Andrew C. Simpson

According to our database1, Andrew C. Simpson authored at least 88 papers between 1993 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study.
Comput. J., 2018

Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
On the formal interpretation and behavioural consistency checking of SysML blocks.
Software and System Modeling, 2017

Privacy Games for Syntactic Privacy Notions.
IACR Cryptology ePrint Archive, 2017

A Formal Model to Facilitate Security Testing in Modern Automotive Systems.
Proceedings of the Proceedings Joint Workshop on Handling IMPlicit and EXplicit knowledge in formal system development (IMPEX) and Formal and Model-Driven Techniques for Developing Trustworthy Systems (FM&MDD), 2017

On small-scale IT users' system architectures and cyber security: A UK case study.
Computers & Security, 2017

AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices.
Comput. J., 2017

On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

The Use of Data Protection Regulatory Actions as a Data Source for Privacy Economics.
Proceedings of the Computer Safety, Reliability, and Security, 2017

A UML Profile for Privacy-Aware Data Lifecycle Models.
Proceedings of the Computer Security, 2017

Personal Data Management: An Abstract Personal Data Lifecycle Model.
Proceedings of the Business Process Management Workshops, 2017

Towards a Principled Approach for Engineering Privacy by Design.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation.
Softw., Pract. Exper., 2016

Policy, statistics and questions: Reflections on UK cyber security disclosures.
J. Cybersecurity, 2016

Parallels Between Action-Object Mapping and Word-Object Mapping in Young Children.
Cognitive Science, 2016

On Safety and Security Requirements in Emerging Ubiquitous Computing Models.
Comput. J., 2016

Formal models for automotive systems and vehicular networks: Benefits and challenges.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Software Security Investment: The Right Amount of a Good Thing.
Proceedings of the IEEE Cybersecurity Development, 2016

Motivating Security Engineering with Economics: A Utility Function Approach.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

A case for the economics of secure software development.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Exploring the use of Intel SGX for Secure Many-Party Applications.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Formal Models for Privacy.
Proceedings of the Workshops of the EDBT/ICDT 2016 Joint Conference, 2016

Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

When the Winning Move is Not to Play: Games of Deterrence in Cyber Security.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Small-Scale Cyber Security.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Formal relational database design: an exercise in extending the formal template language.
Formal Asp. Comput., 2014

On a Process Algebraic Representation of Sequence Diagrams.
Proceedings of the Software Engineering and Formal Methods, 2014

On the Formal Interpretation of SysML Blocks Using a Safety Critical Case Study.
Proceedings of the Eighth Brazilian Symposium on Software Components, 2014

A Formal Model of SysML Blocks Using CSP for Assured Systems Engineering.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2014

2013
Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML.
Proceedings of the Formal Methods and Software Engineering, 2013

On the Cloud-Enabled Refinement Checking of Railway Signalling Interlockings.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013

2012
Listening Level Changes Music Similarity.
Proceedings of the 13th International Society for Music Information Retrieval Conference, 2012

2011
Conformance Checking of Dynamic Access Control Policies.
Proceedings of the Formal Methods and Software Engineering, 2011

Automatic Conformance Checking of Role-Based Access Control Policies via Alloy.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2010
On the Secure Sharing and Aggregation of Data to Support Systems Biology Research.
Proceedings of the Data Integration in the Life Sciences, 7th International Conference, 2010

Towards Formally Templated Relational Database Representations in Z.
Proceedings of the Abstract State Machines, 2010

Formalising and Validating RBAC-to-XACML Translation Using Lightweight Formal Methods.
Proceedings of the Abstract State Machines, 2010

On the Modelling and Analysis of Amazon Web Services Access Policies.
Proceedings of the Abstract State Machines, 2010

2009
On Formalizing and Normalizing Role-Based Access Control Systems.
Comput. J., 2009

On the Construction and Verification of Self-modifying Access Control Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

On the Secure Sharing of Legacy Data.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

On the utilisation of a service-oriented infrastructure to support radiologist training.
Proceedings of the Twenty-Second IEEE International Symposium on Computer-Based Medical Systems, 2009

