Ciarán Bryce

According to our database1, Ciarán Bryce authored at least 39 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Analysis of Cybersecurity Awareness Efforts for Swiss SMEs.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2019
Security governance as a service on the cloud.
J. Cloud Comput., 2019

2009
Report on the 4th international ERCIM workshop on software evolution and evolvability (Evol '08).
ACM SIGSOFT Softw. Eng. Notes, 2009

2008
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs).
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Introduction to the 4th international ERCIM workshop on software evolution and evolvability (Evol '08).
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, 2008

4th International ERCIM Workshop on Software Evolution and Evolvability (Evol'08).
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

Position paper: Meaningful updates to executing programs.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, 2008

A Language Model for Dynamic Code Updating.
Proceedings of the 1st ACM Workshop on Hot Topics in Software Upgrades, 2008

Message Quality for Ambient System Security.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2006
Scaling J2EE<sup>TM</sup> application servers with the Multi-tasking Virtual Machine.
Softw. Pract. Exp., 2006

2005
A resource management interface for the Java platform.
Softw. Pract. Exp., 2005

Towards an Evaluation Methodology for Computational Trust Systems.
Proceedings of the Trust Management, Third International Conference, 2005

Implementation of the SECURE Trust Engine.
Proceedings of the Trust Management, Third International Conference, 2005

Resource management for clusters of virtual machines.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Combating Spam with TEA.
Proceedings of the Second Annual Conference on Privacy, 2004

10th Workshop on Mobile Object Systems.
Proceedings of the Object-Oriented Technology: ECOOP 2004 Workshop Reader, 2004

2003
Coordinating processes with secure spaces.
Sci. Comput. Program., 2003

Using Trust for Secure Collaboration in Uncertain Environments.
IEEE Pervasive Comput., 2003

Agent-Based Services for Information Portals.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Mobile Object Systems: Resource-Aware Computation.
Proceedings of the Object-Oriented Technology: ECOOP 2003 Workshop Reader, 2003

2002
Mobile Object Systems.
Proceedings of the Object-Oriented Technology, 2002

Lana: An Approach to Programming Autonomous Systems.
Proceedings of the ECOOP 2002, 2002

2001
The JavaSeal Mobile Agent Kernel.
Auton. Agents Multi Agent Syst., 2001

The Lana Aproach to Wireless Computing.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

7th Workshop on Mobile Object Systems.
Proceedings of the Object-Oriented Technology ECOOP 2001 Workshop Reader, 2001

Coordination and Security on the Internet.
Proceedings of the Coordination of Internet Agents: Models, Technologies, and Applications, 2001

2000
An approach to safe object sharing.
Proceedings of the 2000 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2000

A Security Framework for a Mobile Agent System.
Proceedings of the Computer Security, 2000

Mobile Object Systems.
Proceedings of the Object-Oriented Technology, 2000

1999
A Coordination Model Agents Based on Secure Spaces.
Proceedings of the Coordination Languages and Models, Third International Conference, 1999

1998
4th ECOOP Workshop on Mobility: Secure Internet Mobile Computations.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

1997
CWASAR: a European Infrastructure for Secure Electronic Commerce.
J. Comput. Secur., 1997

Security Engineering of Lattice-Based Policies.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1995
Matching micro-kernels to modern applications using fine-grained memory protection.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

An approach to information security in distributed systems.
Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), 1995

1994
Compile-Time Detection of Information Flow in Sequential Programs.
Proceedings of the Computer Security, 1994

1993
An Access Control Model or a Parallel Object-Based Programming Language.
Proceedings of the Security for Object-Oriented Systems, 1993

Information Flow Control in Object-Oriented Programs.
Proceedings of the Security for Object-Oriented Systems, 1993

Information Flow Control in a Parallel Language Framework.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993


  Loading...