Andrew Hutchison

According to our database1, Andrew Hutchison authored at least 31 papers between 1994 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Experimenting with Machine Learning in Automated Intrusion Response.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2017
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models.
Proceedings of the Computer Network Security, 2017

2013
Enhancing Security Event Management Systems with Unsupervised Anomaly Detection.
Proceedings of the ICPRAM 2013, 2013

Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Challenges for Advanced Security Monitoring - The MASSIF Project.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Architecting a security strategy measurement and management system.
Proceedings of the Model-Driven Security Workshop, 2012

Security and Reliability Requirements for Advanced Security Event Management.
Proceedings of the Computer Network Security, 2012

2011
An Architecture for Secure Searchable Cloud Storage.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Practical Experiences with Purenet, a Self-Learning Malware Prevention System.
Proceedings of the Open Research Problems in Network Security, 2010

2008
Making the Water Move: Techno-Historic Limits in the Game Aesthetics of Myst and Doom.
Game Stud., 2008

2007
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions.
Proceedings of the New Approaches for Security, 2007

Persistent access control: a formal model for DRM.
Proceedings of the Seventh ACM Workshop on Digital Rights Management, 2007

Chameleon art: a platform for interactive art production.
Proceedings of the Second International Conference on Digital Interactive Media in Entertainment and Arts, 2007

Back to the Holodeck: new life for virtual reality?
Proceedings of the Second International Conference on Digital Interactive Media in Entertainment and Arts, 2007

2006
Ticket Based Identity System for DRM.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Verifiable digital object identity system.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2005
Requirement Analysis of Enterprise DRM Systems.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Fairer usage contracts for DRM.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

2003
Enhanced security protocol engineering through a unified multidimensional framework.
IEEE J. Sel. Areas Commun., 2003

2001
Interfacing Trusted Applications with Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

2000
A Generic Graphical Specification Environment for Security Protocol Modelling.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Predicting the Performance of Transactional Electronic Commerce Protocols.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

Incremental Security in Open, Untrusted Networks.
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 1999

1997
gGSS-API: a group enhanced generic security service.
Proceedings of the Information Security in Research and Business, 1997

1996
Electronic data interchange for health care.
IEEE Commun. Mag., 1996

Cryptographic key distribution and authentication protocols for secure group communication.
Proceedings of the Information Systems Security, 1996

Secure World Wide Web Access to Server Groups.
Proceedings of the Communications and Multimedia Security II, 1996

1995
Current Usage and Potential of Computer Supported Cooperative Work in Swiss Banks: An Empirical Study.
Proceedings of the Sixteenth International Conference on Information Systems, 1995

CSCW for Strategic Management in Swiss Enterprises: an Empirical Study.
Proceedings of the Fourth European Conference on Computer Supported Cooperative Work, 1995

1994
CSCW as opportunity for business process re-engineering.
Proceedings of the Business Process Re-Engineering: Information Systems Opportunities and Challenges, 1994


  Loading...