2008
Towards a Formal Framework for Workflow Interoperability.
Proceedings of the Web Services and Formal Methods, 5th International Workshop, 2008

On the need for user-defined fine-grained access control policies for social networking applications.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

On the Facilitation of Fine-Grained Access to Distributed Healthcare Data.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Accessing and aggregating legacy data sources for healthcare research, delivery and training.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

On Formal Description of Synchronization Requirements in Multimedia Systems.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries.
Proceedings of the Global Healthgrid: e-Science Meets Biomedical Informatics, 2008

2007
On The Development of Secure Service-Oriented Architectures to Support Medical Research.
IJHISI, 2007

Integrative Biology - the challenges of developing a collaborative research environment for heart and cancer modelling.
Future Generation Comp. Syst., 2007

Towards Build-Time Interoperability of Workflow Definition Languages.
Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2007

Developing collaborative technology for neuro-science.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Switched Lightpaths for e-Health Applications: Issues and Challenges.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

2006
Securing web services for deployment in health grids.
Future Generation Comp. Syst., 2006

On tracker attacks in health grids.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Delegation in a Distributed Healthcare Context: A Survey of Current Approaches.
Proceedings of the Information Security, 9th International Conference, 2006

Towards a Fully Generic Theory of Data.
Proceedings of the Formal Methods and Software Engineering, 2006


A Prototype Infrastructure for the Secure Aggregation of Imaging and Pathology Data for Colorectal Cancer Care.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

Switched Lightpaths for e-Health Applications: a Feasibility Study.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

The Challenges of Developing a Collaborative Data and Compute Grid for Neurosciences.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
Towards secure Grid-enabled healthcare.
Softw., Pract. Exper., 2005

Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study.
Computer Supported Cooperative Work, 2005

On Deducibility and Anonymisation in Medical Databases.
Proceedings of the Secure Data Management, 2005

Protecting sensitive patient data via query modification.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Secure Wrapper for OGSA-DAI.
Proceedings of the Advances in Grid Computing, 2005

GIMI: Generic Infrastructure for Medical Informatics.
Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems (CBMS 2005), 2005

NeuroGrid: Using Grid Technology to Advance Neuroscience.
Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems (CBMS 2005), 2005

2004
Security Principles for Public-Resource Modeling Research.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Teaching Formal Methods in Context.
Proceedings of the Teaching Formal Methods, CoLogNET/FME Symposium, 2004

A relational approach to the capture of DICOM files for Grid-enabled medical imaging databases.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2003
On The Supervision and Assessment Of Part-Time Postgraduate Software Engineering Projects.
Proceedings of the 25th International Conference on Software Engineering, 2003

Generalising the Z Schema Calculus: Database Schemas and Beyond.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Climateprediction.net: Design Principles for Publicresource Modeling Research.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

1999
BSP in CSP: Easy as ABC.
Proceedings of the Parallel and Distributed Processing, 1999

1998
The effect of cue-enhancement on the intelligibility of nonsense word and sentence materials presented in noise.
Speech Communication, 1998

Enhancement techniques to improve the intelligibility of consonants in noise : speaker and listener effects.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

1996
Safety through security.
PhD thesis, 1996

Enhancing information-rich regions of natural VCV and sentence materials presented in noise.
Proceedings of the 4th International Conference on Spoken Language Processing, 1996

1995
Enhancing the perceptual salience of information-rich regions of natural intervocalic consonants.
Proceedings of the Fourth European Conference on Speech Communication and Technology, 1995

1994
A Formal Specification of an Automatic Train Protection System.
Proceedings of the FME '94: Industrial Benefit of Formal Methods, 1994

1993
Black box and glass box evaluation of the SUNDIAL system.
Proceedings of the Third European Conference on Speech Communication and Technology, 1993

Evaluating synthesised prosody in simulations of an automated telephone enquiry service.
Proceedings of the Third European Conference on Speech Communication and Technology, 1993


  Loading...