theo, ed. Lecture Notes in Computer Science. Human Aspects of Information Security, Privacy and Trust. HAS 2017. 10292. Springer ISBN 978-3-319-58459-1. (doi:10.1007/978-3-319-58460-7_26) (KAR id:67478)
[img]
Preview

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. Working paper. University of Oxford (KAR id:67481)
[img]
Preview

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2015) Information trustworthiness as a solution to the misinformation problems in social media. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67506)
[img]

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2014) Managing the influence of social media using information trust. In: Social Influence in the Information Age Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67517)

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness. Journal of Trust Management, 2 (10). E-ISSN 2196-064X. (doi:10.1186/s40493-015-0021-5) (KAR id:67501)
[img]
Preview

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2014) Two sides of the coin: measuring and communicating the trustworthiness of online information. Journal of Trust Management, 1 (5). E-ISSN 2196-064X. (doi:10.1186/2196-064X-1-5) (KAR id:67516)
[img]
Preview

Nurse, Jason R. C., Atamli, Ahmad, Martin, Andrew (2016) Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. In: Human Aspects of Information Security, Privacy, and Trust. 4th International Conference, HAS 2016,. the Lecture Notes in Computer Science . pp. 255-267. Springer, Switzerland ISBN 978-3-319-39380-3. E-ISBN 978-3-319-39381-0. (doi:10.1007/978-3-319-39381-0_23) (KAR id:67497)
[img]
Preview

Nurse, Jason R. C., Axon, Louise, Erola, Arnau, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2020) The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). . IEEE (doi:10.1109/CyberSA49311.2020.9139703) (KAR id:80965)
[img]
Preview

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.36) (KAR id:69501)
[img]
Preview

Nurse, Jason R. C., Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:10.22667/JOWUA.2017.03.31.001) (KAR id:67469)
[img]
Preview

Nurse, Jason R. C., Buckley, Oliver (2017) Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem. Human-centric Computing and Information Sciences, 7 . Article Number 40. E-ISSN 2192-1962. (doi:10.1186/s13673-017-0121-6) (KAR id:75294)
[img]
Preview

Nurse, Jason R. C., Buckley, Oliver, Legg, Philip A., Goldsmith, Michael, Creese, Sadie, Wright, Gordon R.T., Whitty, Monica (2014) Understanding Insider Threat: A Framework for Characterising Attacks. In: 2014 IEEE Security and Privacy Workshops. . IEEE E-ISBN 978-1-4799-5103-1. (doi:10.1109/SPW.2014.38) (KAR id:67518)
[img]
Preview

Nurse, Jason R. C., Creese, Sadie, De Roure, David (2017) Security risk assessment in Internet of Things systems. IEEE IT Professional (IT Pro), 19 (5). pp. 20-26. ISSN 1520-9202. E-ISSN 1941-045X. (doi:10.1109/MITP.2017.3680959) (KAR id:67476)
[img]
Preview

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael (2013) At the Crossroads: Cybersecurity and Psychology. In: Annual Cyberpsychology Conference. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67522)

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Craddock, Rachel, Jones, Glyn (2012) An Initial Usability Evaluation of the Secure Situation Awareness System. In: The 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012). (KAR id:67531)
[img]
Preview

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Guidelines for Usable Cybersecurity: Past and Present. In: 2011 Third International Workshop on Cyberspace Safety and Security (CSS). 2011 Third International Workshop on Cyberspace Safety and Security (CSS). . pp. 21-26. IEEE ISBN 978-1-4577-1034-6. E-ISBN 978-1-4577-1035-3. (doi:10.1109/CSS.2011.6058566) (KAR id:67535)
[img]
Preview

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Trustworthy and Effective Communication of Cybersecurity Risks: A Review. In: The 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) at The 5th International Conference on Network and System Security (NSS 2011). (doi:10.1109/STAST.2011.6059257) (KAR id:67534)
[img]
Preview

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2012) Using Information Trustworthiness Advice in Decision-Making. In: 2012 Workshop on Socio-Technical Aspects in Security and Trust. . pp. 35-42. IEEE ISBN 978-1-4673-2748-0. (doi:10.1109/STAST.2012.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67529)
[img]

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Rahman, Syed S. (2013) Supporting Human Decision-Making Online using Information Trustworthiness Metrics. In: HAS 2013: Human Aspects of Information Security, Privacy, and Trust. . pp. 316-325. Springer ISBN 978-3-642-39344-0. E-ISBN 978-3-642-39345-7. (doi:10.1007/978-3-642-39345-7_33) (KAR id:67526)
[img]
Preview

