Andrew P. Martin

According to our database1, Andrew P. Martin authored at least 69 papers between 1993 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
RepCloud: Attesting to Cloud Service Dependency.
IEEE Trans. Services Computing, 2017

A framework for application partitioning using trusted execution environments.
Concurrency and Computation: Practice and Experience, 2017

2016
Analysis of Trusted Execution Environment usage in Samsung KNOX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

Breaking Down the Monarchy: Achieving Trustworthy and Open Cloud Ecosystem Governance with Separation-of-Powers.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Securing Application with Software Partitioning: A Case Study Using SGX.
Proceedings of the Security and Privacy in Communication Networks, 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

An evolutionary game-theoretic framework for cyber-threat information sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Security and Privacy in Smart Grid Demand Response Systems.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

KEDS: Decentralised Network Security for the Smart Home Environment.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Threat-Based Security Analysis for the Internet of Things.
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014

NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust.
Proceedings of the Trusted Systems - 6th International Conference, 2014

A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014

2013
A taxonomy for securely sharing information among others in a trust domain.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Using Propositional Logic for Requirements Verification of Service Workflow.
IEEE Trans. Industrial Informatics, 2012

SWSpec: The Requirements Specification Language in Service Workflow Environments.
IEEE Trans. Industrial Informatics, 2012

A Survey of Trust in Workflows and Relevant Contexts.
IEEE Communications Surveys and Tutorials, 2012

myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management.
Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, 2012

Provenance-Based Model for Verifying Trust-Properties.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Provenance as a Security Control.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Hardware Security for Device Authentication in the Smart Grid.
Proceedings of the Smart Grid Security - First International Workshop, 2012

TMR: Towards a Trusted MapReduce Infrastructure.
Proceedings of the Eighth IEEE World Congress on Services, 2012

On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

2011
Trustworthy Distributed Systems Through Integrity-Reporting.
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011

Trust in the Cloud.
Inf. Sec. Techn. Report, 2011

Managing application whitelists in trusted distributed systems.
Future Generation Comp. Syst., 2011

A multiple comparative study of test-with development product changes and their effects on team speed and product quality.
Empirical Software Engineering, 2011

Secure Virtual Layer Management in Clouds.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Verifying Trustworthiness of Virtual Appliances in Collaborative Environments.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Insiders analysis in Cloud computing focusing on home healthcare system.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Formalizing Trust Requirements and Specification in Service Workflow Environments.
Proceedings of the ICEIS 2011, 2011

myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

RepCloud: achieving fine-grained cloud TCB attestation with reputation systems.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
A verification system for interval-based specification languages.
ACM Trans. Softw. Eng. Methodol., 2010

Engineering Attestable Services.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Trusted Computing and Provenance: Better Together.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

An Abstract Model of a Trusted Platform.
Proceedings of the Trusted Systems - Second International Conference, 2010

Formal Trust Specification in Service Workflows.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Towards a Framework for Security in eScience.
Proceedings of the Sixth International Conference on e-Science, 2010

2009
Towards a Trustable Virtual Organisation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

On the Feasibility of Remote Attestation for Web Services.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2007
Grid security: Next steps.
Inf. Sec. Techn. Report, 2007

2006
A Taxonomy of Web Services Using CSP.
Electr. Notes Theor. Comput. Sci., 2006

Preface.
Electr. Notes Theor. Comput. Sci., 2006

Innovations for Grid Security from Trusted Computing.
Proceedings of the Security Protocols, 2006

ShibGrid: Shibboleth Access for the UK National Grid Service.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

Towards an open, trusted digital rights management platform.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Towards a Secure, Tamper-Proof Grid Platform.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Editorial.
Softw., Pract. Exper., 2005

2004
Security Principles for Public-Resource Modeling Research.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Teaching Formal Methods in Context.
Proceedings of the Teaching Formal Methods, CoLogNET/FME Symposium, 2004

2003
ZML: XML Support for Standard Z.
Proceedings of the ZB 2003: Formal Specification and Development in Z and B, 2003

On The Supervision and Assessment Of Part-Time Postgraduate Software Engineering Projects.
Proceedings of the 25th International Conference on Software Engineering, 2003

Generalising the Z Schema Calculus: Database Schemas and Beyond.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Climateprediction.net: Design Principles for Publicresource Modeling Research.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

e-Science Experiences: Software Engineering Practice and the EU DataGrid.
Proceedings of the 9th Asia-Pacific Software Engineering Conference (APSEC 2002), 2002

2001
Lifting in Z.
Electr. Notes Theor. Comput. Sci., 2001

1999
Relating Z and First-Order Logic.
Proceedings of the FM'99 - Formal Methods, 1999

1998
A Set-Theoretic Model for Real-Time Specification and Reasoning.
Proceedings of the Mathematics of Program Construction, 1998

1997
W Reconstructed.
Proceedings of the ZUM '97: The Z Formal Specification Notation, 1997

The Cogito Development System.
Proceedings of the Algebraic Methodology and Software Technology, 1997

1996
A Tactic Calculus-Abridged Version.
Formal Asp. Comput., 1996

1993
Encoding W: A Logic for Z in 2OBJ.
Proceedings of the FME '93: Industrial-Strength Formal Methods, 1993


  Loading...