Nurse, Jason R. C., Erola, Arnau, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. In: 2015 International Workshop on Secure Internet of Things (SIoT). . pp. 5-14. IEEE E-ISBN 978-1-4673-7769-0. (doi:10.1109/SIOT.2015.10) (KAR id:67502)
[img]
Preview

Nurse, Jason R. C., Erola, Arnau, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie (2016) Analytics for characterising and measuring the naturalness of online personae. Security Informatics Journal, 5 (3). Article Number 3. ISSN 2190-8532. (doi:10.1186/s13388-016-0028-1) (KAR id:67486)
[img]
Preview

Nurse, Jason R. C., Erola, Arnau, Goldsmith, Michael, Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:10.22667/JISIS.2015.02.31.070) (KAR id:67510)
[img]
Preview

Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Technology and information trust for supporting risky decisions based on social-media content. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. . pp. 461-468. IEEE E-ISBN 978-1-5090-0154-5. (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.66) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67503)
[img]

Nurse, Jason R. C., Legg, Philip A., Buckley, Oliver, Agrafiotis, Ioannis, Wright, Gordon, Whitty, Monica, Upton, David, Goldsmith, Michael, Creese, Sadie (2014) A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches. In: HAS 2014: Human Aspects of Information Security, Privacy, and Trust. . Springer ISBN 978-3-319-07619-5. E-ISBN 978-3-319-07620-1. (doi:10.1007/978-3-319-07620-1_24) (KAR id:67519)
[img]
Preview

Nurse, Jason R. C., Pumphrey, Jess, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie (2014) Inferring Social Relationships from Technology-Level Device Connections. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust. . 40 - 47. IEEE ISBN 978-1-4799-3502-4. E-ISBN 978-1-4799-3503-1. (doi:10.1109/PST.2014.6890922) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67515)
[img]

Nurse, Jason R. C., Rahman, Syed Sadiqur, Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Information Quality and Trustworthiness: A Topical State-of-the-Art Review. In: The International Conference on Computer Applications and Network Security (ICCANS) 2011. (KAR id:67536)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business. In: 2009 Fourth International Conference on Internet and Web Applications and Services. IEEE. ISBN 978-1-4244-3851-8. (doi:10.1109/ICIW.2009.48) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67543)

Nurse, Jason R. C. and Sinclair, Jane E. (2011) A Case Study Analysis of an E-Business Security Negotiations Support Tool. In: Electrical Engineering and Applied Computing. Lecture Notes in Electrical Engineering, 90 . Springer. (doi:10.1007/978-94-007-1192-1_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67533)

Nurse, Jason R. C., Sinclair, Jane E. (2010) Evaluating the Compatibility of a Tool to Support E-Businesses' Security Negotiations. In: International Conference of Information Security and Internet Engineering, under World Congress on Engineering (WCE 2010). (KAR id:67539)
[img]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2010) An Evaluation of BOF4WSS and the Security Negotiations Model and Tool used to Support it. International Journal On Advances in Security, 3 (3&). (KAR id:67538)
[img]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2009) Securing e-Businesses that use Web Services - a Guided Tour Through BOF4WSS. International Journal on Advances in Internet Technology, 2 (4). (KAR id:67541)
[img]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2010) A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations. In: 5th International Conference on Internet and Web Applications and Services (ICIW 2010). (doi:10.1109/ICIW.2010.10) (KAR id:67540)
[img]
Preview

Nurse, Jason R. C. and Sinclair, Jane E. (2009) Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development. In: Business Information Systems. Lecture Notes in Business Information Processing, 21 . Springer-Verlag. (doi:10.1007/978-3-642-01190-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:67542)

Nurse, Jason R. C., Sinclair, Jane E. (2010) A Thorough Evaluation of the Compatibility of an E-Business Security Negotiations Support Tool. International Journal of Computer Science, 37 (4). (KAR id:67537)
[img]
Preview

Nurse, Jason R. C., Sinclair, Jane E. (2012) Towards A Model to Support the Reconciliation of Security Actions across Enterprises. In: The 2nd Workshop on Socio-Technical Aspects in Security and Trust (STAST 2012) at The 25th IEEE Computer Security Foundations Symposium (CSF). (doi:10.1109/STAST.2012.11) (KAR id:67530)
[img]
Preview

Nurse, Jason R.C. and Radanliev, Petar and Creese, Sadie and De Roure, David (2018) If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0001) (KAR id:67466)
[img]
Preview

O

Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002) (KAR id:69562)
[img]
Preview

Onions, Robert, Chadwick, David W. (2004) Small and medium enterprises at risk in the United Kingdom. In: Digital Accounting Research Conference, Facultad De Ciencias Empresariales, University Of Huelva, 11 Plaza De La Merced, Huelva (Spain). . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14071)

Owen, Gareth (2007) A Self-Organising Distributed Location Server for Ad Hoc Networks. Doctor of Philosophy (PhD) thesis, University of Portsmouth. (KAR id:14530)
[img]
Preview

Owen, Gareth, Adda, Mo (2008) Storing Data in Ad Hoc Networks. In: International Conference on Challenges in Higher Education and Research in the 21st Century. 6. Heron Press Sofia, Bulgaria ISBN 978-954-580-247-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:24067)

P

Palomar, Esther, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31955)
[img]

Papagiannis, Ioannis, Migliavacca, Matteo, Eyers, David M., Shand, Brian, Bacon, Jean, Pietzuch, Peter (2010) Enforcing user privacy in web applications using Erlang. In: W2SP 2010: Web 2.0 security and privacy 2010, May 20th, 2010, The Claremont Resort, Oakland, California. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31872)
[img]

Papagiannis, Ioannis and Migliavacca, Matteo and Pietzuch, Peter (2011) PHP Aspis: using partial taint tracking to protect against injection attacks. In: WebApps'11 Proceedings of the 2nd USENIX conference on Web application development. USENIX Association, Berkeley, California, USA, pp. 13-24. ISBN 978931971867. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31861)
[img]

Pawar, Pramod and Sajjad, Ali and Chadwick, David W. and Dimitrakos, Theo (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments. In: Trust Management IX. IFIP Advances in Information and Communication Technology . Springer International Publishing, Hamburg, Germany, pp. 251-261. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_21) (KAR id:56874)
[img]
Preview

Pawar, Pramod, Sajjad, Ali, Dimitrakos, Theo, Chadwick, David W. (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. In: Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology (1). pp. 251-261. Springer International Publishing ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3) (KAR id:48730)
[img]
Preview

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31952)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31951)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31953)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., Li, Tieyan, Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31945)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31943)
[img]

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:10.1587/transinf.E93.D.518) (KAR id:31947)
[img]
Preview

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C., Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31950)
[img]

Peris-Lopez, Pedro, Orfila, Agustin, Hernandez-Castro, Julio C., van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31944)
[img]

Peris-Lopez, Pedro, Orfila, Agustin, Palomar, Esther, Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31942)
[img]

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67512)
[img]

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Extracting Social Structure from DarkWeb Forums. In: 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67504)
[img]

Picazo Sanchez, Pablo, Martin, Lara, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45300)
[img]

Polimon, Javier, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (KAR id:31960)
[img]
Preview

Pont, Jamie, Abu Oun, Osama, Brierley, Calvin, Arief, Budi, Hernandez-Castro, Julio C. (2019) A Roadmap for Improving the Impact of Anti-Ransomware Research. In: Askarov, Aslan and Hansen, René Rydhof and Rafnsson, Willard, eds. Lecture Notes in Computer Science. Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. 11875. Springer ISBN 978-3-030-35054-3. (doi:10.1007/978-3-030-35055-0_9) (KAR id:76942)
[img]
Preview

Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Iterated gate teleportation and blind quantum computation. Physical Review Letters: Moving Physics Forward, 114 (22). p. 220502. ISSN 0031-9007. E-ISSN 1079-7114. (doi:10.1103/PhysRevLett.114.220502) (KAR id:58146)
[img]
Preview

Pérez-Delgado, Carlos A, Perez-Gonzalez, Hector G (2020) Towards a Quantum Software Modeling Language. In: ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops. . pp. 442-444. ACM, New York, USA ISBN 978-1-4503-7963-2. (doi:10.1145/3387940.3392183) (KAR id:80774)
[img]
Preview

R

Radanliev, Petar, De Roure, David, Nurse, Jason R. C., Montalvo, Rafael Mantilla, Cannady, Stacy, Santos, Omar, Madox, La'Treall, Burnap, Peter, Maple, Carsten (2020) Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Applied Sciences, 2 . Article Number 169. ISSN 2523-3971. E-ISSN 2523-3971. (doi:10.1007/s42452-019-1931-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:79403)
[img]

Radanliev, Petar and De Roure, David and Nurse, Jason R.C. and Nicolescu, Razvan and Huth, Michael and Cannady, Stacy and Montalvo, Rafael Mantilla (2018) Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0041) (KAR id:67464)
[img]
Preview

Radanliev, Petar, De Roure, David, Page, Kevin, Nurse, Jason R. C., Montalvo, Rafael Mantilla, Santos, Omar, Maddox, La'Treall, Burnap, Peter (2020) Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity, . E-ISSN 2523-3246. (doi:10.1186/s42400-020-00052-8) (KAR id:81278)
[img]
Preview

Rashid, Tabish, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models. In: MIST '16: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. CCS Computer and Communications Security . pp. 47-56. ACM, New York, USA ISBN 978-1-4503-4571-2. (doi:10.1145/2995959.2995964) (KAR id:67482)
[img]
Preview

Roberts, David L., Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:10.1017/S0030605317000679) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:62140)
[img]

Rossebø, Judith E. Y., Houmb, Siv Hilde, Georg, Geri, Franqueira, Virginia N. L., Serpanos, Dimitrios (2014) Introduction to Special Issue on Risk and Trust in Embedded Critical Systems. ACM Transactions on Embedded Computing Systems, 13 (5S). Article Number 152. ISSN 1539-9087. E-ISSN 1558-3465. (doi:10.1145/2659008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77190)
[img]

S

Safkhani, Masoumeh, Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Bagheri, Nasour (2014) Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics, 259 (Pt B). pp. 571-577. ISSN 0377-0427. (doi:10.1016/j.cam.2013.09.073) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45298)
[img]

Sajjad, Ali, Rajarajan, Muttukrishnan, Zisman, Andrea, Dimitrakos, Theo (2015) A scalable and dynamic application-level secure communication framework for inter-cloud services. Future Generation Computer Systems, 48 . pp. 19-27. ISSN 0167-739X. (doi:10.1016/j.future.2015.01.018) (KAR id:58311)
[img]
Preview

Sandoval Orozco, A.L., Arenas Gonzalez, David Manuel, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58385)
[img]

Sandoval Orozco, A.L., Arenas, Gonzalez, Rosales, Corripio, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:10.1007/s00607-013-0313-5) (KAR id:45306)
[img]
Preview

Sağlam, Rahime Belen, Aslan, Çağrı B., Li, Shujun, Dickson, Lisa, Pogrebna, Ganna (2020) A Data-Driven Analysis of Blockchain Systems' Public Online Communications on GDPR. In: Proceedings of 2020 2nd IEEE International Conference on Decentralized Applications and Infrastructures. . pp. 22-31. IEEE ISBN 978-1-72817-022-0. (doi:10.1109/DAPPS49028.2020.00003) (KAR id:81277)
[img]
Preview

Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74214)
[img]

Sedgewick, Peter E. and de Lemos, Rogério (2018) Self-adaptation made easy with Blockchains. In: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems. ICSE International Conference on Software Engineering . ACM, New York, USA. ISBN 978-1-4503-5715-9. (doi:10.1145/3194133.3194150) (KAR id:66569)
[img]
Preview

Sette, Ioram S., Chadwick, David W., Ferraz, Carlos A. G. (2017) Authorization Policy Federation in Heterogeneous Multicloud Environments. IEEE Cloud Computing, 4 (4). pp. 38-47. ISSN 2325-6095. (doi:10.1109/MCC.2017.3791018) (KAR id:64214)
[img]
Preview

Shere, Anjuli R. K. and Nurse, Jason R. C. and Flechais, Ivan (2020) Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE. ISBN 978-1-72818-598-9. E-ISBN 978-1-72818-597-2. (doi:10.1109/EuroSPW51379.2020.00039) (KAR id:80999)
[img]
Preview

Shi, Leilei and Chadwick, David W. (2011) A controlled natural language interface for authoring access control policies. In: Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, New York, USA, pp. 1524-1530. ISBN 978-1-4503-0113-8. (doi:10.1145/1982185.1982510) (KAR id:31980)
[img]

Shi, Na, Tan, Liang, Yang, Ciaxia, He, Chen, Xu, Junli, Lu, Yang, Xu, Hao (2020) BacS: A blockchain-based access control scheme in distributed internet of things. Peer-to-Peer Networking and Applications, . ISSN 1936-6442. E-ISSN 1936-6450. (doi:10.1007/s12083-020-00930-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:81701)
[img]

Sinnott, Richard O., Chadwick, David W. (2004) Experiences of Using the GGF SAML AuthZ Interface. In: Proceedings of the UK e-Science All Hands Meeting. . , Nottingham, UK (KAR id:14087)
[img]
Preview

Sinnott, Richard O. and Chadwick, David W. and Doherty, T. and Martin, D. and Stell, A.J. and Stewart, G. and Su, Linying and Watt, J. (2008) Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security Models. In: 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID). IEEE, pp. 106-113. ISBN 978-1-4244-4237-9. (doi:10.1109/CCGRID.2008.67) (KAR id:24029)
[img]
Preview

Sinnott, Richard O. and Chadwick, David W. and Koetsier, J. and Otenko, O. and Watt, J. and Nguyen, Tuan Anh (2006) Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid. In: 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06). International Conference on e-Science and Grid Computing . IEEE, p. 22. ISBN 0-7695-2734-5. (doi:10.1109/E-SCIENCE.2006.261106) (KAR id:14386)
[img]
Preview

Sinnott, Richard O. and Stell, A.J. and Chadwick, David W. and Otenko, O. (2005) Experiences of Applying Advanced Grid Authorisation Infrastructures. In: Advances in Grid Computing - EGC 2005 European Grid Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 265-274. ISBN 978-3-540-26918-2. E-ISBN 978-3-540-32036-4. (doi:10.1007/11508380_28) (KAR id:14357)
[img]
Preview

Sinnott, Richard O., Stell, A.J., Watt, J., Chadwick, David W. (2006) Advanced Security Infrastructures for Grid Education. In: Proceedings of the 10th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2006. . (KAR id:14447)
[img]
Preview

Sirur, Sean, Nurse, Jason R. C., Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS). CCS Computer and Communications Security . pp. 88-95. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267368) (KAR id:68765)
[img]
Preview

Sloan, Tom, Hernandez-Castro, Julio (2018) Dismantling OpenPuff PDF steganography. Digital Investigation, 25 . pp. 90-96. ISSN 1742-2876. (doi:10.1016/j.diin.2018.03.003) (KAR id:67242)
[img]
Preview

Sturgess, Jack and Nurse, Jason R.C. and Zhao, Jun (2018) A capability-oriented approach to assessing privacy risk in smart home ecosystems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET. E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0037) (KAR id:67465)
[img]
Preview

Su, Linying (1996) Adaptiveimage retrieve based on coocurrence matrix. Journal of Inner Mongolia University, 27 (1). pp. 123-128. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21413)

Su, Linying (1989) Test-questions Data base and Automatic Assembling and Composing. Journal of Inner Mongolia University, 20 (2). pp. 284-288. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20952)

Su, Linying (1993) An interface to dBASE-III in Natural Language. Journal of Inner Mongoliar University, 24 (2). pp. 213-224. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21130)

Su, Linying (1999) The plane footprints inspection in computer. Journal of Inner Mongolia University, 29 (3). pp. 434-438. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21865)

Su, Linying and Chadwick, David W. and Basden, Andrew and Cunningham, James (2005) Automated Decomposition of Access Control Policies. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05). IEEE, pp. 3-13. ISBN 0-7695-2265-3. (doi:10.1109/POLICY.2005.10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14312)

Su, Linying, Ji, Xiulan, Guo, Liling, Lu, Xiaoling (1993) The implementation of Computer Based Nursing System. Processing and Research of Medical Iinformation, 1 (1). pp. 24-26. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21106)

Su, Linying and Sharp, Bernadette and Chibelushi, Claude (2002) Knowledge-based image understanding: A rule-based production system for X-ray segmentation. In: Proceedings of the International Conference on Enterprise Information Systems (ICEIS 02). ICEIS Press, Portugal, pp. 530-533. ISBN 972-98050-6-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13809)

Su, Linying and Sharp, Bernadette and Chibelushi, Claude (2003) Spatial reasoning with multiple knowledge sources in image understanding. In: Simak, Boris and Zahradnik, Pavel, eds. Proceedings of the 10th International Workshop on Systems, Signals and Image Processing. Sdelovaci Technika, pp. 250-253. ISBN 80-86645-05-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:13911)

Su, Linying and Sharp, Bernadette and Davis, Darryl N. (1999) Neural Networks for X-ray image segmentation. In: Proceedings of the First International Conference on Enterprise Information Systems. Escola superior de tecnologia, Portugal, pp. 264-271. ISBN 978-972-98050-0-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21864)

Sun, Bo, Lu, Yang, Hu, Xiaoyan (2013) An interactive tool for teaching right management in 3D e-learning platform. In: Proceedings of the 12th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry. . pp. 313-316. Association for Computing Machinery, New York, NY, United States ISBN 978-1-4503-2590-5. (doi:10.1145/2534329.2534368) (KAR id:80975)
[img]
Preview

T

Tapiador, Juan E., Hernandez-Castro, Julio C., Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31939)
[img]

Tripp, Gerald (2010) Regular expression matching using associative memory. Technical report. , Canterbury, Kent. CT2 7NF. UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30619)

Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22) (KAR id:71418)
[img]
Preview

V

Vu, Quang, Colombo, Maurizio, Asal, Rasool, Sajjad, Ali, El-Moussa, Fadi Ali, Dimitrakos, Theo (2015) Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. In: Communications and Network Security (CNS), 2015 IEEE Conference on. . pp. 638-642. (doi:10.1109/CNS.2015.7346879) (KAR id:50845)
[img]
Preview

van Rensburg, Alastair Janse, Nurse, Jason R. C., Goldsmith, Michael (2016) Attacker-Parametrised Attack Graphs. In: The Tenth International Conference on Emerging Security Information, Systems and Technologies, July 24th-28th 2016, France Nice. (KAR id:67490)
[img]
Preview

W

Wang, Hui and Ho, Anthony T.S. and Li, Shujun (2021) OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. In: Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 243-260. ISBN 978-3-030-66503-6. E-ISBN 978-3-030-66504-3. (doi:10.1007/978-3-030-66504-3_15) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:84857)
[img]

Wang, Xinming and Zhao, Gansen and Zhang, Xin and Jin, Beihong (2005) An Agent-Based Model For Web Services Transaction Processing. In: 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service. IEEE. ISBN 0-7695-2274-2. (doi:10.1109/EEE.2005.30) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14349)

Wang, Zichi, Li, Shujun, Zhang, Xinpeng (2019) Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access, 7 . pp. 168914-168921. ISSN 2169-3536. (doi:10.1109/ACCESS.2019.2955113) (KAR id:79178)
[img]
Preview

Watt, John and Sinnott, Richard O. and Inman, George and Chadwick, David (2011) Federated Authentication and Authorisation in the Social Science Domain. In: 2011 Sixth International Conference on Availability, Reliability and Security. IEEE, pp. 541-548. ISBN 978-1-4577-0979-1. (doi:10.1109/ARES.2011.83) (KAR id:31978)
[img]
Preview

Wazan, Ahmad Samer and Laborde, Romain and Barrere, Fran\cois and Benzekri, Abdelmalek and Chadwick, David W (2013) PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm. In: Information Assurance and Security Education and Training. Springer Berlin Heidelberg, pp. 68-82. (KAR id:43209)
[img]
Preview

Wazan, Ahmad Samer and Laborde, Romain and Chadwick, David W. and Barrere, Francois and Benzekri, Abdelmalek (2016) How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN). IEEE, pp. 531-534. ISBN 978-1-5090-2055-3. E-ISBN 978-1-5090-2054-6. (doi:10.1109/LCN.2016.85) (KAR id:62570)
[img]
Preview

Wazan, Ahmad Samer, Laborde, Romain, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek (2017) TLS Connection Validation by Web Browsers: Why do Web Browsers still not agree? In: Compsac -New York-. 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). . Institute of Electrical and Electronics Engineers (IEEE) ISBN 978-1-5386-0367-3. (doi:10.1109/COMPSAC.2017.240) (KAR id:62572)
[img]
Preview

Wazan, Ahmad Samer, Laborde, Romain, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek, Habbal, Abid M.M., Kaiiali, Mustafa (2017) Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Security and Communication Networks, 2017 (690714). pp. 1-23. ISSN 1939-0114. E-ISSN 1939-0122. (doi:10.1155/2017/6907146) (KAR id:60311)
[img]
Preview

Wei, Yun-gang, Lu, Yang, Hu, Xiaoyan, Sun, Bo (2013) Research and Application of Access Control Technique in 3D Virtual Reality System OpenSim. In: 2013 Sixth International Symposium on Computational Intelligence and Design. . pp. 65-68. IEEE E-ISBN 978-0-7695-5079-4. (doi:10.1109/ISCID.2013.130) (KAR id:80976)
[img]
Preview

Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810) (KAR id:74278)
[img]
Preview

Williams, Meredydd, Axon, Louise, Nurse, Jason R. C., Creese, Sadie (2016) Future scenarios and challenges for security and privacy. In: IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy. (doi:10.1109/RTSI.2016.7740625) (KAR id:67487)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C. (2016) Optional data disclosure and the online privacy paradox: A UK perspective. In: Fourth International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 18th International Conference on Human?Computer Interaction (HCI)., July 17-22, Toronto, ON, Canada,. (doi:10.1007/978-3-319-39381-0_17) (KAR id:67491)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C. (2016) Perspectives on privacy in the use of online systems. In: Electronic Workshops in Computing. Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI 2016). . pp. 1-3. BCS (doi:10.5555/3114770.3114797) (KAR id:67484)
[img]
Preview
[img]
Preview

Williams, Meredydd and Nurse, Jason R. C. and Creese, Sadie (2017) Privacy Salience: Taxonomies and Research Opportunities. In: Lehmann, Anja and Whitehouse, Diane and Fischer-Hübner, Simone and Fritsch, Lothar and Raab, Charles, eds. Privacy and Identity Management. Facing up to Next Steps. IFIP Advances in Information and Communication Technology . Springer, pp. 263-278. ISBN 978-3-319-55782-3. (doi:10.1007/978-3-319-55783-0_18) (KAR id:67477)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2017) Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things. In: 15th International Conference on Privacy‚ Security and Trust (PST), August 28-30, 2017, Calgary, canada. (KAR id:67472)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2019) (Smart)Watch Out! Encouraging Privacy-Protective Behavior through Interactive Games. International Journal of Human-Computer Studies, 132 . pp. 127-137. ISSN 1071-5819. (doi:10.1016/j.ijhcs.2019.07.012) (KAR id:75624)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2019) Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Computers in Human Behavior, 99 . pp. 38-54. ISSN 0747-5632. (doi:10.1016/j.chb.2019.04.026) (KAR id:73887)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2016) The perfect storm: The privacy paradox and the Internet-of-Things. In: 11th International Conference on Availability‚ Reliability and Security (ARES 2016), 31 Aug.-2 Sept. 2016, Salzburg, Austria. (doi:10.1109/ARES.2016.25) (KAR id:67485)
[img]
Preview

Williams, Meredydd, Yao, Kelvin, Nurse, Jason R. C. (2017) ToARist: An Augmented Reality Tourism App created through User-Centred Design. In: Electronic Workshops in Computing. Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017). . BCS ISBN 14779358. (doi:10.14236/ewic/HCI2017.1) (KAR id:67475)
[img]
Preview

Wilson, Michael, Arenas, Alvaro, Chadwick, David W., Dimitrakos, Theo, Doser, Jurgen, Giambiagi, Pablo, Golby, David, Geuer-Pollman, Christian, Haller, Jochen, Ketil, Stølen and others. (2006) The TrustCoM approach to enforcing agreements between interoperating enterprises. In: Interoperability for Enterprise Software and Applications Conference (I-ESA'06). . pp. 365-375. , Bordeaux, France (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14497)

Woods, Daniel, Agrafiotis, Ioannis, Nurse, Jason R. C., Creese, Sadie (2017) Mapping the Coverage of Security Controls in Cyber Insurance Proposal Forms. Journal of Internet Services and Applications, 8 (8). ISSN 1867-4828. (doi:10.1186/s13174-017-0059-y) (KAR id:67473)
[img]
Preview

Wu, Tina, Nurse, Jason R. C. (2015) Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. Journal of Digital Forensics, Security and Law, 10 (4). pp. 79-96. ISSN 1558-7215. (KAR id:67499)
[img]
Preview

X

Xu, Wensheng, Chadwick, David W., Otenko, Sassa (2005) Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. In: 2nd EuroPKI Workshop, 30 June - 1 July 2005, Canterbury, United Kingdom. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14295)

Xu, Wensheng, Chadwick, David W., Otenko, Sassa (2005) A PKI Based Secure Audit Web Server. In: IASTED Communications, Network and Information and CNIS. . , Phoenix, USA (KAR id:14230)
[img]
Preview

Xu, Yan, Wang, Ming, Zhong, Hong, Cui, Jie, Liu, Lu, Franqueira, Virginia N.L. (2017) Verifiable Public Key Encryption Scheme with Equality Test in 5G Networks. IEEE Access, 5 . pp. 12702-12713. ISSN 2169-3536. (doi:10.1109/ACCESS.2017.2716971) (KAR id:77180)
[img]
Preview

Y

Yadav, Poonam, Feraudo, Angelo, Arief, Budi, Shahandashti, Siamak F., Vassilakis, Vassilios G. (2020) A systematic framework for categorising IoT device fingerprinting mechanisms. In: 2nd Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things (AIChallengeIoT 2020), 16 November 2020, online. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:84210)
[img]

Yan, Li, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2014) Limitations on information-theoretically-secure quantum homomorphic encryption. Physical Review A, 90 (5). Article Number 050303. ISSN 2469-9926. E-ISSN 2469-9934. (doi:10.1103/PhysRevA.90.050303) (KAR id:58149)
[img]
Preview

Yang, Shanshan, Joy, Mike S., Nurse, Jason R. C. (2011) Experiences on Sharing E-Learning Resources using Service Technologies. In: 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011). (doi:10.2316/P.2011.734-060) (KAR id:67532)
[img]
Preview

Young, Andrew J., Chadwick, David W., New, John (2001) Providing secure remote access to legacy applications. IEE Computing and Control Engineering Journal, 12 (4). pp. 148-156. ISSN 0956-3385. (KAR id:13581)
[img]
Preview

Young, Andrew J. and Kapidzic Cicovic, Nada and Chadwick, David W. (1997) Trust Models in ICE-TEL. In: Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security. IEEE, pp. 122-133. ISBN 0-8186-7767-8. (doi:10.1109/NDSS.1997.579230) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:21535)

Yu, Yijun, Franqueira, Virginia N. L., Tun, Thein Than, Wieringa, Roel J., Nuseibeh, Bashar (2015) Automated Analysis of Security Requirements through Risk-based Argumentation. Journal of Systems and Software, 106 . pp. 102-116. ISSN 0164-1212. (doi:10.1016/j.jss.2015.04.065) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:77184)
[img]

Yu, Yijun and Tun, Thein Than and Tedeschi, Alessandra and Franqueira, Virginia N.L. and Nuseibeh, Bashar (2011) OpenArgue: Supporting Argumentation to Evolve Secure Software Systems. In: 2011 IEEE 19th International Requirements Engineering Conference. IEEE, pp. 351-352. ISBN 978-1-4577-0921-0. E-ISBN 978-1-4577-0924-1. (doi:10.1109/re.2011.6051671) (KAR id:77194)
[img]
Preview
[img]

Yuan, Haiyue and Li, Shujun (2020) MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80296)
[img] [img]

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17) (KAR id:69559)
[img]
Preview

Z

Zahrah, Fatima, Nurse, Jason R. C., Goldsmith, Michael (2020) #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. In: 2nd Workshop on Attackers and Cyber-Crime Operations (WACCO), at the IEEE European Symposium on Security and Privacy (Euro S&P). . IEEE (In press) (KAR id:81140)
[img]
Preview

Zhang, Nien Fan, Yao, L., Nenadic, A., Chin, J., Goble, C., Rector, A., Chadwick, David W., Otenko, Sassa, Shi, Q. (2007) Achieving Fine-grained Access Control in Virtual Organisations. Concurrency and Computation: Practice and Experience, 19 (9). pp. 1333-1352. ISSN 1532-0626. (doi:10.1002/cpe.1099) (KAR id:14581)
[img]
Preview

Zhao, Gansen, Chadwick, David W. (2005) Evolving Messaging Systems for Secure Role Based Messaging. In: Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems. . pp. 216-223. IEEE Computer Society ISBN 0-7695-2284-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:14321)

Zhao, Gansen and Chadwick, David W. (2008) On the Modeling of Bell-LaPadula Security Policies using RBAC. In: 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE. ISBN 978-0-7695-3315-5. (doi:10.1109/WETICE.2008.34) (KAR id:24030)
[img]
Preview

Zhao, Gansen, Chadwick, David W., Otenko, Sassa (2007) Obligation for Role Based Access Control. In: IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS07). . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:23994)

Zhao, Gansen and Otenko, Sassa and Chadwick, David W. (2006) Distributed Key Management for Secure Role Based Messaging. In: 20th International Conference on Advanced Information Networking and Applications. IEEE, pp. 132-137. ISBN 0-7695-2466-4. (doi:10.1109/AINA.2006.146) (KAR id:14484)
[img]
Preview

Zhao, Liming, Perez-Delgado, Carlos, Fitzsimons, Joseph, Benjamin, Simon (2017) A measurement driven analog of adiabatic quantum computation for frustration-free Hamiltonians. arXiv, . (Submitted) (KAR id:63385)
[img]
Preview

Zhao, Liming, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2016) Fast graph operations in quantum computation. Physical Review A, 93 (3). Article Number 032314. ISSN 2469-9926. E-ISSN 2469-9934. (doi:10.1103/PhysRevA.93.032314) (KAR id:58072)
[img]
Preview

Č

Čagalja, Mario, Perković, Toni, Bugarić, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002) (KAR id:69556)
[img]
Preview

This list was generated on Mon Feb 15 22:11:38 2021 GMT.